首页 > 最新文献

Journal of Cloud Computing最新文献

英文 中文
Cross-chain asset trading scheme for notaries based on edge cloud storage 基于边缘云存储的公证人跨链资产交易方案
Pub Date : 2024-04-16 DOI: 10.1186/s13677-024-00648-2
Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang
Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain technology, such as notary mechanism, enables asset exchanges between different blockchain networks. However, existing research still confronts problems such as single inherent value evaluation, collusion risk, credit evaluation and unreasonable resource allocation, making it difficult to ensure the security of cross-chain asset transactions. So this paper proposes a cross-chain asset trading scheme based on edge cloud storage to improve the reliability of notaries and the security of cross-chain value exchange. Firstly, introduce the entropy weight method to determine indicators and adopt multi indicator evaluation to reduce the risk of collusion between notaries and users; Secondly, design a multi-indicator credit evaluation method to improve the accuracy of the evaluation; Finally, design a new and old notary node share allocation method to improve the rationality of resource allocation.The experiment shows that the scheme designed in this paper can reduce the risk of collusion, more accurately screen out high credit nodes to act as notaries, and make resource allocation more reasonable.
区块链已渗透到金融、医疗、供应链、智能交通等各个领域,但不同区块链之间的价值交换限制了其扩展。公证机制等跨链技术实现了不同区块链网络之间的资产交换。但现有研究仍面临单一固有价值评估、串通风险、信用评估、资源分配不合理等问题,难以保证跨链资产交易的安全性。因此,本文提出了一种基于边缘云存储的跨链资产交易方案,以提高公证的可靠性和跨链价值交换的安全性。首先,引入熵权法确定指标,采用多指标评价,降低公证员与用户之间的串通风险;其次,设计多指标信用评价方法,提高评价的准确性;最后,设计新旧公证节点份额分配方法,提高资源分配的合理性。实验表明,本文设计的方案可以降低串通风险,更准确地筛选出高信用节点担任公证员,使资源分配更加合理。
{"title":"Cross-chain asset trading scheme for notaries based on edge cloud storage","authors":"Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang","doi":"10.1186/s13677-024-00648-2","DOIUrl":"https://doi.org/10.1186/s13677-024-00648-2","url":null,"abstract":"Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain technology, such as notary mechanism, enables asset exchanges between different blockchain networks. However, existing research still confronts problems such as single inherent value evaluation, collusion risk, credit evaluation and unreasonable resource allocation, making it difficult to ensure the security of cross-chain asset transactions. So this paper proposes a cross-chain asset trading scheme based on edge cloud storage to improve the reliability of notaries and the security of cross-chain value exchange. Firstly, introduce the entropy weight method to determine indicators and adopt multi indicator evaluation to reduce the risk of collusion between notaries and users; Secondly, design a multi-indicator credit evaluation method to improve the accuracy of the evaluation; Finally, design a new and old notary node share allocation method to improve the rationality of resource allocation.The experiment shows that the scheme designed in this paper can reduce the risk of collusion, more accurately screen out high credit nodes to act as notaries, and make resource allocation more reasonable.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An overview of QoS-aware load balancing techniques in SDN-based IoT networks 基于 SDN 的物联网网络中的 QoS 感知负载均衡技术概览
Pub Date : 2024-04-13 DOI: 10.1186/s13677-024-00651-7
Mohammad Rostami, Salman Goli-Bidgoli
Increasing and heterogeneous service demands have led to traffic increase, and load imbalance challenges among network entities in the Internet of Things (IoT) environments. It can affect Quality of Service (QoS) parameters. By separating the network control layer from the data layer, Software-Defined Networking (SDN) has drawn the interest of many researchers. Efficient data flow management and better network performance can be reachable through load-balancing techniques in SDN and improve the quality of services in the IoT network. So, the combination of IoT and SDN, with conscious real-time traffic management and load control, plays an influential role in improving the QoS. To give a complete assessment of load-balancing strategies to enhance QoS parameters in SDN-based IoT networks (SD-IoT), a systematic review of recent research is presented here. In addition, the paper provides a comparative analysis of the relevant publications, trends, and future areas of study that are particularly useful for the community of researchers in the field.
日益增长的异构服务需求导致流量增加,并给物联网(IoT)环境中的网络实体带来负载不平衡的挑战。这会影响服务质量(QoS)参数。通过将网络控制层与数据层分离,软件定义网络(SDN)引起了许多研究人员的兴趣。通过 SDN 中的负载均衡技术,可以实现高效的数据流管理和更好的网络性能,并提高物联网网络的服务质量。因此,将物联网和 SDN 结合起来,有意识地进行实时流量管理和负载控制,对提高服务质量具有重要作用。为了全面评估基于 SDN 的物联网网络(SD-IoT)中提高 QoS 参数的负载平衡策略,本文对近期的研究进行了系统综述。此外,本文还对相关出版物、趋势和未来研究领域进行了比较分析,这对该领域的研究人员尤为有用。
{"title":"An overview of QoS-aware load balancing techniques in SDN-based IoT networks","authors":"Mohammad Rostami, Salman Goli-Bidgoli","doi":"10.1186/s13677-024-00651-7","DOIUrl":"https://doi.org/10.1186/s13677-024-00651-7","url":null,"abstract":"Increasing and heterogeneous service demands have led to traffic increase, and load imbalance challenges among network entities in the Internet of Things (IoT) environments. It can affect Quality of Service (QoS) parameters. By separating the network control layer from the data layer, Software-Defined Networking (SDN) has drawn the interest of many researchers. Efficient data flow management and better network performance can be reachable through load-balancing techniques in SDN and improve the quality of services in the IoT network. So, the combination of IoT and SDN, with conscious real-time traffic management and load control, plays an influential role in improving the QoS. To give a complete assessment of load-balancing strategies to enhance QoS parameters in SDN-based IoT networks (SD-IoT), a systematic review of recent research is presented here. In addition, the paper provides a comparative analysis of the relevant publications, trends, and future areas of study that are particularly useful for the community of researchers in the field.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments MSCO:区块链雾计算环境中的移动感知安全计算卸载
Pub Date : 2024-04-12 DOI: 10.1186/s13677-024-00599-8
Veni Thangaraj, Thankaraja Raja Sree
Fog computing has evolved as a promising computing paradigm to support the execution of latency-sensitive Internet of Things (IoT) applications. The mobile devices connected to the fog environment are resource constrained and non-stationary. In such environments, offloading mobile user’s computational task to nearby fog servers is necessary to satisfy the QoS requirements of time-critical IoT applications. Moreover, the fog servers are also susceptible to numerous attacks which induce security and privacy issues.Offloading computation task to a malicious fog node affects the integrity of users’ data. Despite the fact that there are many integrity-preserving strategies for fog environments, the majority of them rely on a reliable central entity that might have a single point of failure. Blockchain is a promising strategy that maintains data integrity in a decentralized manner. The state-of-art blockchain offloading mechnanisms have not considered the mobility during secure offloading process. Besides, it is necessary to ensure QoS constraints of the IoT applications while considering mobility of user devices. Hence, in this paper, Blockchain assisted Mobility-aware Secure Computation Offloading (MSCO) mechanism is proposed to choose the best authorized fog servers for offloading task with minimal computational and energy cost. To address the optimization issue, a hybrid Genetic Algorithm based Particle Swarm Optimization technique is employed. Experimental results demonstrated the significant improvement of MSCO when compared to the existing approaches in terms of on average 11 % improvement of total cost which includes the parameters of latency and energy consumption.
雾计算已发展成为一种前景广阔的计算模式,可支持执行对延迟敏感的物联网(IoT)应用。连接到雾环境中的移动设备资源有限,且不稳定。在这种环境下,有必要将移动用户的计算任务卸载到附近的雾服务器上,以满足时间关键型物联网应用的 QoS 要求。此外,雾服务器还容易受到许多攻击,从而引发安全和隐私问题。尽管有许多针对雾环境的完整性保护策略,但其中大多数都依赖于可能存在单点故障的可靠中央实体。区块链是一种很有前途的策略,它能以去中心化的方式维护数据完整性。最先进的区块链卸载机制没有考虑到安全卸载过程中的移动性。此外,在考虑用户设备移动性的同时,有必要确保物联网应用的 QoS 约束。因此,本文提出了区块链辅助移动感知安全计算卸载(MSCO)机制,以最小的计算和能源成本选择最佳授权雾服务器来完成卸载任务。为解决优化问题,采用了基于遗传算法的混合粒子群优化技术。实验结果表明,与现有方法相比,MSCO 的总成本(包括延迟和能耗参数)平均提高了 11%,取得了显著改善。
{"title":"MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments","authors":"Veni Thangaraj, Thankaraja Raja Sree","doi":"10.1186/s13677-024-00599-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00599-8","url":null,"abstract":"Fog computing has evolved as a promising computing paradigm to support the execution of latency-sensitive Internet of Things (IoT) applications. The mobile devices connected to the fog environment are resource constrained and non-stationary. In such environments, offloading mobile user’s computational task to nearby fog servers is necessary to satisfy the QoS requirements of time-critical IoT applications. Moreover, the fog servers are also susceptible to numerous attacks which induce security and privacy issues.Offloading computation task to a malicious fog node affects the integrity of users’ data. Despite the fact that there are many integrity-preserving strategies for fog environments, the majority of them rely on a reliable central entity that might have a single point of failure. Blockchain is a promising strategy that maintains data integrity in a decentralized manner. The state-of-art blockchain offloading mechnanisms have not considered the mobility during secure offloading process. Besides, it is necessary to ensure QoS constraints of the IoT applications while considering mobility of user devices. Hence, in this paper, Blockchain assisted Mobility-aware Secure Computation Offloading (MSCO) mechanism is proposed to choose the best authorized fog servers for offloading task with minimal computational and energy cost. To address the optimization issue, a hybrid Genetic Algorithm based Particle Swarm Optimization technique is employed. Experimental results demonstrated the significant improvement of MSCO when compared to the existing approaches in terms of on average 11 % improvement of total cost which includes the parameters of latency and energy consumption.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"119 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Edge intelligence‑assisted animation design with large models: a survey 更正为边缘智能辅助大型模型动画设计:一项调查
Pub Date : 2024-04-11 DOI: 10.1186/s13677-024-00650-8
Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali

Correction to: Journal of Cloud Computing (2024) 13:48

https://doi.org/10.1186/s13677-024-00601-3

Following publication of the original article [1], we have been notified that affiliation 3 was incorrectly published.

It is now:

3 Department of Computer Engineering, Boukan Branch, Islamic Azad University, Tehran, Iran

It should be:

3 Department of Computer Engineering, Boukan Branch, Islamic Azad University, Boukan, Iran

The original article was updated.

  1. Zhu et al (2024) Edge intelligence–assisted animation design with large models: a survey (2024). 13:48 https://doi.org/10.1186/s13677-024-00601-3

Download references

Authors and Affiliations

  1. Faculty of Creative Industries, City University Malaysia, Petaling Jaya, Malaysia

    Jing Zhu & Mohd Mustafa Mohd Ghazali

  2. Anhui Vocational and Technical College of Industry and Trade, Huainan, China

    Chuanjiang Hu

  3. Department of Computer Engineering, Boukan Branch, Islamic Azad University, Boukan, Iran

    Edris Khezri

Authors
  1. Jing ZhuView author publications

    You can also search for this author in PubMed Google Scholar

  2. Chuanjiang HuView author publications

    You can also search for this author in PubMed Google Scholar

  3. Edris KhezriView author publications

    You can also search for this author in PubMed Google Scholar

  4. Mohd Mustafa Mohd GhazaliView author publications

    You can also search for this author in PubMed Google Scholar

Corresponding author

Correspondence to Edris Khezri.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The online version of the original article can be found at https://doi.org/10.1186/s13677-024-00601-3

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory

更正:Journal of Cloud Computing (2024) 13:48https://doi.org/10.1186/s13677-024-00601-3Following 原文[1]发表后,我们接到通知,隶属关系3被错误发布。现在是:3 Department of Computer Engineering, Boukan Branch, Islamic Azad University, Tehran, Iran应为:3 Department of Computer Engineering, Boukan Branch, Islamic Azad University, Boukan, Iran原文已更新。Zhu等人 (2024) Edge intelligence-assisted animation design with large models: a survey (2024).13:48 https://doi.org/10.1186/s13677-024-00601-3下载参考文献作者及工作单位马来西亚八打灵再也马来西亚城市大学创意产业学院Jing Zhu &;Mohd Mustafa Mohd Ghazali中国淮南安徽工贸职业技术学院Chuanjiang HuDepartment of Computer Engineering, Boukan Branch, Islamic Azad University, Boukan、伊朗Edris Khezri作者朱静查看作者发表的论文您也可以在PubMed Google Scholar中搜索该作者胡川江查看作者发表的论文您也可以在PubMed Google Scholar中搜索该作者Edris Khezri查看作者发表的论文您也可以在PubMed Google Scholar中搜索该作者Mohd Mustafa Mohd Ghazali查看作者发表的论文您也可以在PubMed Google Scholar中搜索该作者通信作者Edris Khezri。出版者注释Springer Nature对出版地图中的管辖权主张和机构隶属关系保持中立。原文的在线版本可在以下网址找到:https://doi.org/10.1186/s13677-024-00601-3Open Access 本文采用知识共享署名 4.0 国际许可协议进行许可,该协议允许以任何媒介或格式使用、共享、改编、分发和复制,只要您适当注明原作者和来源,提供知识共享许可协议的链接,并说明是否进行了修改。本文中的图片或其他第三方材料均包含在文章的知识共享许可协议中,除非在材料的署名栏中另有说明。如果材料未包含在文章的知识共享许可协议中,且您打算使用的材料不符合法律规定或超出许可使用范围,您需要直接从版权所有者处获得许可。要查看该许可的副本,请访问 http://creativecommons.org/licenses/by/4.0/.Reprints and permissionsCite this articleZhu, J., Hu, C., Khezri, E. et al. Correction to:边缘智能辅助大型模型动画设计:一项调查。J Cloud Comp 13, 87 (2024). https://doi.org/10.1186/s13677-024-00650-8Download citationPublished: 11 April 2024DOI: https://doi.org/10.1186/s13677-024-00650-8Share this articleAnyone you share the following link with will be able to read this content:Get shareable linkSorry, a shareable link is not currently available for this article.Copy to clipboard Provided by the Springer Nature SharedIt content-sharing initiative
{"title":"Correction to: Edge intelligence‑assisted animation design with large models: a survey","authors":"Jing Zhu, Chuanjiang Hu, Edris Khezri, Mohd Mustafa Mohd Ghazali","doi":"10.1186/s13677-024-00650-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00650-8","url":null,"abstract":"<p><b>Correction to: Journal of Cloud Computing (2024) 13:48</b></p><p>https://doi.org/10.1186/s13677-024-00601-3</p><p>Following publication of the original article [1], we have been notified that affiliation 3 was incorrectly published.</p><p>It is now:</p><p>3 Department of Computer Engineering, Boukan Branch, Islamic Azad University, Tehran, Iran</p><p>It should be:</p><p>3 Department of Computer Engineering, Boukan Branch, Islamic Azad University, Boukan, Iran</p><p>The original article was updated.</p><ol data-track-component=\"outbound reference\"><li data-counter=\"1.\"><p>Zhu et al (2024) Edge intelligence–assisted animation design with large models: a survey (2024). 13:48 https://doi.org/10.1186/s13677-024-00601-3</p></li></ol><p>Download references<svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" role=\"img\" width=\"16\"><use xlink:href=\"#icon-eds-i-download-medium\" xmlns:xlink=\"http://www.w3.org/1999/xlink\"></use></svg></p><h3>Authors and Affiliations</h3><ol><li><p>Faculty of Creative Industries, City University Malaysia, Petaling Jaya, Malaysia</p><p>Jing Zhu &amp; Mohd Mustafa Mohd Ghazali</p></li><li><p>Anhui Vocational and Technical College of Industry and Trade, Huainan, China</p><p>Chuanjiang Hu</p></li><li><p>Department of Computer Engineering, Boukan Branch, Islamic Azad University, Boukan, Iran</p><p>Edris Khezri</p></li></ol><span>Authors</span><ol><li><span>Jing Zhu</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Chuanjiang Hu</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Edris Khezri</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li><li><span>Mohd Mustafa Mohd Ghazali</span>View author publications<p>You can also search for this author in <span>PubMed<span> </span>Google Scholar</span></p></li></ol><h3>Corresponding author</h3><p>Correspondence to Edris Khezri.</p><h3>Publisher’s Note</h3><p>Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.</p><p>The online version of the original article can be found at https://doi.org/10.1186/s13677-024-00601-3</p><p><b>Open Access</b> This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provably secure data selective sharing scheme with cloud-based decentralized trust management systems 基于云的分散式信任管理系统的可证明安全的数据选择性共享方案
Pub Date : 2024-04-10 DOI: 10.1186/s13677-024-00634-8
S. Velmurugan, M. Prakash, S. Neelakandan, Arun Radhakrishnan
The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This feature allows users to distribute data to particular recipients, while also allowing data proprietors to selectively grant access to their data to users. Ensuring data security and privacy is a formidable task when selective data is acquired and exchanged. One potential issue that emerges is the risk that data may be transmitted by cloud servers to unauthorized users or individuals who have no interest in the particular data or user interests. The prior research lacks comprehensive solutions for balancing security, privacy, and usability in secure data selective sharing schemes inside Cloud-Based decentralized trust management systems. Motivating factors for settling this gap contain growing concerns concerning data privacy, the necessity for scalable and interoperable frameworks, and the increasing dependency on cloud services for data storage and sharing, which necessitates robust and user-friendly mechanisms for secure data management. An effective and obviously secure data selective sharing and acquisition mechanism for cloud-based systems is proposed in this work. We specifically start by important a common problematic related to the selective collection and distribution of data in cloud-based systems. To address these issues, this study proposes a Cloud-based Decentralized Trust Management System (DTMS)-connected Efficient, Provably Secure Data Selection Sharing Scheme (EPSDSS). The EPSDSS approach employs attribute-based encryption (ABE) and proxy re-encryption (PRE) to provide fine-grained access control over shared data. A decentralized trust management system provides participant dependability and accountability while mitigating the dangers of centralized trust models. The EPSDSS-PRE paradigm would allow data owners to regulate granular access while allowing users to customize data collection without disclosing their preferences. In our strategy, the EPSDSS recognizes shared data and generates short fingerprints for information that can elude detection before cloud storage. DTMS also computes user trustworthiness and improves user behaviour administration. Our research demonstrates that it’s able to deliver trustworthy and safe data sharing features in cloud-based environments, making it a viable option for enterprises seeking to protect sensitive data while maximizing collaboration and utilization of resources.
数据的智能收集和共享是云系统的重要组成部分,因为海量数据正在不断产生。这一功能允许用户将数据分发给特定的接收者,同时也允许数据所有者有选择地允许用户访问其数据。在有选择地获取和交换数据时,确保数据安全和隐私是一项艰巨的任务。出现的一个潜在问题是,云服务器可能会将数据传输给未经授权的用户或对特定数据或用户利益不感兴趣的个人。先前的研究缺乏全面的解决方案,无法在基于云的分散式信任管理系统内的安全数据选择性共享方案中平衡安全性、隐私性和可用性。解决这一问题的动因包括人们对数据隐私的日益关注、可扩展和可互操作框架的必要性,以及数据存储和共享对云服务的依赖性日益增加,这就要求建立健全和用户友好的安全数据管理机制。本作品为基于云的系统提出了一种有效且明显安全的数据选择性共享和获取机制。具体来说,我们首先要重视与云系统中数据选择性收集和分发有关的常见问题。为了解决这些问题,本研究提出了一种基于云的去中心化信任管理系统(DTMS)连接的高效、可证明安全的数据选择共享方案(EPSDSS)。EPSDSS 方法采用基于属性的加密(ABE)和代理重加密(PRE)来提供对共享数据的细粒度访问控制。分散式信任管理系统为参与者提供了可靠性和问责制,同时减轻了集中式信任模型的危险。EPSDSS-PRE 模式允许数据所有者对细粒度访问进行管理,同时允许用户在不透露其偏好的情况下定制数据收集。在我们的策略中,EPSDSS 可识别共享数据,并为云存储前可能无法检测到的信息生成简短的指纹。DTMS 还能计算用户的可信度并改进用户行为管理。我们的研究表明,它能够在基于云的环境中提供可信和安全的数据共享功能,使其成为企业寻求保护敏感数据的可行选择,同时最大限度地提高协作和资源利用率。
{"title":"Provably secure data selective sharing scheme with cloud-based decentralized trust management systems","authors":"S. Velmurugan, M. Prakash, S. Neelakandan, Arun Radhakrishnan","doi":"10.1186/s13677-024-00634-8","DOIUrl":"https://doi.org/10.1186/s13677-024-00634-8","url":null,"abstract":"The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This feature allows users to distribute data to particular recipients, while also allowing data proprietors to selectively grant access to their data to users. Ensuring data security and privacy is a formidable task when selective data is acquired and exchanged. One potential issue that emerges is the risk that data may be transmitted by cloud servers to unauthorized users or individuals who have no interest in the particular data or user interests. The prior research lacks comprehensive solutions for balancing security, privacy, and usability in secure data selective sharing schemes inside Cloud-Based decentralized trust management systems. Motivating factors for settling this gap contain growing concerns concerning data privacy, the necessity for scalable and interoperable frameworks, and the increasing dependency on cloud services for data storage and sharing, which necessitates robust and user-friendly mechanisms for secure data management. An effective and obviously secure data selective sharing and acquisition mechanism for cloud-based systems is proposed in this work. We specifically start by important a common problematic related to the selective collection and distribution of data in cloud-based systems. To address these issues, this study proposes a Cloud-based Decentralized Trust Management System (DTMS)-connected Efficient, Provably Secure Data Selection Sharing Scheme (EPSDSS). The EPSDSS approach employs attribute-based encryption (ABE) and proxy re-encryption (PRE) to provide fine-grained access control over shared data. A decentralized trust management system provides participant dependability and accountability while mitigating the dangers of centralized trust models. The EPSDSS-PRE paradigm would allow data owners to regulate granular access while allowing users to customize data collection without disclosing their preferences. In our strategy, the EPSDSS recognizes shared data and generates short fingerprints for information that can elude detection before cloud storage. DTMS also computes user trustworthiness and improves user behaviour administration. Our research demonstrates that it’s able to deliver trustworthy and safe data sharing features in cloud-based environments, making it a viable option for enterprises seeking to protect sensitive data while maximizing collaboration and utilization of resources.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"119 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets 堆叠-CNN-BiLSTM-COVID:用于阿拉伯语 COVID-19 推文情感分析的有效堆叠集合深度学习框架
Pub Date : 2024-04-09 DOI: 10.1186/s13677-024-00644-6
Naglaa Abdelhady, Taysir Hassan A. Soliman, Mohammed F. Farghally
Social networks are popular for advertising, idea sharing, and opinion formation. Due to COVID-19, coronavirus information disseminated on social media affects people’s lives directly. Individuals sometimes managed it well, but it often hampered daily activities. As a result, analyzing people’s feelings is important. Sentiment analysis identifies opinions or sentiments from text. In this paper, we present an effective model that leverages the benefits of Convolutional Neural Network (CNN) and Bidirectional Long Short-Term Memory (BiLSTM) to categorize Arabic tweets using a stacked ensemble learning model. First, the tweets are represented as vectors using a word embedding model, then the text feature is extracted by CNN, and finally the context information of the text is acquired by BiLSTM. Aravec, FastText, and ArWordVec are employed separately to assess the impact of the word embedding on the our model. We also compare the proposed method to various deep learning models: CNN, LSTM, and BiLSTM. Experiments are performed on three different Arabic datasets related to COVID-19 and vaccines. Empirical findings show that the proposed model outperformed the other models’ results by achieving F-measures of 76.76%, 87.%, and 80.5% on the SenWave, AraCOVID19-SSD, and ArCovidVac datasets, respectively.
社交网络在广告、思想分享和舆论形成方面很受欢迎。由于 COVID-19,在社交媒体上传播的冠状病毒信息直接影响着人们的生活。个人有时能很好地应对,但往往会妨碍日常活动。因此,分析人们的感受非常重要。情感分析可以从文本中识别观点或情感。在本文中,我们提出了一个有效的模型,利用卷积神经网络(CNN)和双向长短期记忆(BiLSTM)的优势,使用堆叠集合学习模型对阿拉伯语推文进行分类。首先,使用单词嵌入模型将推文表示为向量,然后用 CNN 提取文本特征,最后用 BiLSTM 获取文本的上下文信息。我们分别使用了 Aravec、FastText 和 ArWordVec 来评估单词嵌入对我们模型的影响。我们还将提议的方法与各种深度学习模型进行了比较:CNN、LSTM 和 BiLSTM。我们在与 COVID-19 和疫苗相关的三个不同的阿拉伯语数据集上进行了实验。实证结果表明,所提出的模型在 SenWave、AraCOVID19-SSD 和 ArCovidVac 数据集上的 F-measures 分别达到了 76.76%、87.% 和 80.5%,优于其他模型的结果。
{"title":"Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets","authors":"Naglaa Abdelhady, Taysir Hassan A. Soliman, Mohammed F. Farghally","doi":"10.1186/s13677-024-00644-6","DOIUrl":"https://doi.org/10.1186/s13677-024-00644-6","url":null,"abstract":"Social networks are popular for advertising, idea sharing, and opinion formation. Due to COVID-19, coronavirus information disseminated on social media affects people’s lives directly. Individuals sometimes managed it well, but it often hampered daily activities. As a result, analyzing people’s feelings is important. Sentiment analysis identifies opinions or sentiments from text. In this paper, we present an effective model that leverages the benefits of Convolutional Neural Network (CNN) and Bidirectional Long Short-Term Memory (BiLSTM) to categorize Arabic tweets using a stacked ensemble learning model. First, the tweets are represented as vectors using a word embedding model, then the text feature is extracted by CNN, and finally the context information of the text is acquired by BiLSTM. Aravec, FastText, and ArWordVec are employed separately to assess the impact of the word embedding on the our model. We also compare the proposed method to various deep learning models: CNN, LSTM, and BiLSTM. Experiments are performed on three different Arabic datasets related to COVID-19 and vaccines. Empirical findings show that the proposed model outperformed the other models’ results by achieving F-measures of 76.76%, 87.%, and 80.5% on the SenWave, AraCOVID19-SSD, and ArCovidVac datasets, respectively.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic prediction for diverse edge IoT data using graph network 利用图网络对多样化边缘物联网数据进行流量预测
Pub Date : 2024-04-08 DOI: 10.1186/s13677-023-00543-2
Tao Shen, Lu Zhang, Renkang Geng, Shuai Li, Bin Sun
More researchers are proposing artificial intelligence algorithms for Internet of Things (IoT) devices and applying them to themes such as smart cities and smart transportation. In recent years, relevant research has mainly focused on data processing and algorithm modeling, and most have shown good prediction results. However, many algorithmic models often adjust parameters for the corresponding datasets, so the robustness of the models is weak. When different types of data face other model parameters, the prediction performance often varies a lot. Thus, this work starts from the perspective of data processing and algorithm models. Taking traffic data as an example, we first propose a new data processing method that processes traffic data with different attributes and characteristics into a dataset that is more common for most models. Then we will compare different types of datasets from the perspective of multiple model parameters, and further analyze the precautions and changing trends of different traffic data in machine learning. Finally, different types of data and ranges of model parameters are explored, together with possible reasons for fluctuations in forecast results when data parameters change.
越来越多的研究人员为物联网(IoT)设备提出人工智能算法,并将其应用于智慧城市和智能交通等主题。近年来,相关研究主要集中在数据处理和算法建模方面,大多数研究都取得了良好的预测效果。然而,许多算法模型往往会针对相应的数据集调整参数,因此模型的鲁棒性较弱。当不同类型的数据面对其他模型参数时,预测性能往往会有很大差异。因此,这项工作从数据处理和算法模型的角度入手。以交通数据为例,我们首先提出一种新的数据处理方法,将具有不同属性和特征的交通数据处理成对大多数模型来说更常见的数据集。然后,我们将从多个模型参数的角度对不同类型的数据集进行比较,并进一步分析不同交通数据在机器学习中的注意事项和变化趋势。最后,探讨不同类型的数据和模型参数范围,以及数据参数变化时预测结果波动的可能原因。
{"title":"Traffic prediction for diverse edge IoT data using graph network","authors":"Tao Shen, Lu Zhang, Renkang Geng, Shuai Li, Bin Sun","doi":"10.1186/s13677-023-00543-2","DOIUrl":"https://doi.org/10.1186/s13677-023-00543-2","url":null,"abstract":"More researchers are proposing artificial intelligence algorithms for Internet of Things (IoT) devices and applying them to themes such as smart cities and smart transportation. In recent years, relevant research has mainly focused on data processing and algorithm modeling, and most have shown good prediction results. However, many algorithmic models often adjust parameters for the corresponding datasets, so the robustness of the models is weak. When different types of data face other model parameters, the prediction performance often varies a lot. Thus, this work starts from the perspective of data processing and algorithm models. Taking traffic data as an example, we first propose a new data processing method that processes traffic data with different attributes and characteristics into a dataset that is more common for most models. Then we will compare different types of datasets from the perspective of multiple model parameters, and further analyze the precautions and changing trends of different traffic data in machine learning. Finally, different types of data and ranges of model parameters are explored, together with possible reasons for fluctuations in forecast results when data parameters change.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy 使用自组织图和神经模糊集合预测帕金森病的 UPDRS
Pub Date : 2024-04-06 DOI: 10.1186/s13677-024-00641-9
Siren Zhao, Jilun Zhang, Jianbin Zhang
Parkinson's Disease (PD) is a complex, degenerative disease that affects nerve cells that are responsible for body movement. Artificial Intelligence (AI) algorithms are widely used to diagnose and track the progression of this disease, which causes symptoms of Parkinson's disease in its early stages, by predicting the results of the Unified Parkinson's Disease Rating Scale (UPDRS). In this study, we aim to develop a method based on the integration of two methods, one complementary to the other, Ensembles of Self-Organizing Map and Neuro-Fuzzy, and an unsupervised learning algorithm. The proposed method relied on the higher effect of the variables resulting from the analysis of the initial readings to obtain a correct and accurate preliminary prediction. We evaluate the developed approach on a PD dataset including speech cues. The process was evaluated with root mean square error (RMSE) and modified R square (modified R2). Our findings reveal that the proposed method is effective in predicting UPDRS outcomes by a combination of speech signals (measures of hoarseness). As the preliminary results during the evaluation showed numbers that proved the worth of the proposed method, such as UPDRS = 0.955 and RMSE approximately 0.2769 during the prediction process.
帕金森病(PD)是一种复杂的退行性疾病,会影响负责身体运动的神经细胞。人工智能(AI)算法通过预测统一帕金森病评分量表(UPDRS)的结果,被广泛用于诊断和跟踪这种疾病的进展情况,这种疾病在早期阶段会导致帕金森病症状。在这项研究中,我们的目标是开发一种基于自组织图集合和神经模糊两种方法互补整合的方法,以及一种无监督学习算法。所提出的方法依赖于对初始读数分析所产生的变量的更高效应,以获得正确、准确的初步预测。我们在包含语音线索的 PD 数据集上对所开发的方法进行了评估。我们用均方根误差(RMSE)和修正 R 平方(修正 R2)对这一过程进行了评估。我们的研究结果表明,所提出的方法能有效地通过语音信号(声音嘶哑的测量指标)组合预测 UPDRS 的结果。评估过程中的初步结果显示的数字证明了所提方法的价值,如在预测过程中,UPDRS = 0.955,RMSE 约为 0.2769。
{"title":"Predicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy","authors":"Siren Zhao, Jilun Zhang, Jianbin Zhang","doi":"10.1186/s13677-024-00641-9","DOIUrl":"https://doi.org/10.1186/s13677-024-00641-9","url":null,"abstract":"Parkinson's Disease (PD) is a complex, degenerative disease that affects nerve cells that are responsible for body movement. Artificial Intelligence (AI) algorithms are widely used to diagnose and track the progression of this disease, which causes symptoms of Parkinson's disease in its early stages, by predicting the results of the Unified Parkinson's Disease Rating Scale (UPDRS). In this study, we aim to develop a method based on the integration of two methods, one complementary to the other, Ensembles of Self-Organizing Map and Neuro-Fuzzy, and an unsupervised learning algorithm. The proposed method relied on the higher effect of the variables resulting from the analysis of the initial readings to obtain a correct and accurate preliminary prediction. We evaluate the developed approach on a PD dataset including speech cues. The process was evaluated with root mean square error (RMSE) and modified R square (modified R2). Our findings reveal that the proposed method is effective in predicting UPDRS outcomes by a combination of speech signals (measures of hoarseness). As the preliminary results during the evaluation showed numbers that proved the worth of the proposed method, such as UPDRS = 0.955 and RMSE approximately 0.2769 during the prediction process.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cloud-edge computing architecture for monitoring protective equipment 用于监测保护设备的云边计算架构
Pub Date : 2024-04-06 DOI: 10.1186/s13677-024-00649-1
Carlos Reaño, Jose V. Riera, Verónica Romero, Pedro Morillo, Sergio Casas-Yrurzum
The proper use of protective equipment is very important to avoid fatalities. One sector in which this has a great impact is that of construction sites, where a large number of workers die each year. In this sector as in others, employers are responsible for providing their employees with this equipment. In addition, employers must monitor and ensure its correct use. These tasks are usually performed using manual procedures. Existing tools to automate this process are unreliable and present scalability issues. In this paper, we research the benefits of using a cloud-edge computing architecture to automate the monitoring of protective equipment. The solution we propose successfully addresses all the problems that appear in hostile and unstructured work environments such as construction sites. Although these sites are used as a use case, the approach presented can also be deployed in other sectors with similar characteristics and restrictions.
正确使用防护设备对避免死亡非常重要。建筑工地就是对这一点影响很大的一个行业,每年都有大量工人在这里丧生。与其他行业一样,该行业的雇主也有责任为员工提供这种设备。此外,雇主还必须监督并确保其正确使用。这些任务通常由人工操作完成。现有的自动化工具并不可靠,而且存在可扩展性问题。在本文中,我们研究了使用云边缘计算架构自动监控防护设备的好处。我们提出的解决方案成功地解决了建筑工地等恶劣和非结构化工作环境中出现的所有问题。虽然我们将这些工地作为使用案例,但所提出的方法也可部署到具有类似特点和限制的其他行业。
{"title":"A cloud-edge computing architecture for monitoring protective equipment","authors":"Carlos Reaño, Jose V. Riera, Verónica Romero, Pedro Morillo, Sergio Casas-Yrurzum","doi":"10.1186/s13677-024-00649-1","DOIUrl":"https://doi.org/10.1186/s13677-024-00649-1","url":null,"abstract":"The proper use of protective equipment is very important to avoid fatalities. One sector in which this has a great impact is that of construction sites, where a large number of workers die each year. In this sector as in others, employers are responsible for providing their employees with this equipment. In addition, employers must monitor and ensure its correct use. These tasks are usually performed using manual procedures. Existing tools to automate this process are unreliable and present scalability issues. In this paper, we research the benefits of using a cloud-edge computing architecture to automate the monitoring of protective equipment. The solution we propose successfully addresses all the problems that appear in hostile and unstructured work environments such as construction sites. Although these sites are used as a use case, the approach presented can also be deployed in other sectors with similar characteristics and restrictions.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cloud-edge collaborative task scheduling method based on model segmentation 基于模型分割的云边协作任务调度方法
Pub Date : 2024-04-05 DOI: 10.1186/s13677-024-00635-7
Chuanfu Zhang, Jing Chen, Wen Li, Hao Sun, Yudong Geng, Tianxiang Zhang, Mingchao Ji, Tonglin Fu
With the continuous development and combined application of cloud computing and artificial intelligence, some new methods have emerged to reduce task execution time for training neural network models in a cloud-edge collaborative environment. The most attractive method is neural network model segmentation. However, many factors affect the segmentation point, such as resource allocation, system energy consumption, load balancing, and network Bandwidth allocation. Some segmentation methods consider the shortest task execution time, which ignores the utilization of resources at the edge and can result in resource waste. Additionally, these factors are difficult to measure, which presents a challenge in calculating the best segmentation point to achieve the goal of maximum resource utilization and minimum task execution time. To solve this problem, this paper proposes a cloud-edge collaborative task scheduling method based on model segmentation (CECMS). This method first analyzes the factors affecting the segmentation point of the model and then obtains accurate factors that affect the segmentation point calculation through the pre-execution method. Furthermore, a multi-objective solution algorithm is improved to calculate the optimal model segmentation point. And tasks are separately offloaded to the edge and cloud based on the optimal model segmentation point. Finally, the experiments are conducted to verify the effectiveness of this method. Finally, the effectiveness of the CECMS method was verified through simulation experiments. Compared with the Dynamic Adaptive DNN Surgery (DADS) method and an adaptive DNN inference acceleration framework algorithm with end–edge–cloud collaborative computing algorithm (ADC), CECMS achieves the same effectiveness as DADS and ADC in optimizing task execution time by comprehensively considering the utilization of edge resources and minimizing task execution time, while also effectively ensuring resource utilization.
随着云计算和人工智能的不断发展和结合应用,出现了一些新方法来减少云边协作环境中训练神经网络模型的任务执行时间。最有吸引力的方法是神经网络模型分割。然而,影响分割点的因素很多,如资源分配、系统能耗、负载平衡和网络带宽分配等。有些分割方法考虑的是最短的任务执行时间,这忽略了边缘资源的利用率,可能造成资源浪费。此外,这些因素很难测量,这给计算最佳分割点以实现最大资源利用率和最短任务执行时间的目标带来了挑战。为解决这一问题,本文提出了一种基于模型分割的云边协同任务调度方法(CECMS)。该方法首先分析影响模型分割点的因素,然后通过预执行方法获得影响分割点计算的精确因素。此外,还改进了多目标求解算法,计算出最优模型分割点。并根据最优模型分割点将任务分别卸载到边缘和云端。最后,通过实验验证了该方法的有效性。最后,通过仿真实验验证了 CECMS 方法的有效性。与动态自适应DNN手术(Dynamic Adaptive DNN Surgery,DADS)方法和自适应DNN推理加速框架算法与端-边-云协同计算算法(Andive DNN inference acceleration framework algorithm with end-edge-cloud collaborative computing algorithm,ADC)相比,CECMS通过综合考虑边缘资源的利用率,在优化任务执行时间方面取得了与DADS和ADC相同的效果,在最小化任务执行时间的同时也有效保证了资源的利用率。
{"title":"A cloud-edge collaborative task scheduling method based on model segmentation","authors":"Chuanfu Zhang, Jing Chen, Wen Li, Hao Sun, Yudong Geng, Tianxiang Zhang, Mingchao Ji, Tonglin Fu","doi":"10.1186/s13677-024-00635-7","DOIUrl":"https://doi.org/10.1186/s13677-024-00635-7","url":null,"abstract":"With the continuous development and combined application of cloud computing and artificial intelligence, some new methods have emerged to reduce task execution time for training neural network models in a cloud-edge collaborative environment. The most attractive method is neural network model segmentation. However, many factors affect the segmentation point, such as resource allocation, system energy consumption, load balancing, and network Bandwidth allocation. Some segmentation methods consider the shortest task execution time, which ignores the utilization of resources at the edge and can result in resource waste. Additionally, these factors are difficult to measure, which presents a challenge in calculating the best segmentation point to achieve the goal of maximum resource utilization and minimum task execution time. To solve this problem, this paper proposes a cloud-edge collaborative task scheduling method based on model segmentation (CECMS). This method first analyzes the factors affecting the segmentation point of the model and then obtains accurate factors that affect the segmentation point calculation through the pre-execution method. Furthermore, a multi-objective solution algorithm is improved to calculate the optimal model segmentation point. And tasks are separately offloaded to the edge and cloud based on the optimal model segmentation point. Finally, the experiments are conducted to verify the effectiveness of this method. Finally, the effectiveness of the CECMS method was verified through simulation experiments. Compared with the Dynamic Adaptive DNN Surgery (DADS) method and an adaptive DNN inference acceleration framework algorithm with end–edge–cloud collaborative computing algorithm (ADC), CECMS achieves the same effectiveness as DADS and ADC in optimizing task execution time by comprehensively considering the utilization of edge resources and minimizing task execution time, while also effectively ensuring resource utilization.","PeriodicalId":501257,"journal":{"name":"Journal of Cloud Computing","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cloud Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1