Current Issue : July - September Volume : 2017 Issue Number : 3 Articles : 5 Articles
This paper presents the first attempt at combining Cloud with Graphic Processing\nUnits (GPUs) in a complementary manner within the framework of a real-time high performance\ncomputation architecture for the application of detecting and tracking multiple moving targets based\nonWide Area Motion Imagery (WAMI). More specifically, the GPU and Cloud Moving Target Tracking\n(GC-MTT) system applied a front-end web based server to perform the interaction with Hadoop\nand highly parallelized computation functions based on the Compute Unified Device Architecture\n(CUDA�©). The introduced multiple moving target detection and tracking method can be extended to\nother applications such as pedestrian tracking, group tracking, and Patterns of Life (PoL) analysis.\nThe cloud and GPUs based computing provides an efficient real-time target recognition and tracking\napproach as compared to methods when the work flow is applied using only central processing\nunits (CPUs). The simultaneous tracking and recognition results demonstrate that a GC-MTT based\napproach provides drastically improved tracking with low frame rates over realistic conditions....
The huge bandwidth and hardware capacity form a high combination together which leads to a vigorous development in the\nInternet. On the other hand, different problems will come up during the use of the networks such as delay and node tasks load.\nThese problems lead to degrade the network performance and then affect network service for users. In cloud computing, users\nare looking to be provided with a high level of services from the service provider. In addition, cloud computing service facilitates\nthe execution of complicated tasks that needed high-storage scale for the computation. In this paper, we have implemented a new\ntechnique to retain the service and assign tasks to the best and free available node already labeled by the manager node.The Cloud\nComputing Alarm(CCA) technique is working to provide all information about the services node and which one is ready to receive\nthe task from users. According to the simulation results, the CCA technique is making good enhancements on the QoS which will\nincrease the number of users to use the service. Additionally, the results showed that the CCA technique improved the services\nwithout any degrading of network performance by completing each task in less time....
In cloud computing, some large tasks may occupy too many resources and some small\ntasks may wait for a long time based on First-In-First-Out (FIFO) scheduling algorithm. To reduce\ntasks� waiting time, we propose a task scheduling algorithm based on fuzzy clustering algorithms.\nWe construct a task model, resource model, and analyze tasks� preference, then classify resources\nwith fuzzy clustering algorithms. Based on the parameters of cloud tasks, the algorithm will calculate\nresource expectation and assign tasks to different resource clusters, so the complexity of resource\nselection will be decreased. As a result, the algorithm will reduce tasks� waiting time and improve the\nresource utilization. The experiment results show that the proposed algorithm shortens the execution\ntime of tasks and increases the resource utilization....
With the rapid development of network and storage technology, cloud storage has become a new service mode, while data sharing\nand user revocation are important functions in the cloud storage. Therefore, according to the characteristics of cloud storage, a\nrevocable key-aggregate encryption scheme is put forward based on subset-cover framework. The proposed scheme not only has\nthe key-aggregate characteristics, which greatly simplifies the user�s key management, but also can revoke user access permissions,\nrealizing the flexible and effective access control. When user revocation occurs, it allows cloud server to update the ciphertext so\nthat revoked users can not have access to the new ciphertext, while nonrevoked users do not need to update their private keys. In\naddition, a verification mechanism is provided in the proposed scheme, which can verify the updated ciphertext and ensure that\nthe user revocation is performed correctly. Compared with the existing schemes, this scheme can not only reduce the cost of key\nmanagement and storage, but also realize user revocation and achieve user�s access control efficiently. Finally, the proposed scheme\ncan be proved to be selective chosen-plaintext security in the standard model....
This paper presents a review of the main characteristics of cloud computing, where they are exposed, their main components and ways of use. In addition to the technological review that is done, is also carried out. To understand how cloud computing can lead to a powerful ally of SMEs in the context of organizational competitiveness in a world where the role of information systems for a long time proved decisive, it is a reflection that the SMEs, whose core business is not technology, need to be carried out....
Loading....