期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Research on the High Robustness JavaEE Enterprise Development Mode based on Hadoop and Cloud Servers
1
作者 Kun Liu 《International Journal of Technology Management》 2016年第10期63-65,共3页
In this paper, we conduct research on the high robustness JavaEE enterprise development mode based on Hadoop and cloud servers. The current virtual machine real-time migration can only achieve manual migration, and ca... In this paper, we conduct research on the high robustness JavaEE enterprise development mode based on Hadoop and cloud servers. The current virtual machine real-time migration can only achieve manual migration, and cannot achieve full-automatic migration. In other words, when the server overload requires the administrator to artificially select a low-load host, and then hit migration command to implement the migration. In recent years, the Hadoop is becoming popular, and the read performance of the data is measured in terms of the time overhead for reading the required data. The key to reducing read time is to optimize that Hadoop cloud data read time and the RDBMS data query time. This paper integrates the mentioned techniques to construct the novel JavaEE enterprise development pattern that will promote the further development of the related techniques. 展开更多
关键词 High Robustness JavaEE Enterprise HADOOP cloud servers.
在线阅读 下载PDF
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems
2
作者 Tianqi Peng Bei Gong +4 位作者 Chong Guo Akhtar Badshah Muhammad Waqas Hisham Alasmary Sheng Chen 《Digital Communications and Networks》 2025年第4期1292-1303,共12页
Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabli... Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy.However,previous research on DSSE mostly focused on single keyword search,which limits its practical application in cloud-based IoT systems.Recently,Patranabis(NDSS 2021)[1]proposed a groundbreaking DSSE scheme for conjunctive keyword search.However,this scheme fails to effectively handle deletion operations in certain circumstances,resulting in inaccurate query results.Additionally,the scheme introduces unnecessary search overhead.To overcome these problems,we present CKSE,an efficient conjunctive keyword DSSE scheme.Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis,thus enabling a more comprehensive deletion functionality.Furthermore,we introduce a state chain structure to reduce the search overhead.Through security analysis and experimental evaluation,we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security,compared to the oblivious dynamic cross-tags protocol of Patranabis.The combination of comprehensive functionality,high efficiency,and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems. 展开更多
关键词 Symmetric searchable encryption Conjunctive keyword search Forward and backward privacy cloud server
在线阅读 下载PDF
Research on UAV cloud control system based on ant colony algorithm 被引量:4
3
作者 ZHANG Lanyong ZHANG Ruixuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第4期805-811,共7页
In the cloud era, the control objects are becoming larger and the information processing is more complex, and it is difficult for traditional control systems to process massive data in a timely manner. In view of the ... In the cloud era, the control objects are becoming larger and the information processing is more complex, and it is difficult for traditional control systems to process massive data in a timely manner. In view of the difficulty of data processing in the cloud era, it is extremely important to perform massive data operations through cloud servers. Unmanned aeriel vehicle(UAV) control is the representative of the intelligent field. Based on the ant colony algorithm and incorporating the potential field method, an improved potential field ant colony algorithm is designed. To deal with the path planning problem of UAVs, the potential field ant colony algorithm shortens the optimal path distance by 6.7%, increases the algorithm running time by39.3%, and increases the maximum distance by 24.1% compared with the previous improvement. The cloud server is used to process the path problem of the UAV and feedback the calculation results in real time. Simulation experiments verify the effectiveness of the new algorithm in the cloud environment. 展开更多
关键词 ant colony algorithm potential field method cloud server path planning
在线阅读 下载PDF
A Genetic Algorithm Based Approach for Campus Equipment Management System in Cloud Server
4
作者 Yu-Cheng Lin 《Journal of Electronic Science and Technology》 CAS 2013年第2期187-191,共5页
In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status ... In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status of equipment in real time, and uses wire or wireless network to send real-time situation to display on manager's PC or PDA. In addition, the system will also synchronize with database to record and reserve message. Furthermore, the status will display not only to a single manager but also a number of managers. In order to increase efficiency between graphical user interface (GUI) and database, the system adopts SqlDependency object of ADO.NET so that any changed situation of the database could be known immediately and synchronized with manager's PC or PDA. Because the problem of the equipment utilization is an NP-complete (non-deterministic polynomial) problem, we apply genetic algorithm to enhance the efficiency of finding optimum solution for equipment utilization. We assign constraints into the system, and the system will post back the optimum solution simultaneously on the screen. As a consequence, we compare our genetic algorithm based approach (GA) with the simulated annealing based approach (SA) for maximizing the equipment utilization. Experimental result shows that our GA approach achieves an average 79.66% improvement in equipment utilization in an acceptable run time. 展开更多
关键词 Campus equipment cloud server genetic algorithm RFID ubiquitous-managementsystem.
在线阅读 下载PDF
Phish Block:A Blockchain Framework for Phish Detection in Cloud
5
作者 R.N.Karthika C.Valliyammai M.Naveena 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期777-795,共19页
The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of m... The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of much techno-logical advancement,phishing acts as thefirst step in a series of attacks.With technological advancements,availability and access to the phishing kits has improved drastically,thus making it an ideal tool for the hackers to execute the attacks.The phishing cases indicate use of foreign characters to disguise the ori-ginal Uniform Resource Locator(URL),typosquatting the popular domain names,using reserved characters for re directions and multi-chain phishing.Such phishing URLs can be stored as a part of the document and uploaded in the cloud,providing a nudge to hackers in cloud storage.The cloud servers are becoming the trusted tool for executing these attacks.The prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client’s end(browser).At the same time,the avalanche effect and immut-ability of block-chain proves to be a strong source of security.Considering these trends in technology,a block-chain basedfiltering implementation for preserving the integrity of user data stored in the cloud is proposed.The proposed Phish Block detects the homographic phishing URLs with accuracy of 91%which assures the security in cloud storage. 展开更多
关键词 cloud server phishing URLs phish detection blockchain safe files smart contract
在线阅读 下载PDF
IoT Based Smart Framework Monitoring System for Power Station
6
作者 Arodh Lal Karn Panneer Selvam Manickam +3 位作者 R.Saravanan Roobaea Alroobaea Jasem Almotiri Sudhakar Sengan 《Computers, Materials & Continua》 SCIE EI 2023年第3期6019-6037,共19页
Power Station(PS)monitoring systems are becoming critical,ensuring electrical safety through early warning,and in the event of a PS fault,the power supply is quickly disconnected.Traditional technologies are based on ... Power Station(PS)monitoring systems are becoming critical,ensuring electrical safety through early warning,and in the event of a PS fault,the power supply is quickly disconnected.Traditional technologies are based on relays and don’t have a way to capture and store user data when there is a problem.The proposed framework is designed with the goal of providing smart environments for protecting electrical types of equipment.This paper proposes an Internet of Things(IoT)-based Smart Framework(SF)for monitoring the Power Devices(PD)which are being used in power substations.A Real-Time Monitoring(RTM)system is proposed,and it uses a state-of-the-art smart IoT-based System on Chip(SoC)sensors,a Hybrid Prediction Model(HPM),and it is being used in Big Data Processing(BDP).The Cloud Server(CS)processes the data and does the data analytics by comparing it with the historical data already stored in the CS.No-Structural Query Language Mongo Data Base(MDB)is used to store Sensor Data(SD)from the PSs.The proposed HPM combines the Density-Based Spatial Clustering of Applications with Noise(DBSCAN)-algorithm for Outlier Detection(OD)and the Random Forest(RF)classification algorithm for removing the outlier SD and providing Fault Detection(FD)when the PD isn’t working.The suggested work is assessed and tested under various fault circumstances that happened in PSs.The simulation outcome proves that the proposed model is effective in monitoring the smooth functioning of the PS.Also,the suggested HPM has a higher Fault Prediction(FP)accuracy.This means that faults can be found earlier,early warning signals can be sent,and the power supply can be turned off quickly to ensure electrical safety.A powerful RTM and event warning system can also be built into the system before faults happen. 展开更多
关键词 SYSTEM-ON-CHIP cloud server apache kafka apache strom NoSQL MongoDB
在线阅读 下载PDF
Real Time Monitoring of Muscle Fatigue with IoT and Wearable Devices
7
作者 Anita Gehlot Rajesh Singh +5 位作者 Sweety Siwach Shaik Vaseem Akram Khalid Alsubhi Aman Singh Irene Delgado Noya Sushabhan Choudhury 《Computers, Materials & Continua》 SCIE EI 2022年第7期999-1015,共17页
Wearable monitoring devices are in demand in recent times for monitoring daily activities including exercise.Moreover,it is widely utilizing for preventing injuries of athletes during a practice session and in few cas... Wearable monitoring devices are in demand in recent times for monitoring daily activities including exercise.Moreover,it is widely utilizing for preventing injuries of athletes during a practice session and in few cases,it leads to muscle fatigue.At present,emerging technology like the internet of things(IoT)and sensors is empowering to monitor and visualize the physical data from any remote location through internet connectivity.In this study,an IoT-enabled wearable device is proposing for monitoring and identifying the muscle fatigue condition using a surface electromyogram(sEMG)sensor.Normally,the EMG signal is utilized to display muscle activity.Arduino controller,Wi-Fi module,and EMG sensor are utilized in developing the wearable device.The Time-frequency domain spectrum technique is employed for classifying the threemuscle fatigue conditions including meanRMS,mean frequency,etc.A real-time experiment is realized on six different individuals with developed wearable devices and the average RMS value assists to determine the average threshold of recorded data.The threshold level is analyzed by calculating the mean RMS value and concluded three fatigue conditions as>2V:Extensive);1–2V:Moderate,and<1V:relaxed.The warning alarm system was designed in LabVIEW with three color LEDs to indicate the different states of muscle fatigue.Moreover,the device is interfaced with the cloud through the internet provided with a Wi-Fi module embedded in wearable devices.The data available in the cloud server can be utilized for forecasting the frequency of an individual to muscle fatigue. 展开更多
关键词 LABVIEW muscle fatigue SEMG wearable sensor IOT cloud server
在线阅读 下载PDF
Key Management for Outsourced Data Security
8
作者 PEI Bei CHEN Changsong WAN Changsheng 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期449-454,共6页
This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model ... This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model including four entities is designed to provide both integrity and confidentiality protection. The proposed scheme can be proved to achieve the security goals that no cheating cloud server can pass the auditing without storing users' data intact. The efficiency of the proposal is evaluated by analyzing the fulfillment of the design goals, including the computation cost, communication cost and storage cost of our scheme. This light weight publicly auditable Proof-of-storage scheme achieves security goals perfectly, and has an excellent efficiency performance superior to the current bilinear-map-based publicly auditable Proof-of-storage scheme. 展开更多
关键词 cloud computing malicious cloud server key management
原文传递
Intelligent Server Management Framework over Extensible Messaging and Presence Protocol
9
作者 斯佩峰 宋川 周翔 《China Communications》 SCIE CSCD 2013年第5期128-136,共9页
With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server m... With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era. 展开更多
关键词 cloud computing server management XMPP federation mobile push intelligent
在线阅读 下载PDF
COLLABORATIVE RESOURCE ALLOCATION OVER A HYBRID CLOUD CENTER AND EDGE SERVER NETWORK 被引量:2
10
作者 Houfeng Huang Qing Ling +1 位作者 Wei Shi Jinlin Wang 《Journal of Computational Mathematics》 SCIE CSCD 2017年第4期423-438,共16页
This paper considers the collaborative resource allocation problem over a hybrid cloud center and edge server network, an emerging infrastructure for efficient Internet services. The cloud center acts as a pool of ine... This paper considers the collaborative resource allocation problem over a hybrid cloud center and edge server network, an emerging infrastructure for efficient Internet services. The cloud center acts as a pool of inexhaustible computation and storage powers. The edge servers often have limited computation and storage powers but are able to provide quick responses to service requests from end users. Upon receiving service requests, edge servers assign them to themselves, their neighboring edge servers, as well as the cloud center, aiming at minimizing the overall network cost. This paper first establishes an optimization model for this problem. Second, in light of the separable structure of the optimization model, we utilize the alternating direction method of multipliers (ADMM) to develop a fully collaborative resource allocation algorithm. The edge servers and the cloud center autonomously collaborate to compute their local optimization variables and prices of network resources, and reach an optimal solution. Numerical experiments demonstrate the effectiveness of the hybrid network infrastructure as well as the proposed algorithm. 展开更多
关键词 Network resource allocation Distributed network optimization cloud center edge server
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部