Skip to main content
main-content

Cloud Computing

weitere Zeitschriftenartikel

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Reducing the effects of DoS attacks in software defined networks using parallel flow installation

Software defined networking (SDN) is becoming more and more popular due to its key features, such as monitoring, fine-grained control, flexibility and scalability. The centralized control of SDN makes it vulnerable to various types of attacks …

Autoren:
Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan, Abdelouahid Derhab

01.12.2019 | Original Article | Ausgabe 1/2019

FCMiner: mining functional communities in social networks

Community discovery is a popular topic in social network analysis which facilitates several real-world applications. Most commonly, communities are discovered according to their structural similarities resulting in tightly connected user …

Autoren:
T. M. G. Tennakoon, Richi Nayak

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Library adoption in public software repositories

We study the the spread and adoption of libraries within Python projects hosted in public software repositories on GitHub. By modelling the use of Git pull, merge, commit, and other actions as deliberate cognitive activities, we are able to better …

Autoren:
Rachel Krohn, Tim Weninger

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Research on trust mechanism of cooperation innovation with big data processing based on blockchain

In recent years, the status of cooperation and innovation has become increasingly important. Research on the behavior of production, education, and research organizations has attracted widespread attention. Blockchain technology is considered as …

Autoren:
Qi Liu, Xiao Zou

01.12.2019 | Research | Ausgabe 1/2019 Open Access

SCOPE: self-adaptive and policy-based data management middleware for federated clouds

A federated cloud storage setup which integrates and utilizes storage resources from multiple cloud storage providers has become an increasingly popular and attractive paradigm for the persistence tier in cloud-based applications (e.g., SaaS …

Autoren:
Ansar Rafique, Dimitri Van Landuyt, Eddy Truyen, Vincent Reniers, Wouter Joosen

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Investigation of the construction of intelligent logistics system from traditional logistics model based on wireless network technology

With the continuous development of science and technology, wireless network technology has played an important role in the construction of intelligent logistics system. Under this background, based on the wireless network technology, the …

Autoren:
Quan Ouyang, Jun Zheng, Shunlin Wang

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Energy-aware VM placement algorithms for the OpenStack Neat consolidation framework

One of the main challenges in cloud computing is an enormous amount of energy consumed in data-centers. Several researches have been conducted on Virtual Machine(VM) consolidation to optimize energy consumption. Among the proposed VM …

Autoren:
Fikru Feleke Moges, Surafel Lemma Abebe

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation

One of the challenges of deploying multitenant cloud-hosted services that are designed to use (or be integrated with) several components is how to implement the required degree of isolation between the components when there is a change in the …

Autoren:
Laud Charles Ochei, Andrei Petrovski, Julian M. Bass

01.12.2019 | Research | Ausgabe 1/2019 Open Access

A privacy protection-oriented parallel fully homomorphic encryption algorithm in cyber physical systems

Cyber physical system (CPS) is facing enormous security challenges because of open and interconnected network and the interaction between cyber components and physical components, the development of cyber physical systems is constrained by …

Autoren:
Zhaoe Min, Geng Yang, Arun Kumar Sangaiah, Shuangjie Bai, Guoxiu Liu

01.12.2019 | Methodology | Ausgabe 1/2019 Open Access

A parallel and distributed stochastic gradient descent implementation using commodity clusters

Deep Learning is an increasingly important subdomain of artificial intelligence, which benefits from training on Big Data. The size and complexity of the model combined with the size of the training dataset makes the training process very …

Autoren:
Robert K. L. Kennedy, Taghi M. Khoshgoftaar, Flavio Villanustre, Timothy Humphrey

01.12.2019 | Survey paper | Ausgabe 1/2019 Open Access

A survey on data storage and placement methodologies for Cloud-Big Data ecosystem

Currently, the data to be explored and exploited by computing systems increases at an exponential rate. The massive amount of data or so-called “Big Data” put pressure on existing technologies for providing scalable, fast and efficient support.

Autoren:
Somnath Mazumdar, Daniel Seybold, Kyriakos Kritikos, Yiannis Verginadis

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Investigating the adoption of big data analytics in healthcare: the moderating role of resistance to change

Big data analytics is gaining substantial attention due to its innovative contribution to decision making and strategic development across the healthcare field. Therefore, this study explored the adoption mechanism of big data analytics in …

Autoren:
Muhammad Shahbaz, Changyuan Gao, LiLi Zhai, Fakhar Shahzad, Yanling Hu

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Large-scale e-learning recommender system based on Spark and Hadoop

The present work is a part of the ESTenLigne project which is the result of several years of experience for developing e-learning in Sidi Mohamed Ben Abdellah University through the implementation of open, online and adaptive learning environment.

Autoren:
Karim Dahdouh, Ahmed Dakkak, Lahcen Oughdir, Abdelali Ibriz

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Adaptive deduplication of virtual machine images using AKKA stream to accelerate live migration process in cloud environment

Cloud Computing is a paradigm which provides resources to users from its pool based on demand to satisfy their requirements. During this process, many servers are overloaded and underloaded in the cloud environment. Thus, power consumption and …

Autoren:
Naga Malleswari TYJ, Vadivu G

01.12.2019 | Research | Ausgabe 1/2019 Open Access

IoT + AR: pervasive and augmented environments for “Digi-log” shopping experience

The current bare Internet of Things (IoT) infrastructure has recently been extended to include smarter and more effective user interactions. Individual or meaningful sets and groups of IoT objects can be imbued with data and/or content in a …

Autoren:
Dongsik Jo, Gerard Jounghyun Kim

01.12.2019 | Research | Ausgabe 1/2019 Open Access

The use of ict by sme’s in Zambia to access business information services and investments: barriers and drivers

The research aimed at answering key questions regarding the use of ICTs among SMEs in their businesses with an analysis and consideration of the possible factors that enable ICTs to be valued, as drivers and the possible factors that deter them …

Autoren:
Martin Mwila, Luka Ngoyi

01.12.2019 | Research | Ausgabe 1/2019 Open Access

A view of programming scalable data analysis: from clouds to exascale

Scalability is a key feature for big data analysis and machine learning frameworks and for applications that need to analyze very large and real-time data available from data repositories, social media, sensor networks, smartphones, and the Web.

Autor:
Domenico Talia

01.12.2019 | Research | Ausgabe 1/2019 Open Access

An algorithm to optimize deployment of charging base stations for WRSN

Optimizing deployment of charging base stations in wireless rechargeable sensor networks can considerably reduce the cost. Previously, the charging base stations are simply installed at some fixed special points (e.g., the grid points) after …

Autoren:
Peng Wan, Yuhua Cheng, Baoyu Wu, Gaofeng Wang

01.12.2019 | Research | Ausgabe 1/2019 Open Access

An agile and effective network function virtualization infrastructure for the Internet of Things

The processing and power-consumption constraints of the Internet of Things devices hinder them to offer more complex network services than the simple data transmission in smart city scenarios. The lack of complex services, such as security and …

Autoren:
Diogo Menezes Ferrazani Mattos, Pedro Braconnot Velloso, Otto Carlos Muniz Bandeira Duarte

01.12.2019 | Survey paper | Ausgabe 1/2019 Open Access

On the sustainability of smart and smarter cities in the era of big data: an interdisciplinary and transdisciplinary literature review

There has recently been a conscious push for cities across the globe to be smart and even smarter and thus more sustainable by developing and implementing big data technologies and their applications across various urban domains in the hopes of …

Autor:
Simon Elias Bibri

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Compatibility enhancement and performance measurement for socket interface with PCIe interconnections

Today the key technology of high-performance computing systems is the emergence of interconnect technology that makes multiple computers into one computer cluster. This technique is a general method in which each constituent node processes its own …

Autoren:
Cheol Shim, Rupali Shinde, Min Choi

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Hierarchical data fusion for Smart Healthcare

The Internet of Things (IoT) facilitates creation of smart spaces by converting existing environments into sensor-rich data-centric cyber-physical systems with an increasing degree of automation, giving rise to Industry 4.0. When adopted in …

Autoren:
Rustem Dautov, Salvatore Distefano, Rajkumaar Buyya

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Efficient resource provisioning for elastic Cloud services based on machine learning techniques

Automated resource provisioning techniques enable the implementation of elastic services, by adapting the available resources to the service demand. This is essential for reducing power consumption and guaranteeing QoS and SLA fulfillment …

Autoren:
Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo, Ignacio M. Llorente

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Building consumer trust in the cloud: an experimental analysis of the cloud trust label approach

The lack of transparency surrounding cloud service provision makes it difficult for consumers to make knowledge based purchasing decisions. As a result, consumer trust has become a major impediment to cloud computing adoption. Cloud Trust Labels …

Autoren:
Lisa van der Werff, Grace Fox, Ieva Masevic, Vincent C. Emeakaroha, John P. Morrison, Theo Lynn

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Enhanced Secured Map Reduce layer for Big Data privacy and security

The publication and dissemination of raw data are crucial elements in commercial, academic, and medical applications. With an increasing number of open platforms, such as social networks and mobile devices from which data may be collected, the …

Autoren:
Priyank Jain, Manasi Gyanchandani, Nilay Khare

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Managing to release early, often and on time in the OpenStack software ecosystem

The dictum of “Release early, release often.” by Eric Raymond as the Linux modus operandi highlights the importance of release management in open source software development. However, there are very few empirical studies addressing release …

Autoren:
José Apolinário Teixeira, Helena Karsten

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Internet usage, innovation and human development nexus in Africa: the case of ECOWAS

Internet usage and the sporadic rise in the level of innovations have been major drivers of human progress in the last decades. These leaps in human intelligence have affected almost every area of human endeavour including education, health …

Autoren:
Jeremiah O. Ejemeyovwi, Evans S. Osabuohien, Olawale D. Johnson, Ebenezer I. K. Bowale

01.12.2019 | Original Article | Ausgabe 1/2019

Melanoma risk modeling from limited positive samples

The key to effective cancer treatment is early detection. Risk models built from routinely collected clinical data have the opportunity to improve early detection by identifying high-risk patients. In this study, we explored various machine …

Autoren:
Aaron N. Richter, Taghi M. Khoshgoftaar

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Energy efficient edge-of-things

Edge-of-Things (EoT) emerged as a novel computing and storage paradigm to overcome the limitations of IoT-cloud environment by providing cloud-like services at edge of the network. EoT offers a vast area for research and development as the …

Autoren:
Asfa Toor, Saif ul Islam, Ghufran Ahmed, Sohail Jabbar, Shehzad Khalid, Abdullahi Mohamud Sharif

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Performance bottleneck analysis and resource optimized distribution method for IoT cloud rendering computing system in cyber-enabled applications

This paper analyzes current cloud computing, cloud rendering industry, and related businesses. In this field, cloud system performance lacks unified evaluation criterion. A novel analysis method and a related measure of cloud rendering system …

Autoren:
Ronghe Wang, Bo Zhang, Manqing Wu, Jun Zhang, Xiaolei Guo, Xinhai Zhang, Huibo Li, Dong Jiao, Shilong Ma

01.12.2019 | Research | Ausgabe 1/2019 Open Access

On construction of a cloud storage system with heterogeneous software-defined storage technologies

With the rapid development of networks and Information technologies, cloud computing is not only becoming popular, the types of cloud services available are also increasing. Through cloud services, users can upload their requirements via the …

Autoren:
Chao-Tung Yang, Shuo-Tsung Chen, Yu-Wei Chan, Yu-Chuan Shen

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Improved multiobjective salp swarm optimization for virtual machine placement in cloud computing

In data center companies, cloud computing can host multiple types of heterogeneous virtual machines (VMs) and provide many features, including flexibility, security, support, and even better maintenance than traditional centers. However, some …

Autoren:
Shayem Saleh Alresheedi, Songfeng Lu, Mohamed Abd Elaziz, Ahmed A. Ewees

01.12.2019 | Theoretical article | Ausgabe 1/2019 Open Access

The quality management ecosystem for predictive maintenance in the Industry 4.0 era

The Industry 4.0 era requires new quality management systems due to the ever increasing complexity of the global business environment and the advent of advanced digital technologies. This study presents new ideas for predictive quality management …

Autoren:
Sang M. Lee, DonHee Lee, Youn Sung Kim

01.12.2019 | Research | Ausgabe 1/2019 Open Access

Utilization and load balancing in fog servers for health applications

With the evolution of fog computing, processing takes place locally in a virtual platform rather than in a centralized cloud server. Fog computing combined with cloud computing is more efficient as fog computing alone does not serve the purpose.

Autoren:
Hasan Ali Khattak, Hafsa Arshad, Saif ul Islam, Ghufran Ahmed, Sohail Jabbar, Abdullahi Mohamud Sharif, Shehzad Khalid

01.12.2019 | Research | Ausgabe 1/2019 Open Access

A semantic-based discovery service for the Internet of Things

With the Internet of Things (IoT), applications should interact with a huge number of devices and retrieve context data produced by those objects, which have to be discovered and selected a priori. Due to the number, heterogeneity, and dynamicity …

Autoren:
Porfírio Gomes, Everton Cavalcante, Thais Batista, Chantal Taconet, Denis Conan, Sophie Chabridon, Flavia C. Delicato, Paulo F. Pires

01.06.2019 | 3DR Express | Ausgabe 2/2019

LGSA: Hybrid Task Scheduling in Multi Objective Functionality in Cloud Computing Environment

Cloud computing turns to be a big shift from the conventional perception of the IT resources. It is a transpiring computing technology that is increasingly stabling itself as the promising future of distributed on-demand computing. The processes …

Autoren:
N. Manikandan, A. Pravin

01.06.2019 | Ausgabe 6/2019

Demonstration of the no-hiding theorem on the 5-Qubit IBM quantum computer in a category-theoretic framework

The quantum no-hiding theorem, first proposed by Braunstein and Pati (Phys Rev Lett 98:080502, 2007), was verified experimentally by Samal et al. (Phys Rev Lett 186:080401, 2011) using NMR quantum processor. Till then, this fundamental test has …

Autoren:
Amolak Ratan Kalra, Navya Gupta, Bikash K. Behera, Shiroman Prakash, Prasanta K. Panigrahi

18.05.2019 | Technical Paper

Recurrent neural network based real-time failure detection of storage devices

Studies have revealed that the failure rates of storage devices can often be as high as fourteen percent. To make matters worse, there are frequently no warning signs for precaution before catastrophic failure of storage devices occurs. A …

Autoren:
Chuan-Jun Su, Yi Li

17.05.2019 | Focus

Hybridized neural network and decision tree based classifier for prognostic decision making in breast cancers

Artificial intelligence techniques and algorithms are applied at various fields such as face recognition, self-driving cars, industrial robots and health care. These real-world conundrums are solved employing artificial intelligence since it …

Autoren:
A. Suresh, R. Udendhran, M. Balamurgan

17.05.2019

A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems

Nowadays, with the development of cyber-physical systems (CPS), there are an increasing amount of applications deployed in the CPS to connect cyber space with physical world better and closer than ever. Furthermore, the cloud-based CPS bring …

Autoren:
Lianyong Qi, Yi Chen, Yuan Yuan, Shucun Fu, Xuyun Zhang, Xiaolong Xu

17.05.2019

The implementation of an IoT-based exercise improvement system

The benefits of exercise have been well known for years. Most people know that they should do more exercise, but they seldom make exercise a top priority. Regular exercise is generally the most important lifestyle change people can make to improve …

Autoren:
Tsan-Ching Kang, Chia-Hsien Wen, Shih-Wei Guo, Wei-Yueh Chang, Chen-Lin Chang

15.05.2019

A Mobile Cloud-Based Health Promotion System for Cardiovascular Diseases

In this paper, we propose a mobile cloud-based health promotion system targeting clinical cardiovascular diseases for use with both the Windows and Android operating systems. The prototype system can provide health promotion recommendations by …

Autoren:
Chin-Feng Lin, Tai-Xiang Lin, Chung-I Lin, Chung-Cheng Chang

15.05.2019

Edge Caching and Computation Offloading for Fog-Enabled Radio Access Network

Cooperation between the fog and cloud in fog-enabled radio access network could enormously improve the computation offloading services both in terms of latency and energy consumption, while edge caching allowing for low-latency transmission of the …

Autoren:
Xiaohuan Rao, Liqiang Zhao, Kai Liang, Kezhi Wang

15.05.2019 | Focus

A cognitive/intelligent resource provisioning for cloud computing services: opportunities and challenges

In cloud computing, resources could be provisioned in a dynamic way on demand for cloud services. Cloud providers seek to realize effective SLA execution mechanisms for avoiding SLA violations by provisioning the resources or applications and …

Autoren:
Mahfoudh Saeed Al-Asaly, Mohammad Mehedi Hassan, Ahmed Alsanad

14.05.2019

SherlockFog: a new tool to support application analysis in Fog and Edge computing

The Fog and Edge Computing paradigms have emerged as a solution to limitations of the Cloud Computing model to serve a huge amount of connected devices efficiently. These devices have unused computing power that could be exploited to execute …

Autoren:
Maximiliano Geier, David González Márquez, Esteban Mocskos

14.05.2019

Reduced carbon emission and optimized power consumption technique using container over virtual machine

Environmental warning is caused by IT industry which critically leads the global pollution with huge amount of toxic carbon emission which is drastically increasing day by day due to demand and usage raised. Due to the environmental warning the …

Autoren:
G. Anusooya, Varadarajan Vijayakumar

14.05.2019

On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing

This study cracks code words by matching them with target hash values using cloud distributed and GPU parallel computing technologies. For the cloud computing system, this paper implements the matching algorithm using a Hadoop distributed system …

Autoren:
Chu-Hsing Lin, Jung-Chun Liu, Joy Iong-Zong Chen, Tien-Pin Chu

13.05.2019

A new outlier rejection methodology for supporting load forecasting in smart grids based on big data

Internet of things (IoT) enables smart electrical grids (SEGs) to solve its problems and to support a lot of tasks. These tasks include power monitoring, demand-side energy management coordination of distributed storage, and the integration of …

Autoren:
Asmaa H. Rabie, Shereen H. Ali, Ahmed I. Saleh, Hesham A. Ali

13.05.2019

A Multi-objective Optimal Task Scheduling in Cloud Environment Using Cuckoo Particle Swarm Optimization

In cloud computing, varied demands are placed on the constantly changing resources. The task scheduling place very vital role in cloud computing environments, this scheduling process needs to schedule the tasks to virtual machine while reducing …

Autoren:
T. Prem Jacob, K. Pradeep

11.05.2019

Practical Implementation of Femtolet Based Peer-to-Peer Network

Energy and latency aware code offloading is a demanding research area for nowadays. In this paper, for the first time we have successfully implemented the prototype of femtolet for fifth generation mobile network. Mobile devices are registered …

Autoren:
Deepsubhra Guha Roy, Anwesha Mukherjee, Debashis De, Satish Narayana Srirama

11.05.2019

OKRA: optimal task and resource allocation for energy minimization in mobile edge computing systems

To cope with the computational and energy constraints of mobile devices, Mobile Edge Computing (MEC) has recently emerged as a new paradigm that provides IT and cloud-computing services at mobile network edge in close proximity to mobile devices.

Autoren:
Weiwei Fang, Shuai Ding, Yangyang Li, Wenchen Zhou, Naixue Xiong

11.05.2019

Integer linear programming-based multi-objective scheduling for scientific workflows in multi-cloud environments

Scientific communities are motivated to schedule the data-intensive scientific workflows in multi-cloud environments, where considerable diverse resources are provided by multiple clouds and resource limitation imposed by individual clouds is …

Autoren:
Somayeh Mohammadi, Latif PourKarimi, Hossein Pedram

11.05.2019

Classified enhancement model for big data storage reliability based on Boolean satisfiability problem

Disk reliability is a serious problem in the big data foundation environment. Although the reliability of disk drives has greatly improved over the past few years, they are still the most vulnerable core components in the server. If they fail, the …

Autoren:
Hong Huang, Latifur Khan, Shaohua Zhou

10.05.2019

Simulator considering modeling and performance evaluation for high-performance computing of collaborative-based mobile cloud infrastructure

In recent years, as IT technology has progressed, mobile devices have been created that enable various manual tasks to be automated and portable. A variety of mobile devices has computing, storage, and Internet capabilities and can handle many …

Autoren:
Hyun-Woo Kim, Jungho Kang, Young-Sik Jeong

10.05.2019

Hybrid algorithms for placement of virtual machines across geo-separated data centers

Cloud computing has emerged as a new paradigm for hosting and supplying services over the Internet. This technology has brought many benefits, such as eliminating the need for maintaining expensive computing hardware. With an increasing demand for …

Autoren:
Fernando Stefanello, Vaneet Aggarwal, Luciana S. Buriol, Mauricio G. C. Resende

09.05.2019

SAFER: Crowdsourcing Based Disaster Monitoring System Using Software Defined Fog Computing

In the occurrence of natural or artificial disasters, conveying immediate and precise situation awareness (SA) information from the salient disaster scenes to the first responders is vital. Crowdsourcing can offer enormous heterogeneous data …

Autoren:
Gunasekaran Raja, Anil Thomas

09.05.2019

Scheduling Correlated IoT Application Requests Within IoT Eco-System: An Incremental Cloud Oriented Approach

In the era of adopting Internet everywhere, the recent modernization through incredible Internet of Things (IoT) makes the world more shrewd and automated. Thousands of users are connected every day in order to get benefits from the promising IoT …

Autoren:
Abishi Chowdhury, Shital Raut

09.05.2019

NADE: nodes performance awareness and accurate distance evaluation for degraded read in heterogeneous distributed erasure code-based storage

To ensure data availability and save storage space, storage systems usually save data across multiple storage nodes (or servers) using erasure codes. Storage systems need to reconstruct the complete data to respond to reading requests in the case …

Autoren:
Xingjun Zhang, Yi Cai, Yunfei Liu, Zhiwei Xu, Xiaoshe Dong

08.05.2019

Novel probabilistic resource migration algorithm for cross-cloud live migration of virtual machines in public cloud

In cloud computing environment, cross-cloud live migration of virtual machines (VMs) is a major concern in these days. Cloud computing provides the users with huge, versatile and on-demand access to a bulk of customizable and configurable …

Autoren:
Souvik Pal, Raghvendra Kumar, Le Hoang Son, Krishnan Saravanan, Mohamed Abdel-Basset, Gunasekaran Manogaran, Pham Huy Thong

08.05.2019

Hybrid parallel multimethod hyperheuristic for mixed-integer dynamic optimization problems in computational systems biology

This paper describes and assesses a parallel multimethod hyperheuristic for the solution of complex global optimization problems. In a multimethod hyperheuristic, different metaheuristics cooperate to outperform the results obtained by any of them …

Autoren:
Patricia González, Pablo Argüeso-Alejandro, David R. Penas, Xoan C. Pardo, Julio Saez-Rodriguez, Julio R. Banga, Ramón Doallo

08.05.2019

ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment

In today’s world, Cloud computing based health cloud is an effective platform for enhancing e-health productivity, i.e., healthcare professionals can provide medical service by accessing health information on any device in any location at any …

Autoren:
V. Sri Vigna Hema, Ramesh Kesavan

08.05.2019 | Multi-access Edge Computing Enabled Internet of Things

A novel edge-enabled SLAM solution using projected depth image information

Environmental mapping is the key step for mobile robots to perform tasks independently and perfectly. In recent years, visual SLAM, laser-based SLAM and simultaneous localization and mapping (SLAM) have aroused the interest of many people.

Autoren:
Jian-qiang Li, Yi-fan Zhang, Zhuang-zhuang Chen, Jia Wang, Min Fang, Cheng-wen Luo, Huihui Wang

08.05.2019 | ORIGINAL ARTICLE

Smart manufacturing systems: state of the art and future trends

With the development and application of advanced technologies such as Cyber Physical System, Internet of Things, Industrial Internet of Things, Artificial Intelligence, Big Data, Cloud Computing, Blockchain, etc., more manufacturing enterprises …

Autoren:
Y. J. Qu, X. G. Ming, Z. W. Liu, X. Y. Zhang, Z. T. Hou

08.05.2019 | Focus

A privacy-preserving multi-keyword search approach in cloud computing

Cloud computing provides the users with the ability to outsource their data to a third-party cloud storage for cost-effective management of resources and on-demand network access. However, outsourcing the data to a third-party location may raise …

Autoren:
Ahmed M. Manasrah, Mahmoud Abu Nasir, Maher Salem

07.05.2019 | ORIGINAL ARTICLE

An Industry 4.0 approach to assembly line resequencing

Contemporary assembly line systems are characterized by an increasing capability to offer each client a different product, more tuned to her needs and preferences. These assembly systems will be heavily influenced by the advent of Industry 4.0 …

Autoren:
Daniel Alejandro Rossit, Fernando Tohmé, Mariano Frutos

06.05.2019

Equilibrium Transmission Bi-level Energy Efficient Node Selection Approach for Internet of Things

The Internet of things concept is based on data from sensor devices. The conservation of sensor data in the cloud has become a well-known challenge with respect to the sensor-cloud network. There is an enormous quantity of sensed data, including …

Autoren:
Mahammad Shareef Mekala, P. Viswanathan

06.05.2019

Design and implementation of an IoT-cloud converged virtual machine system

This paper presents an internet-of-things (IoT)-cloud converged virtual machine (VM) system for IoT devices with restricted computing resources. The VM is a software processor that has many advantages in terms of software development, release …

Autoren:
Yunsik Son, Junho Jeong, YangSun Lee

04.05.2019

Exploring knowledge management in agile software development organizations

Knowledge represents a sustainable asset for innovative firms and specifically software industries working in unpredictable environments. Until the late 90’s, the most widely used software development approaches advocated extensive documentation …

Autoren:
Carine Khalil, Sabine Khalil

04.05.2019 | Technical Paper

Service aware resource management into cloudlets for data offloading towards IoT

Task offloading in edge cloud and self-organized distributed cloudlet design are two significant research areas to explore internet of things (IoT) setup in mobile cloud computing diligence through network function virtualization. The cloud …

Autoren:
Deepsubhra Guha Roy, Bipasha Mahato, Ahona Ghosh, Debashis De

04.05.2019 | Focus

An improving data delivery method using EEDD algorithm for energy conservation in green cloud network

Energy utilization has attracted enormous concentration in high-performance computing research group for distributed computing administrations. Usages of Cloud network resources in energy utilization have expanded to the cloud network resources …

Autoren:
M. Karuppasamy, S. P. Balakannan

04.05.2019 | Original Article

Ensemble RBM-based classifier using fuzzy integral for big data classification

The restricted Boltzmann machine (RBM) is a primary building block of deep learning models. As an efficient representation learning approach, deep RBM can effectively extract sophisticated and informative features from raw data. Little research …

Autoren:
Junhai Zhai, Xu Zhou, Sufang Zhang, Tingting Wang

04.05.2019

Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital

Much of the information produced in hospitals is clinical, and stored for the purposes of documentation. In practice, most of it is never used. The potential of analytics is to reuse this information for other purposes. This is easier said than …

Autoren:
Bendik Bygstad, Egil Øvrelid, Thomas Lie, Magnus Bergquist

02.05.2019

A hybrid fog-cloud approach for securing the Internet of Things

As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with regard to the security and privacy of the IoT. Malicious attacks such as man-in-the-middle and distributed denial of service (DDoS) are typical threats to …

Autoren:
Rajaputhri Maharaja, Prashant Iyer, Zilong Ye

02.05.2019

Mesh convergence test system in integrated platform environment for finite element analysis

We designed integrated computer-aided engineering (CAE) middleware with a CAE solution for modeling and simulation work to reduce the cost and time of product development. This middleware automates an open-source-based pre/post-processor and …

Autoren:
Daeyong Jung, Daewon Lee, Myungil Kim, Hoyoon Kim, Seung-Keun Park

02.05.2019 | Ausgabe 1/2019

Business models of Internet service providers

A business model can be perceived as a simple, yet focused, representation of the related activities of a company, which describes how to create the value of the company in terms of information, products and services. Given the significance of the …

Autoren:
Payam Hanafizadeh, Parastou Hatami, Erik Bohlin

02.05.2019 | Ausgabe 2/2019

A Low-Cost Test Solution for Reliable Communication in Networks-on-Chip

Networks-on-chip (NoC) provide the communication infrastructure for high-speed and large-scale computation that integrates several IP-cores on a single die. Faults on network channels severely degrade system performance and throughput. This paper …

Autoren:
Biswajit Bhowmik, Santosh Biswas, Jatindra Kumar Deka, Bhargab B. Bhattacharya

01.05.2019 | Regular Paper | Ausgabe 3/2019

Competitive Cloud Pricing for Long-Term Revenue Maximization

We study the pricing policy optimization problem for cloud providers while considering three properties of the real-world market: 1) providers have only incomplete information about the market; 2) it is in evolution due to the increasing number of …

Autoren:
Jiang Rong, Tao Qin, Bo An

30.04.2019

Application of improved distributed naive Bayesian algorithms in text classification

The naive Bayes classifier is a widely used text classification method that applies statistical theory to text classification. Due to the particularity of the text, related feature items may generate new semantic information, which may be lost …

Autoren:
Hongyi Gao, Xi Zeng, Chunhua Yao

30.04.2019

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

Wireless body area network (WBAN) constitutes a widely implemented technique for remote acquisition and monitoring of patient health-related information via the use of embodied sensors. Given that security and privacy protection, including, but …

Autoren:
Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla

30.04.2019

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

With the advent of cloud computing, data owners are motivated to outsource their data to public clouds for decreasing the cost of management systems. For protecting data privacy, sensitive data must be encrypted before outsourcing. So, equipping …

Autoren:
Maryam Zarezadeh, Hamid Mala, Maede Ashouri-Talouki

29.04.2019

Packet Encryption for Securing Real-Time Mobile Cloud Applications

The evolution of smart devices has brought the most confidential data to mobile applications and cloud computing with its processing power is serving the huge processing requirements of these applications. However, these advancements has brought …

Autoren:
Ajay D M, Umamaheswari E

29.04.2019

Energy-Efficient Virtual Machine Scheduling across Cloudlets in Wireless Metropolitan Area Networks

Nowadays, with the development of wireless communication, people are relying on mobile devices heavily due to various application deployment and plentiful service experience of customers in wireless metropolitan area network (WMAN). The computing …

Autoren:
Xiaolong Xu, Xihua Liu, Lianyong Qi, Yuhao Chen, Zihao Ding, Jiangang Shi

29.04.2019

Interoperability in Heterogeneous Wireless Networks Using FIS-ENN Vertical Handover Model

Wireless network system aims to provide dedicated links to the users for improving the quality of services. Particularly in heterogeneous network seamless connectivity is the important requirement for the users utilizing multimedia services.

Autoren:
E. Rajinikanth, S. Jayashri

27.04.2019

Method, formalization, and algorithms to split topology models for distributed cloud application deployments

For automating the deployment of applications in cloud environments, a variety of technologies have been developed in recent years. These technologies enable to specify the desired deployment in the form of deployment models that can be …

Autoren:
Karoline Saatkamp, Uwe Breitenbücher, Oliver Kopp, Frank Leymann

27.04.2019

Reefer container monitoring system using PLC-based communication technology for maritime edge computing

Most of the container transports by sea and land from the Republic of Korea to other countries or continents take more than a week. Under such environment, cargoes in the reefer containers must be kept at the required temperatures. To prevent any …

Autor:
Jun-Ho Huh

27.04.2019

MILP formulations for spatio-temporal thermal-aware scheduling in Cloud and HPC datacenters

This paper focuses on scheduling problems related to the execution of computational jobs in datacenters with thermal constraints. Mixed integer linear programming (MILP) formulations are proposed that encompass both spatial and temporal aspects of …

Autoren:
Jean-Marc Pierson, Patricia Stolf, Hongyang Sun, Henri Casanova

26.04.2019 | Original Paper | Ausgabe 3/2019

National Policies and Educational Technology: a Synopsis of Trends and Perspectives from Five Countries

There have been continued efforts in exploring how educational technology impacts human learning and performance. Through a synopsis of the trends and perspectives on educational technology in five countries by using the STEEP (social …

Autoren:
Jin Mao, Dirk Ifenthaler, Toru Fujimoto, Andrea Garavaglia, Pier Giuseppe Rossi

26.04.2019

Efficient Algorithm for Identification and Cache Based Discovery of Cloud Services

Efficient resource identification and discovery is the primary requirements for cloud computing services, as it assists in scheduling and managing of cloud applications. Cloud computing is a revolution of the economic model rather than …

Autoren:
Abdul Quadir Md, V. Varadarajan, Karan Mandal

26.04.2019

A Framework for Heterogeneous Resource Allocation in Sensor-Cloud Environment

With the advent of sensor technologies, cloud applications are able to acquire sensed data from remotely located sensors which are geographically distributed. Cloud computing, when integrated with sensor devices facilitates pervasive and shared …

Autoren:
Sunanda Bose, Debangana Sarkar, Nandini Mukherjee

26.04.2019 | Original Paper

A routing and spectrum assignment algorithm in elastic optical network based on minimizing contiguity reduction

Elastic optical network, due to its flexibility of spectrum assignment, has been the most promising technology in the next generation of backbone transport network. Routing and spectrum assignment (RSA) is one of its key issues. Several RSA …

Autoren:
Junling Yuan, Di Zhang, Qikun Zhang, Xuhong Li, Zhongbao Ren

26.04.2019

Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman

Cloud computing technology presents a case of centralised digital infrastructure that requires adherence to standards and planned approach for its adoption and implementation. There is little knowledge on how institutions could influence the …

Autoren:
Khalid Alzadjali, Amany Elbanna

25.04.2019

Optimized cloud-based scheduling for protein secondary structure analysis

In the domain of proteomics, an in-depth analysis of the 3D structure of a protein is of paramount importance for many biological studies and applications. At the secondary level, protein structure can be described in terms of motifs, recurrent …

Autoren:
Marco Ferretti, Luigi Santangelo

25.04.2019

Medical Image Encryption Based on Hybrid Chaotic DNA Diffusion

We explore the use of two chaotic systems (Bernoulli shift map and Zizag map) coupled with deoxyribonucleic acid coding in an encryption scheme for medical images in this paper. The scheme consists of two main phases: Chaotic key generation and …

Autoren:
Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye

25.04.2019

Lightweight solutions to counter DDoS attacks in software defined networking

A distributed denial of service (DDoS) attack on any of the major components (e.g., controller, switches, and southbound channel) of software defined networking (SDN) architecture is a critical security threat. For example, the breakdown of …

Autoren:
Mauro Conti, Chhagan Lal, Reza Mohammadi, Umashankar Rawat

25.04.2019

Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots

The advent of cloud computing has been so enormous that, cloud has been seen as the most enduring technology of today’s technology scenario. It is known to be the service oriented architecture, granted to the end-users as Infrastructure as a …

Autoren:
Linda Joseph, Rajeswari Mukesh

25.04.2019

Security Aware Virtual Network Embedding Algorithm Using Information Entropy TOPSIS

Network virtualization is an effective manner to address the ossification issue of Internet architecture. Virtual network embedding is one of the most critical techniques in network virtualization environments. Several security problems about …

Autoren:
Peiying Zhang, Haisheng Li, Yongjing Ni, Faming Gong, Mengnan Li, Fuyan Wang

24.04.2019

Collaborative Mobile Edge Computing in eV2X: A Solution for Low-Cost Driver Assistance Systems

Collision avoidance systems are of great importance in advanced driver assistance systems (ADAS) to increase the level of safety. However, as a result of their excessive costs, are not considered as a feature in lower-end vehicles. The concept of …

Autoren:
Arghavan Keivani, Farzad Ghayoor, Jules-Raymond Tapamo

24.04.2019

Double Time-Memory Trade-Off in OSK RFID Protocol

The OSK/AO protocol has already demonstrated how the application of time-memory trade-off (TMTO) increases the efficiency of a hash chain-based RFID protocol. The complexity of this protocol, both in the preparatory phase and in the tag …

Autoren:
Violeta Tomašević, Milo Tomašević

23.04.2019

Availability of Cellular Systems Based on Space Domain

Ultra-Reliable Communication (URC) is one of the promising features in 5G to provide anytime and anywhere services to the end users. Services related to URC require a high level of reliability and availability. Hence, investigation of system’s …

Autoren:
Hala B. Nafea, Eman M. Soultan, Fayez W. Zaki

23.04.2019 | Focus

Prediction of availability and integrity of cloud data using soft computing technique

In cloud computing, data storage is the most important task. In cloud storage, security and privacy are the major issues. To avoid such issues, we proposed a new protocol called availability and integrity verification protocol (AIVP) to predict …

Autoren:
R. Pitchai, S. Babu, P. Supraja, S. Anjanayya

23.04.2019 | Research Article - Computer Engineering and Computer Science

A New Heuristic Clustering Algorithm Based on RSU for Internet of Vehicles

The emergence of the Internet of Things has led to the evolution of conventional Vehicular Ad-hoc NETworks (VANETs) toward a new paradigm called the Internet of Vehicles (IoV). This latter has recently received the attention of many researchers.

Autoren:
Oussama Senouci, Saad Harous, Zibouda Aliouat

22.04.2019

Stabilizing Sensor Data Collection for Control of Environment-Friendly Clean Technologies Using Internet of Things

The Internet of Things (IoT) is a network formed by smart devices whose core contains embedded technology in order to collect sensory information and exchange it with every single device present within the network. One major challenge in IoT is …

Autoren:
Robin Singh Bhadoria, Dhananjai Bajpai

22.04.2019

Threshold Based Multi-Objective Memetic Optimized Round Robin Scheduling for Resource Efficient Load Balancing in Cloud

Task scheduling is a significant problem to be resolved for balancing the workload on a cloud server. One of the key problems that affect the scheduling performance is burstiness workloads. Few research studies have been introduced to schedule …

Autoren:
Prassanna J, Neelanarayanan Venkataraman

22.04.2019

Mechanism Design for Exchanging Resources in Federated Networks

This paper introduces a mechanism for pricing and exchanging resources in federated networks of task-processing elements. An operational model is developed to allocate processing, storage and communication resources to computational demands. This …

Autoren:
Abbas Ehsanfar, Paul T. Grogan

22.04.2019

Latency Control of ICN Enabled 5G Networks

5G definition falls broadly into order of achievable data rate and reduction in end-to-end latency. Thanks to emerging technologies many features are available in the 5G design to detect, control and avoid congestion in the backhaul networks. In …

Autoren:
Shahin Vakilinia, Halima Elbiaze

20.04.2019 | Methodologies and Application

Feature selection strategy based on hybrid crow search optimization algorithm integrated with chaos theory and fuzzy c-means algorithm for medical diagnosis problems

Powerful knowledge acquisition tools and techniques have the ability to increase both the quality and the quantity of knowledge-based systems for real-world problems. In this paper, we designed a hybrid crow search optimization algorithm …

Autoren:
Ahmed M. Anter, Mumtaz Ali

19.04.2019 | Original Article

Designing secure substitution boxes based on permutation of symmetric group

The strength of cryptosystems heavily relies on the substitution boxes. Cryptosystems with weak substitution boxes cannot resist algebraic attacks, linear and differential cryptanalysis. In this paper, first, we propose a strong algebraic …

Autoren:
Amir Anees, Yi-Ping Phoebe Chen

19.04.2019

Multi-objective virtual network function placement using NSGA-II meta-heuristic approach

Network function virtualization has facilitated network service development through the integration of network functions (NFs) such as firewalls, deep packet inspection, load balancers, and routers/switches. Moreover, virtual network functions …

Autoren:
Sanaz Tavakoli-Someh, Mohammad Hossein Rezvani

18.04.2019 | Schwerpunkt

Smart Factory – Konzeption und Prototyp zum Image Mining und zur Fehlererkennung in der Produktion

Um die Leistungsfähigkeit der Produktion in der Smart Factory effizient zu gestalten, lassen sich durch Sensoren in Echtzeit erhobene Produktionsdaten zur Qualitätsprüfung nutzen. Damit die Daten, die Informationen und letztendlich das durch …

Autoren:
Sebastian Trinks, Carsten Felden

17.04.2019

iPerfDetector: Characterizing and detecting performance anti-patterns in iOS applications

Performance issues in mobile applications (i.e., apps) often have a direct impact on the user experience. However, due to limited testing resources and fast-paced software development cycles, many performance issues remain undiscovered when the …

Autoren:
Sara Seif Afjehei, Tse-Hsun (Peter) Chen, Nikolaos Tsantalis

17.04.2019 | Methodologies and Application

An efficient method for fault tolerance in cloud environment using encryption and classification

Cloud computing may be defined as management and provision of resources, software, application and information as services over the cloud which are dynamically scalable. Fault tolerance includes all the techniques necessary for robustness and …

Autoren:
Vipul Gupta, Bikram Pal Kaur, Surender Jangra

16.04.2019 | Special Issue

Genetic algorithm for quality of service based resource allocation in cloud computing

In the recent years, cloud computing has emerged as one of the important fields in the information technology. Cloud offers different types of services to the web applications. The major issue faced by cloud customers are selecting the resources …

Autoren:
Prasad Devarasetty, Satyananda Reddy

16.04.2019

Dynamic scheduling applying new population grouping of whales meta-heuristic in cloud computing

Scheduling in cloud computing is the assignment of tasks to resources with maximum performance, which is a multi-purpose problem. The scheduling is of NP-Hard issues that is the reason why meta-heuristic algorithms are used in scheduling problems.

Autoren:
Farinaz Hemasian-Etefagh, Faramarz Safi-Esfahani

16.04.2019

Verifiable outsourcing computation for modular exponentiation from shareable functions

Verifiable computation (VC) enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted server. The server returns an answer that allows the client to recover the correct result, accompanied …

Autoren:
Muhua Liu, Ying Wu, Rui Xue, Rui Zhang

16.04.2019

Entropy-based outlier detection using spark

The k-nearest neighbors outlier detection is a simple yet effective widely renowned method in data mining. The actual application of this model in the big data domain is not feasible due to time and memory restrictions. Several distributed …

Autoren:
Guilan Feng, Zhengnan Li, Wengang Zhou, Shi Dong

16.04.2019 Open Access

Smart Monitoring and Controlling of Government Policies Using Social Media and Cloud Computing

The governments, nowadays, throughout the world are increasingly becoming dependent on public opinion regarding the framing and implementation of certain policies for the welfare of the general public. The role of social media is vital to this …

Autoren:
Prabhsimran Singh, Yogesh K. Dwivedi, Karanjeet Singh Kahlon, Ravinder Singh Sawhney, Ali Abdallah Alalwan, Nripendra P. Rana

15.04.2019 | Methodologies and Application

Fuzzy-based approach to assess and prioritize privacy risks

The new general data protection regulation requires organizations to conduct a data protection impact assessment (DPIA) when the processing of personal information may result in high risk to individual rights and freedoms. DPIA allows …

Autoren:
Stephen Hart, Anna Lisa Ferrara, Federica Paci

15.04.2019 Open Access

Digital Innovation Dynamics Influence on Organisational Adoption: The Case of Cloud Computing Services

Digital innovative technologies have enabled organisations to create opportunities to support their competitive advantage. In this regard, realising the dynamics influencing the adoption of these technologies becomes critical to their success.

Autor:
Ramzi El-Haddadeh

15.04.2019

A survey and taxonomy on virtual data center embedding

Data center network virtualization is being considered as a promising technology to provide a performance guarantee for cloud computing applications. One important problem in data center network virtualization technology is virtual data center …

Autoren:
Ameni Hbaieb, Mahdi Khemakhem, Maher Ben Jemaa

15.04.2019

A methodology to assess the availability of next-generation data centers

Cloud data center providers benefit from software-defined infrastructure once it promotes flexibility, automation, and scalability. The new paradigm of software-defined infrastructure helps facing current management challenges of a large-scale …

Autoren:
Daniel Rosendo, Demis Gomes, Guto Leoni Santos, Glauco Goncalves, Andre Moreira, Leylane Ferreira, Patricia Takako Endo, Judith Kelner, Djamel Sadok, Amardeep Mehta, Mattias Wildeman

12.04.2019 | Hauptbeiträge | Ausgabe 2/2019

New Work und Coaching – psychologisches Empowerment als Chance für Coaches

Arbeit wird zunehmend volatil, unsicher, komplex und mehrdeutig. Organisationen begegnen diesen Trends, indem sie im Zuge von New Work-Maßnahmen ihre Organisationstrukturen und Arbeitsprozesse demokratisieren. Häufig stehen dabei die Strukturen im …

Autor:
Prof. Dr. rer. nat. Carsten C. Schermuly

12.04.2019

A Novel Multi-Objective Efficient Offloading Decision Framework in Cloud Computing for Mobile Computing Applications

Mobile cloud computing is the emerging paradigm to improve mobile device computation issues using cloud resources. Computation offloading is an efficient way of transferring certain tasks from mobile devices to the cloud. The computationally …

Autoren:
Shanthi Thangam Manukumar, Vijayalakshmi Muthuswamy

12.04.2019 | Research Article - Computer Engineering and Computer Science

Priority-Based and Optimized Data Center Selection in Cloud Computing

Cloud computing (CC) is rapidly emerging in IT fields and becomes a vital research area. CC environment allows cloud service providers to offer different types of services to customers of different categories. Customers like their requests to be …

Autoren:
Najib A. Kofahi, Tariq Alsmadi, Malek Barhoush, Moy’awiah A. Al-Shannaq

12.04.2019 | AI Transfer

Towards Explainable Process Predictions for Industry 4.0 in the DFKI-Smart-Lego-Factory

With the advent of digitization on the shopfloor and the developments of Industry 4.0, companies are faced with opportunities and challenges alike. This can be illustrated by the example of AI-based process predictions, which can be valuable for …

Autoren:
Jana-Rebecca Rehse, Nijat Mehdiyev, Peter Fettke

11.04.2019 | Research Article - Computer Engineering and Computer Science

A Novel Integrated Approach for Companion Vehicle Discovery Based on Frequent Itemset Mining on Spark

Companion vehicle discovery received much attention from the research community. It has been widely adopted by traffic management departments in many aspects such as the involved vehicle tracking. Since there are a massive amount of traffic data …

Autoren:
Abdulrahman Al-badwi, Zhe Long, Zuping Zhang, Mohammed Al-habib, Kamal Al-Sabahi

11.04.2019

ESNemble: an Echo State Network-based ensemble for workload prediction and resource allocation of Web applications in the cloud

Workload prediction is an essential prerequisite to allocate resources efficiently and maintain service level agreements in cloud computing environment. However, the best solution for a prediction task may not be a single model due to the …

Autoren:
Hoang Minh Nguyen, Gaurav Kalra, Tae Joon Jun, Sungpil Woo, Daeyoung Kim

11.04.2019

An Approach to Alleviate the Sparsity Problem of Hybrid Collaborative Filtering Based Recommendations: The Product-Attribute Perspective from User Reviews

The goal of a recommender system is to return related items that users may be interested in. However recommendation methods result in a sparsity problem that affects the generation of recommendation results and, thus, the user experience.

Autoren:
Xiaoxian Yang, Sijing Zhou, Min Cao

10.04.2019

Multi-Objective Task Scheduling Using Hybrid Genetic-Ant Colony Optimization Algorithm in Cloud Environment

Task allocation within the cloud computing environment is a nondeterministic polynomial time class problem that is laborious to get the best solution. It is an important issue in the cloud computing setting. The usage of cloud based applications …

Autoren:
A. M. Senthil Kumar, M. Venkatesan

10.04.2019

QoS-enabled TCP for software-defined networks: a combined scheduler-per-node approach

Software-defined network (SDN) can ease the implementation of QoS concept by introducing a flexible and manageable mechanism to overcome the TCP pacing in the network and data centers which have burst traffics. SDN’s flexible structure lets the …

Autoren:
Yousef Darmani, Mehrdad Sangelaji

10.04.2019

Two-level task scheduling with multi-objectives in geo-distributed and large-scale SaaS cloud

With the exploding of data-intensive web applications and requests (tasks), geo-distributed and large-scale data centers (DCs) are widely deployed in Software as a Service (SaaS) cloud, but server failures continue to grow at the same time. In …

Autoren:
Puheng Zhang, Xiao Ma, Yanping Xiao, Wenzhuo Li, Chuang Lin

10.04.2019

SDF-GA: a service domain feature-oriented approach for manufacturing cloud service composition

Cloud manufacturing (CMfg) is a new service-oriented manufacturing paradigm in which shared resources are integrated and encapsulated as manufacturing services. When a single service is not able to meet some manufacturing requirement, a …

Autoren:
Tianyang Li, Ting He, Zhongjie Wang, Yufeng Zhang

09.04.2019 | Schwerpunkt | Ausgabe 2/2019

Weiterhin stark bewölkt – Cloud Computing 10 Jahre danach

In der ersten Ausgabe der Wirtschaftsinformatik und Management im Februar 2009 haben wir unter dem Titel „die weiteren Aussichten – wolkig“ Cloud Computing und die daraus folgende Transformation des Rechenzentrums beleuchtet. Was hat sich in den …

Autor:
Gerd Breiter

09.04.2019

Burst Contention Resolution Using Fiber Delay Management in WDM Optical Networks

The discrete time delays are essential for resolving contention for same wavelengths between arriving bursts. The Fiber Delay Lines (FDLs) are used to provide delay, since optical random access memory is unavailable. The time period which is …

Autoren:
Rakesh Kumar Maurya, Shrinivas Petale, Jaisingh Thangaraj, Vishnu Priye

09.04.2019

Comparative study between exact and metaheuristic approaches for virtual machine placement process as knapsack problem

In cloud computing, the virtual machine placement is a critical process which aims to identify the most appropriate physical machine to host the virtual machine. It has a significant impact on the performance, resource usage and energy consumption …

Autoren:
Saloua El Motaki, Ali Yahyaouy, Hamid Gualous, Jalal Sabor

08.04.2019 | Original Paper | Ausgabe 1/2019

Models of Anticipation Within the Responsible Research and Innovation Framework: the Two RRI Approaches and the Challenge of Human Rights

Anticipation is one of the main goals of new governance models, such as Responsible Research and Innovation. However, there is not a single mode of anticipation in this model. Two approaches can be addressed within the RRI framework: a …

Autor:
Daniele Ruggiu

06.04.2019 | Special Issue

Multiobjective memetic algorithm based on adaptive local search chains for vehicle routing problem with time windows

This paper presents a multiobjective memetic algorithm based on adaptive local search chains (MMA-ALSC) for vehicle routing problem with time window (VRPTW) which is an important research area in logistics. As shown in most previous studies, VRPTW …

Autoren:
Kaikai Zhang, Yiqiao Cai, Shunkai Fu, Huizhen Zhang

05.04.2019 | Schwerpunkt | Ausgabe 2/2019

Die IT-Branche muss(te) sich neu erfinden

Vor 10 Jahren wurde viel über die Auswirkungen der Finanzkrise auf die IT geschrieben. Hendrik Haas, mittlerweile Senior Partner bei Advyce, hat damals in dieser Zeitschrift für eine differenzierte Sicht auf die IT und die gesamte IT-Branche …

Autor:
Hendrik Haas

05.04.2019 | Focus

Classification of rubberized coir fibres using deep learning-based neural fuzzy decision tree approach

Indian coir industry is one among the small-scale cottage industries which contributes a great amount to the economy of India. India and Sri Lanka are the top two international producers, and they account for 90% of world coir manufacturing. The …

Autoren:
S. Remya, R. Sasikala

05.04.2019

A Threat Analysis of Human Bond Communications

In this paper we provide a high-level threat analysis of Human Bond Communications, using the STRIDE methodology. To this end, we provide an overview over Human Bond Communications and define a sample set of cases. The Human Bond Communications …

Autor:
Geir M. Køien

05.04.2019

Deploying Data-intensive Applications with Multiple Services Components on Edge

In the information age, the amount of data is huge which shows an exponential growth. In addition, most services of application need to be interdependent with data, cause that they can be executed under the driven data. In fact, such a …

Autoren:
Yishan Chen, Shuiguang Deng, Hongtao Ma, Jianwei Yin

04.04.2019 | Ausgabe 1/2019

Sustainable Framework for Smart Transportation System: A Case Study of Karachi

In this paper, a framework of smart transportation system is proposed, aiming to address the transportation problem in Karachi city. In modern day world, the mega cities and urban areas are on the edge of transformation into smart cities. With the …

Autoren:
Muhammad Aamir, Suhaib Masroor, Zain Anwar Ali, Bai Ting Ting

04.04.2019

QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment

Along with the popularity of intelligent services and mobile services, service recommendation has become a key task, especially the task based on quality-of-service (QoS) in edge computing environment. Most existing service recommendation methods …

Autoren:
Yuyu Yin, Lu Chen, Yueshen Xu, Jian Wan, He Zhang, Zhida Mai

04.04.2019

Canny edge detection and Hough transform for high resolution video streams using Hadoop and Spark

Nowadays, video cameras are increasingly used for surveillance, monitoring, and activity recording. These cameras generate high resolution image and video data at large scale. Processing such large scale video streams to extract useful information …

Autoren:
Bilal Iqbal, Waheed Iqbal, Nazar Khan, Arif Mahmood, Abdelkarim Erradi

04.04.2019

FGSA for optimal quality of service based transaction in real-time database systems under different workload condition

A Real-Time Database System is referred to as a transaction execution system which is administered to manage different workloads. To store and to retrieve data onto distinctive application services database systems are utilized. Unfortunately, in …

Autoren:
Mohammad Sharfoddin Khatib, Mohammad Atique

04.04.2019

Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol

Securing the mobile agents from malicious code execution is the next phase of mobile network computing. Malicious code execution is one of the serious attacks in mobile agent network. To restrict the attack to an extent, a strong authentication …

Autoren:
Prabhjot Kaur Jolly, Shalini Batra

03.04.2019 | ORIGINAL ARTICLE

Data-driven smart production line and its common factors

Due to the wide usage of digital devices and easy access to the edge items in manufacturing industry, massive industrial data is generated and collected. A data-driven smart production line (SPL), which is a basic cell in a smart factory, is …

Autoren:
Yongping Zhang, Ying Cheng, Xi Vincent Wang, Ray Y. Zhong, Yingfeng Zhang, Fei Tao

03.04.2019 | Special Issue

Analysis of evolutionary process of fog computing system based on BA and ER network hybrid model

Fog computing is oriented to the Internet of Things, which integrates network, computing, storage and application capabilities. It is a semi-virtualized distributed service computing paradigm. It extends data, data processing and applications to …

Autor:
Kunpeng Kang

03.04.2019 | Special Issue

Sentiment analysis using convolutional neural network via word embeddings

Convolutional neural networks are known for their excellent performance in computer vision, achieving results in the state of the art. Moreover, recent research has shown that these networks can also provide promising results for natural language …

Autoren:
Nadia Nedjah, Igor Santos, Luiza de Macedo Mourelle

03.04.2019 | Focus

A high-performance parallel coral reef optimization for data clustering

As a critical research topic toward the new era of big data, how to develop a high-performance data analytics system has received significant research attention from different disciplines since the 2000s. In the literature, many recent works …

Autoren:
Chun-Wei Tsai, Wei-Yan Chang, Yi-Chung Wang, Huan Chen

03.04.2019

Dynamic provisioning of resources based on load balancing and service broker policy in cloud computing

Dynamic resource allocation is the key objective of the paper motivated due to a large number of user’s service request and increasing network infrastructure complexity. Load balancing and Service Broker Policy are taken as two main key areas for …

Autoren:
Amrita Jyoti, Manish Shrimali

03.04.2019 | Original Paper

Fine-grained access control of EHRs in cloud using CP-ABE with user revocation

Cloud computing is a novel model for computing and storing. It enables elasticity, on-demand and low-cost usage of computing resources. Electronic health record (EHR) is an emerging patient-oriented paradigm for sharing of medical data. With the …

Autoren:
Gandikota Ramu, B. Eswara Reddy, Appawala Jayanthi, L. V. Narasimha Prasad

02.04.2019 | Theoretical advances

On enhancing the deadlock-preventing object migration automaton using the pursuit paradigm

Probably, the most reputed solution for partitioning, which has applications in databases, attribute partitioning, processor-based assignment and many other similar scenarios, is the object migration automata (OMA). However, one of the known …

Autoren:
Abdolreza Shirvani, B. John Oommen

01.04.2019 | Wissen – CyberSecurity | Ausgabe 2/2019

Wo die Reise hingeht – So rasant ändert sich die Cloud-Landschaft

Sicherheit in der Cloud
Autoren:
Astrid Mehrtens-Haupt, Ralf Rieken, Mathias Widler

01.04.2019 | Wissen – CyberSecurity | Ausgabe 2/2019

Biometrie 2.0 – Sicherheit durch kontinuierliche Authentifizierung

Angewandte Sicherheit
Autoren:
Sebastian Mayer, Werner Thalmeier, Karl-Otto Feger, Frank Reiländer, Dirk Rosenau

01.04.2019 | Unternehmenssteuerung | Ausgabe 3/2019

Planung im digitalen Zeitalter

Planungsprozesse sind komplex, zeitintensiv und oftmals zu statisch. Angesichts zunehmender Digitalisierung und immer dynamischerer Märkte müssen sie flexibler und effizienter werden. Eine Studie erfasst den Status quo und identifiziert die …

Autoren:
Ralf Dillerup, Tobias Witzemann, Simon Schacht, Luca Schaller

01.04.2019 | Control Sciences | Ausgabe 4/2019

Creation of Information-Technological Reserve in Distributed Data Processing Systems

The main stages are presented of creating an information-technological data reserve in distributed automated informational control systems. The reserve is formed on the basis of the results of the analysis of subject areas, regular requests to the …

Autor:
S. K. Somov

01.04.2019 | Ausgabe 4/2019

Cryptanalysis and improvement in controlled quantum dialogue using cluster states

The controlled quantum dialogue protocol which was put forward recently (Kao and Hwang in Quantum Inf Process 16(5):139, 2017) is analyzed. It shows that a dishonest controller can successfully eavesdrop on the secret messages that the two users …

Autoren:
Zhihao Liu, Hanwu Chen

01.04.2019 | Regular Paper

Joint optimization of routing and VM resource allocation for multimedia cloud

With the development of cloud computing, cloud data centers provide powerful platforms for multimedia services. Still, QoS routing and resource allocation are two main challenges to optimize the multimedia services. The QoS routing affects the …

Autoren:
Wenqiang Gong, Jinyao Yan, Xiaoming Nan, Yun Tie

01.04.2019 | Betriebspraxis & Führung | Ausgabe 4/2019

Warum digitale Plattformen die Zukunft sind

Digitale Plattformen sind die strategischen Top-Themen von Unternehmen. Warum? Weil sie offen, agil, datengetrieben, unabhängig und skalierbar sind.

Autor:
Thomas Hoffmeister

01.04.2019 | Betriebspraxis & Führung | Ausgabe 4/2019

Erst der Mensch gibt Daten Sinn und Bedeutung

Die Digitalisierung hat zuerst einzelne Branchen umgekrempelt - die Musikindustrie zum Beispiel. Heute zeigt sich der Umbruch branchen- und funktionsübergreifend. Vertrieb lebt vom persönlichen Kontakt. Ob das so bleibt, ist unsicher. Dessen …

Autor:
Dr. Guido Schafmeister

01.04.2019 | Aufsätze | Ausgabe 4/2019

Die Zertifizierung von Cloud-Diensten nach der DSGVO

Art. 42 und Art. 43 DSGVO regeln auf europäischer Ebene erstmalig die datenschutzrechtliche Zertifizierung und ermöglichen damit auch die Entwicklung technologiespezifischer datenschutzrechtlicher Zertifizierungsverfahren. Der Beitrag zeigt die …

Autoren:
LL. M. Dr. Natalie Maier, Sebastian Lins, Heiner Teigeler, Prof. Dr. Alexander Roßnagel, Prof. Dr. Ali Sunyaev

01.04.2019 | Special Issue

Categorization of Intercloud users and auto-scaling of resources

Optimal allocation of resources in Intercloud computing is NP-complete program. Constraints are many and configuration of each cloud varies from each other. The mapping of the tasks to available virtual machines is challenging. In real life …

Autoren:
Tamanna Jena, J. R. Mohanty, Suresh Chandra Satapathy

01.04.2019 | Focus

Design of visual communication based on deep learning approaches

Aiming at the problem of object recognition caused by small object scale, multi-interaction (occlusion), and strong hiding characteristics in the scene analysis task, an object-region-enhanced network based on deep learning was proposed. The …

Autor:
Lu Lu

30.03.2019

Fog computing in internet of things: Practical applications and future directions

Internet of things (IoT) services have been accepted and accredited globally for the past couple of years and have had increasing interest from researchers. Fog architecture has been brought up in IoT for enhancing its competence in a variety of …

Autoren:
Rida Zojaj Naeem, Saman Bashir, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal

30.03.2019 | Original Article Open Access

Shortest path problem in fuzzy, intuitionistic fuzzy and neutrosophic environment: an overview

In the last decade, concealed by uncertain atmosphere, many algorithms have been studied deeply to workout the shortest path problem. In this paper, we compared the shortest path problem with various existing algorithms. Finally, we concluded the …

Autoren:
Said Broumi, Mohamed Talea, Assia Bakali, Florentin Smarandache, Deivanayagampillai Nagarajan, Malayalan Lathamaheswari, Mani Parimala

29.03.2019

The Incremental Load Balance Cloud Algorithm by Using Dynamic Data Deployment

The rapid advancement of network technology has changed the way the world operates and has produced a large number of network application services for users. In order to provide more convenient services, the network service providers need to …

Autoren:
Hui-Ching Hsieh, Mao-Lun Chiang

29.03.2019

Hybrid Cloud Adaptive Scheduling Strategy for Heterogeneous Workloads

With the advent of the era of big data, many companies have taken the most important steps in the hybrid cloud to handle large amounts of data. In a hybrid cloud environment, cloud burst technology enables applications to be processed at a lower …

Autoren:
Li Chunlin, Tang Jianhang, Luo Youlong

28.03.2019 | Original Article

A new technique for time series forecasting by using symbiotic organisms search

Symbiotic organisms search (SOS) is a new metaheuristic optimization algorithm proposed by Cheng and Prayogo (Comput Struct 139:98–112, 2014). In this paper, SOS has been applied to determine the functional forms of different time series which are …

Autoren:
Shanoli Samui Pal, Saumyadip Samui, Samarjit Kar

28.03.2019

An intelligent and secure healthcare framework for the prediction and prevention of Dengue virus outbreak using fog computing

Mosquitoes play a major role in spreading virus to human. One of the major virus is dengue, and it will cause an impact in the normal health condition. It will lead to some side effects in the human body. The prevention steps that are followed by …

Autoren:
A. Pravin, T. Prem Jacob, G. Nagarajan

27.03.2019

RecFlow: SDN-based receiver-driven flow scheduling in datacenters

Datacenter applications (e.g., web search, recommendation systems, and social networking) are designed to have a high fanout for the purpose of achieving scalable performance. Frequent fabric congestion (e.g., due to incast, imperfect hashing) is …

Autoren:
Aadil Zia Khan, Ihsan Ayyub Qazi

26.03.2019

Energy-efficient migration techniques for cloud environment: a step toward green computing

The technology, cloud computing, in present days, is vastly used due to the services it provides and the ease with which they can be availed. The enormous development of the Internet technology is due to the advent of the concept of cloud. Along …

Autoren:
Srimoyee Bhattacherjee, Rituparna Das, Sunirmal Khatua, Sarbani Roy

26.03.2019 | Ausgabe 2/2019

Mean-field Macro Computation in Large-scale Cloud Service Systems with Resource Management and Job Scheduling

Service computing is an emerging and distributed computing mode in cloud service systems, and has become an interesting research direction for both academia and industry. Note that the cloud service systems always display new characteristics, such …

Autoren:
Feifei Yang, Yanping Jiang, Quanlin Li

25.03.2019 | Einführung

Von smarten Produkten zu smarten Dienstleistungen und deren Auswirkung auf die Wertschöpfung

Im Rahmen der Digitalisierung nehmen smarte Produkte und die darauf aufbauenden intelligenten Dienstleistungen einen immer größeren Platz sowohl im betrieblichen Kontext als auch im Endkundenbereich ein. Auslöser hierfür stellt vor allem die …

Autoren:
Gero Strobel, Ute Paukstadt, Jörg Becker, Stefan Eicker

25.03.2019 | ORIGINAL ARTICLE

An overall framework and subsystems for smart manufacturing integrated system (SMIS) from multi-layers based on multi-perspectives

In the tide of smart manufacturing in the world, many countries have put forward their own reference frameworks for smart manufacturing system. Based on the framework of smart manufacturing system (SMS) proposed by China, a reference smart …

Autoren:
Xianyu Zhang, Xinguo Ming, Zhiwen Liu, Yuanju Qu, Dao Yin

23.03.2019

An IoT based efficient hybrid recommender system for cardiovascular disease

A fog-based IoT model can be helpful for patients from remote areas with cardiovascular disease. An expert cardiologist is usually not available in such remote areas. There are some systems available to classify heart disease and provide …

Autoren:
Fouzia Jabeen, Muazzam Maqsood, Mustansar Ali Ghazanfar, Farhan Aadil, Salabat Khan, Muhammad Fahad Khan, Irfan Mehmood

22.03.2019 | Original Paper

All-optical signal processing technologies in flexible optical networks

All-optical signal processing has always been critical assistance for the flexible optical networks (FONs) development which realizes various signal processing functions in all-optical domain avoiding electronic bottlenecks. The sustained demands …

Autoren:
Yuefeng Ji, Hongxiang Wang, Jiabin Cui, Meitong Yu, Zhitian Yang, Lin Bai

22.03.2019 | Research Paper

Scheduling Flexible Demand in Cloud Computing Spot Markets

A Real Options Approach

The rapid standardization and specialization of cloud computing services have led to the development of cloud spot markets on which cloud service providers and customers can trade in near real-time. Frequent changes in demand and supply give rise …

Autoren:
Robert Keller, Lukas Häfner, Thomas Sachs, Gilbert Fridgen

21.03.2019 | Research Article

SLA-driven container consolidation with usage prediction for green cloud computing

Since service level agreement (SLA) is essentially used to maintain reliable quality of service between cloud providers and clients in cloud environment, there has been a growing effort in reducing power consumption while complying with the SLA by …

Autoren:
Jialei Liu, Shangguang Wang, Ao Zhou, Jinliang Xu, Fangchun Yang

21.03.2019

An enhancement of task scheduling in cloud computing based on imperialist competitive algorithm and firefly algorithm

Cloud computing is an Internet-based approach in which all applications and files are hosted in a cloud consisting of thousands of computers that are linked in complex ways. The major challenge of cloud data centers is to show how the millions of …

Autoren:
Seyedeh Monireh Ggasemnezhad Kashikolaei, Ali Asghar Rahmani Hosseinabadi, Behzad Saemi, Morteza Babazadeh Shareh, Arun Kumar Sangaiah, Gui-Bin Bian

21.03.2019 | Ausgabe 2/2019

Failure prediction using machine learning in a virtualised HPC system and application

Failure is an increasingly important issue in high performance computing and cloud systems. As large-scale systems continue to grow in scale and complexity, mitigating the impact of failure and providing accurate predictions with sufficient lead …

Autoren:
Bashir Mohammed, Irfan Awan, Hassan Ugail, Muhammad Younas

20.03.2019

A market-consistent framework for the fair evaluation of insurance contracts under Solvency II

The entry into force of the Solvency II regulatory regime is pushing insurance companies in engaging into market consistence evaluation of their balance sheet, mainly with reference to financial options and guarantees embedded in life with-profit …

Autoren:
Anna Maria Gambaro, Riccardo Casalini, Gianluca Fusai, Alessandro Ghilarducci

20.03.2019 | Research Paper

Performance Analysis and Enhancement of Deep Convolutional Neural Network

Application to Gearbox Condition Monitoring

Convolutional neural network has been widely investigated for machinery condition monitoring, but its performance is highly affected by the learning of input signal representation and model structure. To address these issues, this paper presents a …

Autoren:
Jinjiang Wang, Yulin Ma, Prof. Zuguang Huang, Ruijuan Xue, Rui Zhao

20.03.2019

Classification of Smart City Research - a Descriptive Literature Review and Future Research Agenda

Smart City (SC) has been a popular area of research and practice during the last decade. An in-depth examination of the existing literature reviews on SCs divulges the scarcity of studies classifying the literature into multiple themes and …

Autoren:
Parul Gupta, Sumedha Chauhan, M. P. Jaiswal

20.03.2019 | Technical Article | Ausgabe 1/2019

BisQue for 3D Materials Science in the Cloud: Microstructure–Property Linkages

Accelerating the design and development of new advanced materials is one of the priorities in modern materials science. These efforts are critically dependent on the development of comprehensive materials cyberinfrastructures which enable …

Autoren:
Marat I. Latypov, Amil Khan, Christian A. Lang, Kris Kvilekval, Andrew T. Polonsky, McLean P. Echlin, Irene J. Beyerlein, B. S. Manjunath, Tresa M. Pollock

19.03.2019 | Methodologies and Application

An improved watermarking algorithm for color image using Schur decomposition

In order to protect the color image copyright protection of the multimedia big data, it is necessary to design a color image watermarking algorithm. To achieve this purpose, an improved color image watermarking algorithm based on Schur …

Autoren:
Qingtang Su, Xiaofeng Zhang, Gang Wang

19.03.2019 | Ausgabe 1/2019

Why Cryptosystems Fail Revisited

In the paper “Why Cryptosystems Fail”, Ross Anderson ponders the question about why cryptosystems really fail. Obviously, there may be weak crypto-algorithms, too short key lengths and flawed crypto-protocols. However, these were not the main …

Autor:
Geir M. Køien

19.03.2019 | Ausgabe 2/2019

A Virtual Machine Scheduling Strategy with a Speed Switch and a Multi-Sleep Mode in Cloud Data Centers

With the rapid growth of energy costs and the constant promotion of environmental standards, energy consumption has become a significant expenditure for the operating and maintaining of a cloud data center. To improve the energy efficiency of …

Autoren:
Shunfu Jin, Shanshan Hao, Xiuchen Qie, Wuyi Yue

19.03.2019 | Ausgabe 2/2019

System Model and Equilibrium Strategy of Mobile Users in a Hybrid Access Network

Mobile users usually access the Internet via a hybrid access network, in which cellular and Wi-Fi networks are available alternatively. In the hybrid access network, a mobile user decides to send or not to send a packet according to the number of …

Autoren:
Dongmei Zhao, Shunfu Jin, Wuyi Yue

18.03.2019

A survey of mmWave user association mechanisms and spectrum sharing approaches: an overview, open issues and challenges, future research trends

Fifth generation (5G) cellular networks promise to support multi-radio access technologies (multi-RATs) with low and high frequencies aiming at delivering good coverage, several gigabits data rate, and ultra-reliable services. In this context …

Autoren:
Mothana L. Attiah, A. A. M. Isa, Zahriladha Zakaria, M. K. Abdulhameed, Mowafak K. Mohsen, Ihab Ali

18.03.2019

Computational and natural language processing based studies of hadith literature: a survey

Hadith is one of the most celebrated resources of Classical Arabic text. The hadiths, or Prophetic traditions (tradition for short), are narrations originating from the sayings and conduct of Prophet Muhammad. For Muslims, hadiths are the second …

Autoren:
Aqil M. Azmi, Abdulaziz O. Al-Qabbany, Amir Hussain

18.03.2019 | Ausgabe 1/2019

Digital technologies in airport ground operations

How have digital technologies changed airport ground operations? Although the relevant peer-reviewed literature emphasizes the role of cost savings as a key driver behind digitalization of airport ground operations, the focus is on data-driven …

Autoren:
Ivan Kovynyov, Ralf Mikut

16.03.2019

A modified knowledge-based ant colony algorithm for virtual machine placement and simultaneous routing of NFV in distributed cloud architecture

The emergence of the new technologies such as virtualization and distributed cloud computing has provided new opportunities for management and orchestration of the networks by software-defined networking (SDN) and network function virtualization …

Autoren:
Alireza Farshin, Saeed Sharifian

16.03.2019

QVIA-SDN: Towards QoS-Aware Virtual Infrastructure Allocation on SDN-based Clouds

Virtual Infrastructures (VIs) emerged as a potential solution for network evolution and cloud services provisioning on the Internet. Deploying VIs, however, is still challenging mainly due to a rigid management of networking resources. By …

Autoren:
Felipe Rodrigo de Souza, Charles Christian Miers, Adriano Fiorese, Marcos Dias de Assunção, Guilherme Piegas Koslovski

15.03.2019

Task Failure Prediction using Combine Bagging Ensemble (CBE) Classification in Cloud Workflow

Scientific applications adopt cloud environment for executing its workflows as tasks. When a task fails, dependency nature of the workflows affects the overall performance of the execution. An efficient failure prediction mechanism is needed to …

Autoren:
P. Padmakumari, A. Umamakeswari

14.03.2019 | Original Paper

A new healthcare architecture using IoV technology for continuous health monitoring system

Technology development has improved to its extent for mobile monitoring that mainly concentrates on a new trend that named as the Internet of Vehicles (IoV).A large number of researchers and organizations are attracted by this technological …

Autoren:
Tamizharasi Thirugnanam, Muhammad Rukunuddin Ghalib

13.03.2019 | Regular Papers | Ausgabe 5/2019

Double-layer Dynamic Decoupling Control System for the Yaw Stability of Four Wheel Steering Vehicle

The four-wheel steering (4WS) is an efficient method to improve the manoeuvrability of electric vehicle with the tendency of understeer, by providing the sufficient steering angles. Because of the various kinds of driving environments, the inner …

Autoren:
Ke Shi, Xiaofang Yuan, Qian He

13.03.2019

Query optimization in cloud environments: challenges, taxonomy, and techniques

Improving query performance remains one of the most interesting and challenging goals for both the academic and industrial communities. Indeed, cloud computing has complicated the traditional process of query optimization since many new challenges …

Autoren:
Abderrazak Sebaa, Abdelkamel Tari

13.03.2019

Multi-sensor-based detection and tracking of moving objects for relative position estimation in autonomous driving conditions

Moving object detection (MOD) technology was combined to include detection, tracking and classification which provides information such as the local and global position estimation and velocity from around objects in real time at least 15 fps. To …

Autoren:
Jinwoo Kim, Yonggeon Choi, MyungWook Park, Sangwoo Lee, Sunghoon Kim

13.03.2019

Using Advanced Handover and Localization Techniques for Maintaining Quality-of-Service of Mobile Users in Heterogeneous Cloud-Based Environment

In order to maintain seamless communication and quality of service (QoS) for mobile applications, a new and flexible mechanisms are needed. The first technique is the use of vertical handover to maintain QoS through multiple interfaces. Modern …

Autoren:
Yonal Kirsal, Glenford Mapp, Fragkiskos Sardis

13.03.2019 | Methodologies and Application

An efficient Minkowski distance-based matching with Merkle hash tree authentication for biometric recognition in cloud computing

Biometric recognition recognizes an identification of an individual which can be obtained with the biological characteristics such as fingerprint, iris, and voice. The challenge of biometric recognition is the matching of fingerprint database with …

Autoren:
R. Ramya, T. Sasikala
Bildnachweise