无气味卡尔曼滤波增强云计算的安全性与统计分析的电力消耗

Q4 Economics, Econometrics and Finance International Journal of Energy, Environment and Economics Pub Date : 2021-11-26 DOI:10.46300/91012.2021.15.17
Mohamadreza Mohamadzadeh
{"title":"无气味卡尔曼滤波增强云计算的安全性与统计分析的电力消耗","authors":"Mohamadreza Mohamadzadeh","doi":"10.46300/91012.2021.15.17","DOIUrl":null,"url":null,"abstract":"To migrate to cloud computing or other new generation of computational and communicational network we should making some laws about limitations on such networks. We should clarify clearly the level of accessions to resources and/or the ability to sending or receiving files through such network. We can avoid unpredicted and undesired works by using of law makings. Furthermore, besides of law making we can use evolutionary and/or intelligence techniques for estimation and prediction about parameters that deal with controlling of our network – for example in this paper we introduce one type of such intelligence algorithms which named as unscented Kalman filter. By giving some raw inputs about treatments and resources of such networks we’re able to estimate and predict about lots of different conditions of these networks. For example, we should have an estimation and prediction algorithm to be able to track and trace the hackers or crackers, if they’re permeating to our network. Or we should estimate the amount of users that will use particular software or application on a specific hour through such network. Also, if we study users treatment on a specific network, like cloud computing, we’re able to estimate and predict their keen and eagerness about new released software or application; because if we know how people treat and face and react with new emerging software we’re able to construct and program our applications more precisely. In this paper, at first we tell about cloud computing – we define it completely and discuss about all aspects of this new generation of internet – also in the first section we discuss about efficiency of cloud computing in saving of energy and tell differences between the amount of energy that cloud resources use and the amount of energy that other computerized frames were use. We proof our suggestions and ideas by the means of analytical and mathematical analysis; after that when we understand about all of its concepts, a brief review about Microsoft decisions on cloud computing were present, we review new systems and software’s of Microsoft that equipped with cloud computing and study the advantages and disadvantages of these new services which are equipped with cloud computing. In the next section by the knowing of whole concepts and key features of this network and also by knowing the critical uses of this network on different industries we introduce fixedinterval smoothers; which can be used for estimation and prediction of different parameters in such network. For example, we can use this for estimation and prediction about permeating of hackers or for predicting the amount of users that will use special part of our network in a particular period of time or by tracking and tracing the packets or even users. By performing such activities we’re able to eliminate malicious and spyware treatments from the beginning points of our network. Also by the means of mathematical analysis in this paper, we demonstrate all of our suggestions and according to these proofs we conclude about workability and liability of such network.","PeriodicalId":39336,"journal":{"name":"International Journal of Energy, Environment and Economics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing the Security of Cloud Computing via Unscented Kalman Filter; with Statistical Analysis About Power Consumption\",\"authors\":\"Mohamadreza Mohamadzadeh\",\"doi\":\"10.46300/91012.2021.15.17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To migrate to cloud computing or other new generation of computational and communicational network we should making some laws about limitations on such networks. We should clarify clearly the level of accessions to resources and/or the ability to sending or receiving files through such network. We can avoid unpredicted and undesired works by using of law makings. Furthermore, besides of law making we can use evolutionary and/or intelligence techniques for estimation and prediction about parameters that deal with controlling of our network – for example in this paper we introduce one type of such intelligence algorithms which named as unscented Kalman filter. By giving some raw inputs about treatments and resources of such networks we’re able to estimate and predict about lots of different conditions of these networks. For example, we should have an estimation and prediction algorithm to be able to track and trace the hackers or crackers, if they’re permeating to our network. Or we should estimate the amount of users that will use particular software or application on a specific hour through such network. Also, if we study users treatment on a specific network, like cloud computing, we’re able to estimate and predict their keen and eagerness about new released software or application; because if we know how people treat and face and react with new emerging software we’re able to construct and program our applications more precisely. In this paper, at first we tell about cloud computing – we define it completely and discuss about all aspects of this new generation of internet – also in the first section we discuss about efficiency of cloud computing in saving of energy and tell differences between the amount of energy that cloud resources use and the amount of energy that other computerized frames were use. We proof our suggestions and ideas by the means of analytical and mathematical analysis; after that when we understand about all of its concepts, a brief review about Microsoft decisions on cloud computing were present, we review new systems and software’s of Microsoft that equipped with cloud computing and study the advantages and disadvantages of these new services which are equipped with cloud computing. In the next section by the knowing of whole concepts and key features of this network and also by knowing the critical uses of this network on different industries we introduce fixedinterval smoothers; which can be used for estimation and prediction of different parameters in such network. For example, we can use this for estimation and prediction about permeating of hackers or for predicting the amount of users that will use special part of our network in a particular period of time or by tracking and tracing the packets or even users. By performing such activities we’re able to eliminate malicious and spyware treatments from the beginning points of our network. Also by the means of mathematical analysis in this paper, we demonstrate all of our suggestions and according to these proofs we conclude about workability and liability of such network.\",\"PeriodicalId\":39336,\"journal\":{\"name\":\"International Journal of Energy, Environment and Economics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Energy, Environment and Economics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.46300/91012.2021.15.17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Economics, Econometrics and Finance\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Energy, Environment and Economics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46300/91012.2021.15.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Economics, Econometrics and Finance","Score":null,"Total":0}
引用次数: 0

摘要

为了迁移到云计算或其他新一代的计算和通信网络,我们应该制定一些关于这些网络限制的法律。我们应该清楚地说明访问资源的级别和/或通过这种网络发送或接收文件的能力。我们可以利用立法来避免意外的和不希望的工作。此外,除了制定法律之外,我们还可以使用进化和/或智能技术来估计和预测处理网络控制的参数-例如,在本文中,我们介绍了一种称为无气味卡尔曼滤波器的智能算法。通过提供一些关于这些网络的治疗和资源的原始输入,我们能够估计和预测这些网络的许多不同条件。例如,我们应该有一个估计和预测算法,能够跟踪和追踪黑客或破解者,如果他们渗透到我们的网络。或者我们应该通过这样的网络估计在特定时间使用特定软件或应用程序的用户数量。此外,如果我们研究用户在特定网络(如云计算)上的态度,我们就能够估计和预测他们对新发布的软件或应用程序的热情和渴望;因为如果我们知道人们如何对待、面对和反应新兴的软件,我们就能更精确地构建和编程我们的应用程序。在本文中,我们首先介绍云计算——我们对其进行了完整的定义,并讨论了新一代互联网的各个方面——在第一部分中,我们还讨论了云计算在节约能源方面的效率,并说明了云资源使用的能源量与其他计算机化框架使用的能源量之间的差异。我们通过分析和数学分析来证明我们的建议和想法;在了解了云计算的所有概念之后,我们简要回顾了微软在云计算方面的决策,回顾了微软配备云计算的新系统和软件,并研究了这些配备云计算的新服务的优缺点。在下一节中,通过了解该网络的整体概念和关键特征,以及了解该网络在不同行业的关键用途,我们将引入固定间隔平滑器;可用于该网络中不同参数的估计和预测。例如,我们可以使用它来估计和预测黑客的渗透,或者预测在特定时间内使用我们网络特定部分的用户数量,或者通过跟踪和跟踪数据包甚至用户。通过执行这些活动,我们能够从我们网络的起点消除恶意和间谍软件处理。本文还通过数学分析的方法对我们的建议进行了论证,并根据这些证明得出了这种网络的可操作性和可靠性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Enhancing the Security of Cloud Computing via Unscented Kalman Filter; with Statistical Analysis About Power Consumption
To migrate to cloud computing or other new generation of computational and communicational network we should making some laws about limitations on such networks. We should clarify clearly the level of accessions to resources and/or the ability to sending or receiving files through such network. We can avoid unpredicted and undesired works by using of law makings. Furthermore, besides of law making we can use evolutionary and/or intelligence techniques for estimation and prediction about parameters that deal with controlling of our network – for example in this paper we introduce one type of such intelligence algorithms which named as unscented Kalman filter. By giving some raw inputs about treatments and resources of such networks we’re able to estimate and predict about lots of different conditions of these networks. For example, we should have an estimation and prediction algorithm to be able to track and trace the hackers or crackers, if they’re permeating to our network. Or we should estimate the amount of users that will use particular software or application on a specific hour through such network. Also, if we study users treatment on a specific network, like cloud computing, we’re able to estimate and predict their keen and eagerness about new released software or application; because if we know how people treat and face and react with new emerging software we’re able to construct and program our applications more precisely. In this paper, at first we tell about cloud computing – we define it completely and discuss about all aspects of this new generation of internet – also in the first section we discuss about efficiency of cloud computing in saving of energy and tell differences between the amount of energy that cloud resources use and the amount of energy that other computerized frames were use. We proof our suggestions and ideas by the means of analytical and mathematical analysis; after that when we understand about all of its concepts, a brief review about Microsoft decisions on cloud computing were present, we review new systems and software’s of Microsoft that equipped with cloud computing and study the advantages and disadvantages of these new services which are equipped with cloud computing. In the next section by the knowing of whole concepts and key features of this network and also by knowing the critical uses of this network on different industries we introduce fixedinterval smoothers; which can be used for estimation and prediction of different parameters in such network. For example, we can use this for estimation and prediction about permeating of hackers or for predicting the amount of users that will use special part of our network in a particular period of time or by tracking and tracing the packets or even users. By performing such activities we’re able to eliminate malicious and spyware treatments from the beginning points of our network. Also by the means of mathematical analysis in this paper, we demonstrate all of our suggestions and according to these proofs we conclude about workability and liability of such network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Energy, Environment and Economics
International Journal of Energy, Environment and Economics Economics, Econometrics and Finance-Economics, Econometrics and Finance (all)
CiteScore
1.10
自引率
0.00%
发文量
0
期刊介绍: International Journal of Energy, Environment, and Economics publishes original research papers that shed light on the interaction between the utilization of energy and the environment, as well as the economic aspects involved with this utilization. The Journal is a vehicle for an international exchange and dissemination of ideas in the multidisciplinary field of energy-environment-economics between research scientists, engineers, economists, policy makers, and others concerned about these issues. The emphasis will be placed on original work, either in the area of scientific or engineering development, or in the area of technological, environmental, economic, or social feasibility. Shorter communications are also invited. The Journal will carry reviews on important issues, which may be invited by the Editors or submitted in the normal way.
期刊最新文献
Determination of a Mathematical Model of Taper Wear for a Longitudinal Surfacing Operation Designing of Dual Power Generation Solar Plus Wind Energy Hybrid System using MPPT Wind and PV Hybrid Micro Grid Power Generation System Getting Ready for Exam of a Special Competence Integration of Migration Flows. A Diffusive Theory
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1