期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
1
作者 Nader Abdel Karim Osama A.Khashan +4 位作者 Waleed K.Abdulraheem Moutaz Alazab Hasan Kanaker Mahmoud E.Farfoura Mohammad Alshinwan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2023-2045,共23页
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i... As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads. 展开更多
关键词 Cloud computing performance VIRTUALIZATION hypervisors HYPER-V KVM cryptographic algorithm
在线阅读 下载PDF
Methods for the Efficient Energy Management in a Smart Mini Greenhouse
2
作者 Vasyl Teslyuk Ivan Tsmots +2 位作者 Michal Gregus ml. Taras Teslyuk Iryna Kazymyra 《Computers, Materials & Continua》 SCIE EI 2022年第2期3169-3187,共19页
To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption.One of the possible ways is proposed in this research.A multi-level hierarchical system for energy efficiency... To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption.One of the possible ways is proposed in this research.A multi-level hierarchical system for energy efficiency management of the enterprise is designed,it is based on the modular principle providing rapid modernization.The novelty of the work is the development of new and improvement of the existing methods and models,in particular:1)models for dynamic analysis of IT tools for data acquisition and processing(DAAP)in multilevel energy management systems,which are based on Petri nets;2)method of synthesis of DAAP tools in energy efficiency management information systems(EEMIS)of the enterprise which provides a reduction in hardware and time costs from 10%to 40%;3)method of conflict-free data exchange determining the minimum memory speed for the synthesis of realtime exchanges,it reduces the cost and energy consumption;4)method of calculating the signal of postsynaptic excitation of neural elements decreases the processing time of technological data two or more times.The proposed methods,models and tools have been tested while implementing the EEMIS of the intelligent mini-greenhouse,as a result,energy efficiency has increased by 12%-25%(depending on season and peculiarities of growing plants). 展开更多
关键词 Energy efficiency management information system(EEMIS) data acquisition and processing(DAAP) industry 4.0 Petri nets smart mini greenhouse
在线阅读 下载PDF
An Optimal Scheme for WSN Based on Compressed Sensing
3
作者 Firas Ibrahim AlZobi Ahmad Ali AlZubi +3 位作者 Kulakov Yurii Abdullah Alharbi Jazem Mutared Alanazi Sami Smadi 《Computers, Materials & Continua》 SCIE EI 2022年第7期1053-1069,共17页
Wireless sensor networks(WSNs)is one of the renowned ad hoc network technology that has vast varieties of applications such as in computer networks,bio-medical engineering,agriculture,industry and many more.It has bee... Wireless sensor networks(WSNs)is one of the renowned ad hoc network technology that has vast varieties of applications such as in computer networks,bio-medical engineering,agriculture,industry and many more.It has been used in the internet-of-things(IoTs)applications.A method for data collecting utilizing hybrid compressive sensing(CS)is developed in order to reduce the quantity of data transmission in the clustered sensor network and balance the network load.Candidate cluster head nodes are chosen first from each temporary cluster that is closest to the cluster centroid of the nodes,and then the cluster heads are selected in order based on the distance between the determined cluster head node and the undetermined candidate cluster head node.Then,each ordinary node joins the cluster that is nearest to it.The greedy CS is used to compress data transmission for nodes whose data transmission volume is greater than the threshold in a data transmission tree with the Sink node as the root node and linking all cluster head nodes.The simulation results demonstrate that when the compression ratio is set to ten,the data transfer volume is reduced by a factor of ten.When compared to clustering and SPT without CS,it is reduced by 75%and 65%,respectively.When compared to SPT with Hybrid CS and Clustering with hybrid CS,it is reduced by 35%and 20%,respectively.Clustering and SPT without CS are compared in terms of node data transfer volume standard deviation.SPT with Hybrid CS and clustering with Hybrid CS were both reduced by 62%and 80%,respectively.When compared to SPT with hybrid CS and clustering with hybrid CS,the latter two were reduced by 41%and 19%,respectively. 展开更多
关键词 Compressed sensing computer networks sensor networks ad hoc networks
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部