期刊文献+
共找到258篇文章
< 1 2 13 >
每页显示 20 50 100
Real-Time Monitoring Method for Cow Rumination Behavior Based on Edge Computing and Improved MobileNet v3
1
作者 ZHANG Yu LI Xiangting +4 位作者 SUN Yalin XUE Aidi ZHANG Yi JIANG Hailong SHEN Weizheng 《智慧农业(中英文)》 CSCD 2024年第4期29-41,共13页
[Objective]Real-time monitoring of cow ruminant behavior is of paramount importance for promptly obtaining relevant information about cow health and predicting cow diseases.Currently,various strategies have been propo... [Objective]Real-time monitoring of cow ruminant behavior is of paramount importance for promptly obtaining relevant information about cow health and predicting cow diseases.Currently,various strategies have been proposed for monitoring cow ruminant behavior,including video surveillance,sound recognition,and sensor monitoring methods.How‐ever,the application of edge device gives rise to the issue of inadequate real-time performance.To reduce the volume of data transmission and cloud computing workload while achieving real-time monitoring of dairy cow rumination behavior,a real-time monitoring method was proposed for cow ruminant behavior based on edge computing.[Methods]Autono‐mously designed edge devices were utilized to collect and process six-axis acceleration signals from cows in real-time.Based on these six-axis data,two distinct strategies,federated edge intelligence and split edge intelligence,were investigat‐ed for the real-time recognition of cow ruminant behavior.Focused on the real-time recognition method for cow ruminant behavior leveraging federated edge intelligence,the CA-MobileNet v3 network was proposed by enhancing the MobileNet v3 network with a collaborative attention mechanism.Additionally,a federated edge intelligence model was designed uti‐lizing the CA-MobileNet v3 network and the FedAvg federated aggregation algorithm.In the study on split edge intelli‐gence,a split edge intelligence model named MobileNet-LSTM was designed by integrating the MobileNet v3 network with a fusion collaborative attention mechanism and the Bi-LSTM network.[Results and Discussions]Through compara‐tive experiments with MobileNet v3 and MobileNet-LSTM,the federated edge intelligence model based on CA-Mo‐bileNet v3 achieved an average Precision rate,Recall rate,F1-Score,Specificity,and Accuracy of 97.1%,97.9%,97.5%,98.3%,and 98.2%,respectively,yielding the best recognition performance.[Conclusions]It is provided a real-time and effective method for monitoring cow ruminant behavior,and the proposed federated edge intelligence model can be ap‐plied in practical settings. 展开更多
关键词 cow rumination behavior real-time monitoring edge computing improved Mobilenet v3 edge intelligence model Bi-LSTM
在线阅读 下载PDF
FedCLCC:A personalized federated learning algorithm for edge cloud collaboration based on contrastive learning and conditional computing
2
作者 Kangning Yin Xinhui Ji +1 位作者 Yan Wang Zhiguo Wang 《Defence Technology(防务技术)》 2025年第1期80-93,共14页
Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure ... Federated learning(FL)is a distributed machine learning paradigm for edge cloud computing.FL can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenges in edge environments.However,the diversity of clients in edge cloud computing presents significant challenges for FL.Personalized federated learning(pFL)received considerable attention in recent years.One example of pFL involves exploiting the global and local information in the local model.Current pFL algorithms experience limitations such as slow convergence speed,catastrophic forgetting,and poor performance in complex tasks,which still have significant shortcomings compared to the centralized learning.To achieve high pFL performance,we propose FedCLCC:Federated Contrastive Learning and Conditional Computing.The core of FedCLCC is the use of contrastive learning and conditional computing.Contrastive learning determines the feature representation similarity to adjust the local model.Conditional computing separates the global and local information and feeds it to their corresponding heads for global and local handling.Our comprehensive experiments demonstrate that FedCLCC outperforms other state-of-the-art FL algorithms. 展开更多
关键词 Federated learning Statistical heterogeneity Personalized model Conditional computing Contrastive learning
在线阅读 下载PDF
Calculation of angular glint in near field utilizing graphical electromagnetic computing 被引量:2
3
作者 Guangfu Zhang Chao Wang +2 位作者 Liguo Liu Yunqi Fu Naichang Yuan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第6期906-911,共6页
The angular glint in the near field plays an important role on radar tracking errors. To predict it more efficiently for electrically large targets, a new method based on graphical electromagnetic computing (GRECO) ... The angular glint in the near field plays an important role on radar tracking errors. To predict it more efficiently for electrically large targets, a new method based on graphical electromagnetic computing (GRECO) is proposed. With the benefit of the graphic card, the GRECO prediction method is faster and more accurate than other methods. The proposed method at the first time considers the special case that the targets cannot be completely covered by radar beams, which makes the prediction of radar tracking errors more self-contained in practical circumstances. On the other hand, the process of the scattering center extraction is omitted, resulting in possible angular glint prediction in real time. Comparisons between the simulation results and the theoretical ones validate its correctness and value to academic research and engineering applications. 展开更多
关键词 angular glint near field tracking error graphical electromagnetic computing (GRECO)
在线阅读 下载PDF
Fast solution to the free return orbit's reachable domain of the manned lunar mission by deep neural network 被引量:2
4
作者 YANG Luyi LI Haiyang +1 位作者 ZHANG Jin ZHU Yuehe 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期495-508,共14页
It is important to calculate the reachable domain(RD)of the manned lunar mission to evaluate whether a lunar landing site could be reached by the spacecraft. In this paper, the RD of free return orbits is quickly eval... It is important to calculate the reachable domain(RD)of the manned lunar mission to evaluate whether a lunar landing site could be reached by the spacecraft. In this paper, the RD of free return orbits is quickly evaluated and calculated via the classification and regression neural networks. An efficient databasegeneration method is developed for obtaining eight types of free return orbits and then the RD is defined by the orbit’s inclination and right ascension of ascending node(RAAN) at the perilune. A classify neural network and a regression network are trained respectively. The former is built for classifying the type of the RD, and the latter is built for calculating the inclination and RAAN of the RD. The simulation results show that two neural networks are well trained. The classification model has an accuracy of more than 99% and the mean square error of the regression model is less than 0.01°on the test set. Moreover, a serial strategy is proposed to combine the two surrogate models and a recognition tool is built to evaluate whether a lunar site could be reached. The proposed deep learning method shows the superiority in computation efficiency compared with the traditional double two-body model. 展开更多
关键词 manned lunar mission free return orbit reachable domain(RD) deep neural network computation efficiency
在线阅读 下载PDF
Dynamic access task scheduling of LEO constellation based on space-based distributed computing
5
作者 LIU Wei JIN Yifeng +2 位作者 ZHANG Lei GAO Zihe TAO Ying 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期842-854,共13页
A dynamic multi-beam resource allocation algorithm for large low Earth orbit(LEO)constellation based on on-board distributed computing is proposed in this paper.The allocation is a combinatorial optimization process u... A dynamic multi-beam resource allocation algorithm for large low Earth orbit(LEO)constellation based on on-board distributed computing is proposed in this paper.The allocation is a combinatorial optimization process under a series of complex constraints,which is important for enhancing the matching between resources and requirements.A complex algorithm is not available because that the LEO on-board resources is limi-ted.The proposed genetic algorithm(GA)based on two-dimen-sional individual model and uncorrelated single paternal inheri-tance method is designed to support distributed computation to enhance the feasibility of on-board application.A distributed system composed of eight embedded devices is built to verify the algorithm.A typical scenario is built in the system to evalu-ate the resource allocation process,algorithm mathematical model,trigger strategy,and distributed computation architec-ture.According to the simulation and measurement results,the proposed algorithm can provide an allocation result for more than 1500 tasks in 14 s and the success rate is more than 91%in a typical scene.The response time is decreased by 40%com-pared with the conditional GA. 展开更多
关键词 beam resource allocation distributed computing low Earth obbit(LEO)constellation spacecraft access task scheduling
在线阅读 下载PDF
Delay-optimal multi-satellite collaborative computation offloading supported by OISL in LEO satellite network
6
作者 ZHANG Tingting GUO Zijian +4 位作者 LI Bin FENG Yuan FU Qi HU Mingyu QU Yunbo 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期805-814,共10页
By deploying the ubiquitous and reliable coverage of low Earth orbit(LEO)satellite networks using optical inter satel-lite link(OISL),computation offloading services can be provided for any users without proximal serv... By deploying the ubiquitous and reliable coverage of low Earth orbit(LEO)satellite networks using optical inter satel-lite link(OISL),computation offloading services can be provided for any users without proximal servers,while the resource limita-tion of both computation and storage on satellites is the impor-tant factor affecting the maximum task completion time.In this paper,we study a delay-optimal multi-satellite collaborative computation offloading scheme that allows satellites to actively migrate tasks among themselves by employing the high-speed OISLs,such that tasks with long queuing delay will be served as quickly as possible by utilizing idle computation resources in the neighborhood.To satisfy the delay requirement of delay-sensi-tive task,we first propose a deadline-aware task scheduling scheme in which a priority model is constructed to sort the order of tasks being served based on its deadline,and then a delay-optimal collaborative offloading scheme is derived such that the tasks which cannot be completed locally can be migrated to other idle satellites.Simulation results demonstrate the effective-ness of our multi-satellite collaborative computation offloading strategy in reducing task complement time and improving resource utilization of the LEO satellite network. 展开更多
关键词 low Earth orbit(LEO)satellite network computation offloading task migration resource allocation
在线阅读 下载PDF
Some studies on stochastic optimization based quantitative risk management
7
作者 HU Zhaolin 《运筹学学报(中英文)》 北大核心 2025年第3期135-159,共25页
Risk management often plays an important role in decision making un-der uncertainty.In quantitative risk management,assessing and optimizing risk metrics requires eficient computing techniques and reliable theoretical... Risk management often plays an important role in decision making un-der uncertainty.In quantitative risk management,assessing and optimizing risk metrics requires eficient computing techniques and reliable theoretical guarantees.In this pa-per,we introduce several topics on quantitative risk management and review some of the recent studies and advancements on the topics.We consider several risk metrics and study decision models that involve the metrics,with a main focus on the related com-puting techniques and theoretical properties.We show that stochastic optimization,as a powerful tool,can be leveraged to effectively address these problems. 展开更多
关键词 stochastic optimization quantitative risk management risk measure computing technique statistical property
在线阅读 下载PDF
An Algorithm for Cloud-based Web Service Combination Optimization Through Plant Growth Simulation
8
作者 Li Qiang Qin Huawei +1 位作者 Qiao Bingqin Wu Ruifang 《系统仿真学报》 北大核心 2025年第2期462-473,共12页
In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-base... In order to improve the efficiency of cloud-based web services,an improved plant growth simulation algorithm scheduling model.This model first used mathematical methods to describe the relationships between cloud-based web services and the constraints of system resources.Then,a light-induced plant growth simulation algorithm was established.The performance of the algorithm was compared through several plant types,and the best plant model was selected as the setting for the system.Experimental results show that when the number of test cloud-based web services reaches 2048,the model being 2.14 times faster than PSO,2.8 times faster than the ant colony algorithm,2.9 times faster than the bee colony algorithm,and a remarkable 8.38 times faster than the genetic algorithm. 展开更多
关键词 cloud-based service scheduling algorithm resource constraint load optimization cloud computing plant growth simulation algorithm
在线阅读 下载PDF
A New Technique for Constructing Higher-order Iterative Methods to Solve Nonlinear Systems
9
作者 XIAO Xiaoyong 《应用数学》 北大核心 2025年第3期762-774,共13页
In this paper,a new technique is introduced to construct higher-order iterative methods for solving nonlinear systems.The order of convergence of some iterative methods can be improved by three at the cost of introduc... In this paper,a new technique is introduced to construct higher-order iterative methods for solving nonlinear systems.The order of convergence of some iterative methods can be improved by three at the cost of introducing only one additional evaluation of the function in each step.Furthermore,some new efficient methods with a higher-order of convergence are obtained by using only a single matrix inversion in each iteration.Analyses of convergence properties and computational efficiency of these new methods are made and testified by several numerical problems.By comparison,the new schemes are more efficient than the corresponding existing ones,particularly for large problem sizes. 展开更多
关键词 Systems of nonlinear equation Order of convergence Higher-order method Extended Newton iteration Computational efficiency
在线阅读 下载PDF
暨南大学刘逸课题组在IEEE S&P 2025发表成果
10
作者 《信息网络安全》 北大核心 2025年第8期1326-1326,共1页
近日,暨南大学网络空间安全学院刘逸课题组在第46届安全与隐私研讨会IEEE S&P 2025上发表题为“Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound”的研究论文。该成果由暨南大学网络空间安... 近日,暨南大学网络空间安全学院刘逸课题组在第46届安全与隐私研讨会IEEE S&P 2025上发表题为“Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound”的研究论文。该成果由暨南大学网络空间安全学院教师刘逸、教授赖俊祚、教授杨安家、教授翁健与香港大学、南方科技大学等研究团队合作完成,暨南大学为第一单位与通信单位。安全两方计算(Secure Two-Party Computation)是密码学中重要的研究方向,可以让两个互不信任的参与者在保护各自输入隐私的情况下共同完成计算。 展开更多
关键词 Secure Two-Party Computation
在线阅读 下载PDF
Entire aerial-aquatic trajectory modeling and optimization for trans- medium vehicles
11
作者 Teng Long Nianhui Ye +2 位作者 Baoshou Zhang Jingliang Sun Renhe Shi 《Defence Technology(防务技术)》 2025年第7期223-241,共19页
Trans-medium flight vehicles can combine high aerial maneuverability and underwater concealment ability,which have attracted much attention recently.As the most crucial procedure,the trajectory design generally determ... Trans-medium flight vehicles can combine high aerial maneuverability and underwater concealment ability,which have attracted much attention recently.As the most crucial procedure,the trajectory design generally determines the trans-medium flight vehicle performance.To quantitatively analyze the flight vehicle performance,an entire aerial-aquatic trajectory model is developed in this paper.Different from modeling a trajectory purely for the water entry process,the constructed entire trajectory model has integrated aerial,water entry,and underwater trajectories together,which can consider the influence of the connected trajectories.As for the aerial and underwater trajectories,explicit dynamic models are established to obtain the trajectory parameters.Due to the complicated fluid force during high-velocity water entry,a computational fluid dynamics model is investigated to analyze this phase.The compu-tational domain size is adaptively refined according to the final aerial trajectory state,where the redundant computational domain is removed.An entire trajectory optimization problem is then formulated to maximize the total flight range via tuning the joint states of different trajectories.Simultaneously,several constraints,i.e.,the max impact load,trajectory height,etc.,are involved in the optimization problem.Rather than directly optimizing by a heuristic algorithm,a multi-surrogate cooperative sampling-based optimization method is proposed to alleviate the computational complexity of the entire trajectory optimization problem.In this method,various surrogates coopera-tively generate infill sample points,thereby preventing the poor approximation.After optimization,the total flight range can be improved by 20%,while all the constraints are satisfied.The result demonstrates the effectiveness and practicability of the developed model and optimization framework. 展开更多
关键词 Water entry Trans-medium vehicle Computational fluid dynamics Trajectory optimization Pseudospectral method Surrogate
在线阅读 下载PDF
Effects of horizontal splitter plates on the vortex-induced vibration and aerostatic characteristics of twin separated parallel decks for a rail-cum-road bridge
12
作者 HE Xu-hui YANG Jia-feng +2 位作者 LIU Lu-lu ZOU Yun-feng HE Jing 《Journal of Central South University》 2025年第3期1024-1043,共20页
Installing the splitter plates is a passive aerodynamic solution for eliminating vortex-induced vibration (VIV). However, the influences of splitter plates on the VIV and aerostatic performances are more complicated d... Installing the splitter plates is a passive aerodynamic solution for eliminating vortex-induced vibration (VIV). However, the influences of splitter plates on the VIV and aerostatic performances are more complicated due to aerodynamic interference between highway and railway decks. To study the effects of splitter plates, wind tunnel experiments for measuring VIV and aerostatic forces of twin decks under two opposite flow directions were conducted, while the surrounding flow and wind pressure of static twin decks with and without splitter plates are numerically simulated. The results showed that the incoming flow direction affects the VIV response and aerostatic coefficients. The highway deck has poor vertical and torsional VIV, and the VIV region and amplitude are different under different directions. While the railway deck only has vertical VIV when located upstream. The splitter plates can impede the process of vortex generation, shedding and impinging at the gap between twin deck, and significantly reducing the surface fluctuating pressure coefficient, thus effectively suppressing the VIV of twin decks. While, the splitter plates hurt the upstream deck regarding static wind stability and have little effect on the downstream deck. The splitter plates of appropriate width are recommended to improve VIV performances in twin parallel bridges. 展开更多
关键词 splitter plates vortex-induced vibration(VIV) aerostatic characteristic wind tunnel test twin parallel decks the rail-cum-road bridges computational fluid dynamics
在线阅读 下载PDF
Learning algorithm and application of quantum BP neural networks based on universal quantum gates 被引量:26
13
作者 Li Panchi Li Shiyong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第1期167-174,共8页
A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is... A quantum BP neural networks model with learning algorithm is proposed. First, based on the universality of single qubit rotation gate and two-qubit controlled-NOT gate, a quantum neuron model is constructed, which is composed of input, phase rotation, aggregation, reversal rotation and output. In this model, the input is described by qubits, and the output is given by the probability of the state in which (1) is observed. The phase rotation and the reversal rotation are performed by the universal quantum gates. Secondly, the quantum BP neural networks model is constructed, in which the output layer and the hide layer are quantum neurons. With the application of the gradient descent algorithm, a learning algorithm of the model is proposed, and the continuity of the model is proved. It is shown that this model and algorithm are superior to the conventional BP networks in three aspects: convergence speed, convergence rate and robustness, by two application examples of pattern recognition and function approximation. 展开更多
关键词 quantum computing universal quantum gate quantum neuron quantum neural networks
在线阅读 下载PDF
Malicious code passive propagation model and vaccine distribution model of P2P networks 被引量:9
14
作者 Xiaolong Xu Ruchuan Wang Fu Xiao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期161-167,共7页
To fight against malicious codes of P2P networks, it is necessary to study the malicious code propagation model of P2P networks in depth. The epidemic of malicious code threatening P2P systems can be divided into the ... To fight against malicious codes of P2P networks, it is necessary to study the malicious code propagation model of P2P networks in depth. The epidemic of malicious code threatening P2P systems can be divided into the active and passive propagation models and a new passive propagation model of malicious code is proposed, which differentiates peers into 4 kinds of state and fits better for actual P2P networks. From the propagation model of malicious code, it is easy to find that quickly making peers get their patched and upgraded anti-virus system is the key way of immunization and damage control. To distribute patches and immune modules efficiently, a new exponential tree plus (ET+) and vaccine distribution algorithm based on ET+ are also proposed. The performance analysis and test results show that the vaccine distribution algorithm based on ET+ is robust, efficient and much more suitable for P2P networks. 展开更多
关键词 data security and computer security computer virus peer-to-peer computing PROPAGATION IMMUNE exponential tree.
在线阅读 下载PDF
Energy efficient virtual machine migration approach with SLA conservation in cloud computing 被引量:4
15
作者 GARG Vaneet JINDAL Balkrishan 《Journal of Central South University》 SCIE EI CAS CSCD 2021年第3期760-770,共11页
In the age of online workload explosion,cloud users are increasing exponentialy.Therefore,large scale data centers are required in cloud environment that leads to high energy consumption.Hence,optimal resource utiliza... In the age of online workload explosion,cloud users are increasing exponentialy.Therefore,large scale data centers are required in cloud environment that leads to high energy consumption.Hence,optimal resource utilization is essential to improve energy efficiency of cloud data center.Although,most of the existing literature focuses on virtual machine(VM)consolidation for increasing energy efficiency at the cost of service level agreement degradation.In order to improve the existing approaches,load aware three-gear THReshold(LATHR)as well as modified best fit decreasing(MBFD)algorithm is proposed for minimizing total energy consumption while improving the quality of service in terms of SLA.It offers promising results under dynamic workload and variable number of VMs(1-290)allocated on individual host.The outcomes of the proposed work are measured in terms of SLA,energy consumption,instruction energy ratio(IER)and the number of migrations against the varied numbers of VMs.From experimental results it has been concluded that the proposed technique reduced the SLA violations(55%,26%and 39%)and energy consumption(17%,12%and 6%)as compared to median absolute deviation(MAD),inter quartile range(IQR)and double threshold(THR)overload detection policies,respectively. 展开更多
关键词 cloud computing energy efficiency three-gear threshold resource allocation service level agreement
在线阅读 下载PDF
New multi-DSP parallel computing architecture for real-time image processing 被引量:4
16
作者 Hu Junhong Zhang Tianxu Jiang Haoyang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期883-889,共7页
The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is present... The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment. 展开更多
关键词 parallel computing image processing REAL-TIME computer architecture
在线阅读 下载PDF
Research on Generalized Computing Systems 被引量:3
17
作者 Min, Yao Jianhua, Luo 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第3期39-43,共5页
This paper presents a kind of artificial intelligent system-generalized computing system (GCS for short), and introduces its mathematical description, implement problem and learning problem.
关键词 Artificial intelligence Generalized computing Generalized computing systems Generalized learning
在线阅读 下载PDF
Low-cost cloud computing solution for geo-information processing 被引量:3
18
作者 高培超 刘钊 +1 位作者 谢美慧 田琨 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3217-3224,共8页
Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/rem... Cloud computing has emerged as a leading computing paradigm,with an increasing number of geographic information(geo-information) processing tasks now running on clouds.For this reason,geographic information system/remote sensing(GIS/RS) researchers rent more public clouds or establish more private clouds.However,a large proportion of these clouds are found to be underutilized,since users do not deal with big data every day.The low usage of cloud resources violates the original intention of cloud computing,which is to save resources by improving usage.In this work,a low-cost cloud computing solution was proposed for geo-information processing,especially for temporary processing tasks.The proposed solution adopted a hosted architecture and can be realized based on ordinary computers in a common GIS/RS laboratory.The usefulness and effectiveness of the proposed solution was demonstrated by using big data simplification as a case study.Compared to commercial public clouds and dedicated private clouds,the proposed solution is more low-cost and resource-saving,and is more suitable for GIS/RS applications. 展开更多
关键词 cloud computing geo-information processing geo-processing
在线阅读 下载PDF
SATVPC:Secure-agent-based trustworthy virtual private cloud model in open computing environments 被引量:2
19
作者 徐小龙 涂群 +2 位作者 BESSIS Nik 杨庚 王新珩 《Journal of Central South University》 SCIE EI CAS 2014年第8期3186-3196,共11页
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and soft... Private clouds and public clouds are turning mutually into the open integrated cloud computing environment,which can aggregate and utilize WAN and LAN networks computing,storage,information and other hardware and software resources sufficiently,but also bring a series of security,reliability and credibility problems.To solve these problems,a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment.Through the introduction of secure-agent technology,SATVPC provides an independent,safe and trustworthy computing virtual private platform for multi-tenant systems.In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies,a new dynamic composite credibility evaluation mechanism was presented,including the credit index computing algorithm and the credibility differentiation strategy.The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility.Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively,correctly and operationally. 展开更多
关键词 cloud computing trustworthy computing VIRTUALIZATION agent
在线阅读 下载PDF
Task scheduling and virtual machine allocation policy in cloud computing environment 被引量:3
20
作者 Xiong Fu Yeliang Cang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第4期847-856,共10页
Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time o... Cloud computing represents a novel computing model in the contemporary technology world. In a cloud system, the com- puting power of virtual machines (VMs) and network status can greatly affect the completion time of data intensive tasks. How- ever, most of the current resource allocation policies focus only on network conditions and physical hosts. And the computing power of VMs is largely ignored. This paper proposes a comprehensive resource allocation policy which consists of a data intensive task scheduling algorithm that takes account of computing power of VMs and a VM allocation policy that considers bandwidth between storage nodes and hosts. The VM allocation policy includes VM placement and VM migration algorithms. Related simulations show that the proposed algorithms can greatly reduce the task comple- tion time and keep good load balance of physical hosts at the same time. 展开更多
关键词 cloud computing resource allocation task scheduling virtual machine (VM) allocation.
在线阅读 下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部