Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Cloud computing

Computer Engineering

Institution
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 85

Full-Text Articles in Engineering

Modeling And Simulation Of Complex Equipment Health Management System Based On Cloud Computing, Tianrui Zhang, Chuansheng Qu, Baoku Wu, Jianan Xu Dec 2019

Modeling And Simulation Of Complex Equipment Health Management System Based On Cloud Computing, Tianrui Zhang, Chuansheng Qu, Baoku Wu, Jianan Xu

Journal of System Simulation

Abstract: For complex equipment operation safely, the health management problems of complex equipment life cycle is analyzed. In order to realize remote service, complex equipment health management mode based on cloud computing is proposed. Aiming at the accuracy problem in the process of extracting and recognizing complex equipment characteristic data, the feature knowledge acquisition method based on ontology is researched, and the expression and acquisition algorithm of state characteristic knowledge is proposed. A task sequencing algorithm faults based on fuzzy comprehensive evaluation method is proposed, an appropriate task assignment model is selected for scheduling health management technicians. …


Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock Oct 2019

Forensicloud: An Architecture For Digital Forensic Analysis In The Cloud, Cody Miller, Dae Glendowne, David Dampier, Kendall Blaylock

David Dampier

The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we have developed an architecture for a cloud-based distributed processing platform we have named Forensicloud. This architecture is designed to reduce the time taken to process digital evidence by leveraging the power of a high performance computing platform and by adapting existing tools to operate within this …


Cloud Job Scheduling Model Based On Improved Plant Growth Algorithm, Li Qiang, Xiaofeng Liu Jan 2019

Cloud Job Scheduling Model Based On Improved Plant Growth Algorithm, Li Qiang, Xiaofeng Liu

Journal of System Simulation

Abstract: The performance of cloud job scheduling algorithm has a great importance to the whole cloud system. The key factors that affect cloud operation scheduling are found out, and a resource constraint model is established. The existing simulation plant growth algorithm is improved based on the Logistic model of plant growth law, so that the plant growth way was made to change according to the energy power. The comparison of four different plant models was carried out and their different features were analyzed. Compared with 6 typical cloud job scheduling algorithms, it is concluded that the improved simulation plant growth …


Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq Jan 2019

Cloud-Supported Machine Learning System For Context-Aware Adaptive M-Learning, Muhammad Adnan, Asad Habib, Jawad Ashraf, Shafaq Mussadiq

Turkish Journal of Electrical Engineering and Computer Sciences

It is a knotty task to amicably identify the sporadically changing real-world context information of a learner during M-learning processes. Contextual information varies greatly during the learning process. Contextual information that affects the learner during a learning process includes background knowledge, learning time, learning location, and environmental situation. The computer programming skills of learners improve rapidly if they are encouraged to solve real-world programming problems. It is important to guide learners based on their contextual information in order to maximize their learning performance. In this paper, we proposed a cloud-supported machine learning system (CSMLS), which assists learners in learning practical …


A Novel Resource Clustering Model To Develop An Efficient Wireless Personal Cloud Environment, Kowsigan Mohan, Balasubramanie Palanisamy Jan 2019

A Novel Resource Clustering Model To Develop An Efficient Wireless Personal Cloud Environment, Kowsigan Mohan, Balasubramanie Palanisamy

Turkish Journal of Electrical Engineering and Computer Sciences

In the current era, cloud computing is the major focus of distributed computing and it helps in satisfying the requirements of the business world. It provides facilities on demand under all the parameters of the computing, such as infrastructure, platform, and software, across the globe. One of the major challenges in the cloud environment is to cluster the resources and schedule the jobs among the resource clusters. Many existing approaches failed to provide an optimal solution for job scheduling due to inefficient clustering of resources. In the proposed system, a novel algorithm called resource differentiation based on equivalence node potential …


Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung Jul 2018

Privacy-Preserving Mining Of Association Rule On Outsourced Cloud Data From Multiple Parties, Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-Fung Fung Leung

Research Collection School Of Computing and Information Systems

It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data privacy in this mining approach have not been well considered so far. To address this problem, we propose a scheme for privacy-preserving association rule mining on outsourced cloud data which are uploaded from multiple parties in a twin-cloud architecture. In particular, we mainly consider the scenario where the data owners and miners have different encryption keys that are …


Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham Jun 2018

Neural Network On Virtualization System, As A Way To Manage Failure Events Occurrence On Cloud Computing, Khoi Minh Pham

Electronic Theses, Projects, and Dissertations

Cloud computing is one important direction of current advanced technology trends, which is dominating the industry in many aspects. These days Cloud computing has become an intense battlefield of many big technology companies, whoever can win this war can have a very high potential to rule the next generation of technologies. From a technical point of view, Cloud computing is classified into three different categories, each can provide different crucial services to users: Infrastructure (Hardware) as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). Normally, the standard measurements for cloud computing reliability level is …


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. Oct 2017

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In addition, …


Blend It Applications And Server, Rebecca Mckinley, Cory Mayer, Tyler Fox, Alex Bartlett, Aly Chapman Jun 2017

Blend It Applications And Server, Rebecca Mckinley, Cory Mayer, Tyler Fox, Alex Bartlett, Aly Chapman

Computer Engineering

No abstract provided.


Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal Apr 2017

Machs: Mitigating The Achilles Heel Of The Cloud Through High Availability And Performance-Aware Solutions, Manar Jammal

Electronic Thesis and Dissertation Repository

Cloud computing is continuously growing as a business model for hosting information and communication technology applications. However, many concerns arise regarding the quality of service (QoS) offered by the cloud. One major challenge is the high availability (HA) of cloud-based applications. The key to achieving availability requirements is to develop an approach that is immune to cloud failures while minimizing the service level agreement (SLA) violations. To this end, this thesis addresses the HA of cloud-based applications from different perspectives. First, the thesis proposes a component’s HA-ware scheduler (CHASE) to manage the deployments of carrier-grade cloud applications while maximizing their …


Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li Mar 2017

Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li

Information Science Faculty Publications

Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …


Hadoop Framework Implementation And Performance Analysis On A Cloud, Göksu Zeki̇ye Özen, Mehmet Tekerek, Rayi̇mbek Sultanov Jan 2017

Hadoop Framework Implementation And Performance Analysis On A Cloud, Göksu Zeki̇ye Özen, Mehmet Tekerek, Rayi̇mbek Sultanov

Turkish Journal of Electrical Engineering and Computer Sciences

The Hadoop framework uses the MapReduce programming paradigm to process big data by distributing data across a cluster and aggregating. MapReduce is one of the methods used to process big data hosted on large clusters. In this method, jobs are processed by dividing into small pieces and distributing over nodes. Parameters such as distributing method over nodes, the number of jobs held in a parallel fashion, and the number of nodes in the cluster affect the execution time of jobs. The aim of this paper is to determine how the numbers of nodes, maps, and reduces affect the performance of …


Designing A Vm-Level Vertical Scalability Service In Current Cloud Platforms: A New Hope For Wearable Computers, Mustafa Kaiiali Jan 2017

Designing A Vm-Level Vertical Scalability Service In Current Cloud Platforms: A New Hope For Wearable Computers, Mustafa Kaiiali

Turkish Journal of Electrical Engineering and Computer Sciences

Public clouds are becoming ripe for enterprise adoption. Many companies, including large enterprises, are increasingly relying on public clouds as a substitute for, or a supplement to, their own computing infrastructures. On the other hand, cloud storage service has attracted over 625 million users. However, apart from the storage service, other cloud services, such as the computing service, have not yet attracted the end users' interest for economic and technical reasons. Cloud service providers offers horizontal scalability to make their services scalable and economical for enterprises while it is still not economical for the individual users to use their computing …


Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai Jan 2017

Qos Recommendation In Cloud Services, Xianrong Zheng, Li Da Xu, Sheng Chai

Information Technology & Decision Sciences Faculty Publications

As cloud computing becomes increasingly popular, cloud providers compete to offer the same or similar services over the Internet. Quality of service (QoS), which describes how well a service is performed, is an important differentiator among functionally equivalent services. It can help a firm to satisfy and win its customers. As a result, how to assist cloud providers to promote their services and cloud consumers to identify services that meet their QoS requirements becomes an important problem. In this paper, we argue for QoS-based cloud service recommendation, and propose a collaborative filtering approach using the Spearman coefficient to recommend cloud …


Data Provisioning For The Object Modeling System (Oms), Jack R. Carlson, Olaf David, Wes J. Lloyd, George H. Leavesley, Ken W. Rojas, Timothy R. Green, Mazdak Arabi, Lucas Yaege, Hom Kipka Oct 2016

Data Provisioning For The Object Modeling System (Oms), Jack R. Carlson, Olaf David, Wes J. Lloyd, George H. Leavesley, Ken W. Rojas, Timothy R. Green, Mazdak Arabi, Lucas Yaege, Hom Kipka

Wes Lloyd

The Object Modelling System (OMS) platform supports initiatives to build or re-factor agro-environmental models and deploy them in different business contexts as model services on cloud computing platforms. Whether traditional desktop, client-server, or emerging cloud deployments, success especially at the enterprise level relies on stable and efficient data provisioning to the models. In this paper we describe recent experience and trends with tools and services deployed to cloud platforms. Also, systematic, sustained data stewardship and alignment with standards organizations impart stability to data provisioning efforts.


The Virtual Machine (Vm) Scaler: An Infrastructure Manager Supporting Environmental Modeling On Iaas Clouds, Wes J. Lloyd, Olaf David, Mazdak Arabi, James C. Ascough Ii, Timothy R. Green, Jack R. Carlson, Ken W. Rojas Oct 2016

The Virtual Machine (Vm) Scaler: An Infrastructure Manager Supporting Environmental Modeling On Iaas Clouds, Wes J. Lloyd, Olaf David, Mazdak Arabi, James C. Ascough Ii, Timothy R. Green, Jack R. Carlson, Ken W. Rojas

Wes Lloyd

Infrastructure-as-a-service (IaaS) clouds provide a new medium for deployment of environmental modeling applications. Harnessing advancements in virtualization, IaaS clouds can provide dynamic scalable infrastructure to better support scientific modeling computational demands. Providing scientific modeling “as-a-service” requires dynamic scaling of server infrastructure to adapt to changing user workloads. This paper presents the Virtual Machine (VM) Scaler, an autonomic resource manager for IaaS Clouds. We have developed VM-Scaler, a REST/JSON-based web services application which supports infrastructure provisioning and management to support scientific modeling for the Cloud Services Innovation Platform (CSIP) [Lloyd et al. 2012]. VM-Scaler harnesses the Amazon Elastic Compute Cloud (EC2) …


A Holistic Approach To Lowering Latency In Geo-Distributed Web Applications, Shankaranarayanan Puzhavakath Narayanan Aug 2016

A Holistic Approach To Lowering Latency In Geo-Distributed Web Applications, Shankaranarayanan Puzhavakath Narayanan

Open Access Dissertations

User perceived end-to-end latency of web applications have a huge impact on the revenue for many businesses. The end-to-end latency of web applications is impacted by: (i) User to Application server (front-end) latency which includes downloading and parsing web pages, retrieving further objects requested by javascript executions; and (ii) Application and storage server(back-end) latency which includes retrieving meta-data required for an initial rendering, and subsequent content based on user actions.

Improving the user-perceived performance of web applications is challenging, given their complex operating environments involving user-facing web servers, content distribution network (CDN) servers, multi-tiered application servers, and storage servers. Further, …


Cepsim: Modelling And Simulation Of Complex Event Processing Systems In Cloud Environments, Wilson A. Higashino, Miriam Am Capretz, Luiz F. Bittencourt Jan 2016

Cepsim: Modelling And Simulation Of Complex Event Processing Systems In Cloud Environments, Wilson A. Higashino, Miriam Am Capretz, Luiz F. Bittencourt

Electrical and Computer Engineering Publications

The emergence of Big Data has had profound impacts on how data are stored and processed. As technologies created to process continuous streams of data with low latency, Complex Event Processing (CEP) and Stream Processing (SP) have often been related to the Big Data velocity dimension and used in this context. Many modern CEP and SP systems leverage cloud environments to provide the low latency and scalability required by Big Data applications, yet validating these systems at the required scale is a research problem per se. Cloud computing simulators have been used as a tool to facilitate reproducible and repeatable …


Data Network Visualization, Marcangelo Dilinila, Carl Miranda, Chase Keech Jan 2016

Data Network Visualization, Marcangelo Dilinila, Carl Miranda, Chase Keech

Capstone Design Expo Posters

Data visualization is an essential component of any data analysis. A visual image can aid in more in-depth analysis of any researched data. Although there are data visualization products that already exist on the market, such as Gephi, yEd Graph editor, and OmniGraffle, they are platform-dependent and can be difficult for novice users to install and get started. Data Network Visualization eliminates these weaknesses by being fully accessible through the web, while having a less cluttered user interface. This allows a user to take advantage of a variety of visualization tools without the need to download a program.

To achieve …


A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur Jan 2016

A Cloud-Based Framework For Smart Permit System For Buildings, Magdalini Eirinaki, Subhankar Dhar, Shishir Mathur

Faculty Publications

In this paper we propose a novel cloud-based platform for building permit system that is efficient, user-friendly, transparent, and has quick turn-around time for homeowners. Compared to the existing permit systems, the proposed smart city permit framework provides a pre-permitting decision workflow, and incorporates a data analytics and mining module that enables the continuous improvement of a) the end user experience, by analyzing explicit and implicit user feedback, and b) the permitting and urban planning process, allowing a gleaning of key insights for real estate development and city planning purposes, by analyzing how users interact with the system depending on …


A Survey Of Security And Privacy Challenges In Cloud Computing: Solutions And Future Directions, Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Athanasios V. Vasilakos Sep 2015

A Survey Of Security And Privacy Challenges In Cloud Computing: Solutions And Future Directions, Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Athanasios V. Vasilakos

Computer Science and Engineering

While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.


Elastic Highly Available Cloud Computing, Hassan Hawilo Aug 2015

Elastic Highly Available Cloud Computing, Hassan Hawilo

Electronic Thesis and Dissertation Repository

High availability and elasticity are two the cloud computing services technical features. Elasticity is a key feature of cloud computing where provisioning of resources is closely tied to the runtime demand. High availability assure that cloud applications are resilient to failures. Existing cloud solutions focus on providing both features at the level of the virtual resource through virtual machines by managing their restart, addition, and removal as needed. These existing solutions map applications to a specific design, which is not suitable for many applications especially virtualized telecommunication applications that are required to meet carrier grade standards. Carrier grade applications typically …


Development Of A Web Application For Continuous Analysis Of Many Cameras (Cam2), Anurag Anjaria, Dr. Yung-Hsiang Lu, Young-Sol Koh, Charles Hansen Aug 2015

Development Of A Web Application For Continuous Analysis Of Many Cameras (Cam2), Anurag Anjaria, Dr. Yung-Hsiang Lu, Young-Sol Koh, Charles Hansen

The Summer Undergraduate Research Fellowship (SURF) Symposium

There are tens of thousands of web cameras located around the world and publicly available on the Internet. The images captured by these cameras contain data relating to our living environment such as traffic patterns, weather and crowd movement. Researchers can capture this data using image analysis techniques on the video and image from these cameras. However, there is a lack of a single, unified repository of all the public cameras on the Internet; this, coupled with the computational demands of image analysis means there is a need for a tool to help researchers perform large-scale image analyis on many …


Data Security And Privacy In Smart Grid, Yue Tong Aug 2015

Data Security And Privacy In Smart Grid, Yue Tong

Doctoral Dissertations

This dissertation explores novel data security and privacy problems in the emerging smart grid.

The need for data security and privacy spans the whole life cycle of the data in the smart grid, across the phases of data acquisition, local processing and archiving, collaborative processing, and finally sharing and archiving. The first two phases happen in the private domains of an individual utility company, where data are collected from the power system and processed at the local facilities. When data are being acquired and processed in the private domain, data security is the most critical concern. The key question is …


Mobile Cloud Computing Based Non Rigid Registration For Image Guided Surgery, Arun Brahmavar Vishwanatha Aug 2015

Mobile Cloud Computing Based Non Rigid Registration For Image Guided Surgery, Arun Brahmavar Vishwanatha

Computer Science Theses & Dissertations

In this thesis we present the design and implementation of a Mobile Cloud computing platform for non-rigid registration required in Image Guided Surgery (MCIGS). MCIGS contributes in flexible, portable and accurate alignment of pre-operative brain data with intra-operative MRI, for image guided diagnosis and therapy and endoscopic skull base surgery. Improved precision of image guided therapy and specifically neurosurgery procedures is known to result in the improved prognosis for brain tumor patients. MCI GS system is tested with Physics Based Non-Rigid Registration method form ITK. Our preliminary results for brain images indicate that the proposed system over Wi-Fi can be …


Maturity Of Cloud Application Interoperability Frameworks For Small To Medium Enterprises, John Warde May 2015

Maturity Of Cloud Application Interoperability Frameworks For Small To Medium Enterprises, John Warde

Dissertations

Cloud computing has many benefits and organisations have bought into the cost effective and elastic solutions provided by major players in the market. However, cloud computing and Cloud Service Providers (CSP) are still evolving, hence there are differences in how customers connect with each provider to the orchestrate application lifecycle management. A lack of standards can create vendor lock-in. This work investigates current research and possible solutions to the vendor lock-in problem through the use of Cloud Interoperability or multi-cloud frameworks. Software developers and organisations can use these frameworks which abstract the differences between CSPs and mitigate vendor lock-in. A …


Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz May 2015

Data Management In Cloud Environments: Nosql And Newsql Data Stores, Katarina Grolinger, Wilson A. Higashino, Abhinav Tiwari, Miriam Am Capretz

Wilson A Higashino

: Advances in Web technology and the proliferation of mobile devices and sensors connected to the Internet have resulted in immense processing and storage requirements. Cloud computing has emerged as a paradigm that promises to meet these requirements. This work focuses on the storage aspect of cloud computing, specifically on data management in cloud environments. Traditional relational databases were designed in a different hardware and software era and are facing challenges in meeting the performance and scale requirements of Big Data. NoSQL and NewSQL data stores present themselves as alternatives that can handle huge volume of data. Because of the …


Data Integrity Verification In Cloud Computing, Katanosh Morovat May 2015

Data Integrity Verification In Cloud Computing, Katanosh Morovat

Graduate Theses and Dissertations

Cloud computing is an architecture model which provides computing and storage capacity as a service over the internet. Cloud computing should provide secure services for users and owners of data as well. Cloud computing services are a completely internet-based technology where data are stored and maintained in the data center of a cloud provider. Lack of appropriate control over the data might incur several security issues. As a result, some data stored in the cloud must be protected at all times. These types of data are called sensitive data. Sensitive data is defined as data that must be protected against …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally Apr 2015

Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally

Information Science Faculty Publications

Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …