A combined approach to ensure data security in cloud computing Abstract? A combined approach to ensure data security in cloud computing. Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users’ data has the highest priority as well as concern….
A Communication-Based Appliance Scheduling Scheme forConsumer-Premise Energy Management Systems Abstract? A communication-based load scheduling protocol is proposed for in-home appliances connected over a home area network. Specifically, a joint access and scheduling approach for appliances is developed to enable in-home appliances to coordinate power usage so that the total energy demand for the home is…
A Computational Dynamic Trust Model for User Authorization Abstract? A Computational Dynamic Trust Model for User Authorization. Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for…
A Context-Aware Architecture Supporting Service Availability in Mobile Cloud Computing Abstract? Mobile systems are gaining more and more importance, and new promising paradigms like Mobile Cloud Computing are emerging. Mobile Cloud Computing provides an infrastructure where data storage and processing could happen outside the mobile node. Specifically, there is a major interest in the use…
Coverage Performance of Joint Transmission for Moving Relay Enabled Cellular Networks in Dense Urban Scenarios Abstract– Cloud computing has promoted the success of big data applications such as medical data analyses. With the abundant resources provisioned by cloud platforms, the QoS (quality of service) of services that process big data could be boosted significantly. However,…
A Cost-Based Distributed Algorithm for Load Balancing in Content Delivery Network Abstract-Load balancing plays an important role in improving scalability and stability in Content Delivery Networks (CDNs) to meet the increasing demand on bandwidth. This paper proposed a modified algorithm that takes into account the equilibrium between load balancing and redirection proximity. We extended a…
A Cost-Effective Deadline-Constrained Dynamic Scheduling Algorithm for Scientific Workflows in a Cloud Environment Abstract? Computing, a distributed computing paradigm, enables delivery of IT resources over the Internet and follows the pay-as-you-go billing model. Workflow scheduling is one of the most challenging problems in Cloud computing. Although, workflow scheduling on distributed systems like Grids and Clusters…
A Cost-Optimized Resource Provisioning Policy for Heterogeneous Cloud Environments Abstract– In the first place, to avoid the drawbacks of a pricing mechanism in heterogeneous cloud environments that considers only single resources, propose a multi-resource combinatorial pricing mechanism in this paper. This approach jointly considers the principal resources (i.e., CPU, memory, storage, and bandwidth) with the…
A Data Mining Approach Combining K-Means Clustering with Bagging Neural Network for Short-term Wind Power Forecasting Abstract-Wind power forecasting (WPF) is significant to guide the dispatching of grid and the production planning of wind farm effectively. The intermittency and volatility of wind leading to the diversity of the training samples have a major impact on…
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization Abstract? A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization. Cloud computing is becoming popular as the next infrastructure of computing platform. Despite the promising model and hype surrounding, security has become the major concern that people hesitate to transfer their applications to clouds….
A decision-theoretic rough set approach for dynamic data mining Abstract? Uncertainty and fuzziness generally exist in real-life data. Approximations are employed to describe the uncertain information approximately in rough set theory. Certain and uncertain rules are induced directly from different regions partitioned by approximations. Approximation can further be applied to data mining related task, e.g.,…