Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (236)
  • Open Access

    ARTICLE

    Building an Open Cloud Virtual Dataspace Model for Materials Scientific Data

    Yang Li1, Jianjiang Li1, Peng Shi2, Xiaoning Qin3

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 615-624, 2019, DOI:10.31209/2019.100000116

    Abstract The applications to process large amounts of materials scientific data at different scales, have been placed the field of materials science on the verge of a revolution. This domain faces serious challenges, including diversity of format of scientific data, and missing unified platform for sharing. A Virtual DataSpace model and the evolution model is introduced to organize heterogeneous data according to the user requirements and track the variations of data. The open cloud model is embedded in a materials scientific data sharing platform in our experiments to verify its effectiveness. The results show the model More >

  • Open Access

    ARTICLE

    Virtual Machine Based on Genetic Algorithm Used in Time and Power Oriented Cloud Computing Task Scheduling

    Tongmao Ma1,2, Shanchen Pang1, Weiguang Zhang1, Shaohua Hao1

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 605-613, 2019, DOI:10.31209/2019.100000115

    Abstract In cloud computing, task scheduling is a challenging problem in cloud data center, and there are many different kinds of task scheduling strategies. A good scheduling strategy can bring good effectiveness, where plenty of parameters should be regulated to achieve acceptable performance of cloud computing platform. In this work, combined elitist strategy, three parameters values oriented genetic algorithms are proposed. Specifically, a model built by Generalized Stochastic Petri Nets (GSPN) is introduced to describe the process of scheduling in cloud datacenter, and then the workflow of the algorithms is showed. After that, the effectiveness of More >

  • Open Access

    ARTICLE

    Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information

    Ce Li1,2,*, Xinyu Shang2, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Xianlei Xu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1245-1260, 2019, DOI:10.32604/cmc.2019.06159

    Abstract Pipeline defect detection systems collect the videos from cameras of pipeline robots, however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats. The existing systems tend to reach the limit in terms of data access anywhere, access security and video processing on cloud. There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection. In this paper, we deploy the framework of a cloud based pipeline defect detection system, including the user management module, pipeline robot control module, system More >

  • Open Access

    ARTICLE

    XML-Based Information Fusion Architecture Based on Cloud Computing Ecosystem

    I-Ching Hsu1,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 929-950, 2019, DOI:10.32604/cmc.2019.07876

    Abstract Considering cloud computing from an organizational and end user computing point of view, it is a new paradigm for deploying, managing and offering services through a shared infrastructure. Current development of cloud computing applications, however, are the lack of a uniformly approach to cope with the heterogeneous information fusion. This leads cloud computing to inefficient development and a low potential reuse. This study addresses these issues to propose a novel Web 2.0 Mashups as a Service, called WMaaS, which is a fundamental cloud service model. The WMaaS is developed based on a XML-based Mashups Architecture More >

  • Open Access

    ARTICLE

    Efficient Computation Offloading in Mobile Cloud Computing for Video Streaming Over 5G

    Bokyun Jo1, Md. Jalil Piran2,*, Daeho Lee3, Doug Young Suh4,*

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 439-463, 2019, DOI:10.32604/cmc.2019.08194

    Abstract In this paper, we investigate video quality enhancement using computation offloading to the mobile cloud computing (MCC) environment. Our objective is to reduce the computational complexity required to covert a low-resolution video to high-resolution video while minimizing computation at the mobile client and additional communication costs. To do so, we propose an energy-efficient computation offloading framework for video streaming services in a MCC over the fifth generation (5G) cellular networks. In the proposed framework, the mobile client offloads the computational burden for the video enhancement to the cloud, which renders the side information needed to… More >

  • Open Access

    ARTICLE

    Underground Disease Detection Based on Cloud Computing and Attention Region Neural Network

    Pinjie Xu2, Ce Li1,2,*, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Jingwu Feng2

    Journal on Artificial Intelligence, Vol.1, No.1, pp. 9-18, 2019, DOI:10.32604/jai.2019.06157

    Abstract Detecting the underground disease is very crucial for the roadbed health monitoring and maintenance of transport facilities, since it is very closely related to the structural health and reliability with the rapid development of road traffic. Ground penetrating radar (GPR) is widely used to detect road and underground diseases. However, it is still a challenging task due to data access anywhere, transmission security and data processing on cloud. Cloud computing can provide scalable and powerful technologies for large-scale storage, processing and dissemination of GPR data. Combined with cloud computing and radar detection technology, it is More >

  • Open Access

    ARTICLE

    Review of Access Control Model

    Zhengtao Liu1,*, Wen Gu1, Jinyue Xia2

    Journal of Cyber Security, Vol.1, No.1, pp. 43-50, 2019, DOI:10.32604/jcs.2019.06070

    Abstract Access control is one of the core problems in data management system. In this paper, the system requirements were described in three aspects: the traditional access control model, the access control model in the Internet era and the access control model in the cloud computing environment. Meanwhile, the corresponding major models were listed and their characteristics and problems were analyzed. Finally, the development trend of the corresponding model was proposed. More >

  • Open Access

    ARTICLE

    A Cross-Tenant RBAC Model for Collaborative Cloud Services

    Zhengtao Liu1,*, Jinyue Xia2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 395-408, 2019, DOI:10.32604/cmc.2019.05627

    Abstract Tenants in the cloud computing environment share various services, including storage, network, computing, and applications. For better use of services in the cloud computing environment, tenants collaborate in tasks, resulting in challenges to the traditional access control. This study proposes a cross-tenant role-based access control (CT-RBAC) model for collaborative cloud services. This model covers the CT-RBAC0, CT-RBAC1, CT-RBAC2, and CT-RBAC3 models. The model not only extends the RBAC model in the multi-tenant cloud computing mode but also includes four types of authorization modes among tenants. Consequently, the role inheritance constraint is increased, and fine-grained authorization More >

  • Open Access

    ARTICLE

    Recent Advances in Mobile Grid and Cloud Computing

    Sayed Chhattan Shah

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 285-298, 2018, DOI:10.1080/10798587.2017.1280995

    Abstract Grid and cloud computing systems have been extensively used to solve large and complex problems in science and engineering fields. These systems include powerful computing resources that are connected through high-speed networks. Due to the recent advances in mobile computing and networking technologies, it has become feasible to integrate various mobile devices, such as robots, aerial vehicles, sensors, and smart phones, with grid and cloud computing systems. This integration enables the design and development of the next generation of applications by sharing of resources in mobile environments and introduces several challenges due to a dynamic More >

  • Open Access

    ARTICLE

    Network Security Situation Awareness Framework based on Threat Intelligence

    Hongbin Zhang1, 2, Yuzi Yi1, *, Junshe Wang1, Ning Cao3, *, Qiang Duan4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 381-399, 2018, DOI:10.3970/cmc.2018.03787

    Abstract Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on… More >

Displaying 221-230 on page 23 of 236. Per Page