期刊文献+
共找到318篇文章
< 1 2 16 >
每页显示 20 50 100
A Unified Framework of the Cloud Computing Service Model 被引量:2
1
作者 Wen-Lung Shiau Chao-Ming Hsiao 《Journal of Electronic Science and Technology》 CAS 2013年第2期150-160,共11页
After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtuali... After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application. 展开更多
关键词 cloud computing service model conceptual framework EVOLUTION information system.
在线阅读 下载PDF
Cloud Foren:A Novel Framework for Digital Forensics in Cloud Computing 被引量:2
2
作者 Mathew Nyamagwa Jigang Liu +1 位作者 Anyi Liu Tetsutaro Uehara 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期39-45,共7页
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.A... Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment. 展开更多
关键词 digital forensics cloud computing framework
在线阅读 下载PDF
Control Framework for Secure Cloud Computing 被引量:2
3
作者 Harshit Srivastava Sathish Alampalayam Kumar 《Journal of Information Security》 2015年第1期12-23,共12页
Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the security issue continues to pose a big threat on it. The sec... Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the security issue continues to pose a big threat on it. The security and privacy issues persisting in cloud computing have proved to be an obstacle for its widespread adoption. In this paper, we look at these issues from a business perspective and how they are damaging the reputation of big companies. There is a literature review on the existing issues in cloud computing and how they are being tackled by the Cloud Service Providers (CSP). We propose a governing body framework which aims at solving these issues by establishing relationship amongst the CSPs in which the data about possible threats can be generated based on the previous attacks on other CSPs. The Governing Body will be responsible for Data Center control, Policy control, legal control, user awareness, performance evaluation, solution architecture and providing motivation for the entities involved. 展开更多
关键词 cloud computing Security PRIVACY Organization CONTROL GOVERNANCE framework cloud PROVIDER
在线阅读 下载PDF
A Cloud Computing Security Assessment Framework for Small and Medium Enterprises 被引量:1
4
作者 Satwinder Singh Rupra Amos Omamo 《Journal of Information Security》 2020年第4期201-224,共24页
Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum servic... Cloud computing plays a very important role in the development of business and competitive edge for many organisations including SMEs (Small and Medium Enterprises). Every cloud user continues to expect maximum service, and a critical aspect to this is cloud security which is one among other specific challenges hindering adoption of the cloud technologies. The absence of appropriate, standardised and self-assessing security frameworks of the cloud world for SMEs becomes an endless problem in developing countries and can expose the cloud computing model to major security risks which threaten its potential success within the country. This research presents a security framework for assessing security in the cloud environment based on the Goal Question Metrics methodology. The developed framework produces a security index that describes the security level accomplished by an evaluated cloud computing environment thereby providing the first line of defence. This research has concluded with an eight-step framework that could be employed by SMEs to assess the information security in the cloud. The most important feature of the developed security framework is to devise a mechanism through which SMEs can have a path of improvement along with understanding of the current security level and defining desired state in terms of security metric value. 展开更多
关键词 cloud computing framework SME SECURITY STANDARDS
在线阅读 下载PDF
Trusted Heartbeat Framework for Cloud Computing 被引量:1
5
作者 Dipen Contractor Dhiren Patel Shreya Patel 《Journal of Information Security》 2016年第3期103-111,共9页
In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunct... In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes. 展开更多
关键词 Trusted Heartbeat cloud computing Hadoop framework REPUTATION Attestation
在线阅读 下载PDF
Cloud Computing in Lebanese Enterprises: Applying the Technology, Organization, and Environment (TOE) Framework
6
作者 Hala Sabbah Hussein Trabulsi +1 位作者 Rida Chbib Ibtissam Sabbah 《Journal of Computer and Communications》 2019年第10期21-35,共15页
In the last few years, cloud computing (CC) has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Many businesses including small, medium (SMEs) and large enterpr... In the last few years, cloud computing (CC) has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Many businesses including small, medium (SMEs) and large enterprises are migrating to this technology. The objective of this paper was to describe the opinions of enterprises about the benefits and challenges of cloud computing services in the private and public companies in South Lebanon. During 2019, a cross-sectional study which enrolled 29 enterprises used CC was conducted. The survey included questions on socio-demographic characteristics of representative of companies, and companies’ factors in reference to the technology, organization, and environment (TOE) framework. Most (58.6%) of companies were private and micro and SMEs sized (86.8%). The cost saving (75.0%), scalability and flexibility (75.9%), security (44.8%), and improved service delivery were the main benefits that cloud offer to the business. The security aspect, the cost, and the limited provision of infra-structure remain a challenge for the adoption of CC. In conclusion, the research reveals the potential for the development of CC and obstacles for successful implementation of this new technology. 展开更多
关键词 cloud computing SMES TOE framework Benefits of cloud computing
在线阅读 下载PDF
A Multilayer Security Framework for Cloud Computing in Internet of Things (IoT) Domain
7
作者 M. Mamun-Ibn-Abdullah M. Humayun Kabir 《Journal of Computer and Communications》 2021年第7期31-42,共12页
Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provi... Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily. 展开更多
关键词 cloud computing Data Security Embedded Platform framework Security Threat
在线阅读 下载PDF
Factors Affecting the Intention of Adopting Cloud Computing in Jordanian Hospitals
8
作者 Osama Harfoushi Abdel Hakim Akhorshaideh +2 位作者 Noor Aqqad Marwa Al Janini Ruba Obiedat 《Communications and Network》 2016年第2期88-101,共14页
The purpose of this study is to examine the different factors that are expected to influence the intention of hospitals to adopt cloud computing in Jordan. This study is conducted using quatititative methodology. 223 ... The purpose of this study is to examine the different factors that are expected to influence the intention of hospitals to adopt cloud computing in Jordan. This study is conducted using quatititative methodology. 223 questionnaires were distributed to the IT departments of different hospitals to evaluate their ability and willingness to adopt cloud computing. The data were tested using multiple regression in order to determine whether Technology, Organizational, and Environmental factors (TOE) played a role in hospitals’ decision to consider cloud computing as a beneficial investment. The findings of this study showed that all the factors had a significant positive impact on the intention of hospitals to adopt cloud computing, with the Technological factor having the most impact on the decision made. 展开更多
关键词 cloud computing Hospitals JORDAN TOE framework
在线阅读 下载PDF
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture 被引量:3
9
作者 Amir Mohamed Talib Rodziah Atan +1 位作者 Rusli Abdullah Masrah Azrifah Azmi Murad 《Journal of Information Security》 2012年第4期295-306,共12页
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d... The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents. 展开更多
关键词 cloud computing MULTI-AGENT System cloud Data STORAGE Security framework cloud Service PROVIDER
在线阅读 下载PDF
Cloud-Enabled E-Governance Framework for Citizen Centric Services 被引量:1
10
作者 Jara Muda Sisay Tumsa +1 位作者 Amin Tuni Durga Prasad Sharma 《Journal of Computer and Communications》 2020年第7期63-78,共16页
In the modern arena, the Information and Communication Technologies (ICTs) have been playing a vital role in every walks of our day to day life. In order to enhance the ICT capacity and align with the global technolog... In the modern arena, the Information and Communication Technologies (ICTs) have been playing a vital role in every walks of our day to day life. In order to enhance the ICT capacity and align with the global technology transformations, the developing countries have started introducing the computerization and automation processes at different levels of the governments. The several research studies revealed that the existing legacy of governance system and their services in current state have several issues and challenges in terms of timeliness, cost of services, delay in service delivery, time-bound availability of services (24/7/365), inefficiency services, ease of service and discomforts, poor service collaboration, absence of responsiveness, and limited security of sensitive information/documents. A significant question is still unanswered that how to bring the Citizens and Government bodies closer for alleviating the aforementioned issues and challenges of existing government system services. This research paper aims to investigate the issues and challenges in the current status of Governance and partial E-Governance systems which encompass the computerization or automation process. The research designs a cloud framework for effective delivery of citizen centric services in general and Ethiopia as a specific case study. After rigorous analysis of prior research efforts, along with primary survey and interview, it was clearly observed that cloud computing can be an alternative instrumental for significant transformation of governmental service delivery. The research paper used a mix of exploratory and constructive research design and methodology with qualitative & quantitative data analysis approach. Finally, a Cloud Based E-Governance (CBEG) Framework is designed for the delivery of Ethiopian Citizen Centric Services. The validation, evaluation and acceptance test of the framework proves that the revealed knowledge can provide a significant transformation towards the betterment of the E Governance Services Delivery Systems. 展开更多
关键词 E-GOVERNANCE framework cloud computing Citizen Centric Hybrid cloud
在线阅读 下载PDF
A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications
11
作者 Wael Said Elsayed Mostafa +1 位作者 M.M.Hassan Ayman Mohamed Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第5期3193-3209,共17页
User’s data is considered as a vital asset of several organizations.Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns.Service providers must e... User’s data is considered as a vital asset of several organizations.Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns.Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment.The data stored on the public cloud will be vulnerable to outside and inside attacks.This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud.Different access control policies are applied for verifying users on the cloud.A security mechanism is applied to the cloud application that includes user registration,granting user privileges,and generating user authentication factor.An intrusion detection system is embedded to the security mechanism to detect malicious users.The multi factor authentication,intrusion detection,and access control techniques can be used for ensuring the identity of the user.Finally,encryption techniques are used for protecting the data from being disclosed.Experimental results are carried out to verify the accuracy and efficiency of the proposed frameworks and mechanism.The results recorded high detection rate with low false positive alarms. 展开更多
关键词 cloud computing service providers multi-layer authentication frameworks and access control
在线阅读 下载PDF
A Cloud Framework for High Spatial Resolution Soil Moisture Mapping from Radar and Optical Satellite Imageries
12
作者 GUO Tianhao ZHENG Jia +8 位作者 WANG Chunmei TAO Zui ZHENG Xingming WANG Qi LI Lei FENG Zhuangzhuang WANG Xigang LI Xinbiao KE Liwei 《Chinese Geographical Science》 SCIE CSCD 2023年第4期649-663,共15页
Soil moisture plays an important role in crop yield estimation,irrigation management,etc.Remote sensing technology has potential for large-scale and high spatial soil moisture mapping.However,offline remote sensing da... Soil moisture plays an important role in crop yield estimation,irrigation management,etc.Remote sensing technology has potential for large-scale and high spatial soil moisture mapping.However,offline remote sensing data processing is time-consuming and resource-intensive,and significantly hampers the efficiency and timeliness of soil moisture mapping.Due to the high-speed computing capabilities of remote sensing cloud platforms,a High Spatial Resolution Soil Moisture Estimation Framework(HSRSMEF)based on the Google Earth Engine(GEE)platform was developed in this study.The functions of the HSRSMEF include research area and input datasets customization,radar speckle noise filtering,optical-radar image spatio-temporal matching,soil moisture retrieving,soil moisture visualization and exporting.This paper tested the performance of HSRSMEF by combining Sentinel-1,Sentinel-2 images and insitu soil moisture data in the central farmland area of Jilin Province,China.Reconstructed Normalized Difference Vegetation Index(NDVI)based on the Savitzky-Golay algorithm conforms to the crop growth cycle,and its correlation with the original NDVI is about 0.99(P<0.001).The soil moisture accuracy of the random forest model(R 2=0.942,RMSE=0.013 m3/m3)is better than that of the water cloud model(R 2=0.334,RMSE=0.091 m3/m3).HSRSMEF transfers time-consuming offline operations to cloud computing platforms,achieving rapid and simplified high spatial resolution soil moisture mapping. 展开更多
关键词 soil moisture(SM) Google Earth Engine(GEE) cloud computing Platform High Spatial Resolution Soil Moisture Estimation framework(HSRSMEF) remote sensing Sentienl-1 Sentinel-2 Northeast China
在线阅读 下载PDF
基于Cloud-BIM的绿色施工信息化管理研究 被引量:20
13
作者 李英攀 马晓飞 +1 位作者 梁欣 邓宇 《施工技术》 CAS 北大核心 2016年第18期48-53,共6页
分析了BIM和云计算的概念及应用,基于BIM技术应用的弊端及云计算的优势,提出云计算与BIM技术的结合,建立Cloud-BIM平台。在此平台的基础上,探究了绿色施工参与方如何利用信息化技术进行管理,以保证绿色施工的实现,这对于我国绿色施工的... 分析了BIM和云计算的概念及应用,基于BIM技术应用的弊端及云计算的优势,提出云计算与BIM技术的结合,建立Cloud-BIM平台。在此平台的基础上,探究了绿色施工参与方如何利用信息化技术进行管理,以保证绿色施工的实现,这对于我国绿色施工的信息化发展有着重要意义。 展开更多
关键词 信息化 绿色施工 建筑信息模型 云计算 管理 研究
在线阅读 下载PDF
基于Cloud-BIM的建设工程协同设计研究 被引量:21
14
作者 陈杰 武电坤 +2 位作者 任剑波 李俊 刘兵全 《工程管理学报》 2014年第5期27-31,共5页
为了推动协同设计理念在建设工程设计中的有效实施、提高各设计专业之间的协同效率,将云计算技术(Cloud Computing)与建筑信息模型(BIM)集成应用于建筑工程协同设计,构建了一个基于Could—BIM的协同设计平台,设计了其主要功能模块,包括... 为了推动协同设计理念在建设工程设计中的有效实施、提高各设计专业之间的协同效率,将云计算技术(Cloud Computing)与建筑信息模型(BIM)集成应用于建筑工程协同设计,构建了一个基于Could—BIM的协同设计平台,设计了其主要功能模块,包括BIM建模、任务划分与设计协同、设计者权限管理、冲突检测与消解、知识管理、基于BIM模型的扩展功能分析等六大模块,提出了该协同设计平台的实施方案,并通过一个实际工程案例分析了该协同设计平台的实施过程。研究结果表明,云计算技术和BIM有潜力支撑建设工程项目的协同设计。 展开更多
关键词 建设项目 协同设计 云计算 建筑信息模型
在线阅读 下载PDF
基于SpringCloud框架的医疗信息共享平台设计与实现 被引量:13
15
作者 王蓉 李晗 +1 位作者 周国海 何沐 《中国医学装备》 2022年第5期133-137,共5页
目的:设计并实现一款基于SpringCloud框架的医疗信息共享平台,以提高医疗信息的共享和交换能力。方法:借助云平台提供的云计算开发及运维资源,采用SpringCloud微服务的思路,将医疗信息共享平台的微服务分为人事管理微服务(SMS)、患者管... 目的:设计并实现一款基于SpringCloud框架的医疗信息共享平台,以提高医疗信息的共享和交换能力。方法:借助云平台提供的云计算开发及运维资源,采用SpringCloud微服务的思路,将医疗信息共享平台的微服务分为人事管理微服务(SMS)、患者管理微服务(PMS)、诊断管理微服务(DMS)和财务管理微服务(FMS)4部分,分别提供不同的医疗信息共享功能。结果:平台支持病患在移动APP端和Web端进行挂号操作,不同微服务之间通过Eureka组件有机整合到一起,实现医疗信息共享,内置的RabbitMQ支持大量实时数据的存储与管理,使得医疗信息共享更加顺畅。结论:基于SpringCloud框架的医疗信息共享平台可实现医院信息系统中大量数据的共享与交换,能够打通各部门、各科室与不同使用角色之间的信息交互,解决大型医院信息共享交换难的弊端;借助云计算服务能力可增强医疗信息共享平台的稳定性和安全性。 展开更多
关键词 共享与交换 医疗信息共享平台 Springcloud框架 云计算
暂未订购
智能建筑机电设备远程监控通信系统设计 被引量:3
16
作者 邓玉平 《江苏通信》 2025年第1期111-115,共5页
智慧建筑机电设备远程监控通信系统是实现建筑智能化管理的关键。该系统通过物联网、云计算等技术,实现对建筑内机电设备的实时监测、远程控制和数据分析。本文研究设计基于物联网的数据采集层、基于云平台的数据处理层和基于Web的用户... 智慧建筑机电设备远程监控通信系统是实现建筑智能化管理的关键。该系统通过物联网、云计算等技术,实现对建筑内机电设备的实时监测、远程控制和数据分析。本文研究设计基于物联网的数据采集层、基于云平台的数据处理层和基于Web的用户交互层三层架构,在某智慧办公楼进行为期6个月的实验。结果表明,该系统可有效提高设备运行效率15%,降低能耗12%,减少故障率8%,具有较好的实用性和推广价值。 展开更多
关键词 智慧建筑 机电设备 远程监控 物联网 云计算
在线阅读 下载PDF
新质生产力背景下的智慧建筑运维技术发展现状与应用研究 被引量:1
17
作者 宋爽 窦强 +1 位作者 童漫漫 朱永磊 《建筑节能(中英文)》 2025年第8期13-20,共8页
国内建筑业正经历从增量市场向存量市场的转变,新质生产力推动着建筑业的创新与发展,引领着智慧建筑从“量”的累积逐渐转向“质”的突破,也代表着建筑运维已从信息化时代到数字化时代的大幅跨越。综合分析了在新质生产力背景下智慧建... 国内建筑业正经历从增量市场向存量市场的转变,新质生产力推动着建筑业的创新与发展,引领着智慧建筑从“量”的累积逐渐转向“质”的突破,也代表着建筑运维已从信息化时代到数字化时代的大幅跨越。综合分析了在新质生产力背景下智慧建筑运维的发展现状和技术应用,探讨了数字孪生、人工智能、边缘计算和云计算等新技术如何驱动产业革新,探讨了在环境品质与舒适度、能源与碳智能分析、需求管理和运行调节、预防性维护与风险管理等场景下建筑运维管理新模式的应用成效,还通过新技术的加持,助力建筑提升管理效率、降低运行成本,进而展望了智慧建筑未来的发展方向,旨在为建筑运维数字化转型及可持续发展提供参考。 展开更多
关键词 新质生产力 智慧建筑 建筑运维 数字孪生 大模型 边缘计算和云计算
在线阅读 下载PDF
MDA方法在网格计算平台Gbuilder开发中的研究与实现
18
作者 季一木 王汝传 《南京邮电大学学报(自然科学版)》 2006年第1期70-75,共6页
利用网格基础中间件GT3(G lobus Toolk it 3.x)进行网格服务设计时代码工作量大,且调试过程不清晰,而在所有的网格服务或同一类型的服务中都有着一些共同的实现模块和操作步骤,对这些部分用模型和模板来实现将减少重复的工作量。所以文... 利用网格基础中间件GT3(G lobus Toolk it 3.x)进行网格服务设计时代码工作量大,且调试过程不清晰,而在所有的网格服务或同一类型的服务中都有着一些共同的实现模块和操作步骤,对这些部分用模型和模板来实现将减少重复的工作量。所以文中在开放源码的开发工具Ec lipse平台上实现了基于GT3开发网格服务的流程,该实现的最大目标就是代码自动化生成,达到终极编程的目的。采用的思想是MDA,并给出了GBu ilder平台下用MDA方法实现网格服务工作流的设计框架。 展开更多
关键词 网格计算 模型驱动开发 终极编程 代码自动生成 Eclipse建模框架 图形编辑框架
在线阅读 下载PDF
基于分布特征学习灰狼优化算法的云计算资源调度方法
19
作者 程林钢 王亚光 《计算机应用与软件》 北大核心 2025年第5期306-316,共11页
针对当前云计算资源调度方法求解精度不高、容易陷入局部最优等问题,提出一种基于改进灰狼优化算法的云计算资源调度方法。该文在基于Map/Reduce的框架模式下,构建云计算资源调度数学模型;为了提高灰狼优化算法的全局搜索能力,采用分布... 针对当前云计算资源调度方法求解精度不高、容易陷入局部最优等问题,提出一种基于改进灰狼优化算法的云计算资源调度方法。该文在基于Map/Reduce的框架模式下,构建云计算资源调度数学模型;为了提高灰狼优化算法的全局搜索能力,采用分布特征学习框架策略调整搜索方向;利用改进后的灰狼优化算法解决云计算资源调度。仿真实验结果表明,相比于其他算法,改进的灰狼优化算法在解决资源调度方面收敛精度较小,能够寻优到较好的资源调度策略,尤其在大规模任务中。 展开更多
关键词 云计算 资源调度 灰狼优化算法 分布特征学习框架
在线阅读 下载PDF
基于云计算的微服务拆分提取框架分析
20
作者 方鹏 《计算机应用文摘》 2025年第13期113-115,共3页
凭借松耦合、高内聚、易于部署和扩展等优势,微服务架构已成为企业数字化转型的重要选择。文章系统阐述了微服务拆分的基本原则,包括单一职责原则、接口隔离原则、高内聚低耦合原则以及粒度适中原则等。其中,着重探讨了基于云计算的微... 凭借松耦合、高内聚、易于部署和扩展等优势,微服务架构已成为企业数字化转型的重要选择。文章系统阐述了微服务拆分的基本原则,包括单一职责原则、接口隔离原则、高内聚低耦合原则以及粒度适中原则等。其中,着重探讨了基于云计算的微服务架构设计,从应用路径角度为微服务的部署和运行提供了可靠的技术保障。 展开更多
关键词 云计算 微服务 拆分 提取框架
在线阅读 下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部