دانلود و نمایش مقالات مرتبط با Cloud computing::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2
نتیجه جستجو - Cloud computing

تعداد مقالات یافته شده: 399
ردیف عنوان نوع
1 MISS-D: A fast and scalable framework of medical image storage service based on distributed file system
MISS-D: یک چارچوب سریع و مقیاس پذیر از خدمات ذخیره سازی تصویر پزشکی بر اساس سیستم فایل توزیع شده-2020
Background and Objective Processing of medical imaging big data is deeply challenging due to the size of data, computational complexity, security storage and inherent privacy issues. Traditional picture archiving and communication system, which is an imaging technology used in the healthcare industry, generally uses centralized high performance disk storage arrays in the practical solutions. The existing storage solutions are not suitable for the diverse range of medical imaging big data that needs to be stored reliably and accessed in a timely manner. The economical solution is emerging as the cloud computing which provides scalability, elasticity, performance and better managing cost. Cloud based storage architecture for medical imaging big data has attracted more and more attention in industry and academia. Methods This study presents a novel, fast and scalable framework of medical image storage service based on distributed file system. Two innovations of the framework are introduced in this paper. An integrated medical imaging content indexing file model for large-scale image sequence is designed to adapt to the high performance storage efficiency on distributed file system. A virtual file pooling technology is proposed, which uses the memory-mapped file method to achieve an efficient data reading process and provides the data swapping strategy in the pool. Result The experiments show that the framework not only has comparable performance of reading and writing files which meets requirements in real-time application domain, but also bings greater convenience for clinical system developers by multiple client accessing types. The framework supports different user client types through the unified micro-service interfaces which basically meet the needs of clinical system development especially for online applications. The experimental results demonstrate the framework can meet the needs of real-time data access as well as traditional picture archiving and communication system. Conclusions This framework aims to allow rapid data accessing for massive medical images, which can be demonstrated by the online web client for MISS-D framework implemented in this paper for real-time data interaction. The framework also provides a substantial subset of features to existing open-source and commercial alternatives, which has a wide range of potential applications.
Keywords: Hadoop distributed file system | Data packing | Memory mapping file | Message queue | Micro-service | Medical imaging
مقاله انگلیسی
2 Automatic underground space security monitoring based on BIM
نظارت بر امنیت خودکار فضای زیرزمینی بر اساس BIM-2020
Traditional underground space safety monitoring is ineffective as data continuity is weak, systematic and random errors are prominent, data quantification is difficult, data stability is scarce (especially in bad weather), and it is difficult to guarantee human safety. In this study, BIM technology and multi-data wireless sensor network transmission protocol, cloud computing platform are introduced into engineering monitoring, real-time online monitoring equipment, cloud computing platform and other hardware and software are developed, and corresponding online monitoring system for structural safety is developed to realize online monitoring and early diagnosis of underground space safety. First, the shape of the underground space, the surrounding environment, and various monitoring points are modeled using BIM. Then, the monitoring data collected from sensors at the engineering site are transmitted to the cloud via wireless transmission. Data information management is then realized via cloud computing, and an actual state-change trend and security assessment is provided. Finally, 4D technology (i.e., 3D model + time axis) that leverages a deformation chromatographic nephogram is used to facilitate managers to view deformation and safety of their underground spaces. To overcome past shortcomings, this system supports the management of basic engineering project data and storage of historical data. Furthermore, the system continuously reflects the fine response of each monitoring item under various working conditions all day, which has significant theoretical value and application.
Keywords: BIM technology | Deformation monitoring | Automation information | Management model
مقاله انگلیسی
3 Challenges and recommended technologies for the industrial internet of things: A comprehensive review
چالش ها و فن آوری های پیشنهادی برای اینترنت اشیا صنعتی: مرور جامع-2020
Physical world integration with cyber world opens the opportunity of creating smart environments; this new paradigm is called the Internet of Things (IoT). Communication between humans and objects has been extended into those between objects and objects. Industrial IoT (IIoT) takes benefits of IoT communications in business applications focusing in interoperability between machines (i.e., IIoT is a subset from the IoT). Number of daily life things and objects connected to the Internet has been in increasing fashion, which makes the IoT be the dynamic network of networks. Challenges such as heterogeneity, dynamicity, velocity, and volume of data, make IoT services produce inconsistent, inaccurate, incomplete, and incorrect results, which are critical for many applications especially in IIoT (e.g., health-care, smart transportation, wearable, finance, industry, etc.). Discovering, searching, and sharing data and resources reveal 40% of IoT benefits to cover almost industrial applications. Enabling real-time data analysis, knowledge extraction, and search techniques based on Information Communication Technologies (ICT), such as data fusion, machine learning, big data, cloud computing, blockchain, etc., can reduce and control IoT and leverage its value. This research presents a comprehensive review to study state-of-the-art challenges and recommended technologies for enabling data analysis and search in the future IoT presenting a framework for ICT integration in IoT layers. This paper surveys current IoT search engines (IoTSEs) and presents two case studies to reflect promising enhancements on intelligence and smartness of IoT applications due to ICT integration.
Keywords: Industrial IoT (IIoT) | Searching and indexing | Blockchain | Big data | Data fusion Machine learning | Cloud and fog computing
مقاله انگلیسی
4 الگوریتم تکاملی چند هدفه مبتنی بر شبکه عصبی برای زمانبندی گردش کار پویا در محاسبات ابری
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 16 - تعداد صفحات فایل doc فارسی: 45
زمانبندی گردشکار یک موضوع پژوهشی است که به طور گسترده در محاسبات ابری مورد مطالعه قرار گرفته است و از منابع ابری برای کارهای گردش کار استفاده می¬شود و برای این منظور اهداف مشخص شده در QoS را لحاظ می¬کند. در این مقاله، مسئله زمانبندی گردش کار پویا را به عنوان یک مسئله بهینه سازی چند هدفه پویا (DMOP) مدل می¬کنیم که در آن منبع پویایی سازی بر اساس خرابی منابع و تعداد اهداف است که ممکن است با گذر زمان تغییر کنند. خطاهای نرم افزاری و یا نقص سخت افزاری ممکن است باعث ایجاد پویایی نوع اول شوند. از سوی دیگر مواجهه با سناریوهای زندگی واقعی در محاسبات ابری ممکن است تعداد اهداف را در طی اجرای گردش کار تغییر دهد. در این مطالعه یک الگوریتم تکاملی چند هدفه پویا مبتنی بر پیش بینی را به نام الگوریتم NN-DNSGA-II ارائه می¬دهیم و برای این منظور شبکه عصبی مصنوعی را با الگوریتم NGSA-II ترکیب می¬کنیم. علاوه بر این پنج الگوریتم پویای مبتنی بر غیرپیش بینی از ادبیات موضوعی برای مسئله زمانبندی گردش کار پویا ارائه می¬شوند. راه¬حل¬های زمانبندی با در نظر گرفتن شش هدف یافت می¬شوند: حداقل سازی هزینه ساخت، انرژی و درجه عدم تعادل و حداکثر سازی قابلیت اطمینان و کاربرد. مطالعات تجربی مبتنی بر کاربردهای دنیای واقعی از سیستم مدیریت گردش کار Pegasus نشان می¬دهد که الگوریتم NN-DNSGA-II ما به طور قابل توجهی از الگوریتم¬های جایگزین خود در بیشتر موارد بهتر کار می¬کند با توجه به معیارهایی که برای DMOP با مورد واقعی پارتو بهینه در نظر گرفته می¬شود از جمله تعداد راه¬حل¬های غیرغالب، فاصله¬گذاری Schott و شاخص Hypervolume.
مقاله ترجمه شده
5 Manufacturing big data ecosystem: A systematic literature review
ساخت اکوسیستم داده های بزرگ: مروری بر ادبیات سیستماتیک-2020
Advanced manufacturing is one of the core national strategies in the US (AMP), Germany (Industry 4.0) and China (Made-in China 2025). The emergence of the concept of Cyber Physical System (CPS) and big data imperatively enable manufacturing to become smarter and more competitive among nations. Many researchers have proposed new solutions with big data enabling tools for manufacturing applications in three directions: product, production and business. Big data has been a fast-changing research area with many new opportunities for applications in manufacturing. This paper presents a systematic literature review of the state-of-the-art of big data in manufacturing. Six key drivers of big data applications in manufacturing have been identified. The key drivers are system integration, data, prediction, sustainability, resource sharing and hardware. Based on the requirements of manufacturing, nine essential components of big data ecosystem are captured. They are data ingestion, storage, computing, analytics, visualization, management, workflow, infrastructure and security. Several research domains are identified that are driven by available capabilities of big data ecosystem. Five future directions of big data applications in manufacturing are presented from modelling and simulation to realtime big data analytics and cybersecurity.
Keywords: Smart manufacturing | Big data | Cloud computing | Cloud manufacturing | Internet of things | NoSQL
مقاله انگلیسی
6 A task scheduling algorithm considering game theory designed for energy management in cloud computing
یک الگوریتم برنامه ریزی کار با توجه به تئوری بازی طراحی شده برای مدیریت انرژی در محاسبات ابری-2020
With the increasing popularity of cloud computing products, task scheduling problem has become a hot research topic in this field. The task scheduling problem of cloud computing system is more complex than the traditional distributed system. Based on the analysis of cloud computing in related literature, we established a simplified model for task scheduling system in cloud computing.Different from the previous research of cloud computing task scheduling algorithm, the simplified model in this paper is based on game theory as a mathematical tool. Based on game theory, the task scheduling algorithm considering the reliability of the balanced task is proposed. Based on the balanced scheduling algorithm, the task scheduling model for computing nodes is proposed. In the cooperative game model, game strategy is used for the task in the calculation of rate allocation strategy on the node. Through analysis of experimental results, it is shown that the proposed algorithm has better optimization effect.
Keywords: Task scheduling | Game theory | Cloud computing | Optimization
مقاله انگلیسی
7 Energy management for multiple real-time workflows on cyber–physical cloud systems
مدیریت انرژی برای گردش های چند گانه در زمان واقعی در سیستم های ابر سایبری فیزیکی-2020
Cyber–physical cloud systems (CPCS) are extensions of cyber–physical systems (CPS) that expand the cyber-part and distribute it on-device and in-cloud. CPCS are considered large-scale heterogeneous distributed cloud computing systems that support execution of multiple workflows. This study aims to reduce the energy consumption of multiple real-time workflows on CPCS and it contains two objectives: (1) maximizing the number of workflows that are completed within their deadlines; (2) minimizing the energy consumption of the workflows that are completed within their deadlines. The former is solved by proposing a deadline-driven processor merging for multiple workflows (DPMMW) algorithm, whereas the latter is solved by proposing a global energy saving for multiple workflows (GESMW) algorithm to minimize the total energy consumption. Experimental results validate that the combined DPMMW&GESMW algorithm can reduce deadline miss ratio (DMR) and save as much as possible energy over existing methods.
Keywords: Cyber–physical cloud systems (CPCS) | Deadline miss ratio (DMR) | Global energy saving (GES) | Multiple workflows | Real-time constraint
مقاله انگلیسی
8 Internet of energy-based demand response management scheme for smart homes and PHEVs using SVM
اینترنت برنامه پاسخگویی به تقاضای مبتنی بر انرژی برای خانه های هوشمند و PHEV با استفاده از SVM-2020
The usage of information and communication technology (ICT) in the power sector has led to the emergence of smart grid (SG). The connected loads in SG are able to communicate their consumption data to the grid using ICT and thus forming a large Internet of Energy (IoE) network. However, various issues such as–increasing demand–supply gap, grid instability, and deteriorating quality of service persist in this network which degrade its performance. These issues can be handled in an efficient way by managing the demand response (DR) of different types of loads. For this purpose, cloud computing can be leveraged to gather the data generated in IoE network and perform analytics to manage DR. Working in this direction, a novel scheme to handle the DR of smart homes (SHs) and plug-in hybrid electric vehicles (PHEVs) is presented in this paper. The proposed scheme is based on analyzing the demand of these users at the cloud server for flattening the overall load profile of grid. This scheme is divided into two hierarchical stages which work as follows. In the first stage, the residential and PHEV users are identified whose demands can be regulated. This task is achieved with the help of a binary-class support vector machine (SVM) which uses Gaussian kernel function to classify these users. In the next stage, the load in SHs is curtailed on the basis of a pre-defined rule-base after analyzing the consumption data of various devices; whereas PHEVs are managed by controlling their charging rates. The efficacy of proposed scheme has been tested on PJM benchmark data and Open Energy Information dataset. The simulation results prove that the proposed scheme is effective in maintaining the overall load profile of SG by managing the DR of SHs and PHEV users.
Keywords: Data analytics | Demand response | Plug-in hybrid electric vehicles | Smart grid | Smart homes | Support vector machine
مقاله انگلیسی
9 Probabilistic data structures for big data analytics: A comprehensive review
ساختار داده های احتمالی برای تجزیه و تحلیل داده های بزرگ: یک مرور جامع-2020
An exponential increase in the data generation resources is widely observed in last decade, because of evolution in technologies such as-cloud computing, IoT, social networking, etc. This enormous and unlimited growth of data has led to a paradigm shift in storage and retrieval patterns from traditional data structures to Probabilistic Data Structures (PDS). PDS are a group of data structures that are extremely useful for Big data and streaming applications in order to avoid high-latency analytical processes. These data structures use hash functions to compactly represent a set of items in stream-based computing while providing approximations with error bounds so that well-formed approximations get built into data collections directly. Compared to traditional data structures, PDS use much less memory and constant time in processing complex queries. This paper provides a detailed discussion of various issues which are normally encountered in massive data sets such as-storage, retrieval, query,etc. Further, role of PDS in solving these issues is also discussed where these data structures are used as temporary accumulators in query processing. Several variants of existing PDS along with their application areas have also been explored which give a holistic view of domains where these data structures can be applied for efficient storage and retrieval of massive data sets. Mathematical proofs of various parameters considered in the PDS have also been discussed in the paper. Moreover, the relative comparison of various PDS with respect to various parameters is also explored.
Keywords: Big data | Internet of things (IoT) | Probabilistic data structures | Bloom filter | Quotient filter | Count min sketch | HyperLogLog counter | Min-hash Locality | sensitive hashing
مقاله انگلیسی
10 Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms
شناسایی و جلوگیری از نفوذ چند لایه در SDN / NFV ابر شبکه های 5G را با استفاده از مکانیسم های دفاعی مبتنی بر هوش مصنوعی فعال می کند-2020
Software defined networking (SDN), network function virtualization (NFV), and cloud computing are receiving significant attention in 5G networks. However, this attention creates a new challenge for security provisioning in these integrated technologies. Research in the field of SDN, NFV, cloud computing, and 5G has recently focused on the intrusion detection and prevention system (IDPS). Existing IDPS solutions are inadequate, which could cause large resource wastage and several security threats. To alleviate security issues, timely detection of an attacker is important. Thus, in this paper, we propose a novel approach that is referred to as multilayered intrusion detection and prevention (ML-IDP) in an SDN/NFV-enabled cloud of 5G networks. The proposed approach defends against security attacks using artificial intelligence (AI). In this paper, we employed five layers: data acquisition layer, switches layer, domain controllers (DC) layer, smart controller (SC) layer, and virtualization layer (NFV infrastructure). User authentication is held in the first layer using the Four-Q-Curve algorithm. To address the flow table overloading attack in the switches layer, the game theory approach, which is executed in the IDP agent, is proposed. The involvement of the IDP agent is to completely avoid a flow table overloading attack by a deep reinforcement learning algorithm, and thus, it updates the current state of all switches. In the DC layer, packets are processed and classified into two classes (normal and suspicious) by a Shannon Entropy function. Normal packets are forwarded to the cloud via the SC. Suspicious packets are sent to the VNF using a growing multiple self-organization map (GM-SOM). The proposed ML-IDP system is evaluated using NS3.26 for different security attacks, including IP Spoofing, flow table overloading, DDoS, Control Plane Saturation, and host location hijacking. From the experiment results, we proved that the ML-IDP with AI-based defense mechanisms effectively detects and prevents attacks.
Keywords: SDN/NFV Cloud of 5G | Multilayered architecture | Intrusion detection and prevention | And artificial intelligence
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi