Int. J. Grid Util. Comput.最新文献

筛选
英文 中文
IoT-based intensive care secure framework for patient monitoring and tracking 基于物联网的重症监护安全框架,用于患者监测和跟踪
Int. J. Grid Util. Comput. Pub Date : 2019-07-18 DOI: 10.1504/IJGUC.2019.10022672
L. N. Omran, Kadry Ali Ezzat, Alaa Bayoumi, A. Darwish, A. Hassanien
{"title":"IoT-based intensive care secure framework for patient monitoring and tracking","authors":"L. N. Omran, Kadry Ali Ezzat, Alaa Bayoumi, A. Darwish, A. Hassanien","doi":"10.1504/IJGUC.2019.10022672","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022672","url":null,"abstract":"This paper aims to design a prototype of the real-time patient control system. The proposed framework is used to quantify the physical parameters of the patient such as the temperature of the body, rate of heartbeat and ECG observation with the assistance of sensors. The collected data is sent to the cloud, then to the nurse station, specialist and the patient tablet or the web application. In this framework, the patient's health is checked consistently and the data obtained through the networks are transmitted. If any irregularity is noticed from the patient's signs, it will be sent to nurses and doctors for any suggestions to help the patient. The system is implemented through Arduino advanced controller and simulation results are obtained. The Smart Intensive Care Unit (SICU) provides a new way for health monitoring of patients in order to improve healthcare systems and patients' care and safety. The cloud system is provided by a group of micro-services hosted in many servers the simulate a small cloud system. To secure the patient's data through this framework is provided by using OAuth server to authenticate the users and the sensors and generate the tokens. This system can assist doctors and nurses to achieve their missions and improve the healthcare system.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"os-11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An adaptive technique for cost reduction in cloud data centre environment 一种降低云数据中心环境成本的自适应技术
Int. J. Grid Util. Comput. Pub Date : 2019-07-18 DOI: 10.1504/IJGUC.2019.10022663
Hesham M. Elmasry, Ayman E. Khedr, Mona M. Nasr
{"title":"An adaptive technique for cost reduction in cloud data centre environment","authors":"Hesham M. Elmasry, Ayman E. Khedr, Mona M. Nasr","doi":"10.1504/IJGUC.2019.10022663","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022663","url":null,"abstract":"The developing interest for utilising the Cloud Computing (CC) has expanded the energy consumption of data centres which has become a critical issue. High energy consumption not only is translated to high operational cost but also reduces the profit margin for the cloud providers and leads to high carbon emissions, which are not environmentally friendly. Therefore, there is a need for energy-saving solutions to minimise the negative impact of CC. This research proposes an Energy Saving Load Balancing (ESLB) technique that plans to make energy saving in the cloud server while keeping up the Service Level Agreement (SLA), which includes the Quality of Service (QoS) between the cloud service provider and cloud customers. This proposed technique aims to enhance the performance, resources' utilisation and reduce the both of energy consumption and carbon dioxide in order to mitigate the negative impact of CC on the environment.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"45 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125555180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The energy consumption laxity-based algorithm to perform computation processes in virtual machine environments 在虚拟机环境中执行计算过程的基于能耗宽松的算法
Int. J. Grid Util. Comput. Pub Date : 2019-07-18 DOI: 10.1504/ijguc.2019.101996
T. Enokido, Dilawaer Duolikun, M. Takizawa
{"title":"The energy consumption laxity-based algorithm to perform computation processes in virtual machine environments","authors":"T. Enokido, Dilawaer Duolikun, M. Takizawa","doi":"10.1504/ijguc.2019.101996","DOIUrl":"https://doi.org/10.1504/ijguc.2019.101996","url":null,"abstract":"Server cluster systems equipped with virtual machines are widely used to realise scalable and high-performance computing systems. In order to satisfy application requirements like response time, processing loads of virtual machines have to balance with one another in a server cluster. In addition to achieve the performance objectives, the total electric energy of a server cluster to perform application processes has to be reduced. In this paper, the Energy Consumption Laxity Based (ECLB) algorithm is proposed to allocate computation type application processes to virtual machines in a server cluster so that the total electric energy of the server cluster and response time of each process can be reduced. We evaluate the ECLB algorithm compared with basic Round-Robin (RR) algorithm. Evaluation results show the average total electric energy of a server cluster and average response time of each process in the ECLB algorithm can be more reduced than in the RR algorithm.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of data fragmentation techniques on a cloud server 云服务器上数据碎片技术的性能分析
Int. J. Grid Util. Comput. Pub Date : 2019-07-16 DOI: 10.1504/IJGUC.2019.10022144
Nelson L. Santos, Salvatore Lentini, E. Grosso, B. Ghita, G. Masala
{"title":"Performance analysis of data fragmentation techniques on a cloud server","authors":"Nelson L. Santos, Salvatore Lentini, E. Grosso, B. Ghita, G. Masala","doi":"10.1504/IJGUC.2019.10022144","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022144","url":null,"abstract":"The advancements in virtualisation and distributed computing have allowed the cloud paradigm to become very popular among users and resources. It allows companies to save costs on infrastructure and maintenance and to focus on the development of products. However, this fast-growing paradigm has brought along some concerns from users, such as the integrity and security of the data, particularly in environments where users rely entirely on providers to secure their data. This paper explores different techniques to fragment data on the cloud and prevent direct unauthorised access to the data. It explores their performance on a cloud instance, where the total time to perform the operation, including the upload and download of the data, is considered. Results from this experiment indicate that fragmentation algorithms show better performance compared to encryption. Moreover, when combining encryption with fragmentation, there is an increase in the security, with the trade-off of the performance.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A fog computing model for pervasive connected healthcare in smart environments 用于智能环境中普及互联医疗保健的雾计算模型
Int. J. Grid Util. Comput. Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022143
Philip T. Moore, H. Pham
{"title":"A fog computing model for pervasive connected healthcare in smart environments","authors":"Philip T. Moore, H. Pham","doi":"10.1504/IJGUC.2019.10022143","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022143","url":null,"abstract":"Healthcare provision faces many demand and resource challenges. Addressing these challenges requires effective patient management which may be achieved using autonomic health monitoring systems. However, such monitoring has been limited to 'smart-homes'; we propose extending the 'smart-home' to a wider 'smart-environment' which conflates 'smart-homes' with the 'smart-city' (in an interconnected environment) based on the fog computing paradigm. We introduce our low latency fog computing model which is designed to enable 'real-time' patient monitoring with situational awareness, pervasive consciousness, and related data analytic solutions. Illustrative scenarios are presented along with a 'real-world' example of a proposed 'smart-environment'. Context-awareness and decision support are considered with a proposed implementation strategy and a 'real-world' case study in the healthcare domain. While the proposed fog model and implementation strategy is predicated on healthcare domain, the proposed fog computing model will generalise to other medical conditions and domains of interest.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123137535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Logic programming as a service in multi-agent systems for the Internet of Things 物联网多智能体系统中的逻辑编程服务
Int. J. Grid Util. Comput. Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022135
Roberta Calegari, E. Denti, S. Mariani, Andrea Omicini
{"title":"Logic programming as a service in multi-agent systems for the Internet of Things","authors":"Roberta Calegari, E. Denti, S. Mariani, Andrea Omicini","doi":"10.1504/IJGUC.2019.10022135","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022135","url":null,"abstract":"The widespread diffusion of low-cost computing devices, along with improvements of cloud computing platforms, is paving the way towards a whole new set of opportunities for Internet of Things (IoT) applications and services. Varying degrees of intelligence are required for supporting adaptation and self-management: yet, they should be provided in a light-weight, easy to use and customisable highly-interoperable way. In this paper we explore Logic Programming as a Service (LPaaS) as a novel and promising re-interpretation of distributed logic programming in the IoT era. After introducing the reference context and motivating scenarios of LPaaS as an effective enabling technology for intelligent IoT, we define the LPaaS general architecture, and discuss two different prototype implementations - as a web service and as an agent in a multi-agent system (MAS), both built on top of the tuProlog system, which provides the required interoperability and customisation. We finally showcase the LPaaS potential through two case studies, designed as simple examples of the motivating scenarios.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115781966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
GPU accelerated video super resolution using transformed spatio-temporal exemplars GPU利用变换的时空样本加速视频超分辨率
Int. J. Grid Util. Comput. Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022124
C. Kondapalli, Srikanth Khanna, V. Chandrasekaran, P. K. Baruah, Diwakar Kartheek Pingali, Sai Hareesh Anamandra
{"title":"GPU accelerated video super resolution using transformed spatio-temporal exemplars","authors":"C. Kondapalli, Srikanth Khanna, V. Chandrasekaran, P. K. Baruah, Diwakar Kartheek Pingali, Sai Hareesh Anamandra","doi":"10.1504/IJGUC.2019.10022124","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022124","url":null,"abstract":"Super-resolution (SR) is the method of obtaining high-resolution (HR) images or image sequences from one or more low-resolution (LR) images of a scene. Huang et al. in 2015 proposed a transformed self-exemplar internal database technique which takes advantage of fractal nature in an image by expanding patch search space using geometric variations. This method fails if there is no patch redundancy within and across image scales and also if there is a failure in detecting vanishing points (VP) which are used to determine perspective transformation between LR image and its sub-sampled form. In this paper, we expand the patch search space by taking advantage of temporal dimension of image frames in the scene video and also use an efficient vanishing point (VP) detection technique by Lezama et al. in 2014 and are thereby able to successfully super-resolve even the failure cases of Huang et al. and an overall improvement in PSNR. We also focused on reducing the computation time by exploiting the embarrassingly parallel nature of the algorithm. We achieved a speedup of six on multi-core, up to 11 on GPU, around 16 on hybrid platform of multi-core and GPU by parallelising the proposed algorithm. Using our hybrid implementation, we achieved 32x super-resolution factor in limited time.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124620630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The analysis of man at the end attack behaviour in software defined network 软件定义网络中终端攻击行为分析
Int. J. Grid Util. Comput. Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022146
Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry
{"title":"The analysis of man at the end attack behaviour in software defined network","authors":"Abeer E. W. Eldewahi, Alzubair Hassan, Khalid Elbadawi, Bazara I. A. Barry","doi":"10.1504/IJGUC.2019.10022146","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022146","url":null,"abstract":"Software defined network (SDN) is an emerging technology that decouples the control plane from data plane in its network architecture. This architecture exposes new threats that are absent in the traditional IP network. The man at the end attack (MATE) is one of the serious attacks against SDN controller. The MATE attacker does his/her malicious activities by exploiting the nature of messages between the controller and switches which are involved in requests and replies. This paper proposes a new detection method for MATE attack. We also used the spoofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege (STRIDE) model in the classification of a four-dimensional model to determine which attacks can be considered as MATE. Furthermore, we determine the behaviour of MATE attacker in SDN after control has been taken from the controller to help in the detection and prevention of the MATE attack.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126648464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large-scale data processing software and performance instabilities within HEP grid environments HEP网格环境中的大规模数据处理软件和性能不稳定性
Int. J. Grid Util. Comput. Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022145
O. Datskova, W. Shi
{"title":"Large-scale data processing software and performance instabilities within HEP grid environments","authors":"O. Datskova, W. Shi","doi":"10.1504/IJGUC.2019.10022145","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022145","url":null,"abstract":"Large tasks running on grids and clouds have introduced a need for stability guarantees from geographically spanning resources, where failures are handled pre-emptively. Detecting performance inefficiencies in such cases is difficult. While individual services implement fault-tolerance, the behaviour of interacting failures within tightly-coupled systems is less understood. This paper describes an approach to modelling performance of production tasks running within the ALICE grid. We provide an overview of the ALICE data and software workflow for production jobs. Event states are then constructed, based on data centre job, computing, storage and user behaviour. We then address the question of analysing failures within the context of operational instabilities, occurring in production grid environments. The results demonstrate that operational issues can be detected and described according to the principle service layers involved. This can guide users, central and data centre experts to take action in advance of service failure effects.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation 基于节能模糊的动态虚拟机整合方法
Int. J. Grid Util. Comput. Pub Date : 2019-06-25 DOI: 10.1504/IJGUC.2019.10022127
Anita Choudhary, M. C. Govil, Girdhari Singh, L. Awasthi, E. Pilli
{"title":"Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation","authors":"Anita Choudhary, M. C. Govil, Girdhari Singh, L. Awasthi, E. Pilli","doi":"10.1504/IJGUC.2019.10022127","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10022127","url":null,"abstract":"In cloud environments, the overload leads to performance degradation and Service Level Agreement (SLA) violation while underload results in inefficient utilisation of resources and needless energy consumption. Dynamic Virtual Machine (VM) consolidation is considered as an effective solution to deal with both overload and underload problems. However, dynamic VM consolidation is not a trivial solution as it can also lead to violation of negotiated SLA due to runtime overheads in VM migration. Further, dynamic VM consolidation approaches need to answer many questions such as (i) when to migrate a VM? (ii) which VM is to be migrated? and (iii) where to migrate the selected VM? In this work, efforts are made to develop a comprehensive approach to achieve better solution to above discussed problems. In the proposed approach, future forecasting methods for host overload detection are explored; a fuzzy logic based VM selection approach that enhances the performance of VM selection strategy is developed; and a VM placement algorithm based on destination CPU utilisation is also developed. The performance evaluation of the proposed approaches is carried out on CloudSim toolkit using PlanetLab data set. The simulation results have exhibited significant improvement in the number of VM migrations, energy consumption, and SLA violations.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126538001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信