LEADER 10510nam 2200505 450 001 9910556883303321 005 20231110224346.0 010 $a3-030-99191-1 035 $a(MiAaPQ)EBC6935560 035 $a(Au-PeEL)EBL6935560 035 $a(CKB)21418289700041 035 $a(PPN)261519743 035 $a(EXLCZ)9921418289700041 100 $a20221106d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCloud computing $e11th EAI International Conference, CloudComp 2021, virtual event, December 9-10, 2021, proceedings /$fedited by Mohammad R. Khosravi, Qiang He, Haipeng Dai 210 1$aCham, Switzerland :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (241 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;$vv.430 311 08$aPrint version: Khosravi, Mohammad R. Cloud Computing Cham : Springer International Publishing AG,c2022 9783030991906 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents -- Data Analytics for Cloud Systems with Distributed Applications -- Load Quality Analysis and Forecasting for Power Data Set on Cloud Platform -- 1 Introduction -- 2 Analysis and Improvement of Power Data -- 2.1 Classification and Comparison of Common Power Data Sets -- 2.2 The Function of Electric Power Data Set -- 2.3 Methods of Improving Data Quality -- 3 Data Prediction -- 3.1 ARIMA Model -- 3.2 LSTM Model -- 3.3 Experimental Results and Evaluation -- 4 Conclusion -- References -- A Survey of Traffic Prediction Based on Deep Neural Network: Data, Methods and Challenges -- 1 Introduction -- 2 Classification of Traffic Data -- 2.1 Spatial Static Time Dynamic Data -- 2.2 Spatio-Temporal Dynamic Data -- 3 Deep Neural Networks for Traffic Prediction -- 3.1 A Traffic Forecasting Method Based on CNN -- 3.2 A Traffic Forecasting Method Based on RNN -- 3.3 A Traffic Forecasting Method Based on the Hybrid Model -- 4 Challenges -- 5 Conclusions -- References -- A Dynamic Gesture Recognition Control File Method Based on Deep Learning -- 1 Introduction -- 2 Construction of PyTorch Model, YOLOv4 and Realization of Control Algorithm -- 2.1 PyTorch Model -- 2.2 Introduction to YOLO -- 2.3 Control Algorithm -- 3 Experiment and Result Analysis -- 3.1 Experimental Platform and Data Set -- 3.2 Network Training -- 3.3 Result Analysis -- 4 Conclusion -- References -- A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment -- 1 Introduction -- 2 Methods -- 2.1 Three Layer Model-L2R (= 0.001) Overall Network Architecture -- 2.2 Back Propagation (BP) Algorithm -- 2.3 Baseline Model -- 3 Deep Learning Distributed System -- 4 Experiment and Analysis -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Model Performance -- 5 Conclusion -- References. 327 $aTriangle Coordinate Diagram Localization for Academic Literature Based on Line Segment Detection in Cloud Computing -- 1 Introduction -- 2 Related Work -- 3 Triangle Coordinate Diagram Localization -- 3.1 Gaussian Filter and Sobel Operator -- 3.2 Line Segment Detector -- 3.3 Line Segment Merging -- 3.4 Diagram Localization -- 4 Experiment -- 4.1 Dataset -- 4.2 Experimental Method -- 4.3 Experimental Results and Numerical Analysis -- 5 Conclusion -- References -- Optimizing Fund Allocation for Game-Based Verifiable Computation Outsourcing -- 1 Introduction -- 2 System Architecture -- 3 Optimization Problem -- 4 Setting I: Server S vs Single Client Ci -- 4.1 Client's Optimization Problem -- 4.2 Server's Optimization Problem -- 4.3 Proposed Algorithm -- 4.4 Analysis -- 5 Setting II: Server S vs Clients C1,@?????,Cm -- 5.1 Algorithm -- 5.2 Analysis -- 6 Conclusions and Future Works -- References -- A Survey of Face Image Inpainting Based on Deep Learning -- 1 Introduction -- 2 Face Inpainting Method Based on Deep Learning -- 2.1 Attention-Based Image Inpainting -- 2.2 Semantic-Based Image Inpainting -- 2.3 Progressive-Based Image Inpainting -- 3 Datasets and Evaluation Indicators -- 3.1 Dataset -- 3.2 Evaluating Indicator -- 4 Conclusion -- References -- Cloud Architecture and Challenges in Real-World Use -- Layered Service Model Architecture for Cloud Computing -- 1 Introduction -- 2 Important Terms and Definitions -- 2.1 Cloud Computing -- 2.2 Cloud Service Provider or CSP -- 2.3 Infrastructure as a Service or IaaS -- 2.4 Platform as a Service or PaaS -- 2.5 Software as a Service or SaaS -- 2.6 Serverless Computing -- 2.7 Containers and Containers as a Service (CaaS) -- 3 Need to Think Beyond IaaS, PaaS, and SaaS -- 3.1 Serverless vs IaaS, PaaS, and SaaS -- 3.2 CaaS vs IaaS, PaaS, and SaaS -- 4 Existing Approaches and the Need for New Approach. 327 $a4.1 XaaS (Anything as a Service) -- 4.2 Johan Den Haan Framework for Categorizing Cloud Services -- 5 Proposed Architecture -- 5.1 Preview -- 5.2 Design Methodology and Trends -- 5.3 Architecture Explanation -- 5.4 Layers Explanation and Criteria -- 6 Plotting Cloud Products in the Proposed Architecture -- 7 Future Research Directions -- 8 Conclusion -- References -- KPG4Rec: Knowledge Property-Aware Graph for Recommender Systems -- 1 Introduction -- 2 Preliminary and Overview -- 2.1 Knowledge Graph (KG) -- 2.2 Node2vec Mechanism -- 2.3 Locality Sensitive Hashing (LSH) -- 2.4 Problem Formulation -- 3 Methodology -- 3.1 Construction of Property-Aware Graphs -- 3.2 Generation of Property-Aware Vectors -- 3.3 Regeneration of User Preference Sequence with LSH -- 3.4 Prediction Module -- 4 Experiments -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Impact of Parameters -- 4.4 Performance Evaluation -- 4.5 Evaluation of Different Properties -- 5 Related Work -- 5.1 Random Walk Algorithm -- 5.2 Recommendations Using Knowledge Graph -- 6 Conclusion -- References -- ERP as Software-as-a-Service: Factors Depicting Large Enterprises Cloud Adoption -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Results -- 4.1 Service Quality -- 4.2 Costs -- 4.3 Technical Limitations -- 4.4 Cloud Characteristics -- 5 Discussion and Conclusions -- References -- Design of an Evaluation System of Limb Motor Function Using Inertial Sensor -- 1 Introduction -- 2 Design of the Rehabilitation Assessment Module -- 2.1 General Structure Design -- 2.2 Realization of Upper Limb Real Time Motion Simulation -- 3 Discussion -- 4 Conclusion -- References -- Towards a GPU-Accelerated Open Source VDI for OpenStack -- 1 Motivation -- 2 Related Work -- 2.1 GPU Virtualization -- 2.2 Video Encoding and Decoding -- 2.3 Remote Desktop Transport -- 2.4 Preliminary Work in bwLehrpool. 327 $a2.5 OpenStack - Basis and Missing Pieces -- 3 Proposed System Architecture -- 4 Work Program and Planned Efforts -- 5 Conclusion and Outlook -- References -- Security in Cloud/Edge Platforms -- Trustworthy IoT Computing Environment Based on Layered Blockchain Consensus Framework -- 1 Introduction -- 2 Related Works -- 3 Trustworthy IoT Model with Integrated Blockchain -- 3.1 System Model Overview -- 3.2 Build a Two-Layer Blockchain for the IoT -- 4 Layered Chained BFT (LCBFT) Consensus Mechanism -- 4.1 Overview of the HotStuff -- 4.2 Consensus and Block Generation in Energy-Constrained Part -- 4.3 Global Blockchain Consensus and Joining Blocks onto the Chain -- 4.4 Liveness Mechanism of Consensus Process -- 5 Microservice-Based Consensus Protocol Deployment Plan -- 6 Evaluation -- 6.1 Computational Structure of the Two Consensus Mechanisms -- 6.2 Energy Consumption Analysis of Two Consensus Mechanism -- 7 Conclusion -- References -- Heuristic Network Security Risk Assessment Based on Attack Graph -- 1 Introduction -- 2 Related Work -- 3 Heuristic Network Security Risk Assessment Based on Attack Graph -- 3.1 Attack Graph -- 3.2 Heuristic Graph Arborescences of Maximum Weight Generation Algorithm -- 3.3 Heuristic Attack Path Finding Algorithm for Maximum Risk -- 3.4 Node Importance Evaluation Based on ISM -- 4 Experimental Settings and Results -- 4.1 Experimental Environment -- 4.2 Experimental Results -- 5 Conclusion -- References -- Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System -- 1 Introduction -- 2 Related Work -- 2.1 Anomaly Detection -- 2.2 Active Defense -- 3 Research Motivation -- 4 An Active Defense System Framework Design -- 4.1 The Behavioral Feature Extraction of Typical Network Security Events -- 4.2 The Security Disposal Strategy Generation of Typical Network Security Events. 327 $a4.3 The Automation Orchestration of Security Disposal Strategies -- 5 A Case Study -- 6 Conclusion and Future Work -- References -- Energy- and Reliability-Aware Computation Offloading with Security Constraints in MEC-Enabled Smart Cities -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Network System Model -- 3.2 Workflow Applications Model -- 3.3 Energy Consumption Model -- 3.4 Resource Utilization Model -- 3.5 Reliability Model -- 3.6 Privacy Preservation Model -- 3.7 Problem Formulation -- 4 Energy- and Reliability-Aware Multi-objective Optimization Method with Security Constraint (ERMOS) -- 5 Experimental Evaluation -- 5.1 Experimental Setting -- 5.2 Experimental Result and Discussion -- 6 Conclusion -- References -- A Review of Cross-Blockchain Solutions -- 1 Introduction -- 2 Mature Cross-Blockchain Solutions -- 2.1 Notary Schemes -- 2.2 Sidechain/Relay -- 2.3 Hash-Locking -- 3 Innovative Cross-Blockchain Solutions -- 3.1 DexTT -- 3.2 Blockchain Router -- 3.3 Satellite Chain -- 3.4 HyperService -- 4 Industrial Solutions -- 4.1 Cosmos -- 4.2 Polkadot -- 4.3 Aion -- 4.4 Wanchain -- 4.5 Lisk -- 4.6 Ark -- 4.7 Metronome -- 5 Conclusion -- References -- Author Index. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 606 $aCloud computing 615 0$aCloud computing. 676 $a004.6782 702 $aDai$b Haipeng 702 $aHe$b Qiang 702 $aKhosravi$b Mohammad R. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910556883303321 996 $aCloud Computing$9773733 997 $aUNINA