2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)最新文献

筛选
英文 中文
An IoT data logging instrument for monitoring and early efficiency loss detection at a photovoltaic generation plant 用于光伏发电厂监测和早期效率损失检测的物联网数据记录仪器
N. Luwes, Sarel J.B. Lubbe
{"title":"An IoT data logging instrument for monitoring and early efficiency loss detection at a photovoltaic generation plant","authors":"N. Luwes, Sarel J.B. Lubbe","doi":"10.1109/CloudTech49835.2020.9365922","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365922","url":null,"abstract":"Photovoltaic generation is the proses used to convert solar radiation into electrical energy, at this stage in the development of photovoltaic technology the efficiency of such systems is low and any loss of efficiency should be prevented to create an optimal system. The proposal is an IoT (Internet of things) device that can be used to prevent power loss on large solar farms by monitoring each array separately and giving feedback on efficiency. It is also able to aid in the prevention of power loss by early detection of problematic arrays. A case study calculation is done on a 50MW solar farm to show the possible financial impact of the system, as well as describing the construction and operation of the system. The literature review section describes the equations to calculate the quality and accuracy of the instrument as well as a discussion on sensors and hardware used. It also discusses a real-world case study 50MW photovoltaic plant. The methodology explains the construction and evaluation of the instrument as well as how to calculate the cost impact if implemented on a photovoltaic generation station. The results explain what the relevance is of all the calculations. Conclusions are drawn discussing the outcome and overall relevance. and demonstrating the cost-saving that can be achieved at a typical 50 MW photovoltaic generation station. This instrument’s low production cost could mean that it can be incorporated in large or small scale Photovoltaic generation systems.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114338901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cloud-based foundational infrastructure for water management ecosystem 基于云的水管理生态系统基础设施
R. E. Sibai, J. B. Abdo, C. A. Jaoude, J. Demerjian, Yousra Chabchoub, Raja Chiky
{"title":"A cloud-based foundational infrastructure for water management ecosystem","authors":"R. E. Sibai, J. B. Abdo, C. A. Jaoude, J. Demerjian, Yousra Chabchoub, Raja Chiky","doi":"10.1109/CloudTech49835.2020.9365902","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365902","url":null,"abstract":"Water monitoring is one of the critical battles of sustainability for a better future of humanity. 44 countries are considered at high risk of the water crisis, 28 of which are developing countries and have limited capacity to deploy a national scale solution. As a response to the United Nation’s sustainability goals and initiatives, this paper proposes an intelligent water monitoring service which acts as a foundational infrastructure for all future water management systems. It also provides municipalities, Non-Governmental Organization and other private initiatives with the tools needed to establish local water monitoring in the scale of villages or rural areas with a very small initial investment.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114557019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet of Things Learning: a Practical Case for Smart Building automation 物联网学习:智能楼宇自动化的实践案例
Olivier Debauche, S. Mahmoudi, Yahya Moussaoui
{"title":"Internet of Things Learning: a Practical Case for Smart Building automation","authors":"Olivier Debauche, S. Mahmoudi, Yahya Moussaoui","doi":"10.1109/CloudTech49835.2020.9365920","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365920","url":null,"abstract":"The Internet of Things (IoT) is becoming more and more present in our daily lives and affects all areas of activity. More and more devices capable of interacting with each other are being designed and appearing on the market. Learning about IoT technologies is becoming inevitable in education. In this article, we propose a demonstrator to learn, through use cases, the essential concepts of IoT applied to Smart Homes. From basic use cases implemented in a model building, the general public can more easily understand the operating principles of these new applications, which opens the door to the imagination of new ones.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A distributed large graph coloring algorithm on Giraph 基于Giraph的分布式大图着色算法
Assia Brighen, Hachem Slimani, A. Rezgui, H. Kheddouci
{"title":"A distributed large graph coloring algorithm on Giraph","authors":"Assia Brighen, Hachem Slimani, A. Rezgui, H. Kheddouci","doi":"10.1109/CloudTech49835.2020.9365872","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365872","url":null,"abstract":"Vertex graph coloring (VGC) is a well known problem in graph theory and has a large number of applications in various domains such as telecommunications, bioinformatics, and Internet. It is one of the 21 NP-complete problems of Karp. Several large graph treatment frameworks have emerged and are effective options to deal with the VGC problem. Examples of those frameworks include Pregel, Graphx and Giraph. The latter is one of the most popular large graph processing frameworks both in industry and academia. In this paper, we present a novel graph coloring algorithm designed for utilizing the simple parallelization technique provided by the Giraph framework or any other vertex-centric paradigm. We have compared our algorithm to existing Giraph graph coloring algorithms with regard to solution quality (number of used colors) and CPU runtime, using several large graph datasets. The obtained results have shown that the proposed algorithm is much more efficient than existing Giraph algorithms.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124966243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Density Based Support Vector Machine (DBSVM) 一种改进的基于密度的支持向量机
K. E. Moutaouakil, Abdellatif el Ouissari, A. Touhafi, N. Aharrane
{"title":"An Improved Density Based Support Vector Machine (DBSVM)","authors":"K. E. Moutaouakil, Abdellatif el Ouissari, A. Touhafi, N. Aharrane","doi":"10.1109/CloudTech49835.2020.9365893","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365893","url":null,"abstract":"Support Vector Machines (SVM) is a classification model based on the duality optimization approach. Non-zero Lagrange multipliers correspond to the data selected to be support vectors used to build the margin decision. Unfortunately, SVM has two major drawbacks: the noisy and redundant data cause an overfitting; moreover, the number of local minima increases with the size of data, even worse when it comes to Big Data. To overcome these shortcoming, we propose a new version of SVM, called Density Based Support Vector Machine (DBVSM), which performs on three steps: first, we set two parameters, the radius of the neighborhood and the size of this latter. Second, we determine three types of points: noisy, cord and interior. Third, we solve the dual problem based on the cord data only. To justify this choice, we demonstrate that the cord points cannot be support vectors. Moreover, we show that the kernel functions don't change the cord point nature even. The DBSVM is benchmarked on several datasets and is compared with a variety of methods in the literature. The results of the tests prove that the proposed algorithm is able to provide very competitive results in terms of time, classification performance, and capacity to tackle datasets of very large size. Finally, to point out the consistency of the DBSVM, several tests were performed for different values of the ratio and the neighborhood size.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Evaluation of Newly Implemented Resource Blocks (RB) Allocation Schemes on NS-3 simulator for mMTC 5G NR (New Radio) Femtocells mMTC 5G NR (New Radio) Femtocells新实现的资源块(RB)分配方案在NS-3模拟器上的性能评估
Ismail Angri, A. Najid, Mohammed Mahfoudi
{"title":"Performance Evaluation of Newly Implemented Resource Blocks (RB) Allocation Schemes on NS-3 simulator for mMTC 5G NR (New Radio) Femtocells","authors":"Ismail Angri, A. Najid, Mohammed Mahfoudi","doi":"10.1109/CloudTech49835.2020.9365883","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365883","url":null,"abstract":"The new standard of mobile technologies called 5G allows enormous improvements, comparing to the previous telecommunication network system LTE, in terms of user requirements by offering different use cases (eMBB, URLLC and mMTC). With the use of the Internet of Things (IoT) by 5G networks, the number of radio devices by each user will drop from 2 to around 7 to 10 devices. Despite this, the saturation of the system does not arise, thanks to the connected equipment’s high density, offered by Massive machine type communications (mMTC). A Radio Resource Management RRM procedure for efficient distribution of available radio resources between those devices is essential for 5G systems. In this article, we have studied the behavior of scheduling algorithms in a 5G environment, for a large number of connected objects and for different types of data flows, while limiting to small cells (Femtocells) with a speed of 3 km/h of the User Equipment (UE). In this objective, we program in C++ two new scheduling algorithms at the base station gNb, namely Exponential PF (EXP/PF) and Exponential Rule (EXP-rule), in addition to those already existing (Maximum-Weight (MW) and Proportional Fair (PF)), using the mmWave model of the famous NS-3 simulator. The performance comparison of the different 5G scheduler schemes was inspected via two important parameters, which are the user throughput and the Signal-to-Interference-plus-Noise Ratio (SINR). Consequently, we have demonstrated that the scheduling algorithms used by LTE networks can be implemented at the 5G gNB level. The results of our simulations have shown that the EXP-rule algorithm provides the best SINR and DataRate values for voice, video and data streams.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122536831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High-performance computing under availability constraints to solve dense triangular system 可用性约束下的高性能计算求解密集三角形系统
Mounira Belmabrouk, M. Marrakchi
{"title":"High-performance computing under availability constraints to solve dense triangular system","authors":"Mounira Belmabrouk, M. Marrakchi","doi":"10.1109/CloudTech49835.2020.9365898","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365898","url":null,"abstract":"In this paper, we focus on parallel planning applied to a 2-step graph with a constant task cost which is the precedence graph of the algorithm solving a triangular system. We sort the tasks of 2-steps graph using critical path scheduling and we present a new schedule without and with some availability constraints. Some processors may not be available for some time interval. For each described scheduling, we determine the theoretical value of its makespan. Finally, we expose some experimental results.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare ESSMAR:医疗保健边缘支持安全移动增强现实架构
An Braeken, P. Porambage, Amirthan Puvaneswaran, Madhusanka Liyanage
{"title":"ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare","authors":"An Braeken, P. Porambage, Amirthan Puvaneswaran, Madhusanka Liyanage","doi":"10.1109/CloudTech49835.2020.9365909","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365909","url":null,"abstract":"The recent advances in mobile devices and wireless communication sector transformed Mobile Augmented Reality (MAR) from science fiction to reality. Among the other MAR use cases, the incorporation of this MAR technology in the healthcare sector can elevate the quality of diagnosis and treatment for the patients. However, due to the highly sensitive nature of the data available in this process, it is also highly vulnerable to all types of security threats. In this paper, an edge-based secure architecture is presented for a MAR healthcare application. Based on the ESSMAR architecture, a secure key management scheme is proposed for both the registration and authentication phases. Then the security of the proposed scheme is validated using formal and informal verification methods.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132508667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CloudTech 2020 Copyright Page CloudTech 2020版权页面
{"title":"CloudTech 2020 Copyright Page","authors":"","doi":"10.1109/cloudtech49835.2020.9365894","DOIUrl":"https://doi.org/10.1109/cloudtech49835.2020.9365894","url":null,"abstract":"","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114299794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing security classifications and taxonomies: a comprehensive study and comparison 云计算安全分类与分类法:全面研究与比较
Najat Tissir, S. E. Kafhali, N. Aboutabit
{"title":"Cloud Computing security classifications and taxonomies: a comprehensive study and comparison","authors":"Najat Tissir, S. E. Kafhali, N. Aboutabit","doi":"10.1109/CloudTech49835.2020.9365884","DOIUrl":"https://doi.org/10.1109/CloudTech49835.2020.9365884","url":null,"abstract":"Cloud Computing is an evolving term that is subject to security threats, vulnerabilities, and attacks. Latterly, various classifications and taxonomies have been suggested to characterize and classify cloud security issues. Some of them are based on general security factors, such as the CIA triad (confidentiality, integrity, and availability), while others specify cloud security classes. Most of these classes are determined by the cloud’s attributes, such as Cloud service models, cloud deployment models, and cloud actors. In this paper, we explore the already existing criteria and dimensions considered in the development of cloud computing security classification/taxonomy. Then, we study and compare their strengths and characteristics. Thereafter, our objective is to provide and develop exhaustive cloud security taxonomy and push researchers to better comprehend the nature of any newly introduced threat or attack, categorize them, and explain the relationship between threats and other categories or subcategories.","PeriodicalId":272860,"journal":{"name":"2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128640350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信