We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.
This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others. 相似文献
Timonacic acid (TCA) was successfully labeled with 99mTc. The influence exerted on the reaction by the substrate and reducing agent concentrations, pH of the reaction mixture, and reaction time was examined, and in vitro stability of 99mTc-TCA was evaluated. The maximum labeling yield was 98.5 ± 0.6%. The complex was stable throughout the working period (6 h). A study of in-vivo biodistribution in mice showed that the maximum uptake of 99mTc-TCA in the liver was 22.3 ± 0.3% of the injected activity per gram of the tissue or organ (% ID/g) at 30 min post injection. The clearance from the mice appeared to proceed via the circulation mainly through the kidneys and urine (approximately 56% of the injected dose at 1 h after injection). The liver uptake of 99mTc-TCA is higher than that of 99mTc-UDCA (ursodeoxycholic acid); therefore, 99mTc-TCA shows more promise for liver SPECT. 相似文献
In this paper, the effect of mass diffusion in a thermoelastic nanoscale beam in context Lord and Shulman theory is studied. The analytical solution in the Laplace domain is obtained for lateral deflection, temperature, displacement, concentration, stress and chemical potential. The both ends of the nanoscale beam are simply supported. The basic equations have been written in the form of a vector-matrix differential equation in the Laplace transform domain, which is then solved by an eigenvalue approach. The results obtained are presented graphically for the effect of time and mass diffusion to display the phenomena physical meaning. 相似文献
This research proposes a machine learning approach using fuzzy logic to build an information retrieval system for the next crop rotation. In case-based reasoning systems, case representation is critical, and thus, researchers have thoroughly investigated textual, attribute-value pair, and ontological representations. As big databases result in slow case retrieval, this research suggests a fast case retrieval strategy based on an associated representation, so that, cases are interrelated in both either similar or dissimilar cases. As soon as a new case is recorded, it is compared to prior data to find a relative match. The proposed method is worked on the number of cases and retrieval accuracy between the related case representation and conventional approaches. Hierarchical Long Short-Term Memory (HLSTM) is used to evaluate the efficiency, similarity of the models, and fuzzy rules are applied to predict the environmental condition and soil quality during a particular time of the year. Based on the results, the proposed approaches allows for rapid case retrieval with high accuracy. 相似文献
Recently, many applications have used Peer-to-Peer (P2P) systems to overcome the current problems with client/server systems
such as non-scalability, high bandwidth requirement and single point of failure. In this paper, we propose an efficient scheme
to support efficient range query processing over structured P2P systems, while balancing both the storage load and access
load. The paper proposes a rotating token scheme to balance the storage load by placing joining nodes in appropriate locations
in the identifier space to share loads with already overloaded nodes. Then, to support range queries, we utilize an order-preserving
mapping function to map keys to nodes in order preserving way and without hashing. This may result in an access load imbalance
due to non-uniform distribution of keys in the identifier space. Thus, we propose an adaptive replication scheme to relieve
overloaded nodes by shedding some load on other nodes to balance the access load. We derive a formula for estimating the overhead
of the proposed adaptive replication scheme. In this study, we carry simulation experiments with synthetic data to measure
the performance of the proposed schemes. Our simulation experiments show significant gains in both storage load balancing
and access load balancing. 相似文献
In the recent years it has been demonstrated that type-2 fuzzy logic systems are more effective in modeling and control of complex nonlinear systems compared to type-1 fuzzy logic systems. An inverse controller based on type-2 fuzzy model can be proposed since inverse model controllers provide an efficient way to control nonlinear processes. Even though various fuzzy inversion methods have been devised for type-1 fuzzy logic systems up to now, there does not exist any method for type-2 fuzzy logic systems. In this study, a systematic method has been proposed to form the inverse of the interval type-2 Takagi-Sugeno fuzzy model based on a pure analytical method. The calculation of inverse model is done based on simple manipulations of the antecedent and consequence parts of the fuzzy model. Moreover, the type-2 fuzzy model and its inverse as the primary controller are embedded into a nonlinear internal model control structure to provide an effective and robust control performance. Finally, the proposed control scheme has been implemented on an experimental pH neutralization process where the beneficial sides are shown clearly. 相似文献
Variational method (VM) is employed to derive the co-state equations, boundary (transversality) conditions, and functional sensitivity derivatives. The converged solutions of the state equations together with the steady state solution of the co-state equations are integrated along the domain boundary to uniquely determine the functional sensitivity derivatives with respect to the design function. The application of the variational method to aerodynamic shape optimization problems is demonstrated on internal flow problems at supersonic Mach number range of 1.5. Optimization results for flows with and without shock phenomena are presented. The study shows that while maintaining the accuracy of aerodynamical objective function and constraint within the reasonable range for engineering prediction purposes, variational method provides a substantial gain in computational efficiency, i.e., computer time and memory, when compared with the finite difference computations. 相似文献
In this paper, a fractional order control law is proposed and implemented for the evaluation of trajectory tracking performance of a rotary flexible-joint system. A state feedback based fractional integral control scheme is used in this proposed method. In this scheme, state feedback is responsible for stabilizing the system. The compensator, in series with the fractional integrator leads to obtain a similar closed-loop transient response like Bode’s ideal transfer function. The effectiveness of the proposed controller in tracking and being robust against parameter uncertainties is demonstrated through simulation. In addition, to show the usefulness of the proposed control scheme, the fractional controller is compared to an integer state feedback control by simulation and through experimentation on the Quanser’s rotary flexible-joint system. 相似文献