Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (240)
  • Open Access

    ARTICLE

    Cloud Based Monitoring and Diagnosis of Gas Turbine Generator Based on Unsupervised Learning

    Xian Ma1, Tingyan Lv2,*, Yingqiang Jin2, Rongmin Chen2, Dengxian Dong2, Yingtao Jia2

    Energy Engineering, Vol.118, No.3, pp. 691-705, 2021, DOI:10.32604/EE.2021.012701 - 22 March 2021

    Abstract The large number of gas turbines in large power companies is difficult to manage. A large amount of the data from the generating units is not mined and utilized for fault analysis. This study focuses on F-class (9F.05) gas turbine generators and uses unsupervised learning and cloud computing technologies to analyse the faults for the gas turbines. Remote monitoring of the operational status are conducted. The study proposes a cloud computing service architecture for large gas turbine objects, which uses unsupervised learning models to monitor the operational state of the gas turbine. Faults such as More >

  • Open Access

    ARTICLE

    A Heuristics-Based Cost Model for Scientific Workflow Scheduling in Cloud

    Ehab Nabiel Al-Khanak1,*, Sai Peck Lee2, Saif Ur Rehman Khan3, Navid Behboodian4, Osamah Ibrahim Khalaf5, Alexander Verbraeck6, Hans van Lint1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3265-3282, 2021, DOI:10.32604/cmc.2021.015409 - 01 March 2021

    Abstract Scientific Workflow Applications (SWFAs) can deliver collaborative tools useful to researchers in executing large and complex scientific processes. Particularly, Scientific Workflow Scheduling (SWFS) accelerates the computational procedures between the available computational resources and the dependent workflow jobs based on the researchers’ requirements. However, cost optimization is one of the SWFS challenges in handling massive and complicated tasks and requires determining an approximate (near-optimal) solution within polynomial computational time. Motivated by this, current work proposes a novel SWFS cost optimization model effective in solving this challenge. The proposed model contains three main stages: (i) scientific workflow… More >

  • Open Access

    ARTICLE

    Prediction of Cloud Ranking in a Hyperconverged Cloud Ecosystem Using Machine Learning

    Nadia Tabassum1, Allah Ditta2, Tahir Alyas3, Sagheer Abbas4, Hani Alquhayz5, Natash Ali Mian6, Muhammad Adnan Khan7,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3129-3141, 2021, DOI:10.32604/cmc.2021.014729 - 01 March 2021

    Abstract Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet. The design of reliable and high-quality cloud applications requires a strong Quality of Service QoS parameter metric. In a hyperconverged cloud ecosystem environment, building high-reliability cloud applications is a challenging job. The selection of cloud services is based on the QoS parameters that play essential roles in optimizing and improving cloud rankings. The emergence of cloud computing is significantly reshaping the digital ecosystem, and the numerous services offered by cloud service providers are playing a vital… More >

  • Open Access

    ARTICLE

    A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

    Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3349-3361, 2021, DOI:10.32604/cmc.2021.012454 - 01 March 2021

    Abstract The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying traffic management applications. However, cloud computing has disadvantages such as high delay, low privacy and high communication cost, which can not meet the needs of real-time interactive information of Internet of vehicles. Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges. Therefore, in order to ensure the user information security and improve the real-time of vehicle information interaction, this paper proposes an anonymous authentication scheme based on edge computing. In this scheme,… More >

  • Open Access

    ARTICLE

    A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter

    Shan Chun1, Xiaolong Chen2, Guoqiang Deng3,*, Hao Liu4

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 1203-1216, 2021, DOI:10.32604/cmes.2021.012230 - 19 February 2021

    Abstract The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information. However, it is difficult to predict the congestion state of the link-end accurately at the source. In this paper, we presented an improved NUMFabric algorithm for calculating the overall congestion price. In the proposed scheme, the whole network structure had been obtained by the central control server in the Software Defined Network, and a kind of dual-hierarchy algorithm for calculating overall network… More >

  • Open Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437 - 01 March 2021

    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques More >

  • Open Access

    ARTICLE

    Safeguarding Cloud Computing Infrastructure: A Security Analysis

    Mamdouh Alenezi*

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 159-167, 2021, DOI:10.32604/csse.2021.015282 - 01 March 2021

    Abstract Cloud computing is the provision of hosted resources, comprising software, hardware and processing over the World Wide Web. The advantages of rapid deployment, versatility, low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes, mostly as a component of the combination/multi-cloud infrastructure structure. While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion, new opportunities and challenges in the context of security vulnerabilities are emerging in this domain. Cloud security, also recognized as cloud computing security, refers to a collection of More >

  • Open Access

    ARTICLE

    A Resource Management Algorithm for Virtual Machine Migration in Vehicular Cloud Computing

    Sohan Kumar Pande1, Sanjaya Kumar Panda2, Satyabrata Das1, Kshira Sagar Sahoo3, Ashish Kr. Luhach4, N. Z. Jhanjhi5,*, Roobaea Alroobaea6, Sivakumar Sivanesan5

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2647-2663, 2021, DOI:10.32604/cmc.2021.015026 - 05 February 2021

    Abstract In recent years, vehicular cloud computing (VCC) has gained vast attention for providing a variety of services by creating virtual machines (VMs). These VMs use the resources that are present in modern smart vehicles. Many studies reported that some of these VMs hosted on the vehicles are overloaded, whereas others are underloaded. As a circumstance, the energy consumption of overloaded vehicles is drastically increased. On the other hand, underloaded vehicles are also drawing considerable energy in the underutilized situation. Therefore, minimizing the energy consumption of the VMs that are hosted by both overloaded and underloaded… More >

  • Open Access

    REVIEW

    A Review of Dynamic Resource Management in Cloud Computing Environments

    Mohammad Aldossary*

    Computer Systems Science and Engineering, Vol.36, No.3, pp. 461-476, 2021, DOI:10.32604/csse.2021.014975 - 18 January 2021

    Abstract In a cloud environment, Virtual Machines (VMs) consolidation and resource provisioning are used to address the issues of workload fluctuations. VM consolidation aims to move the VMs from one host to another in order to reduce the number of active hosts and save power. Whereas resource provisioning attempts to provide additional resource capacity to the VMs as needed in order to meet Quality of Service (QoS) requirements. However, these techniques have a set of limitations in terms of the additional costs related to migration and scaling time, and energy overhead that need further consideration. Therefore, More >

  • Open Access

    ARTICLE

    Live Data Analytics with IoT Intelligence-Sensing System in Public Transportation for COVID-19 Pandemic

    Abdullah Alamri1,*, Sultan Alamri2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 441-452, 2021, DOI:10.32604/iasc.2021.015198 - 18 January 2021

    Abstract The COVID-19 pandemic has presented an unprecedented challenge to the entire world. It is a humanitarian crisis on a global scale. The virus continues to spread throughout nations, putting health systems under enormous pressure in the battle to save lives. With this growing crisis, companies and researchers worldwide are searching for ways to overcome the challenges associated with this virus. Also, the transport sector will play a critical role in revitalizing economies while simultaneously containing the spread of COVID-19. As the virus is still circulating, the only solution is to redesign public transportation to make More >

Displaying 181-190 on page 19 of 240. Per Page