Skip to main content
main-content

Cloud Computing

weitere Zeitschriftenartikel

01-12-2019 | Research | Issue 1/2019 Open Access

Reducing the effects of DoS attacks in software defined networks using parallel flow installation

Software defined networking (SDN) is becoming more and more popular due to its key features, such as monitoring, fine-grained control, flexibility and scalability. The centralized control of SDN makes it vulnerable to various types of attacks …

Authors:
Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan, Abdelouahid Derhab

01-12-2019 | Original Article | Issue 1/2019

FCMiner: mining functional communities in social networks

Community discovery is a popular topic in social network analysis which facilitates several real-world applications. Most commonly, communities are discovered according to their structural similarities resulting in tightly connected user …

Authors:
T. M. G. Tennakoon, Richi Nayak

01-12-2019 | Research | Issue 1/2019 Open Access

Library adoption in public software repositories

We study the the spread and adoption of libraries within Python projects hosted in public software repositories on GitHub. By modelling the use of Git pull, merge, commit, and other actions as deliberate cognitive activities, we are able to better …

Authors:
Rachel Krohn, Tim Weninger

01-12-2019 | Research | Issue 1/2019 Open Access

Research on trust mechanism of cooperation innovation with big data processing based on blockchain

In recent years, the status of cooperation and innovation has become increasingly important. Research on the behavior of production, education, and research organizations has attracted widespread attention. Blockchain technology is considered as …

Authors:
Qi Liu, Xiao Zou

01-12-2019 | Research | Issue 1/2019 Open Access

SCOPE: self-adaptive and policy-based data management middleware for federated clouds

A federated cloud storage setup which integrates and utilizes storage resources from multiple cloud storage providers has become an increasingly popular and attractive paradigm for the persistence tier in cloud-based applications (e.g., SaaS …

Authors:
Ansar Rafique, Dimitri Van Landuyt, Eddy Truyen, Vincent Reniers, Wouter Joosen

01-12-2019 | Research | Issue 1/2019 Open Access

Investigation of the construction of intelligent logistics system from traditional logistics model based on wireless network technology

With the continuous development of science and technology, wireless network technology has played an important role in the construction of intelligent logistics system. Under this background, based on the wireless network technology, the …

Authors:
Quan Ouyang, Jun Zheng, Shunlin Wang

01-12-2019 | Research | Issue 1/2019 Open Access

Energy-aware VM placement algorithms for the OpenStack Neat consolidation framework

One of the main challenges in cloud computing is an enormous amount of energy consumed in data-centers. Several researches have been conducted on Virtual Machine(VM) consolidation to optimize energy consumption. Among the proposed VM …

Authors:
Fikru Feleke Moges, Surafel Lemma Abebe

01-12-2019 | Research | Issue 1/2019 Open Access

Optimal deployment of components of cloud-hosted application for guaranteeing multitenancy isolation

One of the challenges of deploying multitenant cloud-hosted services that are designed to use (or be integrated with) several components is how to implement the required degree of isolation between the components when there is a change in the …

Authors:
Laud Charles Ochei, Andrei Petrovski, Julian M. Bass

01-12-2019 | Original Paper | Issue 1/2019 Open Access

Key factors for the implementation and integration of innovative ICT solutions in SMEs and large companies involved in the multimodal transport of dangerous goods

The increased number of transports with dangerous goods (TDG) increases the risk of both accidents and terrorist attacks. Digitalisation is crucial in order to avoid human errors and to increase safety, security and efficiency, however there are …

Authors:
Gemma Dolores Molero, Francisco Enrique Santarremigia, Sara Poveda-Reyes, Melanie Mayrhofer, Samir Awad-Núñez, Abdullah Kassabji

01-12-2019 | Research | Issue 1/2019 Open Access

Evaluation of distributed stream processing frameworks for IoT applications in Smart Cities

The widespread growth of Big Data and the evolution of Internet of Things (IoT) technologies enable cities to obtain valuable intelligence from a large amount of real-time produced data. In a Smart City, various IoT devices generate streams of …

Authors:
Hamid Nasiri, Saeed Nasehi, Maziar Goudarzi

01-12-2019 | Research | Issue 1/2019 Open Access

Multi-Dimensional Regression Host Utilization algorithm (MDRHU) for Host Overload Detection in Cloud Computing

The use of cloud computing data centers is growing rapidly to meet the tremendous increase in demand for high-performance computing (HPC), storage and networking resources for business and scientific applications. Virtual machine (VM) …

Authors:
Ali A. El-Moursy, Amany Abdelsamea, Rukshanda Kamran, Mohamed Saad

01-12-2019 | Research | Issue 1/2019 Open Access

A privacy protection-oriented parallel fully homomorphic encryption algorithm in cyber physical systems

Cyber physical system (CPS) is facing enormous security challenges because of open and interconnected network and the interaction between cyber components and physical components, the development of cyber physical systems is constrained by …

Authors:
Zhaoe Min, Geng Yang, Arun Kumar Sangaiah, Shuangjie Bai, Guoxiu Liu

01-12-2019 | Research | Issue 1/2019 Open Access

A big data placement method using NSGA-III in meteorological cloud platform

Meteorological cloud platforms (MCP) are gradually replacing the traditional meteorological information systems to provide information analysis services such as weather forecasting, disaster warning, and scientific research. However, the explosive …

Authors:
Feng Ruan, Renhao Gu, Tao Huang, Shengjun Xue

01-12-2019 | Research | Issue 1/2019 Open Access

ECPM: an energy-efficient cloudlet placement method in mobile cloud environment

The development of mobile cloud computing has greatly improved the computing and storage performance of mobile devices. And mobile cloud computing is undoubtedly the necessary way to solve the performance of the process for mobile applications …

Authors:
Chao Shen, Shengjun Xue, Shucun Fu

01-12-2019 | Research | Issue 1/2019 Open Access

Trust-based recommendation systems in Internet of Things: a systematic literature review

Internet of Things (IoT) creates a world where smart objects and services interacting autonomously. Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security …

Authors:
Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh, Amir Sahafi

01-12-2019 | Methodology | Issue 1/2019 Open Access

A parallel and distributed stochastic gradient descent implementation using commodity clusters

Deep Learning is an increasingly important subdomain of artificial intelligence, which benefits from training on Big Data. The size and complexity of the model combined with the size of the training dataset makes the training process very …

Authors:
Robert K. L. Kennedy, Taghi M. Khoshgoftaar, Flavio Villanustre, Timothy Humphrey

01-12-2019 | Survey paper | Issue 1/2019 Open Access

A survey on data storage and placement methodologies for Cloud-Big Data ecosystem

Currently, the data to be explored and exploited by computing systems increases at an exponential rate. The massive amount of data or so-called “Big Data” put pressure on existing technologies for providing scalable, fast and efficient support.

Authors:
Somnath Mazumdar, Daniel Seybold, Kyriakos Kritikos, Yiannis Verginadis

01-12-2019 | Research | Issue 1/2019 Open Access

Investigating the adoption of big data analytics in healthcare: the moderating role of resistance to change

Big data analytics is gaining substantial attention due to its innovative contribution to decision making and strategic development across the healthcare field. Therefore, this study explored the adoption mechanism of big data analytics in …

Authors:
Muhammad Shahbaz, Changyuan Gao, LiLi Zhai, Fakhar Shahzad, Yanling Hu

01-12-2019 | Research | Issue 1/2019 Open Access

Large-scale e-learning recommender system based on Spark and Hadoop

The present work is a part of the ESTenLigne project which is the result of several years of experience for developing e-learning in Sidi Mohamed Ben Abdellah University through the implementation of open, online and adaptive learning environment.

Authors:
Karim Dahdouh, Ahmed Dakkak, Lahcen Oughdir, Abdelali Ibriz

01-12-2019 | Research | Issue 1/2019 Open Access

Adaptive deduplication of virtual machine images using AKKA stream to accelerate live migration process in cloud environment

Cloud Computing is a paradigm which provides resources to users from its pool based on demand to satisfy their requirements. During this process, many servers are overloaded and underloaded in the cloud environment. Thus, power consumption and …

Authors:
Naga Malleswari TYJ, Vadivu G

01-12-2019 | Research | Issue 1/2019 Open Access

IoT + AR: pervasive and augmented environments for “Digi-log” shopping experience

The current bare Internet of Things (IoT) infrastructure has recently been extended to include smarter and more effective user interactions. Individual or meaningful sets and groups of IoT objects can be imbued with data and/or content in a …

Authors:
Dongsik Jo, Gerard Jounghyun Kim

01-12-2019 | Research | Issue 1/2019 Open Access

The use of ict by sme’s in Zambia to access business information services and investments: barriers and drivers

The research aimed at answering key questions regarding the use of ICTs among SMEs in their businesses with an analysis and consideration of the possible factors that enable ICTs to be valued, as drivers and the possible factors that deter them …

Authors:
Martin Mwila, Luka Ngoyi

01-12-2019 | Research | Issue 1/2019 Open Access

A view of programming scalable data analysis: from clouds to exascale

Scalability is a key feature for big data analysis and machine learning frameworks and for applications that need to analyze very large and real-time data available from data repositories, social media, sensor networks, smartphones, and the Web.

Author:
Domenico Talia

01-12-2019 | Research | Issue 1/2019 Open Access

An algorithm to optimize deployment of charging base stations for WRSN

Optimizing deployment of charging base stations in wireless rechargeable sensor networks can considerably reduce the cost. Previously, the charging base stations are simply installed at some fixed special points (e.g., the grid points) after …

Authors:
Peng Wan, Yuhua Cheng, Baoyu Wu, Gaofeng Wang

01-12-2019 | Research | Issue 1/2019 Open Access

An agile and effective network function virtualization infrastructure for the Internet of Things

The processing and power-consumption constraints of the Internet of Things devices hinder them to offer more complex network services than the simple data transmission in smart city scenarios. The lack of complex services, such as security and …

Authors:
Diogo Menezes Ferrazani Mattos, Pedro Braconnot Velloso, Otto Carlos Muniz Bandeira Duarte

01-12-2019 | Survey paper | Issue 1/2019 Open Access

On the sustainability of smart and smarter cities in the era of big data: an interdisciplinary and transdisciplinary literature review

There has recently been a conscious push for cities across the globe to be smart and even smarter and thus more sustainable by developing and implementing big data technologies and their applications across various urban domains in the hopes of …

Author:
Simon Elias Bibri

01-12-2019 | Research | Issue 1/2019 Open Access

Compatibility enhancement and performance measurement for socket interface with PCIe interconnections

Today the key technology of high-performance computing systems is the emergence of interconnect technology that makes multiple computers into one computer cluster. This technique is a general method in which each constituent node processes its own …

Authors:
Cheol Shim, Rupali Shinde, Min Choi

01-12-2019 | Research | Issue 1/2019 Open Access

Hierarchical data fusion for Smart Healthcare

The Internet of Things (IoT) facilitates creation of smart spaces by converting existing environments into sensor-rich data-centric cyber-physical systems with an increasing degree of automation, giving rise to Industry 4.0. When adopted in …

Authors:
Rustem Dautov, Salvatore Distefano, Rajkumaar Buyya

01-12-2019 | Research | Issue 1/2019 Open Access

Efficient resource provisioning for elastic Cloud services based on machine learning techniques

Automated resource provisioning techniques enable the implementation of elastic services, by adapting the available resources to the service demand. This is essential for reducing power consumption and guaranteeing QoS and SLA fulfillment …

Authors:
Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo, Ignacio M. Llorente

01-12-2019 | Research | Issue 1/2019 Open Access

Building consumer trust in the cloud: an experimental analysis of the cloud trust label approach

The lack of transparency surrounding cloud service provision makes it difficult for consumers to make knowledge based purchasing decisions. As a result, consumer trust has become a major impediment to cloud computing adoption. Cloud Trust Labels …

Authors:
Lisa van der Werff, Grace Fox, Ieva Masevic, Vincent C. Emeakaroha, John P. Morrison, Theo Lynn

01-12-2019 | Research | Issue 1/2019 Open Access

Enhanced Secured Map Reduce layer for Big Data privacy and security

The publication and dissemination of raw data are crucial elements in commercial, academic, and medical applications. With an increasing number of open platforms, such as social networks and mobile devices from which data may be collected, the …

Authors:
Priyank Jain, Manasi Gyanchandani, Nilay Khare

01-12-2019 | Research | Issue 1/2019 Open Access

Managing to release early, often and on time in the OpenStack software ecosystem

The dictum of “Release early, release often.” by Eric Raymond as the Linux modus operandi highlights the importance of release management in open source software development. However, there are very few empirical studies addressing release …

Authors:
José Apolinário Teixeira, Helena Karsten

01-12-2019 | Research | Issue 1/2019 Open Access

Internet usage, innovation and human development nexus in Africa: the case of ECOWAS

Internet usage and the sporadic rise in the level of innovations have been major drivers of human progress in the last decades. These leaps in human intelligence have affected almost every area of human endeavour including education, health …

Authors:
Jeremiah O. Ejemeyovwi, Evans S. Osabuohien, Olawale D. Johnson, Ebenezer I. K. Bowale

01-12-2019 | Original Article | Issue 1/2019

Melanoma risk modeling from limited positive samples

The key to effective cancer treatment is early detection. Risk models built from routinely collected clinical data have the opportunity to improve early detection by identifying high-risk patients. In this study, we explored various machine …

Authors:
Aaron N. Richter, Taghi M. Khoshgoftaar

01-12-2019 | Research | Issue 1/2019 Open Access

Energy efficient edge-of-things

Edge-of-Things (EoT) emerged as a novel computing and storage paradigm to overcome the limitations of IoT-cloud environment by providing cloud-like services at edge of the network. EoT offers a vast area for research and development as the …

Authors:
Asfa Toor, Saif ul Islam, Ghufran Ahmed, Sohail Jabbar, Shehzad Khalid, Abdullahi Mohamud Sharif

01-12-2019 | Research | Issue 1/2019 Open Access

Performance bottleneck analysis and resource optimized distribution method for IoT cloud rendering computing system in cyber-enabled applications

This paper analyzes current cloud computing, cloud rendering industry, and related businesses. In this field, cloud system performance lacks unified evaluation criterion. A novel analysis method and a related measure of cloud rendering system …

Authors:
Ronghe Wang, Bo Zhang, Manqing Wu, Jun Zhang, Xiaolei Guo, Xinhai Zhang, Huibo Li, Dong Jiao, Shilong Ma

01-12-2019 | Research | Issue 1/2019 Open Access

On construction of a cloud storage system with heterogeneous software-defined storage technologies

With the rapid development of networks and Information technologies, cloud computing is not only becoming popular, the types of cloud services available are also increasing. Through cloud services, users can upload their requirements via the …

Authors:
Chao-Tung Yang, Shuo-Tsung Chen, Yu-Wei Chan, Yu-Chuan Shen

01-12-2019 | Research | Issue 1/2019 Open Access

Improved multiobjective salp swarm optimization for virtual machine placement in cloud computing

In data center companies, cloud computing can host multiple types of heterogeneous virtual machines (VMs) and provide many features, including flexibility, security, support, and even better maintenance than traditional centers. However, some …

Authors:
Shayem Saleh Alresheedi, Songfeng Lu, Mohamed Abd Elaziz, Ahmed A. Ewees

01-12-2019 | Theoretical article | Issue 1/2019 Open Access

The quality management ecosystem for predictive maintenance in the Industry 4.0 era

The Industry 4.0 era requires new quality management systems due to the ever increasing complexity of the global business environment and the advent of advanced digital technologies. This study presents new ideas for predictive quality management …

Authors:
Sang M. Lee, DonHee Lee, Youn Sung Kim

01-12-2019 | Research | Issue 1/2019 Open Access

Utilization and load balancing in fog servers for health applications

With the evolution of fog computing, processing takes place locally in a virtual platform rather than in a centralized cloud server. Fog computing combined with cloud computing is more efficient as fog computing alone does not serve the purpose.

Authors:
Hasan Ali Khattak, Hafsa Arshad, Saif ul Islam, Ghufran Ahmed, Sohail Jabbar, Abdullahi Mohamud Sharif, Shehzad Khalid

01-12-2019 | Research | Issue 1/2019 Open Access

A semantic-based discovery service for the Internet of Things

With the Internet of Things (IoT), applications should interact with a huge number of devices and retrieve context data produced by those objects, which have to be discovered and selected a priori. Due to the number, heterogeneity, and dynamicity …

Authors:
Porfírio Gomes, Everton Cavalcante, Thais Batista, Chantal Taconet, Denis Conan, Sophie Chabridon, Flavia C. Delicato, Paulo F. Pires

01-12-2019 | Research | Issue 1/2019 Open Access

A placement architecture for a container as a service (CaaS) in a cloud environment

Unlike a traditional virtual machine (VM), a container is an emerging lightweight virtualization technology that operates at the operating system level to encapsulate a task and its library dependencies for execution. The Container as a Service …

Authors:
Mohamed K. Hussein, Mohamed H. Mousa, Mohamed A. Alqarni

01-12-2019 | Research | Issue 1/2019 Open Access

An energy saving based on task migration for mobile edge computing

Mobile edge computing (MEC), as the key technology to improve user experience in a 5G network, can effectively reduce network transmission delay. Task migration can migrate complex tasks to remote edge servers through wireless networks, solving …

Authors:
Yichuan Wang, He Zhu, Xinhong Hei, Yue Kong, Wenjiang Ji, Lei Zhu

01-12-2019 | Research | Issue 1/2019 Open Access

An intelligent wireless channel allocation in HAPS 5G communication system based on reinforcement learning

Channel allocation is the prerequisite for the HAPS (high-altitude platform station) 5G communication network to transmit information. An intelligent wireless channel allocation algorithm for HAPS 5G massive MIMO (multiple-input multiple-output) …

Authors:
Mingxiang Guan, Zhou Wu, Yingjie Cui, Xuemei Cao, Le Wang, Jianfeng Ye, Bao Peng

01-12-2019 | Research | Issue 1/2019 Open Access

Virtual machine scheduling strategy based on machine learning algorithms for load balancing

With the rapid increase of user access, load balancing in cloud data center has become an important factor affecting cluster stability. From the point of view of green scheduling, this paper proposed a virtual machine intelligent scheduling …

Authors:
Xin Sui, Dan Liu, Li Li, Huan Wang, Hongwei Yang

01-07-2019 | Issue 7/2019

Experimental demonstration of the violations of Mermin’s and Svetlichny’s inequalities for W and GHZ states

Violation of Mermin’s and Svetlichny’s inequalities can rule out the predictions of local hidden variable theory and can confirm the existence of true nonlocal correlation for n-particle pure quantum systems ( $${n} \ge 3$$ n ≥ 3 ). Here we …

Authors:
Manoranjan Swain, Amit Rai, Bikash K. Behera, Prasanta K. Panigrahi

01-07-2019 | Schwerpunkt | Issue 7/2019

Methoden: ,,Secured by definition‘‘ und die Umsetzung von Prinzipien aus dem Qualitätsmanagement

Durchgängige IT-Sicherheit durch Integration in die IT-Produktionsprozesse

IT-Sicherheit funktioniert nicht als heilendes Pflaster, das nachträglich verordnet und zur Anwendung gebracht wird. Und natürlich muss man die Sicherheit schon ganz zu Anfang im Auge haben (,,security by design‘‘). Doch das ist nicht ausreichend …

Author:
Prof. Dr. Eberhard von Faber

01-07-2019 | Schwerpunkt | Issue 7/2019

Die Lücke: Informationssicherheit in Systemen mit künstlicher Intelligenz

Wie Algorithmen und künstliche Intelligenz zur Gefahr für die IT-Sicherheit werden

Alle bekannten Maßnahmen und Methoden für die IT-Sicherheit beruhen auf der Definition eines Soll-Zustandes, der Kontrolle des Ist-Zustandes und dem gezielten, korrigierenden Eingriff. Aber dies sind nicht die einzigen Annahmen für eine …

Authors:
Prof. Dr. Eberhard von Faber, Arndt Kohler

01-07-2019 | Schwerpunkt | Issue 7/2019

Architekturen: Sicherheit im Internet der Dinge (IoT)

Ein sicheres IoT erfordert neue Denkweisen

IoT-Systeme sind immer mehr Bestandteil unseres täglichen Lebens, ob zum Energiesparen in den Gebäuden, in denen wir arbeiten, zur Steuerung in den Autos, die wir fahren, oder bei uns zu Hause, wo unser Kühlschrank uns darauf aufmerksam macht …

Author:
Dr. Angelika Steinacker

01-07-2019 | Schwerpunkt | Issue 7/2019

Kriterien: Wie Security auch für Safety verantwortlich wird

Safety-Inseln im Security-Komplex

Nahe Fukushima schien ein Atomkraftwerk seiner wesentlichsten Safety-Aufgabe nicht gerecht geworden zu sein: Durch die explodierenden Druckbehälter wurden Tausende strahlengeschädigt, die Umgebung ist für Jahrzehnte unbewohnbar geworden. Und wenn …

Authors:
Dr. Ivo Keller, Prof. Dr. Friedrich-L. Holl

17-06-2019

Methodology and optimization for implementing cluster-based parallel geospatial algorithms with a case study

Cluster-based parallel computing technology has been widely used in the geosciences. However, how to implement the corresponding parallel algorithm in a simple way, and how to make parallel algorithms more efficient and effective, are still of …

Authors:
Fang Huang, Bo Tie, Jian Tao, Xicheng Tan, Yan Ma

17-06-2019 | Original Article

A comprehensive survey of AR/MR-based co-design in manufacturing

For more than 2 decades, Augmented Reality (AR)/Mixed Reality (MR) has received an increasing amount of attention by researchers and practitioners in the manufacturing community, because it has applications in many fields, such as product design …

Authors:
Peng Wang, Shusheng Zhang, Mark Billinghurst, Xiaoliang Bai, Weiping He, Shuxia Wang, Mengmeng Sun, Xu Zhang

17-06-2019

Computation offloading for multimedia workflows with deadline constraints in cloudlet-based mobile cloud

In recent years, mobile applications have become more demanding on device performance, especially for the multimedia applications. As the battery capacity and computing performance of mobile devices gradually fails to meet the needs of mobile …

Authors:
Tao Huang, Feng Ruan, Shengjun Xue, Lianyong Qi, Yucong Duan

17-06-2019

Scalable replica selection based on node service capability for improving data access performance in edge computing environment

The replica strategies in traditional cloud computing often result in excessive resource consumption and long response time. In the edge cloud environment, if the replica node cannot be managed efficiently, it will cause problems such as low …

Authors:
Chunlin Li, Jianhang Tang, Youlong Luo

17-06-2019

CDABC: chaotic discrete artificial bee colony algorithm for multi-level clustering in large-scale WSNs

Artificial bee colony or ABC is an interesting meta-heuristic algorithm designed to solve various continuous optimization problems. However, it cannot be directly applied to solve discrete problems such as clustering of sensor nodes in the …

Authors:
Mohammad Masdari, Saeid Barshande, Suat Ozdemir

15-06-2019

Strategic management perspectives on supply chain

In the second decade of the twenty-first century, supply chain management (SCM) practices have gained an increasingly strategic character. The focus has shifted from an operational perspective to a strategic one, and SCM is repeatedly cited in the …

Authors:
Goknur Arzu Akyuz, Guner Gursoy

14-06-2019

Design of Retrievable Data Perturbation Approach and TPA for Public Cloud Data Security

In cloud computing, privacy is turn out to be the foremost difficulty. Therefore, this document is used to develop the cloud data defense by the help of an efficient data perturbation method. In the anticipated data perturbation method, the …

Authors:
Lalit Kumar, Vinay Rishiwal

14-06-2019

Parallel computing in bioinformatics: a view from high-performance, heterogeneous, and cloud computing

Bioinformatics allows and encourages the application of many different parallel computing approaches. This special issue brings together high-quality state-of-the-art contributions about parallel computing in bioinformatics, from different points …

Authors:
Miguel A. Vega-Rodríguez, Sergio Santander-Jiménez

14-06-2019

Cloud–SPHERE: Towards Secure UAV Service Provision

Unmanned Aerial Vehicles (UAVs) are gaining popularity in many fields and have now increased connectivity. Among others, security is considered one of the greatest challenges for UAV technology acceptance from the general public, more so when the …

Authors:
Mariana Rodrigues, Kalinka Regina Lucas Jaquie Castelo Branco

13-06-2019

A new efficient approach for extracting the closed episodes for workload prediction in cloud

The prediction of the future workload of applications is an essential step guiding resource provisioning in cloud environments. In our previous works, we proposed two prediction models based on pattern mining. This paper builds on our previous …

Authors:
Maryam Amiri, Leyli Mohammad-Khanli, Raffaela Mirandola

12-06-2019

Conceptual model for informing user with innovative smart wearable device in industry 4.0

The everyday needs of people with disabilities represent a challenge in designing new and innovative services. The capabilities provided by modern communication technologies designed by assistive technology models can help people with disabilities …

Authors:
Marko Periša, Tibor Mijo Kuljanić, Ivan Cvitić, Peter Kolarovszki

12-06-2019

Priority-based task scheduling method over cloudlet using a swarm intelligence algorithm

In a cloud environment, scheduling problem as an NP-complete problem can be solved using various metaheuristic algorithms. The metaheuristic algorithms are very popular for scheduling tasks because of their effectiveness. A bacterial foraging is a …

Authors:
Sara Tabagchi Milan, Lila Rajabion, Aso Darwesh, Mehdi Hosseinzadeh, Nima Jafari Navimipour

11-06-2019 Open Access

COWCache: effective flash caching for Copy-on-Write virtual disks

Host-side flash caching emerges as an effective solution for improving the performance of virtual machines (VMs) in cloud computing environment. However, for VMs with the commonly used Copy-on-Write (COW) virtual disks, flash caching in fact has …

Authors:
Jianyu Fu, Youyou Lu, Jiwu Shu, Guangming Liu, Ming Zhao

11-06-2019

A comprehensive and systematic review of the load balancing mechanisms in the Internet of Things

The Internet of Things (IoT) is a network of different objects that refers to an environment in which intelligent devices around us can connect to the Internet and exchange information together. A large number of generated events from IoT objects …

Authors:
Behrouz Pourghebleh, Vahideh Hayyolalam

11-06-2019

VPPE: A Novel Visual Parallel Programming Environment

Parallel programming continues to be a challenging task despite the many advances in parallel architectures and their wide availability in the cloud. The need both to partition the workload among various processing elements and to specify …

Authors:
José L. Quiroz-Fabián, Graciela Román-Alonso, Miguel A. Castro-García, Jorge Buenabad-Chávez, Azzedine Boukerche, Manuel Aguilar-Cornejo

11-06-2019

Counting time in drops: views on the role and importance of smartwatches in dew computing

A large amount of data, called the big data, generated by the devices that are part of the Internet of Things, is expected in the coming years. This scenario creates challenges for sending, processing, and storing all data centrally in the cloud.

Authors:
Charles Tim Batista Garrocho, Ricardo Augusto Rabelo Oliveira

11-06-2019

IoT-F2N: An energy-efficient architectural model for IoT using Femtolet-based fog network

Energy- and latency-optimized Internet of Things (IoT) is an emerging research domain within fifth-generation (5G) wireless network paradigm. In traditional cloud-centric IoT the sensor data processing and storage occurs inside remote cloud …

Authors:
Anwesha Mukherjee, Priti Deb, Debashis De, Rajkumar Buyya

10-06-2019 | Original Article

Non-artificial non-intelligence: Amazon’s Alexa and the frictions of AI

This paper examines a case where Amazon’s cloud-based AI assistant Alexa accidentally ordered a dollhouse for a 6-year-old girl. In the press, the case was defined as a technical recognition problem. Building on this idea, we argue that the …

Authors:
Tero Karppi, Yvette Granata

10-06-2019

SAVE: self-adaptive consolidation of virtual machines for energy efficiency of CPU-intensive applications in the cloud

In virtualized data centers, consolidation of virtual machines (VMs) on minimizing the number of total physical machines (PMs) has been recognized as a very efficient approach. This paper considers the energy-efficient consolidation of VMs in a …

Authors:
Wenxia Guo, Ping Kuang, Yaqiu Jiang, Xiang Xu, Wenhong Tian

10-06-2019 | Real-world Optimization Problems and Meta-heuristics

PSO-based novel resource scheduling technique to improve QoS parameters in cloud computing

Cloud computing provides infinite resources and various services for the execution of variety of applications to end users, but still it has various challenges that need to be addressed. Objective of cloud users is to select the optimal resource …

Authors:
Mohit Kumar, S. C. Sharma

10-06-2019 | Original Article

Holding maximum customers in cloud business environment by efficient load balancing methods based on MPSO-MC

As is well-known Cloud is an Environment for sharing resources based on Anything as a Service (XaaS) pattern that includes software, platform, infrastructure, storage, etc. on demand. For allocating resources and managing it efficiently, the load …

Authors:
P. Sundaramoorthy, M. Selvam, S. Karthik, K. Srihari

08-06-2019

The survey on ARM processors for HPC

The ongoing effort to reach the exascale computing barrier has led to a myriad of research and publications in the topic of alternative energy-efficient architectures, such as ARM, for HPC systems. The staggering pace at which ARM architectures …

Authors:
Daniel Yokoyama, Bruno Schulze, Fábio Borges, Giacomo Mc Evoy

08-06-2019

Multimedia intelligent fog computing scheme based on robust perception for complex networks

The dynamic topology of complex networks, the randomness of environmental noise and the uncertainty of data links make it difficult to guarantee the quality of multimedia services. This paper combines synchronization control, robustness perception …

Author:
Lu Liu

07-06-2019 Open Access

Economic impact of energy saving techniques in cloud server

In recent years, lot of research has been carried in the field of cloud computing and distributed systems to investigate and understand their performance. Economic impact of energy consumption is of major concern for major companies. Cloud …

Authors:
Bilal Ahmad, Zaib Maroof, Sally McClean, Darryl Charles, Gerard Parr

07-06-2019

A survey on software aging and rejuvenation in the cloud

The adoption of cloud computing for providing resource and delivering services is an irreversible trend. For most IT companies, the quality of provided services is strongly dependent on reliability and performance of the underlying cloud …

Authors:
Roberto Pietrantuono, Stefano Russo

07-06-2019

An efficient energy-aware method for virtual machine placement in cloud data centers using the cultural algorithm

Excessive consumption of energy in cloud data centers whose number is increasing day by day has led to substantial problems. Hence, offering efficient schemes for virtual machine (VM) placement to decrease energy consumption in cloud computing …

Authors:
Mahdieh Mohammadhosseini, Abolfazl Toroghi Haghighat, Ebrahim Mahdipour

06-06-2019

Artificial intelligence and big data in entrepreneurship: a new era has begun

While the disruptive potential of artificial intelligence (AI) and big data has been receiving growing attention and concern in a variety of research and application fields over the last few years, it has not received much scrutiny in contemporary …

Authors:
Martin Obschonka, David B. Audretsch

06-06-2019

Novel approach for detection of IoT generated DDoS traffic

The problem of detecting anomalies in network traffic caused by the distributed denial of service (DDoS) attack so far has mainly been investigated in terms of detection of illegitimate DDoS traffic generated by conventional terminal devices (PCs …

Authors:
Ivan Cvitić, Dragan Peraković, Marko Periša, Mate Botica

06-06-2019 | Original Research Paper

Service description languages in cloud computing: state-of-the-art and research issues

The continuous growth of cloud computing environment is supported by the automated provisioning of cloud services, which allows cloud users to dynamically procure and deploy their required services over the internet. However, to describe key …

Authors:
Falak Nawaz, Ahmad Mohsin, Naeem Khalid Janjua

06-06-2019

Role-based policy to maintain privacy of patient health records in cloud

Modern healthcare system collects health information from health assisted gadgets of different sources and stores them in the cloud storage servers as an electronic record called the patients health records (PHR) and ensures the availability …

Authors:
Akshay Tembhare, S. Sibi Chakkaravarthy, D. Sangeetha, V. Vaidehi, M. Venkata Rathnam

06-06-2019 | Thematic Section: 5th World Congress on Integrated Computational Materials Engineering | Issue 2/2019

Cloud-Based Materials and Product Realization—Fostering ICME Via Industry 4.0

Facilitating integrated computational materials engineering (ICME) in the digitized world necessitates facilitating a network of participants (material scientists, systems designers, software developers, service customers) to share …

Authors:
Anand Balu Nellippallil, Zhenjun Ming, Janet K. Allen, Farrokh Mistree

05-06-2019 | ORIGINAL ARTICLE Open Access

From a literature review to a conceptual framework of enablers for smart manufacturing control

When cyber-physical systems (CPS) are connected to perform smart manufacturing, we have a cyber-physical production system (CPPS). In such systems, CPS collaborate in an intelligent way to obtain and maintain the optimum of the manufacturing …

Authors:
Rafael A. Rojas, Erwin Rauch

05-06-2019

SLA-RALBA: cost-efficient and resource-aware load balancing algorithm for cloud computing

Recently, Service-level agreement (SLA) is deemed to be an integral aspect for on-demand provisioning of scalable resources on Cloud. SLA defines important constraints for instance guaranteed quality of service (QoS), pricing, fault-tolerant …

Authors:
Altaf Hussain, Muhammad Aleem, Muhammad Azhar Iqbal, Muhammad Arshad Islam

05-06-2019

Simplifying and implementing service level objectives for stream parallelism

An increasing attention has been given to provide service level objectives (SLOs) in stream processing applications due to the performance and energy requirements, and because of the need to impose limits in terms of resource usage while improving …

Authors:
Dalvan Griebler, Adriano Vogel, Daniele De Sensi, Marco Danelutto, Luiz G. Fernandes

05-06-2019

Making Sense of Enterprise Apps in Everyday Work Practices

This paper draws attention to the growing adoption of web and mobile apps in the enterprise, typically supported by digital storage in the cloud. While these developments offer several advantages, they also pose challenges for workers who must …

Authors:
Christine T. Wolf, Jeanette L. Blomberg

05-06-2019 | Original Paper Open Access

A Micro-ethnographic Study of Big Data-Based Innovation in the Financial Services Sector: Governance, Ethics and Organisational Practices

Our study considers the governance, ethics and operational challenges associated with the acquisition, manipulation and commodification of ‘big data’ in the financial services sector. To the best of our knowledge, there are no published studies …

Authors:
Keren Naa Abeka Arthur, Richard Owen

04-06-2019

An energy-aware scheduling algorithm for big data applications in Spark

Energy consumption is explosive increasing with the fast growth of big data applications. High carbon emissions from big data platforms have serious impacts on environment. In this paper, we propose an energy-aware scheduling algorithm for Spark …

Authors:
Hongjian Li, Huochen Wang, Shuyong Fang, Yang Zou, Wenhong Tian

03-06-2019 | Focus

Application of cloud-based visual communication design in Internet of Things image

In order to apply cloud computing to study visual communication design, high-resolution remote sensing image features and applications were analyzed. A high-resolution remote sensing image storage model in the cloud computing environment was …

Author:
Xixia Liu

03-06-2019 | Focus

Analysis of multi-level capital market linkage driven by artificial intelligence and deep learning methods

Artificial intelligence has a very wide application in modern society. Deep learning algorithms promote the development of artificial intelligence industry. The development of artificial intelligence industry needs the support of capital market.

Authors:
Xinxin Jing, Pin Peng, Zhe Huang

03-06-2019

Transient fault aware application partitioning computational offloading algorithm in microservices based mobile cloudlet networks

Mobile Cloudlet Computing paradigm (MCC) allows execution of resource-intensive mobile applications using computation cloud resources by exploiting computational offloading method for resource-constrained mobile devices. Whereas, computational …

Authors:
Abdullah Lakhan, Xiaoping Li

03-06-2019

Cloud resource management using 3Vs of Internet of Big data streams

Internet of things (IoT) allows various smart devices to get connected to anything, anywhere, and at anytime. The ubiquitous nature of IoT devices generates huge volume of data called Internet of Big data (IoBd). IoBd is generated in continuous …

Authors:
Navroop Kaur, Sandeep K. Sood, Prabal Verma

03-06-2019 | ORIGINAL ARTICLE

Research on sharing manufacturing in Chinese manufacturing industry

This paper provides some reasons for the slow development of shared manufacturing in China. The concept, research status, and significance of shared manufacturing are introduced. The paper first gives the sharing mode of China’s sharing …

Authors:
Jiabo He, Jin Zhang, Xinjian Gu

03-06-2019

First-Principles Study of Electronic Structure and Optical Properties of La-Doped AlN

As a wide-bandgap semiconductor material with small dielectric constant and good thermal stability, aluminium nitride (AlN) can theoretically emit light in the deep ultraviolet wavelength region, so it is important in expanding the response of AlN …

Authors:
Kun Wang, Qingquan Xiao, Quan Xie, Li Wang, Teng He, Hao Chen, Jiaona Shi

03-06-2019 | Original Paper

Emotional domotics: a system and experimental model development for UX implementations

The Emotional Domotics (home automation) is a concept that has been one of the main focus of our research team seeks to integrate the subject or user of an inhabitable space as central element for the modulation and control of the environmental …

Authors:
Sergio A. Navarro-Tuch, Ariel A. Lopez-Aguilar, M. Rogelio Bustamante-Bello, Arturo Molina, Javier Izquierdo-Reyes, Luis A. Curiel Ramirez

03-06-2019 | Special Issue

A new framework to locate, connect and share mobile web services through intelligence techniques

The advancement in mobile technology is taking place at very high speed, especially in the case of smart devices. In recent years, the use of mobile phones has changed the life style of common people. As days pass, new and better technologies are …

Authors:
Roshan Fernandes, G. L. Rio D’Souza, Anisha P. Rodrigues

01-06-2019 | Issue 6/2019

Demonstration of the no-hiding theorem on the 5-Qubit IBM quantum computer in a category-theoretic framework

The quantum no-hiding theorem, first proposed by Braunstein and Pati (Phys Rev Lett 98:080502, 2007), was verified experimentally by Samal et al. (Phys Rev Lett 186:080401, 2011) using NMR quantum processor. Till then, this fundamental test has …

Authors:
Amolak Ratan Kalra, Navya Gupta, Bikash K. Behera, Shiroman Prakash, Prasanta K. Panigrahi

01-06-2019 | Control Sciences | Issue 6/2019

The Problem of the Optimal Placing of the Information-Technological Reserve in Distributed Data Processing Systems

It is noted, that information-technological reserve is a new type of information redundancy, the use of which in distributed automated informational control systems allows to increase the efficiency of their performance while processing the …

Author:
S. K. Somov

01-06-2019 | Schwerpunkt | Issue 3/2019

Inseln zur Exzellenz

Südafrika: Ein gehypter Hub für digitale Dienste hat sich hier heimlich entwickelt. Allerdings haben Personal-Manager dadurch echte Herausforderungen zu meistern.

Author:
Claudia Bröll

01-06-2019 | Original Research Paper

Auto-scaling for real-time stream analytics on HPC cloud

There are very-high-volume streaming data in the cyber world today. With the popularization of 5G technology, the streaming Big Data grows larger. Moreover, it needs to be analyzed in real time. We propose a new strategy HPC2-ARS to enable …

Authors:
Yingchao Cheng, Zhifeng Hao, Ruichu Cai

01-06-2019

QoS provisioning framework for service-oriented internet of things (IoT)

The proliferation of ubiquitous sensing technology is bringing a rising number of the innovative models that have unique characteristics of the utility computing. These models have offered great opportunities to improve IT industries and business …

Authors:
Mahmoud M. Badawy, Zainab H. Ali, Hesham A. Ali

01-06-2019 Open Access

Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud

Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource-constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited …

Authors:
Saqib Rasool, Muddesar Iqbal, Tasos Dagiuklas, Zia Ul-Qayyum, Shancang Li

01-06-2019 | 3DR Express | Issue 2/2019

LGSA: Hybrid Task Scheduling in Multi Objective Functionality in Cloud Computing Environment

Cloud computing turns to be a big shift from the conventional perception of the IT resources. It is a transpiring computing technology that is increasingly stabling itself as the promising future of distributed on-demand computing. The processes …

Authors:
N. Manikandan, A. Pravin

01-06-2019 | Hauptbeiträge | Special Issue 1/2019

Zum Wandel der wissenschaftlichen Wissensproduktion durch Big Data: Welche Rolle spielt Citizen Science?

Mit der fortschreitenden Digitalisierung wie der Verbreitung von Web-2.0-Technologien, mobilen Endgeräten oder Cloud-Computing sind in den letzten Jahren Kollaborationsformen jenseits klassischer Organisations- und Professionsgrenzen entstanden.

Author:
Martina Franzen

30-05-2019 | Focus

Online sequential pattern mining and association discovery by advanced artificial intelligence and machine learning techniques

With the advances in information science, vast amounts of financial time series data can been collected and analyzed. In modern time series analysis, sequential pattern mining (SPM) and association discovery (AD) are the most important techniques …

Authors:
Shian-Chang Huang, Chei-Chang Chiou, Jui-Te Chiang, Cheng-Feng Wu

29-05-2019

A Scalable Platform for Monitoring Data Intensive Applications

Latest advances in information technology and the widespread growth in different areas are producing large amounts of data. Consequently, in the past decade a large number of distributed platforms for storing and processing large datasets have …

Authors:
Ioan Drăgan, Gabriel Iuhasz, Dana Petcu

29-05-2019 | Original Paper

The social network analysis on the behavioral intention to use cloud sphygmomanometer

Previous studies on the new information technology focused on the system development and could computing in health care. However, with rapid development of information systems, discussion on the cloud computing for health management should not be …

Author:
Yi-Horng Lai

29-05-2019 | Research Article -Computer Engineering and Computer Science

An Effective Mechanism for Selection of a Cloud Service Provider Using Cosine Maximization Method

With the emergence of the cloud computing paradigm, important issues have arisen, which need to be addressed to widen cloud computing adoption. It relates technical, legal and economic issues between cloud service providers and users to the …

Author:
Mohammed Alshehri

29-05-2019 | Original Research Paper

Locality sensitive request distribution for fog and cloud servers

Fog computing is meant to bring the cloud resource closer to the edge of the Internet so that devices can access the back end services much faster. Additionally, the services hosted at the fogs can be customized to fit the local needs. Because …

Authors:
Olamilekan Fadahunsi, Muthucumaru Maheswaran

29-05-2019

Joint Downlink and Uplink Edge Computing Offloading in Ultra-Dense HetNets

The deployment of ultra-dense heterogeneous networks (HetNets) are envisioned as the essentials to embrace of intelligent applications for the next-generation wireless networks. For ultra-dense HetNets, the small scale heterogeneous edge servers …

Authors:
Jie Zheng, Ling Gao, Hai Wang, Xiaoya Li, Pengfei Xu, Lin Wang, Bo Jiang, Xudong Yang

28-05-2019

What’s Happening Around the World? A Survey and Framework on Event Detection Techniques on Twitter

In the last few years, Twitter has become a popular platform for sharing opinions, experiences, news, and views in real-time. Twitter presents an interesting opportunity for detecting events happening around the world. The content (tweets) …

Authors:
Zafar Saeed, Rabeeh Ayaz Abbasi, Onaiza Maqbool, Abida Sadaf, Imran Razzak, Ali Daud, Naif Radi Aljohani, Guandong Xu

27-05-2019 | Regular Paper

Lifetime-aware solid-state disk (SSD) cache management for video servers

Solid-state disks (SSDs) are now being used as enterprise storage servers owing to their technical merits such as low power consumption, shock resistance, and excellent random read performance. To handle the large storage requirements for video …

Authors:
Jungwoo Lee, Hwangje Han, Sungjin Lee, Minseok Song

25-05-2019 | Technical Paper

Design of a public services platform for university management based on microservice architecture

With the booming development of mobile computing, cloud computing and complex business scales, cloud service platforms based on distributed architecture are urgently required. As higher education has rapidly expanded in the last decade, many …

Authors:
Liming Huang, Chenchen Zhang, Zhihong Zeng

25-05-2019 | Original Paper

A survey on role of photonic technologies in 5G communication systems

A new generation of mobile communications has been evolving for every 10 years, keeping in mind the enormous data traffic, huge capacity requirements, excellent quality of service with minimal latency; there is a shift in paradigm toward the …

Authors:
Rohan Katti, Shanthi Prince

25-05-2019

Efficient Hybrid-Supervised Deep Reinforcement Learning for Person Following Robot

Traditional person following robots usually need hand-crafted features and a well-designed controller to follow the assigned person. Normally it is difficult to be applied in outdoor situations due to variability and complexity of the environment.

Authors:
Linzhuo Pang, Yunzhou Zhang, Sonya Coleman, He Cao

25-05-2019

A lightweight and cost effective edge intelligence architecture based on containerization technology

The integration of Cloud computing and Internet of Things led to rapid growth in the edge computing field. This would not be achievable without combining the data centers’ managing systems with much more restrained technologies. One significantly …

Authors:
Mabrook Al-Rakhami, Abdu Gumaei, Mohammed Alsahli, Mohammad Mehedi Hassan, Atif Alamri, Antonio Guerrieri, Giancarlo Fortino

24-05-2019 | ORIGINAL ARTICLE

Defending against product-oriented cyber-physical attacks on machining systems

Industry 4.0 and its related technologies (e.g., embedded sensing, internet-of-things, and cyber-physical systems) are promising a paradigm shift in manufacturing automation. However, with a continual increase in device interconnectivity, securing …

Authors:
Mohammed S. Shafae, Lee J. Wells, Gregory T. Purdy

24-05-2019 | Foundations

Improvement of an outsourced attribute-based encryption scheme

Attribute-based encryption (ABE) scheme has become an important technology in cryptography. However, the considerable overhead of encryption and decryption restricts its application on the devices with limited resource. Fortunately, as the …

Authors:
Hongjie Chen, Yongjian Liao

23-05-2019 | Special Issue

Design and analysis of behaviour based DDoS detection algorithm for data centres in cloud

In the recent years, security is the major concern in cloud computing. One of the major security threats to the cloud is distributed denial of service (DDoS). This DDoS attacks results in data corruption, losing of sensitive information and leads …

Authors:
Qubeb Shaik Mohammed Penukonda, Ilango Paramasivam

23-05-2019 | Regular Paper

Prescriptive analytics: a survey of emerging trends and technologies

This paper provides a survey of the state-of-the-art and future directions of one of the most important emerging technologies within business analytics (BA), namely prescriptive analytics (PSA). BA focuses on data-driven decision-making and …

Authors:
Davide Frazzetto, Thomas Dyhre Nielsen, Torben Bach Pedersen, Laurynas Šikšnys

23-05-2019

ICT-related training and support Programmes for information professionals

This paper, which seeks to investigate ICT-related training and support programmes for information professionals, becomes essential due to multifarious tasks that require adequate ICT skills, knowledge and application in a dynamic context to …

Author:
Rexwhite Tega Enakrire

23-05-2019

Recent Studies on Chicken Swarm Optimization algorithm: a review (2014–2018)

Solving a complex optimization problem in a limited timeframe is a tedious task. Conventional gradient-based optimization algorithms have their limitations in solving complex problems such as unit commitment, microgrid planning, vehicle routing …

Authors:
Sanchari Deb, Xiao-Zhi Gao, Kari Tammi, Karuna Kalita, Pinakeswar Mahanta

23-05-2019 | Issue 3/2019

Algorithms for Solving Problems of Cryptographic Protection of Color Image Pixels in the Rademacher’s Basis and Residue Number Systems

This paper substantiates the urgency of developing theoretical foundations, methods, and algorithms for cryptographic protection of color image pixels using problem-oriented multifunctional data structuring and representing codes of color image …

Authors:
N. Y. Vozna, Y. M. Nykolaychuk, O. I. Volynskyi

23-05-2019 | Issue 3/2019

Blockchain Technology: Issues of Analysis and Synthesis

The role of the blockchain technology in decentralizing modern information systems is discussed. A general model of functioning a blockchain system is analyzed and the idea of constructing a new type of consensus protocols (“proof-of-accuracy” …

Authors:
A. M. Kudin, B. A. Kovalenko, I. V. Shvidchenko

22-05-2019 | Original Article

Extraction of non-functional requirement using semantic similarity distance

Functional and non-functional requirements are important equally in software development. Usually, the requirements are expressed in natural languages. The functional and non-functional requirements are written inter-mixed in software requirement …

Authors:
Muhammad Younas, D. N. A. Jawawi, Imran Ghani, Muhammad Arif Shah

22-05-2019 | Focus

On construction of the air pollution monitoring service with a hybrid database converter

Air pollution has a severe impact on human health, pollution harms human health, and people start to pay attention to how to use the monitoring system in real-time recording for analysis. To maintain smooth monitoring and analysis, we have to …

Authors:
Chao-Tung Yang, Shuo-Tsung Chen, Jung-Chun Liu, Pei-Lun Sun, Neil Y. Yen

21-05-2019

ICFR: An effective incremental collaborative filtering based recommendation architecture for personalized websites

To solve the problem that users’ retrieval intentions are seldom considered by personalized websites, we propose an improved incremental collaborative filtering (CF)-based recommendation implementation method (ICFR) in this paper. The ICFR model …

Authors:
Yayuan Tang, Kehua Guo, Ruifang Zhang, Tao Xu, Jianhua Ma, Tao Chi

21-05-2019

Resource allocation based on redundancy models for high availability cloud

Today, most innovation on Information Technology and Communication is cloud-centric and an increasing number of organizations believe that this transition is ever more unavoidable. With this increased demand for Cloud services, providers are …

Authors:
Glauco Estácio Gonçalves, Patricia Takako Endo, Moises Rodrigues, Djamel H. Sadok, Judith Kelner, Calin Curescu

20-05-2019 | Technical Paper

Trust model for wireless network security based on the edge computing

In the big data cloud environment, more and more attention has been paid to the security problems faced by wireless sensor networks based on edge computing and the server service processing. This paper focuses on the deployment of a wireless edge …

Authors:
Fenglian Jiang, Hsien-Wei Tseng

18-05-2019 | Technical Paper

Recurrent neural network based real-time failure detection of storage devices

Studies have revealed that the failure rates of storage devices can often be as high as fourteen percent. To make matters worse, there are frequently no warning signs for precaution before catastrophic failure of storage devices occurs. A …

Authors:
Chuan-Jun Su, Yi Li

17-05-2019 | Focus

Hybridized neural network and decision tree based classifier for prognostic decision making in breast cancers

Artificial intelligence techniques and algorithms are applied at various fields such as face recognition, self-driving cars, industrial robots and health care. These real-world conundrums are solved employing artificial intelligence since it …

Authors:
A. Suresh, R. Udendhran, M. Balamurgan

17-05-2019

A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems

Nowadays, with the development of cyber-physical systems (CPS), there are an increasing amount of applications deployed in the CPS to connect cyber space with physical world better and closer than ever. Furthermore, the cloud-based CPS bring …

Authors:
Lianyong Qi, Yi Chen, Yuan Yuan, Shucun Fu, Xuyun Zhang, Xiaolong Xu

17-05-2019

The implementation of an IoT-based exercise improvement system

The benefits of exercise have been well known for years. Most people know that they should do more exercise, but they seldom make exercise a top priority. Regular exercise is generally the most important lifestyle change people can make to improve …

Authors:
Tsan-Ching Kang, Chia-Hsien Wen, Shih-Wei Guo, Wei-Yueh Chang, Chen-Lin Chang

15-05-2019 | Focus

A cognitive/intelligent resource provisioning for cloud computing services: opportunities and challenges

In cloud computing, resources could be provisioned in a dynamic way on demand for cloud services. Cloud providers seek to realize effective SLA execution mechanisms for avoiding SLA violations by provisioning the resources or applications and …

Authors:
Mahfoudh Saeed Al-Asaly, Mohammad Mehedi Hassan, Ahmed Alsanad

15-05-2019

A Mobile Cloud-Based Health Promotion System for Cardiovascular Diseases

In this paper, we propose a mobile cloud-based health promotion system targeting clinical cardiovascular diseases for use with both the Windows and Android operating systems. The prototype system can provide health promotion recommendations by …

Authors:
Chin-Feng Lin, Tai-Xiang Lin, Chung-I Lin, Chung-Cheng Chang

15-05-2019

Edge Caching and Computation Offloading for Fog-Enabled Radio Access Network

Cooperation between the fog and cloud in fog-enabled radio access network could enormously improve the computation offloading services both in terms of latency and energy consumption, while edge caching allowing for low-latency transmission of the …

Authors:
Xiaohuan Rao, Liqiang Zhao, Kai Liang, Kezhi Wang

14-05-2019

On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing

This study cracks code words by matching them with target hash values using cloud distributed and GPU parallel computing technologies. For the cloud computing system, this paper implements the matching algorithm using a Hadoop distributed system …

Authors:
Chu-Hsing Lin, Jung-Chun Liu, Joy Iong-Zong Chen, Tien-Pin Chu

14-05-2019

Reduced carbon emission and optimized power consumption technique using container over virtual machine

Environmental warning is caused by IT industry which critically leads the global pollution with huge amount of toxic carbon emission which is drastically increasing day by day due to demand and usage raised. Due to the environmental warning the …

Authors:
G. Anusooya, Varadarajan Vijayakumar

14-05-2019

SherlockFog: a new tool to support application analysis in Fog and Edge computing

The Fog and Edge Computing paradigms have emerged as a solution to limitations of the Cloud Computing model to serve a huge amount of connected devices efficiently. These devices have unused computing power that could be exploited to execute …

Authors:
Maximiliano Geier, David González Márquez, Esteban Mocskos

13-05-2019

A Multi-objective Optimal Task Scheduling in Cloud Environment Using Cuckoo Particle Swarm Optimization

In cloud computing, varied demands are placed on the constantly changing resources. The task scheduling place very vital role in cloud computing environments, this scheduling process needs to schedule the tasks to virtual machine while reducing …

Authors:
T. Prem Jacob, K. Pradeep

13-05-2019

A new outlier rejection methodology for supporting load forecasting in smart grids based on big data

Internet of things (IoT) enables smart electrical grids (SEGs) to solve its problems and to support a lot of tasks. These tasks include power monitoring, demand-side energy management coordination of distributed storage, and the integration of …

Authors:
Asmaa H. Rabie, Shereen H. Ali, Ahmed I. Saleh, Hesham A. Ali

11-05-2019 | Issue 5/2019

OKRA: optimal task and resource allocation for energy minimization in mobile edge computing systems

To cope with the computational and energy constraints of mobile devices, Mobile Edge Computing (MEC) has recently emerged as a new paradigm that provides IT and cloud-computing services at mobile network edge in close proximity to mobile devices.

Authors:
Weiwei Fang, Shuai Ding, Yangyang Li, Wenchen Zhou, Naixue Xiong

11-05-2019

Practical Implementation of Femtolet Based Peer-to-Peer Network

Energy and latency aware code offloading is a demanding research area for nowadays. In this paper, for the first time we have successfully implemented the prototype of femtolet for fifth generation mobile network. Mobile devices are registered …

Authors:
Deepsubhra Guha Roy, Anwesha Mukherjee, Debashis De, Satish Narayana Srirama

11-05-2019

Integer linear programming-based multi-objective scheduling for scientific workflows in multi-cloud environments

Scientific communities are motivated to schedule the data-intensive scientific workflows in multi-cloud environments, where considerable diverse resources are provided by multiple clouds and resource limitation imposed by individual clouds is …

Authors:
Somayeh Mohammadi, Latif PourKarimi, Hossein Pedram

11-05-2019

Classified enhancement model for big data storage reliability based on Boolean satisfiability problem

Disk reliability is a serious problem in the big data foundation environment. Although the reliability of disk drives has greatly improved over the past few years, they are still the most vulnerable core components in the server. If they fail, the …

Authors:
Hong Huang, Latifur Khan, Shaohua Zhou

10-05-2019

Simulator considering modeling and performance evaluation for high-performance computing of collaborative-based mobile cloud infrastructure

In recent years, as IT technology has progressed, mobile devices have been created that enable various manual tasks to be automated and portable. A variety of mobile devices has computing, storage, and Internet capabilities and can handle many …

Authors:
Hyun-Woo Kim, Jungho Kang, Young-Sik Jeong

10-05-2019

Hybrid algorithms for placement of virtual machines across geo-separated data centers

Cloud computing has emerged as a new paradigm for hosting and supplying services over the Internet. This technology has brought many benefits, such as eliminating the need for maintaining expensive computing hardware. With an increasing demand for …

Authors:
Fernando Stefanello, Vaneet Aggarwal, Luciana S. Buriol, Mauricio G. C. Resende

09-05-2019

SAFER: Crowdsourcing Based Disaster Monitoring System Using Software Defined Fog Computing

In the occurrence of natural or artificial disasters, conveying immediate and precise situation awareness (SA) information from the salient disaster scenes to the first responders is vital. Crowdsourcing can offer enormous heterogeneous data …

Authors:
Gunasekaran Raja, Anil Thomas

09-05-2019

Scheduling Correlated IoT Application Requests Within IoT Eco-System: An Incremental Cloud Oriented Approach

In the era of adopting Internet everywhere, the recent modernization through incredible Internet of Things (IoT) makes the world more shrewd and automated. Thousands of users are connected every day in order to get benefits from the promising IoT …

Authors:
Abishi Chowdhury, Shital Raut

09-05-2019

NADE: nodes performance awareness and accurate distance evaluation for degraded read in heterogeneous distributed erasure code-based storage

To ensure data availability and save storage space, storage systems usually save data across multiple storage nodes (or servers) using erasure codes. Storage systems need to reconstruct the complete data to respond to reading requests in the case …

Authors:
Xingjun Zhang, Yi Cai, Yunfei Liu, Zhiwei Xu, Xiaoshe Dong

08-05-2019 | Multi-access Edge Computing Enabled Internet of Things

A novel edge-enabled SLAM solution using projected depth image information

Environmental mapping is the key step for mobile robots to perform tasks independently and perfectly. In recent years, visual SLAM, laser-based SLAM and simultaneous localization and mapping (SLAM) have aroused the interest of many people.

Authors:
Jian-qiang Li, Yi-fan Zhang, Zhuang-zhuang Chen, Jia Wang, Min Fang, Cheng-wen Luo, Huihui Wang

08-05-2019 | Focus

A privacy-preserving multi-keyword search approach in cloud computing

Cloud computing provides the users with the ability to outsource their data to a third-party cloud storage for cost-effective management of resources and on-demand network access. However, outsourcing the data to a third-party location may raise …

Authors:
Ahmed M. Manasrah, Mahmoud Abu Nasir, Maher Salem

08-05-2019

Novel probabilistic resource migration algorithm for cross-cloud live migration of virtual machines in public cloud

In cloud computing environment, cross-cloud live migration of virtual machines (VMs) is a major concern in these days. Cloud computing provides the users with huge, versatile and on-demand access to a bulk of customizable and configurable …

Authors:
Souvik Pal, Raghvendra Kumar, Le Hoang Son, Krishnan Saravanan, Mohamed Abdel-Basset, Gunasekaran Manogaran, Pham Huy Thong

08-05-2019

Hybrid parallel multimethod hyperheuristic for mixed-integer dynamic optimization problems in computational systems biology

This paper describes and assesses a parallel multimethod hyperheuristic for the solution of complex global optimization problems. In a multimethod hyperheuristic, different metaheuristics cooperate to outperform the results obtained by any of them …

Authors:
Patricia González, Pablo Argüeso-Alejandro, David R. Penas, Xoan C. Pardo, Julio Saez-Rodriguez, Julio R. Banga, Ramón Doallo

08-05-2019

ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment

In today’s world, Cloud computing based health cloud is an effective platform for enhancing e-health productivity, i.e., healthcare professionals can provide medical service by accessing health information on any device in any location at any …

Authors:
V. Sri Vigna Hema, Ramesh Kesavan

08-05-2019 | ORIGINAL ARTICLE

Smart manufacturing systems: state of the art and future trends

With the development and application of advanced technologies such as Cyber Physical System, Internet of Things, Industrial Internet of Things, Artificial Intelligence, Big Data, Cloud Computing, Blockchain, etc., more manufacturing enterprises …

Authors:
Y. J. Qu, X. G. Ming, Z. W. Liu, X. Y. Zhang, Z. T. Hou

07-05-2019 | ORIGINAL ARTICLE

An Industry 4.0 approach to assembly line resequencing

Contemporary assembly line systems are characterized by an increasing capability to offer each client a different product, more tuned to her needs and preferences. These assembly systems will be heavily influenced by the advent of Industry 4.0 …

Authors:
Daniel Alejandro Rossit, Fernando Tohmé, Mariano Frutos

06-05-2019

Design and implementation of an IoT-cloud converged virtual machine system

This paper presents an internet-of-things (IoT)-cloud converged virtual machine (VM) system for IoT devices with restricted computing resources. The VM is a software processor that has many advantages in terms of software development, release …

Authors:
Yunsik Son, Junho Jeong, YangSun Lee

06-05-2019

Equilibrium Transmission Bi-level Energy Efficient Node Selection Approach for Internet of Things

The Internet of things concept is based on data from sensor devices. The conservation of sensor data in the cloud has become a well-known challenge with respect to the sensor-cloud network. There is an enormous quantity of sensed data, including …

Authors:
Mahammad Shareef Mekala, P. Viswanathan

04-05-2019 | Focus

An improving data delivery method using EEDD algorithm for energy conservation in green cloud network

Energy utilization has attracted enormous concentration in high-performance computing research group for distributed computing administrations. Usages of Cloud network resources in energy utilization have expanded to the cloud network resources …

Authors:
M. Karuppasamy, S. P. Balakannan

04-05-2019 | Original Article

Ensemble RBM-based classifier using fuzzy integral for big data classification

The restricted Boltzmann machine (RBM) is a primary building block of deep learning models. As an efficient representation learning approach, deep RBM can effectively extract sophisticated and informative features from raw data. Little research …

Authors:
Junhai Zhai, Xu Zhou, Sufang Zhang, Tingting Wang

04-05-2019

Exploring knowledge management in agile software development organizations

Knowledge represents a sustainable asset for innovative firms and specifically software industries working in unpredictable environments. Until the late 90’s, the most widely used software development approaches advocated extensive documentation …

Authors:
Carine Khalil, Sabine Khalil

04-05-2019 | Technical Paper

Service aware resource management into cloudlets for data offloading towards IoT

Task offloading in edge cloud and self-organized distributed cloudlet design are two significant research areas to explore internet of things (IoT) setup in mobile cloud computing diligence through network function virtualization. The cloud …

Authors:
Deepsubhra Guha Roy, Bipasha Mahato, Ahona Ghosh, Debashis De

04-05-2019

Developing and Organizing an Analytics Capability for Patient Flow in a General Hospital

Much of the information produced in hospitals is clinical, and stored for the purposes of documentation. In practice, most of it is never used. The potential of analytics is to reuse this information for other purposes. This is easier said than …

Authors:
Bendik Bygstad, Egil Øvrelid, Thomas Lie, Magnus Bergquist

02-05-2019

A hybrid fog-cloud approach for securing the Internet of Things

As the Internet of Things (IoT) continues to grow, there arises concerns and challenges with regard to the security and privacy of the IoT. Malicious attacks such as man-in-the-middle and distributed denial of service (DDoS) are typical threats to …

Authors:
Rajaputhri Maharaja, Prashant Iyer, Zilong Ye

02-05-2019

Mesh convergence test system in integrated platform environment for finite element analysis

We designed integrated computer-aided engineering (CAE) middleware with a CAE solution for modeling and simulation work to reduce the cost and time of product development. This middleware automates an open-source-based pre/post-processor and …

Authors:
Daeyong Jung, Daewon Lee, Myungil Kim, Hoyoon Kim, Seung-Keun Park

02-05-2019 | Issue 1/2019

Business models of Internet service providers

A business model can be perceived as a simple, yet focused, representation of the related activities of a company, which describes how to create the value of the company in terms of information, products and services. Given the significance of the …

Authors:
Payam Hanafizadeh, Parastou Hatami, Erik Bohlin

02-05-2019 | Issue 2/2019

A Low-Cost Test Solution for Reliable Communication in Networks-on-Chip

Networks-on-chip (NoC) provide the communication infrastructure for high-speed and large-scale computation that integrates several IP-cores on a single die. Faults on network channels severely degrade system performance and throughput. This paper …

Authors:
Biswajit Bhowmik, Santosh Biswas, Jatindra Kumar Deka, Bhargab B. Bhattacharya

01-05-2019 | Regular Paper | Issue 3/2019

Competitive Cloud Pricing for Long-Term Revenue Maximization

We study the pricing policy optimization problem for cloud providers while considering three properties of the real-world market: 1) providers have only incomplete information about the market; 2) it is in evolution due to the increasing number of …

Authors:
Jiang Rong, Tao Qin, Bo An

30-04-2019

Application of improved distributed naive Bayesian algorithms in text classification

The naive Bayes classifier is a widely used text classification method that applies statistical theory to text classification. Due to the particularity of the text, related feature items may generate new semantic information, which may be lost …

Authors:
Hongyi Gao, Xi Zeng, Chunhua Yao

30-04-2019

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks

Wireless body area network (WBAN) constitutes a widely implemented technique for remote acquisition and monitoring of patient health-related information via the use of embodied sensors. Given that security and privacy protection, including, but …

Authors:
Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla

30-04-2019

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

With the advent of cloud computing, data owners are motivated to outsource their data to public clouds for decreasing the cost of management systems. For protecting data privacy, sensitive data must be encrypted before outsourcing. So, equipping …

Authors:
Maryam Zarezadeh, Hamid Mala, Maede Ashouri-Talouki

29-04-2019

Packet Encryption for Securing Real-Time Mobile Cloud Applications

The evolution of smart devices has brought the most confidential data to mobile applications and cloud computing with its processing power is serving the huge processing requirements of these applications. However, these advancements has brought …

Authors:
Ajay D M, Umamaheswari E

29-04-2019

Energy-Efficient Virtual Machine Scheduling across Cloudlets in Wireless Metropolitan Area Networks

Nowadays, with the development of wireless communication, people are relying on mobile devices heavily due to various application deployment and plentiful service experience of customers in wireless metropolitan area network (WMAN). The computing …

Authors:
Xiaolong Xu, Xihua Liu, Lianyong Qi, Yuhao Chen, Zihao Ding, Jiangang Shi

29-04-2019

Interoperability in Heterogeneous Wireless Networks Using FIS-ENN Vertical Handover Model

Wireless network system aims to provide dedicated links to the users for improving the quality of services. Particularly in heterogeneous network seamless connectivity is the important requirement for the users utilizing multimedia services.

Authors:
E. Rajinikanth, S. Jayashri

27-04-2019

Method, formalization, and algorithms to split topology models for distributed cloud application deployments

For automating the deployment of applications in cloud environments, a variety of technologies have been developed in recent years. These technologies enable to specify the desired deployment in the form of deployment models that can be …

Authors:
Karoline Saatkamp, Uwe Breitenbücher, Oliver Kopp, Frank Leymann

27-04-2019

Reefer container monitoring system using PLC-based communication technology for maritime edge computing

Most of the container transports by sea and land from the Republic of Korea to other countries or continents take more than a week. Under such environment, cargoes in the reefer containers must be kept at the required temperatures. To prevent any …

Author:
Jun-Ho Huh

27-04-2019

MILP formulations for spatio-temporal thermal-aware scheduling in Cloud and HPC datacenters

This paper focuses on scheduling problems related to the execution of computational jobs in datacenters with thermal constraints. Mixed integer linear programming (MILP) formulations are proposed that encompass both spatial and temporal aspects of …

Authors:
Jean-Marc Pierson, Patricia Stolf, Hongyang Sun, Henri Casanova

26-04-2019 | Original Paper | Issue 3/2019

National Policies and Educational Technology: a Synopsis of Trends and Perspectives from Five Countries

There have been continued efforts in exploring how educational technology impacts human learning and performance. Through a synopsis of the trends and perspectives on educational technology in five countries by using the STEEP (social …

Authors:
Jin Mao, Dirk Ifenthaler, Toru Fujimoto, Andrea Garavaglia, Pier Giuseppe Rossi

26-04-2019

A Framework for Heterogeneous Resource Allocation in Sensor-Cloud Environment

With the advent of sensor technologies, cloud applications are able to acquire sensed data from remotely located sensors which are geographically distributed. Cloud computing, when integrated with sensor devices facilitates pervasive and shared …

Authors:
Sunanda Bose, Debangana Sarkar, Nandini Mukherjee

26-04-2019

Efficient Algorithm for Identification and Cache Based Discovery of Cloud Services

Efficient resource identification and discovery is the primary requirements for cloud computing services, as it assists in scheduling and managing of cloud applications. Cloud computing is a revolution of the economic model rather than …

Authors:
Abdul Quadir Md, Vijayakumar Varadarajan, Karan Mandal

26-04-2019 | Original Paper

A routing and spectrum assignment algorithm in elastic optical network based on minimizing contiguity reduction

Elastic optical network, due to its flexibility of spectrum assignment, has been the most promising technology in the next generation of backbone transport network. Routing and spectrum assignment (RSA) is one of its key issues. Several RSA …

Authors:
Junling Yuan, Di Zhang, Qikun Zhang, Xuhong Li, Zhongbao Ren

26-04-2019

Smart Institutional Intervention in the Adoption of Digital Infrastructure: The Case of Government Cloud Computing in Oman

Cloud computing technology presents a case of centralised digital infrastructure that requires adherence to standards and planned approach for its adoption and implementation. There is little knowledge on how institutions could influence the …

Authors:
Khalid Alzadjali, Amany Elbanna

25-04-2019 | Issue 5/2019

Lightweight solutions to counter DDoS attacks in software defined networking

A distributed denial of service (DDoS) attack on any of the major components (e.g., controller, switches, and southbound channel) of software defined networking (SDN) architecture is a critical security threat. For example, the breakdown of …

Authors:
Mauro Conti, Chhagan Lal, Reza Mohammadi, Umashankar Rawat

25-04-2019

Medical Image Encryption Based on Hybrid Chaotic DNA Diffusion

We explore the use of two chaotic systems (Bernoulli shift map and Zizag map) coupled with deoxyribonucleic acid coding in an encryption scheme for medical images in this paper. The scheme consists of two main phases: Chaotic key generation and …

Authors:
Joshua C. Dagadu, Jian-Ping Li, Emelia O. Aboagye

25-04-2019

Security Aware Virtual Network Embedding Algorithm Using Information Entropy TOPSIS

Network virtualization is an effective manner to address the ossification issue of Internet architecture. Virtual network embedding is one of the most critical techniques in network virtualization environments. Several security problems about …

Authors:
Peiying Zhang, Haisheng Li, Yongjing Ni, Faming Gong, Mengnan Li, Fuyan Wang

25-04-2019

Optimized cloud-based scheduling for protein secondary structure analysis

In the domain of proteomics, an in-depth analysis of the 3D structure of a protein is of paramount importance for many biological studies and applications. At the secondary level, protein structure can be described in terms of motifs, recurrent …

Authors:
Marco Ferretti, Luigi Santangelo, Mirto Musci

25-04-2019

Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots

The advent of cloud computing has been so enormous that, cloud has been seen as the most enduring technology of today’s technology scenario. It is known to be the service oriented architecture, granted to the end-users as Infrastructure as a …

Authors:
Linda Joseph, Rajeswari Mukesh

24-04-2019

Collaborative Mobile Edge Computing in eV2X: A Solution for Low-Cost Driver Assistance Systems

Collision avoidance systems are of great importance in advanced driver assistance systems (ADAS) to increase the level of safety. However, as a result of their excessive costs, are not considered as a feature in lower-end vehicles. The concept of …

Authors:
Arghavan Keivani, Farzad Ghayoor, Jules-Raymond Tapamo

24-04-2019

Double Time-Memory Trade-Off in OSK RFID Protocol

The OSK/AO protocol has already demonstrated how the application of time-memory trade-off (TMTO) increases the efficiency of a hash chain-based RFID protocol. The complexity of this protocol, both in the preparatory phase and in the tag …

Authors:
Violeta Tomašević, Milo Tomašević

23-04-2019 | Focus

Prediction of availability and integrity of cloud data using soft computing technique

In cloud computing, data storage is the most important task. In cloud storage, security and privacy are the major issues. To avoid such issues, we proposed a new protocol called availability and integrity verification protocol (AIVP) to predict …

Authors:
R. Pitchai, S. Babu, P. Supraja, S. Anjanayya

23-04-2019

Availability of Cellular Systems Based on Space Domain

Ultra-Reliable Communication (URC) is one of the promising features in 5G to provide anytime and anywhere services to the end users. Services related to URC require a high level of reliability and availability. Hence, investigation of system’s …

Authors:
Hala B. Nafea, Eman M. Soultan, Fayez W. Zaki

23-04-2019 | Research Article - Computer Engineering and Computer Science

A New Heuristic Clustering Algorithm Based on RSU for Internet of Vehicles

The emergence of the Internet of Things has led to the evolution of conventional Vehicular Ad-hoc NETworks (VANETs) toward a new paradigm called the Internet of Vehicles (IoV). This latter has recently received the attention of many researchers.

Authors:
Oussama Senouci, Saad Harous, Zibouda Aliouat

22-04-2019

Stabilizing Sensor Data Collection for Control of Environment-Friendly Clean Technologies Using Internet of Things

The Internet of Things (IoT) is a network formed by smart devices whose core contains embedded technology in order to collect sensory information and exchange it with every single device present within the network. One major challenge in IoT is …

Authors:
Robin Singh Bhadoria, Dhananjai Bajpai

22-04-2019

Latency Control of ICN Enabled 5G Networks

5G definition falls broadly into order of achievable data rate and reduction in end-to-end latency. Thanks to emerging technologies many features are available in the 5G design to detect, control and avoid congestion in the backhaul networks. In …

Authors:
Shahin Vakilinia, Halima Elbiaze

22-04-2019

Mechanism Design for Exchanging Resources in Federated Networks

This paper introduces a mechanism for pricing and exchanging resources in federated networks of task-processing elements. An operational model is developed to allocate processing, storage and communication resources to computational demands. This …

Authors:
Abbas Ehsanfar, Paul T. Grogan

22-04-2019

Threshold Based Multi-Objective Memetic Optimized Round Robin Scheduling for Resource Efficient Load Balancing in Cloud

Task scheduling is a significant problem to be resolved for balancing the workload on a cloud server. One of the key problems that affect the scheduling performance is burstiness workloads. Few research studies have been introduced to schedule …

Authors:
Prassanna J, Neelanarayanan Venkataraman

20-04-2019 | Methodologies and Application

Feature selection strategy based on hybrid crow search optimization algorithm integrated with chaos theory and fuzzy c-means algorithm for medical diagnosis problems

Powerful knowledge acquisition tools and techniques have the ability to increase both the quality and the quantity of knowledge-based systems for real-world problems. In this paper, we designed a hybrid crow search optimization algorithm …

Authors:
Ahmed M. Anter, Mumtaz Ali

19-04-2019 | Original Article

Designing secure substitution boxes based on permutation of symmetric group

The strength of cryptosystems heavily relies on the substitution boxes. Cryptosystems with weak substitution boxes cannot resist algebraic attacks, linear and differential cryptanalysis. In this paper, first, we propose a strong algebraic …

Authors:
Amir Anees, Yi-Ping Phoebe Chen

19-04-2019

Multi-objective virtual network function placement using NSGA-II meta-heuristic approach

Network function virtualization has facilitated network service development through the integration of network functions (NFs) such as firewalls, deep packet inspection, load balancers, and routers/switches. Moreover, virtual network functions …

Authors:
Sanaz Tavakoli-Someh, Mohammad Hossein Rezvani

18-04-2019 | Schwerpunkt

Smart Factory – Konzeption und Prototyp zum Image Mining und zur Fehlererkennung in der Produktion

Um die Leistungsfähigkeit der Produktion in der Smart Factory effizient zu gestalten, lassen sich durch Sensoren in Echtzeit erhobene Produktionsdaten zur Qualitätsprüfung nutzen. Damit die Daten, die Informationen und letztendlich das durch …

Authors:
Sebastian Trinks, Carsten Felden
Image Credits