In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status ...In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status of equipment in real time, and uses wire or wireless network to send real-time situation to display on manager's PC or PDA. In addition, the system will also synchronize with database to record and reserve message. Furthermore, the status will display not only to a single manager but also a number of managers. In order to increase efficiency between graphical user interface (GUI) and database, the system adopts SqlDependency object of ADO.NET so that any changed situation of the database could be known immediately and synchronized with manager's PC or PDA. Because the problem of the equipment utilization is an NP-complete (non-deterministic polynomial) problem, we apply genetic algorithm to enhance the efficiency of finding optimum solution for equipment utilization. We assign constraints into the system, and the system will post back the optimum solution simultaneously on the screen. As a consequence, we compare our genetic algorithm based approach (GA) with the simulated annealing based approach (SA) for maximizing the equipment utilization. Experimental result shows that our GA approach achieves an average 79.66% improvement in equipment utilization in an acceptable run time.展开更多
In this paper, we conduct research on the high robustness JavaEE enterprise development mode based on Hadoop and cloud servers. The current virtual machine real-time migration can only achieve manual migration, and ca...In this paper, we conduct research on the high robustness JavaEE enterprise development mode based on Hadoop and cloud servers. The current virtual machine real-time migration can only achieve manual migration, and cannot achieve full-automatic migration. In other words, when the server overload requires the administrator to artificially select a low-load host, and then hit migration command to implement the migration. In recent years, the Hadoop is becoming popular, and the read performance of the data is measured in terms of the time overhead for reading the required data. The key to reducing read time is to optimize that Hadoop cloud data read time and the RDBMS data query time. This paper integrates the mentioned techniques to construct the novel JavaEE enterprise development pattern that will promote the further development of the related techniques.展开更多
The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of m...The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of much techno-logical advancement,phishing acts as thefirst step in a series of attacks.With technological advancements,availability and access to the phishing kits has improved drastically,thus making it an ideal tool for the hackers to execute the attacks.The phishing cases indicate use of foreign characters to disguise the ori-ginal Uniform Resource Locator(URL),typosquatting the popular domain names,using reserved characters for re directions and multi-chain phishing.Such phishing URLs can be stored as a part of the document and uploaded in the cloud,providing a nudge to hackers in cloud storage.The cloud servers are becoming the trusted tool for executing these attacks.The prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client’s end(browser).At the same time,the avalanche effect and immut-ability of block-chain proves to be a strong source of security.Considering these trends in technology,a block-chain basedfiltering implementation for preserving the integrity of user data stored in the cloud is proposed.The proposed Phish Block detects the homographic phishing URLs with accuracy of 91%which assures the security in cloud storage.展开更多
With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To addres...With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.展开更多
针对云服务器中存在软件老化现象,将造成系统性能衰退与可靠性下降问题,借鉴剩余使用寿命(Remaining useful life,RUL)概念,提出基于支持向量和高斯函数拟合(Support vectors and Gaussian function fitting,SVs-GFF)的老化预测方法.首...针对云服务器中存在软件老化现象,将造成系统性能衰退与可靠性下降问题,借鉴剩余使用寿命(Remaining useful life,RUL)概念,提出基于支持向量和高斯函数拟合(Support vectors and Gaussian function fitting,SVs-GFF)的老化预测方法.首先,提取云服务器老化数据的统计特征指标,并采用支持向量回归(Support vector regression,SVR)对统计特征指标进行数据稀疏化处理,得到支持向量(Support vectors,SVs)序列数据;然后,建立基于密度聚类的高斯函数拟合(Gaussian function fitting,GFF)模型,对不同核函数下的支持向量序列数据进行老化曲线拟合,并采用Fréchet距离优化算法选取最优老化曲线;最后,基于最优老化曲线,评估系统到达老化阈值前的RUL,以预测系统何时发生老化.在OpenStack云服务器4个老化数据集上的实验结果表明,基于RUL和SVs-GFF的云服务器老化预测方法与传统预测方法相比,具有更高的预测精度和更快的收敛速度.展开更多
In the cloud era, the control objects are becoming larger and the information processing is more complex, and it is difficult for traditional control systems to process massive data in a timely manner. In view of the ...In the cloud era, the control objects are becoming larger and the information processing is more complex, and it is difficult for traditional control systems to process massive data in a timely manner. In view of the difficulty of data processing in the cloud era, it is extremely important to perform massive data operations through cloud servers. Unmanned aeriel vehicle(UAV) control is the representative of the intelligent field. Based on the ant colony algorithm and incorporating the potential field method, an improved potential field ant colony algorithm is designed. To deal with the path planning problem of UAVs, the potential field ant colony algorithm shortens the optimal path distance by 6.7%, increases the algorithm running time by39.3%, and increases the maximum distance by 24.1% compared with the previous improvement. The cloud server is used to process the path problem of the UAV and feedback the calculation results in real time. Simulation experiments verify the effectiveness of the new algorithm in the cloud environment.展开更多
论述了SQL Server Spatial技术理论,探讨了空间数据导入、索引的创建以及空间数据的查询方法。并以3维激光扫描获取的点云数据为例,采用C#连接SQL Server数据库,对点云数据进行了组织及查询,并在MapOb-ject组件下进行可视化。试验证明,...论述了SQL Server Spatial技术理论,探讨了空间数据导入、索引的创建以及空间数据的查询方法。并以3维激光扫描获取的点云数据为例,采用C#连接SQL Server数据库,对点云数据进行了组织及查询,并在MapOb-ject组件下进行可视化。试验证明,建立空间索引后点云数据的检索效率较高。展开更多
文摘In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status of equipment in real time, and uses wire or wireless network to send real-time situation to display on manager's PC or PDA. In addition, the system will also synchronize with database to record and reserve message. Furthermore, the status will display not only to a single manager but also a number of managers. In order to increase efficiency between graphical user interface (GUI) and database, the system adopts SqlDependency object of ADO.NET so that any changed situation of the database could be known immediately and synchronized with manager's PC or PDA. Because the problem of the equipment utilization is an NP-complete (non-deterministic polynomial) problem, we apply genetic algorithm to enhance the efficiency of finding optimum solution for equipment utilization. We assign constraints into the system, and the system will post back the optimum solution simultaneously on the screen. As a consequence, we compare our genetic algorithm based approach (GA) with the simulated annealing based approach (SA) for maximizing the equipment utilization. Experimental result shows that our GA approach achieves an average 79.66% improvement in equipment utilization in an acceptable run time.
文摘In this paper, we conduct research on the high robustness JavaEE enterprise development mode based on Hadoop and cloud servers. The current virtual machine real-time migration can only achieve manual migration, and cannot achieve full-automatic migration. In other words, when the server overload requires the administrator to artificially select a low-load host, and then hit migration command to implement the migration. In recent years, the Hadoop is becoming popular, and the read performance of the data is measured in terms of the time overhead for reading the required data. The key to reducing read time is to optimize that Hadoop cloud data read time and the RDBMS data query time. This paper integrates the mentioned techniques to construct the novel JavaEE enterprise development pattern that will promote the further development of the related techniques.
文摘The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy.But,deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes.In Spite of much techno-logical advancement,phishing acts as thefirst step in a series of attacks.With technological advancements,availability and access to the phishing kits has improved drastically,thus making it an ideal tool for the hackers to execute the attacks.The phishing cases indicate use of foreign characters to disguise the ori-ginal Uniform Resource Locator(URL),typosquatting the popular domain names,using reserved characters for re directions and multi-chain phishing.Such phishing URLs can be stored as a part of the document and uploaded in the cloud,providing a nudge to hackers in cloud storage.The cloud servers are becoming the trusted tool for executing these attacks.The prevailing software for blacklisting phishing URLs lacks the security for multi-level phishing and expects security from the client’s end(browser).At the same time,the avalanche effect and immut-ability of block-chain proves to be a strong source of security.Considering these trends in technology,a block-chain basedfiltering implementation for preserving the integrity of user data stored in the cloud is proposed.The proposed Phish Block detects the homographic phishing URLs with accuracy of 91%which assures the security in cloud storage.
基金The National Natural Science Foundation of China(No.61272413,No.61472165)
文摘With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.
文摘针对云服务器中存在软件老化现象,将造成系统性能衰退与可靠性下降问题,借鉴剩余使用寿命(Remaining useful life,RUL)概念,提出基于支持向量和高斯函数拟合(Support vectors and Gaussian function fitting,SVs-GFF)的老化预测方法.首先,提取云服务器老化数据的统计特征指标,并采用支持向量回归(Support vector regression,SVR)对统计特征指标进行数据稀疏化处理,得到支持向量(Support vectors,SVs)序列数据;然后,建立基于密度聚类的高斯函数拟合(Gaussian function fitting,GFF)模型,对不同核函数下的支持向量序列数据进行老化曲线拟合,并采用Fréchet距离优化算法选取最优老化曲线;最后,基于最优老化曲线,评估系统到达老化阈值前的RUL,以预测系统何时发生老化.在OpenStack云服务器4个老化数据集上的实验结果表明,基于RUL和SVs-GFF的云服务器老化预测方法与传统预测方法相比,具有更高的预测精度和更快的收敛速度.
基金supported by the Natural Science Foundation of Heilongjiang Province (LH2021E045)。
文摘In the cloud era, the control objects are becoming larger and the information processing is more complex, and it is difficult for traditional control systems to process massive data in a timely manner. In view of the difficulty of data processing in the cloud era, it is extremely important to perform massive data operations through cloud servers. Unmanned aeriel vehicle(UAV) control is the representative of the intelligent field. Based on the ant colony algorithm and incorporating the potential field method, an improved potential field ant colony algorithm is designed. To deal with the path planning problem of UAVs, the potential field ant colony algorithm shortens the optimal path distance by 6.7%, increases the algorithm running time by39.3%, and increases the maximum distance by 24.1% compared with the previous improvement. The cloud server is used to process the path problem of the UAV and feedback the calculation results in real time. Simulation experiments verify the effectiveness of the new algorithm in the cloud environment.
文摘论述了SQL Server Spatial技术理论,探讨了空间数据导入、索引的创建以及空间数据的查询方法。并以3维激光扫描获取的点云数据为例,采用C#连接SQL Server数据库,对点云数据进行了组织及查询,并在MapOb-ject组件下进行可视化。试验证明,建立空间索引后点云数据的检索效率较高。