Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_29
Mevlut A. Demir, W. Wagner, Divyaansh Dandona, John J. Prevost
{"title":"A Comprehensive Solution for Research-Oriented Cloud Computing","authors":"Mevlut A. Demir, W. Wagner, Divyaansh Dandona, John J. Prevost","doi":"10.1007/978-3-319-94295-7_29","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_29","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"35 1","pages":"407-417"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72757902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_3
J. Carvalho, Dario Vieira, Fernando A. M. Trinta
{"title":"Dynamic Selecting Approach for Multi-cloud Providers","authors":"J. Carvalho, Dario Vieira, Fernando A. M. Trinta","doi":"10.1007/978-3-319-94295-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_3","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"13 1","pages":"37-51"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86804428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_18
Huan Zhou, Yang Hu, Jinshu Su, C. D. Laat, Zhiming Zhao
{"title":"CloudsStorm: An Application-Driven Framework to Enhance the Programmability and Controllability of Cloud Virtual Infrastructures","authors":"Huan Zhou, Yang Hu, Jinshu Su, C. D. Laat, Zhiming Zhao","doi":"10.1007/978-3-319-94295-7_18","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_18","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"126 1","pages":"265-280"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76834761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-25DOI: 10.1007/978-3-319-94295-7_28
Kevin Grünberg, W. Schenck
{"title":"A Case Study on Benchmarking IoT Cloud Services","authors":"Kevin Grünberg, W. Schenck","doi":"10.1007/978-3-319-94295-7_28","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_28","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"79 1","pages":"398-406"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83412837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to study the influences of defective rail welding joints on wheel/rail interaction, a transient finite element model of a high-speed train passing over rail welding joints is presented on the basis of field measurements. Focusing on the physical mechanisms differences of wheel/rail rolling contact on welding joints with varying rail straightness at rolling speeds of up to 400 km/h, this model takes vehicle/track system dynamics and wheel/rail elastic–plastic deformations into account. The defective thermite welding joint with short wave irregularity easily leads to rail nucleus flaw with residual stress. When the running speed is over 250km/h,the maximum value of wheel/rail vertical force at welding joint has a basic trend of a bilinear increase with the increase of running speed and the unevenness of the welding joint. There is a phase difference between the maximum contact force and the peak joint irregularity. When the high-speed railway operation management standard is 250~350km/h, the short wave irregularity at rail welding joint with over 0.3mm straightness should be grinded.
{"title":"A Transient Finite Element Model to Simulate the Physical Mechanisms of High-speed Wheel/rail Rolling Contact on a Rail Welding Joint","authors":"Miao Yu, Weidong Wang, Jinzhao Liu","doi":"10.22323/1.300.0040","DOIUrl":"https://doi.org/10.22323/1.300.0040","url":null,"abstract":"In order to study the influences of defective rail welding joints on wheel/rail interaction, a transient finite element model of a high-speed train passing over rail welding joints is presented on the basis of field measurements. Focusing on the physical mechanisms differences of wheel/rail rolling contact on welding joints with varying rail straightness at rolling speeds of up to 400 km/h, this model takes vehicle/track system dynamics and wheel/rail elastic–plastic deformations into account. The defective thermite welding joint with short wave irregularity easily leads to rail nucleus flaw with residual stress. When the running speed is over 250km/h,the maximum value of wheel/rail vertical force at welding joint has a basic trend of a bilinear increase with the increase of running speed and the unevenness of the welding joint. There is a phase difference between the maximum contact force and the peak joint irregularity. When the high-speed railway operation management standard is 250~350km/h, the short wave irregularity at rail welding joint with over 0.3mm straightness should be grinded.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"181 1","pages":"040"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, more and more studies have been done on symptom information extraction. These studies are mostly based on clinical medical records, and they focus only on symptom entities, which are not sufficient to convey the full symptom information. This paper presents a feature split-based approach to extract symptom information from Chinese medicine instruction texts. In this approach, the symptom information is split into two parts: symptom subject entity and symptom manifestation entity. The main idea of this method is to automatically recognize the symptom subject and symptom manifestation first, and then add these two identification results as features to the symptom information extraction task. Through a series of experiments based on Conditional Random Fields (CRF)- an effective model proved by lots of experiments in the field of medicine, it is obvious that the feature split-based approach proposed in this paper can obtain higher accuracy and recall rate in symptom information extraction.
近年来,对症状信息提取的研究越来越多。这些研究大多基于临床病历,只关注症状实体,不足以传达完整的症状信息。提出了一种基于特征分割的中药说明书症状信息提取方法。该方法将症状信息分为两部分:症状主体实体和症状表现实体。该方法的主要思想是首先自动识别症状主体和症状表现,然后将这两个识别结果作为特征加入到症状信息提取任务中。通过一系列基于条件随机场(Conditional Random Fields, CRF)的实验,可以看出本文提出的基于特征分割的方法在症状信息提取中可以获得更高的准确率和召回率。条件随机场是医学领域中被大量实验证明的有效模型。
{"title":"Feature Split-based Information Extraction in the Field of Medicine","authors":"Jing Wan, Huanchun Yan, Xuechao Zhang","doi":"10.22323/1.300.0029","DOIUrl":"https://doi.org/10.22323/1.300.0029","url":null,"abstract":"In recent years, more and more studies have been done on symptom information extraction. \u0000These studies are mostly based on clinical medical records, and they focus only on symptom \u0000entities, which are not sufficient to convey the full symptom information. This paper presents a \u0000feature split-based approach to extract symptom information from Chinese medicine instruction \u0000texts. In this approach, the symptom information is split into two parts: symptom subject entity \u0000and symptom manifestation entity. The main idea of this method is to automatically recognize \u0000the symptom subject and symptom manifestation first, and then add these two identification \u0000results as features to the symptom information extraction task. Through a series of experiments \u0000based on Conditional Random Fields (CRF)- an effective model proved by lots of experiments in \u0000the field of medicine, it is obvious that the feature split-based approach proposed in this paper \u0000can obtain higher accuracy and recall rate in symptom information extraction.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"15 1","pages":"029"},"PeriodicalIF":0.0,"publicationDate":"2018-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-30DOI: 10.5121/IJCCSA.2016.6601
Colin Ting Si Xue, F. W. Xin
The loss of business and downturn of economics almost occur every day. Thus technology is needed in every organization. Cloud computing has played a major role in solving the inefficiencies problem in organizations and increase the growth of business thus help the organizations to stay competitive. It is required to improve and automate the traditional ways of doing business. Cloud computing has been considered as an innovative way to improve business. Overall, cloud computing enables the organizations to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs in organizations expenses are avoided using cloud computing. Although cloud computing can provide advantages but it does not mean that there are no drawbacks. Security has become the major concern in cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary research, that is collecting data from published journal papers and conference papers.
{"title":"Benefits and Challenges of the Adoption of Cloud Computing in Business","authors":"Colin Ting Si Xue, F. W. Xin","doi":"10.5121/IJCCSA.2016.6601","DOIUrl":"https://doi.org/10.5121/IJCCSA.2016.6601","url":null,"abstract":"The loss of business and downturn of economics almost occur every day. Thus technology is needed in every organization. Cloud computing has played a major role in solving the inefficiencies problem in organizations and increase the growth of business thus help the organizations to stay competitive. It is required to improve and automate the traditional ways of doing business. Cloud computing has been considered as an innovative way to improve business. Overall, cloud computing enables the organizations to manage their business efficiently. Unnecessary procedural, administrative, hardware and software costs in organizations expenses are avoided using cloud computing. Although cloud computing can provide advantages but it does not mean that there are no drawbacks. Security has become the major concern in cloud and cloud attacks too. Business organizations need to be alert against the attacks to their cloud storage. Benefits and drawbacks of cloud computing in business will be explored in this paper. Some solutions also provided in this paper to overcome the drawbacks. The method has been used is secondary research, that is collecting data from published journal papers and conference papers.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"1 1","pages":"01-15"},"PeriodicalIF":0.0,"publicationDate":"2016-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-11-26DOI: 10.14257/ASTL.2016.139.88
Jun Wu, J. Chen
Based on the idea of the encryption algorithm, a new method for data storage in cloud computing is designed. Experimental results show that the proposed method in data encryption, data decryption, data retrieval and other aspects of the implementation of the efficiency is significantly higher than the BGV algorithm, and more suitable for the safe storage of cloud data.
{"title":"Research on the Method of Cloud Computing Storage Security based on the Homomorphic Encryption Method","authors":"Jun Wu, J. Chen","doi":"10.14257/ASTL.2016.139.88","DOIUrl":"https://doi.org/10.14257/ASTL.2016.139.88","url":null,"abstract":"Based on the idea of the encryption algorithm, a new method for data storage in cloud computing is designed. Experimental results show that the proposed method in data encryption, data decryption, data retrieval and other aspects of the implementation of the efficiency is significantly higher than the BGV algorithm, and more suitable for the safe storage of cloud data.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"42 1","pages":"443-449"},"PeriodicalIF":0.0,"publicationDate":"2016-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-07-29DOI: 10.1007/978-3-319-48674-1_41
Lin Jianghao, Zhou Yongmei, Y. Aimin, Chen Jin
{"title":"Analysis of Topic Evolution on News Comments Based on Word Vectors","authors":"Lin Jianghao, Zhou Yongmei, Y. Aimin, Chen Jin","doi":"10.1007/978-3-319-48674-1_41","DOIUrl":"https://doi.org/10.1007/978-3-319-48674-1_41","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"23 1","pages":"464-475"},"PeriodicalIF":0.0,"publicationDate":"2016-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76574657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Caring weaning pigs is important in the management of a group-housed pig farm. In this study, we propose an automatic method for detecting low-weight pigs in a pigsty. We install a top-view camera in a room of weaning pigs to detect the motion area of each pig from the video obtained. Then, we automatically detect a low-weight pig by comparing the size of each pig. Based on the experimental results, we confirm that the proposed method can automatically detect relatively low-weight pigs without any manual inspection or measurement of actual weight by a farm administrator.
{"title":"Detection of Low-Weight Pigs using a Top-View Camera","authors":"J. Sa","doi":"10.22323/1.264.0024","DOIUrl":"https://doi.org/10.22323/1.264.0024","url":null,"abstract":"Caring weaning pigs is important in the management of a group-housed pig farm. In this study, we propose an automatic method for detecting low-weight pigs in a pigsty. We install a top-view camera in a room of weaning pigs to detect the motion area of each pig from the video obtained. Then, we automatically detect a low-weight pig by comparing the size of each pig. Based on the experimental results, we confirm that the proposed method can automatically detect relatively low-weight pigs without any manual inspection or measurement of actual weight by a farm administrator.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":"58 1","pages":"024"},"PeriodicalIF":0.0,"publicationDate":"2016-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}