With the increasing number of resources provided by cloud environments, identifying which types of resources should be rent when deploying an application is often a difficult and error-prone process. Currently, most c...With the increasing number of resources provided by cloud environments, identifying which types of resources should be rent when deploying an application is often a difficult and error-prone process. Currently, most cloud environments offer a wide range of configurable resources, which can be combined in many different ways. Finding an appropriate configuration under cost constraints while meeting requirements is still a challenge. In this paper, software product line engineering is introduced to describe cloud environments, and configurable resources are abstracted as features with attributes. Then, a Self-Tuning Particle Swarm Optimization approach(called STPSO) is proposed to configure the cloud environment. STPSO can automatically adjust the arbitrary configuration to a valid configuration. To evaluate the performance of the proposed approach, we conduct a series of comprehensive experiments. The empirical experiment shows that our approach reduces time and provides a reliable way to find a correct and suitable cloud configuration when dealing with a significant number of resources.展开更多
Due to the security and scalability features of hybrid cloud architecture,it can bettermeet the diverse requirements of users for cloud services.And a reasonable resource allocation solution is the key to adequately u...Due to the security and scalability features of hybrid cloud architecture,it can bettermeet the diverse requirements of users for cloud services.And a reasonable resource allocation solution is the key to adequately utilize the hybrid cloud.However,most previous studies have not comprehensively optimized the performance of hybrid cloud task scheduling,even ignoring the conflicts between its security privacy features and other requirements.Based on the above problems,a many-objective hybrid cloud task scheduling optimization model(HCTSO)is constructed combining risk rate,resource utilization,total cost,and task completion time.Meanwhile,an opposition-based learning knee point-driven many-objective evolutionary algorithm(OBL-KnEA)is proposed to improve the performance of model solving.The algorithm uses opposition-based learning to generate initial populations for faster convergence.Furthermore,a perturbation-based multipoint crossover operator and a dynamic range mutation operator are designed to extend the search range.By comparing the experiments with other excellent algorithms on HCTSO,OBL-KnEA achieves excellent results in terms of evaluation metrics,initial populations,and model optimization effects.展开更多
The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any business.It has transformed the methodology for storing the enterprise data,acc...The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any business.It has transformed the methodology for storing the enterprise data,accessing the data,and Data Sharing(DS).Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data.With the requirement of vast volumes of storage area in the CCEs,capturing a secured data access framework is an important issue.This paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing(ISIMSDS)to hold the DS of big data in CCEs.The complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex CCEs.An access control Encryption Method(EM)is used to improve the encryption.The Complexity is measured to increase the authentication standard.The active attack is protected using this ISIMSDS methodology.Our proposed ISIMSDS method assists in diminishing the Complexity whenever the user’s population is increasing rapidly.The security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText(PT)attack and provides more efficient computation and storage space than the related methods.The performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption,decryption,and retrieval of the data.展开更多
Internet of things(IoT)and cloud computing(CC)becomes widespread in different application domains such as business,e-commerce,healthcare,etc.The recent developments of IoT technology have led to an increase in large a...Internet of things(IoT)and cloud computing(CC)becomes widespread in different application domains such as business,e-commerce,healthcare,etc.The recent developments of IoT technology have led to an increase in large amounts of data from various sources.In IoT enabled cloud environment,load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization.The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics.In this view,this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling(C3SOA-LS)technique for IoT enabled cloud environment.The proposed C3SOA-LS technique intends to effectually schedule the tasks and balance the load uniformly in such a way that maximum resource utilization can be accomplished.Besides,the presented C3SOA-LS model involves the design of circle chaotic mapping(CCM)with the traditional chameleon swarm optimization(CSO)algorithm for improving the exploration process,shows the novelty of the work.The proposed C3SOA-LS model computes an objective with the minimization of energy consumption and makespan.The experimental outcome implied that the C3SOA-LS model has showcased improved performance and uniformly balances the load over other approaches.展开更多
Workload balancing in cloud computing is not yet resolved,particularly considering Infrastructure as a Service(IaaS)in the cloud network.The problem of being underloaded or overloaded should not occur at the time of t...Workload balancing in cloud computing is not yet resolved,particularly considering Infrastructure as a Service(IaaS)in the cloud network.The problem of being underloaded or overloaded should not occur at the time of the server or host accessing the cloud which may lead to create system crash problem.Thus,to resolve these existing problems,an efficient task scheduling algorithm is required for distributing the tasks over the entire feasible resources,which is termed load balancing.The load balancing approach assures that the entire Virtual Machines(VMs)are utilized appropriately.So,it is highly essential to develop a load-balancing model in a cloud environment based on machine learning and optimization strategies.Here,the computing and networking data is utilized for the analysis to observe the traffic as well as performance patterns.The acquired data is offered to the machine learning decision to select the right server by predicting the performance effectively by employing an Optimal Kernel-based Extreme Learning Machine(OK-ELM)and their parameter is tuned by the developed hybrid approach Population Size-based Mud Ring Tunicate Swarm Algorithm(PS-MRTSA).Further,effective scheduling is performed to resolve the load balancing issues by employing the developed model MR-TSA.Here,the developed approach effectively resolves the multi-objective constraints such as Response time,Resource cost,and energy consumption.Thus,the recommended load balancing model securesan enhanced performance rate than the traditional approaches over several experimental analyses.展开更多
Nowadays most of the cloud applications process large amount of data to provide the desired results. The Internet environment, the enterprise network advertising, network marketing plan, need partner sites selected as...Nowadays most of the cloud applications process large amount of data to provide the desired results. The Internet environment, the enterprise network advertising, network marketing plan, need partner sites selected as carrier and publishers. Website through static pages, dynamic pages, floating window, AD links, take the initiative to push a variety of ways to show the user enterprise marketing solutions, when the user access to web pages, use eye effect and concentration effect, attract users through reading web pages or click the page again, let the user detailed comprehensive understanding of the marketing plan, which affects the user' s real purchase decisions. Therefore, we combine the cloud environment with search engine optimization technique, the result shows that our method outperforms compared with other approaches.展开更多
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In...Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images.展开更多
With the rapid development of software engineering,traditional teaching methods are confronted with the challenges of short knowledge update cycles and the rapid emergence of new technologies.By analyzing the current ...With the rapid development of software engineering,traditional teaching methods are confronted with the challenges of short knowledge update cycles and the rapid emergence of new technologies.By analyzing the current situation of the mismatch between educational practices and industrial change,this study proposes an innovative teaching model—“Micro-practices”.This model integrates new knowledge and new technologies into the teaching process quickly and flexibly through practical teaching projects with“short class time,small capacity,and cloud environment”to meet the different educational needs of students,teachers,and enterprises.The aim is to train innovative software engineering talents who can meet the challenges of the future.展开更多
人工智能与机器人技术的快速发展对当前市面上的机器人功能提出了更高的要求。目前,各类机器人的功能与整体设计仍然存在设计目的单一,智能化功能不足等特点,本文提出一种多功能可拆卸的机器人设计,采用Orange Pi AIpro与STM32F401RE为...人工智能与机器人技术的快速发展对当前市面上的机器人功能提出了更高的要求。目前,各类机器人的功能与整体设计仍然存在设计目的单一,智能化功能不足等特点,本文提出一种多功能可拆卸的机器人设计,采用Orange Pi AIpro与STM32F401RE为控制板,对硬件电路进行设计,结合视觉算法,能够完成迎宾、搬运、巡逻等多种功能,对其机械结构及外观进行设计,在不同工作模式下能够通过简易拆卸更换部件方式完成机器人的功能转变。机器人在YOLOv8的基础上设计一种基于行人坐标框的距离算法,结合超声波传感器完成了行人跟踪、避障等功能,利用百度大模型完成语音交互,并利用温度、湿度、红外等传感器完成火焰检测、温湿度报警、闯入检测等功能,接入物联网云平台进行数据交互监测。展开更多
基金supported by the Foundation for Outstanding Young Scientist in Shandong Province (No. BS2014DX021)the Fundamental Research Funds for the Central Universities (No. 14CX02136A)the National Natural Science Foundation of China (Grant No. 61402533)
文摘With the increasing number of resources provided by cloud environments, identifying which types of resources should be rent when deploying an application is often a difficult and error-prone process. Currently, most cloud environments offer a wide range of configurable resources, which can be combined in many different ways. Finding an appropriate configuration under cost constraints while meeting requirements is still a challenge. In this paper, software product line engineering is introduced to describe cloud environments, and configurable resources are abstracted as features with attributes. Then, a Self-Tuning Particle Swarm Optimization approach(called STPSO) is proposed to configure the cloud environment. STPSO can automatically adjust the arbitrary configuration to a valid configuration. To evaluate the performance of the proposed approach, we conduct a series of comprehensive experiments. The empirical experiment shows that our approach reduces time and provides a reliable way to find a correct and suitable cloud configuration when dealing with a significant number of resources.
基金supported by National Natural Science Foundation of China(Grant No.61806138)the Central Government Guides Local Science and Technology Development Funds(Grant No.YDZJSX2021A038)+2 种基金Key RD Program of Shanxi Province(International Cooperation)under Grant No.201903D421048Outstanding Innovation Project for Graduate Students of Taiyuan University of Science and Technology(Project No.XCX211004)China University Industry-University-Research Collaborative Innovation Fund(Future Network Innovation Research and Application Project)(Grant 2021FNA04014).
文摘Due to the security and scalability features of hybrid cloud architecture,it can bettermeet the diverse requirements of users for cloud services.And a reasonable resource allocation solution is the key to adequately utilize the hybrid cloud.However,most previous studies have not comprehensively optimized the performance of hybrid cloud task scheduling,even ignoring the conflicts between its security privacy features and other requirements.Based on the above problems,a many-objective hybrid cloud task scheduling optimization model(HCTSO)is constructed combining risk rate,resource utilization,total cost,and task completion time.Meanwhile,an opposition-based learning knee point-driven many-objective evolutionary algorithm(OBL-KnEA)is proposed to improve the performance of model solving.The algorithm uses opposition-based learning to generate initial populations for faster convergence.Furthermore,a perturbation-based multipoint crossover operator and a dynamic range mutation operator are designed to extend the search range.By comparing the experiments with other excellent algorithms on HCTSO,OBL-KnEA achieves excellent results in terms of evaluation metrics,initial populations,and model optimization effects.
文摘The Cloud Computing Environment(CCE)developed for using the dynamic cloud is the ability of software and services likely to grow with any business.It has transformed the methodology for storing the enterprise data,accessing the data,and Data Sharing(DS).Big data frame a constant way of uploading and sharing the cloud data in a hierarchical architecture with different kinds of separate privileges to access the data.With the requirement of vast volumes of storage area in the CCEs,capturing a secured data access framework is an important issue.This paper proposes an Improved Secure Identification-based Multilevel Structure of Data Sharing(ISIMSDS)to hold the DS of big data in CCEs.The complex file partitioning technique is proposed to verify the access privilege context for sharing data in complex CCEs.An access control Encryption Method(EM)is used to improve the encryption.The Complexity is measured to increase the authentication standard.The active attack is protected using this ISIMSDS methodology.Our proposed ISIMSDS method assists in diminishing the Complexity whenever the user’s population is increasing rapidly.The security analysis proves that the proposed ISIMSDS methodology is more secure against the chosen-PlainText(PT)attack and provides more efficient computation and storage space than the related methods.The performance of the proposed ISIMSDS methodology provides more efficiency in communication costs such as encryption,decryption,and retrieval of the data.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 1/322/42)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R136)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4340237DSR09).
文摘Internet of things(IoT)and cloud computing(CC)becomes widespread in different application domains such as business,e-commerce,healthcare,etc.The recent developments of IoT technology have led to an increase in large amounts of data from various sources.In IoT enabled cloud environment,load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization.The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics.In this view,this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling(C3SOA-LS)technique for IoT enabled cloud environment.The proposed C3SOA-LS technique intends to effectually schedule the tasks and balance the load uniformly in such a way that maximum resource utilization can be accomplished.Besides,the presented C3SOA-LS model involves the design of circle chaotic mapping(CCM)with the traditional chameleon swarm optimization(CSO)algorithm for improving the exploration process,shows the novelty of the work.The proposed C3SOA-LS model computes an objective with the minimization of energy consumption and makespan.The experimental outcome implied that the C3SOA-LS model has showcased improved performance and uniformly balances the load over other approaches.
文摘Workload balancing in cloud computing is not yet resolved,particularly considering Infrastructure as a Service(IaaS)in the cloud network.The problem of being underloaded or overloaded should not occur at the time of the server or host accessing the cloud which may lead to create system crash problem.Thus,to resolve these existing problems,an efficient task scheduling algorithm is required for distributing the tasks over the entire feasible resources,which is termed load balancing.The load balancing approach assures that the entire Virtual Machines(VMs)are utilized appropriately.So,it is highly essential to develop a load-balancing model in a cloud environment based on machine learning and optimization strategies.Here,the computing and networking data is utilized for the analysis to observe the traffic as well as performance patterns.The acquired data is offered to the machine learning decision to select the right server by predicting the performance effectively by employing an Optimal Kernel-based Extreme Learning Machine(OK-ELM)and their parameter is tuned by the developed hybrid approach Population Size-based Mud Ring Tunicate Swarm Algorithm(PS-MRTSA).Further,effective scheduling is performed to resolve the load balancing issues by employing the developed model MR-TSA.Here,the developed approach effectively resolves the multi-objective constraints such as Response time,Resource cost,and energy consumption.Thus,the recommended load balancing model securesan enhanced performance rate than the traditional approaches over several experimental analyses.
文摘Nowadays most of the cloud applications process large amount of data to provide the desired results. The Internet environment, the enterprise network advertising, network marketing plan, need partner sites selected as carrier and publishers. Website through static pages, dynamic pages, floating window, AD links, take the initiative to push a variety of ways to show the user enterprise marketing solutions, when the user access to web pages, use eye effect and concentration effect, attract users through reading web pages or click the page again, let the user detailed comprehensive understanding of the marketing plan, which affects the user' s real purchase decisions. Therefore, we combine the cloud environment with search engine optimization technique, the result shows that our method outperforms compared with other approaches.
文摘Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images.
基金funded by Universityindustry Collaborative Education Program(No.220605181024725)the Undergraduate Education and Teaching Reform Research Project of Northwestern Polytechnical University(No.22GZ13083)。
文摘With the rapid development of software engineering,traditional teaching methods are confronted with the challenges of short knowledge update cycles and the rapid emergence of new technologies.By analyzing the current situation of the mismatch between educational practices and industrial change,this study proposes an innovative teaching model—“Micro-practices”.This model integrates new knowledge and new technologies into the teaching process quickly and flexibly through practical teaching projects with“short class time,small capacity,and cloud environment”to meet the different educational needs of students,teachers,and enterprises.The aim is to train innovative software engineering talents who can meet the challenges of the future.
文摘人工智能与机器人技术的快速发展对当前市面上的机器人功能提出了更高的要求。目前,各类机器人的功能与整体设计仍然存在设计目的单一,智能化功能不足等特点,本文提出一种多功能可拆卸的机器人设计,采用Orange Pi AIpro与STM32F401RE为控制板,对硬件电路进行设计,结合视觉算法,能够完成迎宾、搬运、巡逻等多种功能,对其机械结构及外观进行设计,在不同工作模式下能够通过简易拆卸更换部件方式完成机器人的功能转变。机器人在YOLOv8的基础上设计一种基于行人坐标框的距离算法,结合超声波传感器完成了行人跟踪、避障等功能,利用百度大模型完成语音交互,并利用温度、湿度、红外等传感器完成火焰检测、温湿度报警、闯入检测等功能,接入物联网云平台进行数据交互监测。