首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
As a new mode and means of smart manufacturing, smart cloud manufacturing (SCM) faces great challenges in massive supply and demand, dynamic resource collaboration and intelligent adaptation. To address the problem, this paper proposes an SCM-oriented dynamic supply-demand (S-D) intelligent adaptation model for massive manufacturing services. In this model, a collaborative network model is established based on the properties of both the supply-demand and their relationships; in addition, an algorithm based on deep graph clustering (DGC) and aligned sampling (AS) is used to divide and conquer the large adaptation domain to solve the problem of the slow computational speed caused by the high complexity of spatiotemporal search in the collaborative network model. At the same time, an intelligent supply-demand adaptation method driven by the quality of service (QoS) is established, in which the experiences of adaptation are shared among adaptation subdomains through deep reinforcement learning (DRL) powered by a transfer mechanism to improve the poor adaptation results caused by dynamic uncertainty. The results show that the model and the solution proposed in this paper can perform collaborative and intelligent supply-demand adaptation for the massive and dynamic resources in SCM through autonomous learning and can effectively perform global supply-demand matching and optimal resource allocation.  相似文献   

2.
We focus on a cloud computing environment by using open source softwares such as OpenStack and Eucalyptus because of the unification management of data and low cost. A cloud computing is attracting attention as a network service to share the computing resources, that is, networks, servers, storage, applications, and services. We propose jump diffusion models based on stochastic differential equations in order to consider the interesting aspect of the provisioning process. Especially, the reliability and maintainability analysis tool for cloud computing is developed in this paper. Also, we analyze actual data to show numerical illustrations of application of the software analysis tool considering the characteristics of cloud computing. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

3.
Container virtual technology aims to provide program independence and resource sharing. The container enables flexible cloud service. Compared with traditional virtualization, traditional virtual machines have difficulty in resource and expense requirements. The container technology has the advantages of smaller size, faster migration, lower resource overhead, and higher utilization. Within container-based cloud environment, services can adopt multi-target nodes. This paper reports research results to improve the traditional trust model with consideration of cooperation effects. Cooperation trust means that in a container-based cloud environment, services can be divided into multiple containers for different container nodes. When multiple target nodes work for one service at the same time, these nodes are in a cooperation state. When multi-target nodes cooperate to complete the service, the target nodes evaluate each other. The calculation of cooperation trust evaluation is used to update the degree of comprehensive trust. Experimental simulation results show that the cooperation trust evaluation can help solving the trust problem in the container-based cloud environment and can improve the success rate of following cooperation.  相似文献   

4.
Kubernetes is an open-source container management tool which automates container deployment, container load balancing and container(de)scaling, including Horizontal Pod Autoscaler (HPA), Vertical Pod Autoscaler (VPA). HPA enables flawless operation, interactively scaling the number of resource units, or pods, without downtime. Default Resource Metrics, such as CPU and memory use of host machines and pods, are monitored by Kubernetes. Cloud Computing has emerged as a platform for individuals beside the corporate sector. It provides cost-effective infrastructure, platform and software services in a shared environment. On the other hand, the emergence of industry 4.0 brought new challenges for the adaptability and infusion of cloud computing. As the global work environment is adapting constituents of industry 4.0 in terms of robotics, artificial intelligence and IoT devices, it is becoming eminent that one emerging challenge is collaborative schematics. Provision of such autonomous mechanism that can develop, manage and operationalize digital resources like CoBots to perform tasks in a distributed and collaborative cloud environment for optimized utilization of resources, ensuring schedule completion. Collaborative schematics are also linked with Bigdata management produced by large scale industry 4.0 setups. Different use cases and simulation results showed a significant improvement in Pod CPU utilization, latency, and throughput over Kubernetes environment.  相似文献   

5.
6.
In recent years, progressive developments have been observed in recent technologies and the production cost has been continuously decreasing. In such scenario, Internet of Things (IoT) network which is comprised of a set of Unmanned Aerial Vehicles (UAV), has received more attention from civilian to military applications. But network security poses a serious challenge to UAV networks whereas the intrusion detection system (IDS) is found to be an effective process to secure the UAV networks. Classical IDSs are not adequate to handle the latest computer networks that possess maximum bandwidth and data traffic. In order to improve the detection performance and reduce the false alarms generated by IDS, several researchers have employed Machine Learning (ML) and Deep Learning (DL) algorithms to address the intrusion detection problem. In this view, the current research article presents a deep reinforcement learning technique, optimized by Black Widow Optimization (DRL-BWO) algorithm, for UAV networks. In addition, DRL involves an improved reinforcement learning-based Deep Belief Network (DBN) for intrusion detection. For parameter optimization of DRL technique, BWO algorithm is applied. It helps in improving the intrusion detection performance of UAV networks. An extensive set of experimental analysis was performed to highlight the supremacy of the proposed model. From the simulation values, it is evident that the proposed method is appropriate as it attained high precision, recall, F-measure, and accuracy values such as 0.985, 0.993, 0.988, and 0.989 respectively.  相似文献   

7.
Cloud computing provides easy and on-demand access to computing resources in a configurable pool. The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines (VMs), instead of being restricted on a single physical server. When more and more network services are deployed on the cloud, the detection of the intrusion likes Distributed Denial-of-Service (DDoS) attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system. In this paper, we propose a cloud-based intrusion detection system (IDS) which inspects the features of data flow between neighboring VMs, analyzes the probability of being attacked on each pair of VMs and then regards it as independent evidence using Dempster-Shafer theory, and eventually combines the evidence among all pairs of VMs using the method of evidence fusion. Unlike the traditional IDS that focus on analyzing the entire network service externally, our proposed algorithm makes full use of the internal interactions between VMs, and the experiment proved that it can provide more accurate results than the traditional algorithm.  相似文献   

8.
The authors propose an innovative Internet of Things (IoT) based E-commerce business model Cloud Laundry for mass scale laundry services. The model utilises big data analytics, intelligent logistics management, and machine learning techniques. Using GPS and real-time update of big data, it calculates the best transportation path and update and re-route the logistic terminals quickly and simultaneously. Cloud laundry intelligently and dynamically provides the best laundry solutions based on the current state spaces of the laundry terminals through the user's specifications and thus offers local hotel customers with convenient, efficient, and transparent laundry services. Taking advantage of the rapid development of the big data industry, user interest modelling, and information security and privacy considerations, cloud laundry uses smartphone terminal control and big data models to maintain customers’ security needs. Different from the traditional laundry industry, cloud laundry companies have higher capital turnover, more liquidity, and stronger profitability. Therefore, this new generation of smart laundry business model could be of interest to not only academic researchers, but E-commerce entrepreneurs as well.  相似文献   

9.
Task composition in cloud manufacturing involves the selection of appropriate services from the cloud manufacturing platform and combining them to process the task with the purpose of achieving its expected performance. Calculation methods for achieving the performance expected by customers when the task has two or more composition patterns (e.g. sequential and switching pattern) are necessary because most tasks have multiple composition patterns in cloud manufacturing. Previous studies, however, have focused only on a single composition pattern. In this paper, we regard a task as a directed acyclic graph, and propose graph-based algorithms to obtain cost, execution time, quality and reliability of a task having multiple composition patterns. In addition, we model the task composition problem by introducing cost and execution time as performance attributes, and quality and reliability as basic attributes in the Kano model. Finally, an experiment to compare the performances of three metaheuristic algorithms (namely, variable neighbourhood search, genetic, and simulated annealing) is conducted to solve the problem. The experimental result shows that the variable neighbourhood search algorithm yields better and more stable solutions than the genetic algorithm and simulated annealing algorithms.  相似文献   

10.
We consider an agent that must choose repeatedly among several actions. Each action has a certain probability of giving the agent an energy reward, and costs may be associated with switching between actions. The agent does not know which action has the highest reward probability, and the probabilities change randomly over time. We study two learning rules that have been widely used to model decision-making processes in animals—one deterministic and the other stochastic. In particular, we examine the influence of the rules'' ‘learning rate’ on the agent''s energy gain. We compare the performance of each rule with the best performance attainable when the agent has either full knowledge or no knowledge of the environment. Over relatively short periods of time, both rules are successful in enabling agents to exploit their environment. Moreover, under a range of effective learning rates, both rules are equivalent, and can be expressed by a third rule that requires the agent to select the action for which the current run of unsuccessful trials is shortest. However, the performance of both rules is relatively poor over longer periods of time, and under most circumstances no better than the performance an agent could achieve without knowledge of the environment. We propose a simple extension to the original rules that enables agents to learn about and effectively exploit a changing environment for an unlimited period of time.  相似文献   

11.
目的通过三维扫描仪得到的点云数据往往存在很多异常值,例如噪点、遗失点和外部点等。在这些异常值存在的情况下,为了提高三维点云数据的分类精度,提出一种基于集成学习的强鲁棒性三维点云数据分类方法。方法提出一种基于最大投票法的集成学习思想,将2个深度神经网络的分类结果进行集成,从而提高网络的泛化性和准确性;采用全局特征增强和中心损失函数来优化神经网络结构,提高分类精度并增强鲁棒性。结果文中方法缩短模型训练时间至30个迭代次数,且在有噪点、丢失点和外部点的情况下分类精度均得到有效提升。结论提出的EL-3D算法在含有噪点、丢失点和外部点的情况下,鲁棒性效果要优于目前的点云分类方法。  相似文献   

12.
With the rapid development of the internet of things (IoT), electricity consumption data can be captured and recorded in the IoT cloud center. This provides a credible data source for enterprise credit scoring, which is one of the most vital elements during the financial decision-making process. Accordingly, this paper proposes to use deep learning to train an enterprise credit scoring model by inputting the electricity consumption data. Instead of predicting the credit rating, our method can generate an absolute credit score by a novel deep ranking model–ranking extreme gradient boosting net (rankXGB). To boost the performance, the rankXGB model combines several weak ranking models into a strong model. Due to the high computational cost and the vast amounts of data, we design an edge computing framework to reduce the latency of enterprise credit evaluation. Specially, we design a two-stage deep learning task architecture, including a cloud-based weak credit ranking and an edge-based credit score calculation. In the first stage, we send the electricity consumption data of the evaluated enterprise to the computing cloud server, where multiple weak-ranking networks are executed in parallel to produce multiple weak-ranking results. In the second stage, the edge device fuses multiple ranking results generated in the cloud server to produce a more reliable ranking result, which is used to calculate an absolute credit score by score normalization. The experiments demonstrate that our method can achieve accurate enterprise credit evaluation quickly.  相似文献   

13.
Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks, etc.), customers require additional assurances before adopting cloud services. Moreover, the continuous integration and continuous deployment of the code fragments have made cloud services more prone to security breaches. In this study, the model based on the root of trust for continuous integration and continuous deployment is proposed, instead of only relying on a single sign-on authentication method that typically uses only id and password. The underlying study opted hardware security module by utilizing the Trusted Platform Module (TPM), which is commonly available as a cryptoprocessor on the motherboards of the personal computers and data center servers. The preliminary proof of concept demonstrated that the TPM features can be utilized through RESTful services to establish the root of trust for continuous integration and continuous deployment pipeline and can additionally be integrated as a secure microservice feature in the cloud computing environment.  相似文献   

14.
Considering cloud computing from an organizational and end user computing point of view, it is a new paradigm for deploying, managing and offering services through a shared infrastructure. Current development of cloud computing applications, however, are the lack of a uniformly approach to cope with the heterogeneous information fusion. This leads cloud computing to inefficient development and a low potential reuse. This study addresses these issues to propose a novel Web 2.0 Mashups as a Service, called WMaaS, which is a fundamental cloud service model. The WMaaS is developed based on a XML-based Mashups Architecture (XMA) that is composed of Web 2.0 Mashups technologies, including Web Data, Web API, Web Interaction, and Web Presentation to associate with existing service models. To demonstrate the feasibility of this approach, this study implemented a Ubiquitous Location-based Service System (ULSS) that is a cloud computing application developed based on WMaaS to provide continuous and location-based schedule information for organization monitoring and end user needs.  相似文献   

15.
Mobile edge computing (MEC) provides effective cloud services and functionality at the edge device, to improve the quality of service (QoS) of end users by offloading the high computation tasks. Currently, the introduction of deep learning (DL) and hardware technologies paves a method in detecting the current traffic status, data offloading, and cyberattacks in MEC. This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC (AIMDO-SMEC) systems. The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks (SNN) to determine the traffic status in the MEC system. Also, an adaptive sampling cross entropy (ASCE) technique is utilized for data offloading in MEC systems. Moreover, the modified salp swarm algorithm (MSSA) with extreme gradient boosting (XGBoost) technique was implemented to identification and classification of cyberattack that exist in the MEC systems. For examining the enhanced outcomes of the AIMDO-SMEC technique, a comprehensive experimental analysis is carried out and the results demonstrated the enhanced outcomes of the AIMDO-SMEC technique with the minimal completion time of tasks (CTT) of 0.680.  相似文献   

16.
《工程(英文)》2021,7(9):1248-1261
This paper synchronizes control theory with computer vision by formalizing object tracking as a sequential decision-making process. A reinforcement learning (RL) agent successfully tracks an interface between two liquids, which is often a critical variable to track in many chemical, petrochemical, metallurgical, and oil industries. This method utilizes less than 100 images for creating an environment, from which the agent generates its own data without the need for expert knowledge. Unlike supervised learning (SL) methods that rely on a huge number of parameters, this approach requires far fewer parameters, which naturally reduces its maintenance cost. Besides its frugal nature, the agent is robust to environmental uncertainties such as occlusion, intensity changes, and excessive noise. From a closed-loop control context, an interface location-based deviation is chosen as the optimization goal during training. The methodology showcases RL for real-time object-tracking applications in the oil sands industry. Along with a presentation of the interface tracking problem, this paper provides a detailed review of one of the most effective RL methodologies: actor–critic policy.  相似文献   

17.
江玉杰  姚志刚 《包装工程》2019,40(5):162-168
目的研究随机因素对2种调箱方式的影响,以体现合作调箱方式在随机环境下的优越性。方法综合考虑港口空箱需求和空箱运力限额的随机性,以决策周期内调箱总成本最小为目标,构建随机环境下班轮公司之间合作调箱模型,然后通过算例,研究不同港口服务水平和运力限制水平对2种调箱方式的影响,以及对调箱系统中随机因素进行灵敏度分析。结果当班轮公司采用保守-成本型决策、保守-服务型决策、冒险-成本型决策、冒险-服务型决策时,2种调箱方式的总成本差值分别为9638,22862,10710,19284美元。结论降低运力限制水平可以压缩调箱总成本,但是提高港口服务水平会增加调箱总成本,且当港口服务水平和运力限制水平均处于高值时,合作调箱方式的优势更加显著;与单独调箱方式相比,合作调箱方式可以降低调箱系统中随机因素波动对调箱总成本的影响。  相似文献   

18.
Resource allocation in auctions is a challenging problem for cloud computing. However, the resource allocation problem is NP-hard and cannot be solved in polynomial time. The existing studies mainly use approximate algorithms such as PTAS or heuristic algorithms to determine a feasible solution; however, these algorithms have the disadvantages of low computational efficiency or low allocate accuracy. In this paper, we use the classification of machine learning to model and analyze the multi-dimensional cloud resource allocation problem and propose two resource allocation prediction algorithms based on linear and logistic regressions. By learning a small-scale training set, the prediction model can guarantee that the social welfare, allocation accuracy, and resource utilization in the feasible solution are very close to those of the optimal allocation solution. The experimental results show that the proposed scheme has good effect on resource allocation in cloud computing.  相似文献   

19.
The two-stream convolutional neural network exhibits excellent performance in the video action recognition. The crux of the matter is to use the frames already clipped by the videos and the optical flow images pre-extracted by the frames, to train a model each, and to finally integrate the outputs of the two models. Nevertheless, the reliance on the pre-extraction of the optical flow impedes the efficiency of action recognition, and the temporal and the spatial streams are just simply fused at the ends, with one stream failing and the other stream succeeding. We propose a novel hidden twostream collaborative (HTSC) learning network that masks the steps of extracting the optical flow in the network and greatly speeds up the action recognition. Based on the two-stream method, the two-stream collaborative learning model captures the interaction of the temporal and spatial features to greatly enhance the accuracy of recognition. Our proposed method is highly capable of achieving the balance of efficiency and precision on large-scale video action recognition datasets.  相似文献   

20.
The shortage of computation methods and storage devices has largely limited the development of multi-objective optimization in industrial processes. To improve the operational levels of the process industries, we propose a multi-objective optimization framework based on cloud services and a cloud distribution system. Real-time data from manufacturing procedures are first temporarily stored in a local database, and then transferred to the relational database in the cloud. Next, a distribution system with elastic compute power is set up for the optimization framework. Finally, a multi-objective optimization model based on deep learning and an evolutionary algorithm is proposed to optimize several conflicting goals of the blast furnace ironmaking process. With the application of this optimization service in a cloud factory, iron production was found to increase by 83.91 t∙d−1, the coke ratio decreased 13.50 kg∙t−1, and the silicon content decreased by an average of 0.047%.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号