共查询到20条相似文献,搜索用时 15 毫秒
1.
Healthcare is a fundamental part of every individual’s life. The healthcare industry is developing very rapidly with the help of advanced technologies. Many researchers are trying to build cloud-based healthcare applications that can be accessed by healthcare professionals from their premises, as well as by patients from their mobile devices through communication interfaces. These systems promote reliable and remote interactions between patients and healthcare professionals. However, there are several limitations to these innovative cloud computing-based systems, namely network availability, latency, battery life and resource availability. We propose a hybrid mobile cloud computing (HMCC) architecture to address these challenges. Furthermore, we also evaluate the performance of heuristic and dynamic machine learning based task scheduling and load balancing algorithms on our proposed architecture. We compare them, to identify the strengths and weaknesses of each algorithm; and provide their comparative results, to show latency and energy consumption performance. Challenging issues for cloud-based healthcare systems are discussed in detail. 相似文献
2.
3.
Hui-Chin Wu 《中国工程学刊》2016,39(6):755-764
Distance learning is gradually relocating from Internet-based e-learning platforms to a mobile cloud-based environment. Cloud is a technology which allows the delivery of teaching material, shared learning experience, and exchanges of knowledge with great proficiency. In this paper, we design a mobile cloud-based learning platform adapted to the needs of practice-oriented education, such as teaching of various sports. The platform enables sport students not only to learn skills, but also to view and analyze learning outcomes anytime and anywhere. It is just as easy for teachers because, first, they can share the online learning activities with students and, second, can provide instant assessments of outcomes. The paper explains how the environment can help sport teaching in higher education and how students can use it to improve skills. A specially developed table tennis course employing the cloud environment is the subject for investigating via a questionnaire what students think about it. Their responses, compiled from the questionnaire and follow-up interviews, are statistically analyzed. The results indicate that, overall, experience with the environment agrees with the top four reasons that Jelavic (2014) lists in support of the role of e-learning in sport education and reveals that it is viewed as a fit and useful platform for the purpose. 相似文献
4.
Liu Xian Xiao Guozhen 《Applicable Algebra in Engineering, Communication and Computing》1995,6(3):159-169
Cryptographic sequence generators are discussed in which a linear feedback shift register (LFSR) is clock controlled in a pseudorandom manner by another register. A model of clock-controlled sequences is proposed. The necessary and sufficient condition guaranteeing the maximal linear complexity and the maximal period of such sequences is given. Two kinds of improved models having better statistical properties are given. In order to study the security of this model, three types of algebraic attacking algorithms are proposed. If the length of the second LFSR in such a model is large, the model can resist our algebraic attacks. 相似文献
5.
6.
基于云计算和大数据教学实训平台的设计研究 总被引:3,自引:0,他引:3
谭忠理 《工程设计CAD及自动化》2014,(8):86-90
云计算、大数据是当前信息产业和教育领域的热点。云计算的核心技术是基于虚拟化的技术,而大数据的核心基础是基于集群的计算技术。论文围绕云计算与大数据的核心特点,设计实现一套适合教学实训的云计算大数据硬件实验平台。平台采用瘦终端+集群的硬件解决方案,构建虚拟化平台,以满足普通的教学实验,并构建虚拟化实验环境;在此基础上构建多种集群计算环境,以满足大数据和高性能计算教学实训的要求。本平台融合虚拟化和集群计算的特点,提供统一的解决方案,具有一体化、高密度、多平台、高性价比等特点。 相似文献
7.
In this new information era, the transfer of data and information has become a very important matter. Transferred data must be kept secured from unauthorized persons using cryptography. The science of cryptography depends not only on complex mathematical models but also on encryption keys. Amino acid encryption is a promising model for data security. In this paper, we propose an amino acid encryption model with two encryption keys. The first key is generated randomly using the genetic algorithm. The second key is called the protein key which is generated from converting DNA to a protein message. Then, the protein message and the first key are used in the modified Playfair matrix to generate the cypher message. The experimental results show that the proposed model survives against known attacks such as the Brute-force attack and the Ciphertext-only attack. In addition, the proposed model has been tested over different types of characters including white spaces and special characters, as all the data is encoded to 8-bit binary. The performance of the proposed model is compared with other models using encryption time and decryption time. The model also balances all three principles in the CIA triad. 相似文献
8.
屠卫 《成组技术与生产现代化》2015,(4):44-52
介绍了云计算技术.云计算技术可实现并行计算、分布式计算和网格计算等.以Google云计算平台为例,阐述了云计算三大关键技术:GFS分布式文件、BigTable分布式数据库以及Map-Reduce编程模型.基于Apache的Hadoop-0.20.2平台,通过WordCount实例,分析了云计算的实现机制与工作过程,并讨论了云计算技术的发展问题. 相似文献
9.
Sumbal Zahoor Ishtiaq Ahmad Ateeq Ur Rehman Elsayed Tag Eldin Nivin A. Ghamry Muhammad Shafiq 《计算机、材料和连续体(英文)》2023,75(1):311-327
The development of the Next-Generation Wireless Network(NGWN) is becoming a reality. To conduct specialized processes more, rapidnetwork deployment has become essential. Methodologies like NetworkFunction Virtualization (NFV), Software-Defined Networks (SDN), andcloud computing will be crucial in addressing various challenges that 5Gnetworks will face, particularly adaptability, scalability, and reliability. Themotivation behind this work is to confirm the function of virtualizationand the capabilities offered by various virtualization platforms, includinghypervisors, clouds, and containers, which will serve as a guide to dealingwith the stimulating environment of 5G. This is particularly crucial whenimplementing network operations at the edge of 5G networks, where limitedresources and prompt user responses are mandatory. Experimental resultsprove that containers outperform hypervisor-based virtualized infrastructureand cloud platforms’ latency and network throughput at the expense of highervirtualized processor use. In contrast to public clouds, where a set of rules iscreated to allow only the appropriate traffic, security is still a problem withcontainers. 相似文献
10.
Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab S. Band Amir Mosavi 《计算机、材料和连续体(英文)》2023,74(2):2625-2640
Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double encryption algorithm will be implemented to send data in a secure format. First, the XOR function will be applied to plain text, and then salt technique will be used. Finally, a reversing mechanism will be implemented on that data to provide more data security. To decrypt data, the cipher text will be reversed, salt will be removed, and XOR will be implemented. At the end of the paper, the proposed algorithm will be compared with other algorithms, and it will conclude how much better the existing algorithm is than other algorithms. 相似文献
11.
13.
Nithya Rekha Sivakumar Sara Ghorashi Mona Jamjoom Mai Alduailij 《计算机、材料和连续体(英文)》2020,65(3):1925-1943
In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance. For remote execution, recent studies suggested downloading all or part of mobile application from mobile device. On the other hand, in offloading process, mobile device energy consumption, Central Processing Unit (CPU) utilization, execution time, remaining battery life and amount of data transmission in network were related to one or more constraints by frameworks designed. To address the issues, a Heuristic and Bent Key Exchange (H-BKE) method can be considered by both ways to optimize energy consumption as well as to improve security during offloading. First, an energy efficient offloading model is designed using Reactive Heuristic Offloading algorithm where, the secondary users are allocated with the unused primary users’ spectrum. Next, a novel AES algorithm is designed that uses a Bent function and Rijndael variant with the advantage of large block size is hard to interpret and hence is said to ensure security while accessing primary users’ unused spectrum by the secondary user. Simulations are conducted for efficient offloading in mobile cloud and performance valuations are carried on the way to demonstrate that our projected technique is successful in terms of time consumption, energy consumption along with the security aspects covered during offloading in MCC. 相似文献
14.
Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures. It offers tremendous advantages for enterprises and service providers. It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service. To realize access control in a multi-tenant cloud computing environment, this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants. The model consists of three submodels, which achieve trust relationships between tenants with different granularities andsatisfy the requirements of different application scenarios. With an established trustrelation in MT-UCON (Multi-tenant Usage Access Control), the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor. In addition, the security of the model is analyzed by an information flow method. The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants. 相似文献
15.
云计算架构是实现标准资源信息共享的有效手段之一。本文通过对标准化资源共享服务平台的建设方案调查,结合云计算环境下的标准化资源共享服务平台构建研究,构建基于云计算的标准化资源共享服务平台。在介绍了标准化资源服务技术的发展现状基础上,阐述了云计算、标准化资源共享服务平台的概念、内涵及特点,设计出标准化资源共享服务平台的体系架构,并基于该平台设计了资源检索、管理、分析等多种云服务。实现政府、行业、机构、企业、专家、公众等标准化资源数字信息资源的共知共建共享,按需为用户提供个性化标准化数字资源(如查询、阅读、下载、分享等等)服务。 相似文献
16.
基于Python语言进行Abaqus二次开发,可实现建模、分析、后处理过程,对于一些需要重复操作的仿真分析,可大大提高工作效率。但即使使用这种模式,使用者仍然需要购买、安装Abaqus软件。论文针对拉丝模的拉拔过程开发了基于Web的拉丝模在线仿真系统。通过该系统用户可通过Web提交参数,如模具参数、材料参数、工艺参数等,由云后台进行计算,并自动生成仿真报告;用户可在线下载仿真报告、动画等。使用这种模式在不需要购买昂贵的CAE软件、不需要熟悉CAE软件的情况下,一样可以进行CAE分析。降低了CAE技术的使用门槛。 相似文献
17.
This paper addressed the order tracking and allocation problem in an apparel manufacturing environment with multiple plants. A cloud-based intelligent decision-making system was developed to tackle this problem, which combined radio frequency identification and cloud computing technologies to capture real-time production records and make remote production order tracking, and employed computational intelligence techniques to generate effective order allocation solutions to appropriate plants. To evaluate the effectiveness of the proposed system, the system was implemented in an apparel manufacturing company with multiple plants, which reported distinct reductions in production costs and increases in production efficiency. This paper also investigated learning phenomenon in production and its effects on production efficiency and decision-making performance. 相似文献
18.
目的研究基于云计算的中小型印刷企业供应物流管理中的采购管理和库存管理系统,实现按需付费的供应物流管理服务。方法首先采用基于BPMN(业务流程建模与标注)的业务流程和用例图对系统进行分析,构建系统的业务流程和数据流程模型;其次采用类图实现系统的数据库设计,采用标准化的服务语义定义系统的服务接口;最后在本地计算机上开发测试系统,并将系统部署到GAE(Google App Engine)平台上。结果基于云计算的中小型印刷企业供应物流管理系统可满足中小型印刷企业拿来即用、按需付费的低成本信息化需求。结论该系统将供应物流管理系统和云计算技术结合起来,提高了中小型印刷企业的信息化水平,降低了企业信息化的成本。 相似文献
19.
Paweł Lula Octavian Dospinescu Daniel Homocianu Napoleon-Alexandru Sireteanu 《计算机、材料和连续体(英文)》2021,66(3):2425-2443
Our primary research hypothesis stands on a simple idea: The evolution of top-rated publications on a particular theme depends heavily on the progress and maturity of related topics. And this even when there are no clear relations or some concepts appear to cease to exist and leave place for newer ones starting many years ago. We implemented our model based on Computer Science Ontology (CSO) and analyzed 44 years of publications. Then we derived the most important concepts related to Cloud Computing (CC) from the scientific collection offered by Clarivate Analytics. Our methodology includes data extraction using advanced web crawling techniques, data preparation, statistical data analysis, and graphical representations. We obtained related concepts after aggregating the scores using the Jaccard coefficient and CSO Ontology. Our article reveals the contribution of Cloud Computing topics in research papers in leading scientific journals and the relationships between the field of Cloud Computing and the interdependent subdivisions identified in the broader framework of Computer Science. 相似文献
20.
With the development of information technology, cloud computing technology has brought many conveniences to all aspects of work and life. With the continuous promotion, popularization and vigorous development of e-government and e-commerce, the number of documents in electronic form is getting larger and larger. Electronic document is an indispensable main tool and real record of e-government and business activities. How to scientifically and effectively manage electronic documents? This is an important issue faced by governments and enterprises in improving management efficiency, protecting state secrets or business secrets, and reducing management costs. This paper discusses the application of cloud computing technology in the construction of electronic file management system, proposes an architecture of electronic file management system based on cloud computing, and makes a more detailed discussion on key technologies and implementation. The electronic file management system is built on the cloud architecture to enable users to upload, download, share, set security roles, audit, and retrieve files based on multiple modes. An electronic file management system based on cloud computing can make full use of cloud storage, cloud security, and cloud computing technologies to achieve unified, reliable, and secure management of electronic files. 相似文献