Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 24
Filtrar
1.
Heliyon ; 10(19): e37912, 2024 Oct 15.
Artigo em Inglês | MEDLINE | ID: mdl-39386875

RESUMO

The convenience and cost-effectiveness offered by cloud computing have attracted a large customer base. In a cloud environment, the inclusion of the concept of virtualization requires careful management of resource utilization and energy consumption. With a rapidly increasing consumer base of cloud data centers, it faces an overwhelming influx of Virtual Machine (VM) requests. In cloud computing technology, the mapping of these requests onto the actual cloud hardware is known as VM placement which is a significant area of research. The article presents the Dragonfly Algorithm integrated with Modified Best Fit Decreasing (DA-MBFD) is proposed to minimize the overall power consumption and the migration count. DA-MBFD uses MBFD for ranking VMs based on their resource requirement, then uses the Minimization of Migration (MM) algorithm for hotspot detection followed by DA to optimize the replacement of VMs from the overutilized hosts. DA-MBFD is compared with a few of the other existing techniques to show its efficiency. The comparative analysis of DA-MBFD against E-ABC, E-MBFD, and MBFD-MM shows %improvement reflecting a significant reduction in power consumption 8.21 %, 8.6 %, 6.77 %, violations in service level agreement from 9.25 %, 6.98 %-7.86 % and number of migrations 6.65 %, 8.92 %, 7.02 %, respectively.

2.
Sci Rep ; 14(1): 18028, 2024 Aug 04.
Artigo em Inglês | MEDLINE | ID: mdl-39098886

RESUMO

Users can purchase virtualized computer resources using the cloud computing concept, which is a novel and innovative way of computing. It offers numerous advantages for IT and healthcare industries over traditional methods. However, a lack of trust between CSUs and CSPs is hindering the widespread adoption of cloud computing across industries. Since cloud computing offers a wide range of trust models and strategies, it is essential to analyze the service using a detailed methodology in order to choose the appropriate cloud service for various user types. Finding a wide variety of comprehensive elements that are both required and sufficient for evaluating any cloud service is vital in order to achieve that. As a result, this study suggests an accurate, fuzzy logic-based trust evaluation model for evaluating the trustworthiness of a cloud service provider. Here, we examine how fuzzy logic raises the efficiency of trust evaluation. Trust is assessed using Quality of Service (QoS) characteristics like security, privacy, dynamicity, data integrity, and performance. The outcomes of a MATLAB simulation demonstrate the viability of the suggested strategy in a cloud setting.

3.
Technol Health Care ; 32(4): 2837-2846, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38517825

RESUMO

BACKGROUND: Incubators, especially the ones for babies, require continuous monitoring for anomaly detection and taking action when necessary. OBJECTIVE: This study aims to introduce a system in which important information such as temperature, humidity and gas values being tracked from incubator environment continuously in real-time. METHOD: Multiple sensors, a microcontroller, a transmission module, a cloud server, a mobile application, and a Web application were integrated Data were made accessible to the duty personnel both remotely via Wi-Fi and in the range of the sensors via Bluetooth Low Energy technologies. In addition, potential emergencies were detected and alarm notifications were created utilising a machine learning algorithm. The mobile application receiving the data from the sensors via Bluetooth was designed such a way that it stores the data internally in case of Internet disruption, and transfers the data when the connection is restored. RESULTS: The obtained results reveal that a neural network structure with sensor measurements from the last hour gives the best prediction for the next hour measurement. CONCLUSION: The affordable hardware and software used in this system make it beneficial, especially in the health sector, in which the close monitoring of baby incubators is vitally important.


Assuntos
Incubadoras para Lactentes , Aprendizado de Máquina , Humanos , Monitorização Fisiológica/instrumentação , Monitorização Fisiológica/métodos , Aplicativos Móveis , Recém-Nascido , Alarmes Clínicos , Umidade , Internet das Coisas , Redes Neurais de Computação , Computação em Nuvem , Tecnologia sem Fio/instrumentação , Temperatura , Algoritmos
4.
Heliyon ; 9(4): e15177, 2023 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-37101644

RESUMO

The quality of cloud service is an important aspect to the success of any global business in today's world. The objective of this paper is to find the factors of the cloud service quality and assess the impact of service quality on customer satisfaction and loyalty. A survey of 419 cloud experts/users was conducted in India by means of an organized survey instrument/questionnaire based on Likert scale. The respondents were the cloud experts/users using the services of top 5 cloud service providers of India. Research hypotheses were tested using partial least squares structural equation modeling. The study found that agility, assurance of service, reliability, scalability, security, service responsiveness, and usability all have a positive and significant effect on overall cloud service quality. The research revealed the partial mediation effect of customer satisfaction amid service quality and customer loyalty. It is noticed that service quality has positive and significant link with customer loyalty and customer satisfaction. This establishes the partial mediation effect of customer satisfaction on the link between service quality and customer loyalty. Finally, the paper recommends cloud experts/users/service providers to give specific attention to these factors when migrating to cloud services.

5.
JMIR Med Inform ; 11: e44977, 2023 Apr 20.
Artigo em Inglês | MEDLINE | ID: mdl-37079367

RESUMO

BACKGROUND: The clinical narrative in electronic health records (EHRs) carries valuable information for predictive analytics; however, its free-text form is difficult to mine and analyze for clinical decision support (CDS). Large-scale clinical natural language processing (NLP) pipelines have focused on data warehouse applications for retrospective research efforts. There remains a paucity of evidence for implementing NLP pipelines at the bedside for health care delivery. OBJECTIVE: We aimed to detail a hospital-wide, operational pipeline to implement a real-time NLP-driven CDS tool and describe a protocol for an implementation framework with a user-centered design of the CDS tool. METHODS: The pipeline integrated a previously trained open-source convolutional neural network model for screening opioid misuse that leveraged EHR notes mapped to standardized medical vocabularies in the Unified Medical Language System. A sample of 100 adult encounters were reviewed by a physician informaticist for silent testing of the deep learning algorithm before deployment. An end user interview survey was developed to examine the user acceptability of a best practice alert (BPA) to provide the screening results with recommendations. The planned implementation also included a human-centered design with user feedback on the BPA, an implementation framework with cost-effectiveness, and a noninferiority patient outcome analysis plan. RESULTS: The pipeline was a reproducible workflow with a shared pseudocode for a cloud service to ingest, process, and store clinical notes as Health Level 7 messages from a major EHR vendor in an elastic cloud computing environment. Feature engineering of the notes used an open-source NLP engine, and the features were fed into the deep learning algorithm, with the results returned as a BPA in the EHR. On-site silent testing of the deep learning algorithm demonstrated a sensitivity of 93% (95% CI 66%-99%) and specificity of 92% (95% CI 84%-96%), similar to published validation studies. Before deployment, approvals were received across hospital committees for inpatient operations. Five interviews were conducted; they informed the development of an educational flyer and further modified the BPA to exclude certain patients and allow the refusal of recommendations. The longest delay in pipeline development was because of cybersecurity approvals, especially because of the exchange of protected health information between the Microsoft (Microsoft Corp) and Epic (Epic Systems Corp) cloud vendors. In silent testing, the resultant pipeline provided a BPA to the bedside within minutes of a provider entering a note in the EHR. CONCLUSIONS: The components of the real-time NLP pipeline were detailed with open-source tools and pseudocode for other health systems to benchmark. The deployment of medical artificial intelligence systems in routine clinical care presents an important yet unfulfilled opportunity, and our protocol aimed to close the gap in the implementation of artificial intelligence-driven CDS. TRIAL REGISTRATION: ClinicalTrials.gov NCT05745480; https://www.clinicaltrials.gov/ct2/show/NCT05745480.

6.
Sensors (Basel) ; 23(6)2023 Mar 10.
Artigo em Inglês | MEDLINE | ID: mdl-36991730

RESUMO

A variety of data-based services such as cloud services and big data-based services have emerged in recent times. These services store data and derive the value of the data. The reliability and integrity of the data must be ensured. Unfortunately, attackers have taken valuable data as hostage for money in attacks called ransomware. It is difficult to recover original data from files in systems infected by ransomware because they are encrypted and cannot be accessed without keys. There are cloud services to backup data; however, encrypted files are synchronized with the cloud service. Therefore, the original file cannot be restored even from the cloud when the victim systems are infected. Therefore, in this paper, we propose a method to effectively detect ransomware for cloud services. The proposed method detects infected files by estimating the entropy to synchronize files based on uniformity, one of the characteristics of encrypted files. For the experiment, files containing sensitive user information and system files for system operation were selected. In this study, we detected 100% of the infected files in all file formats, with no false positives or false negatives. We demonstrate that our proposed ransomware detection method was very effective compared to other existing methods. Based on the results of this paper, we expect that this detection method will not synchronize with a cloud server by detecting infected files even if the victim systems are infected with ransomware. In addition, we expect to restore the original files by backing up the files stored on the cloud server.

7.
Appl Nanosci ; 13(3): 2329-2342, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-35136707

RESUMO

Since the last decade, cloud-based electronic health records (EHRs) have gained significant attention to enable remote patient monitoring. The recent development of Healthcare 4.0 using the Internet of Things (IoT) components and cloud computing to access medical operations remotely has gained the researcher's attention from a smart city perspective. Healthcare 4.0 mainly consisted of periodic medical data sensing, aggregation, data transmission, data sharing, and data storage. The sensitive and personal data of patients lead to several challenges while protecting it from hackers. Therefore storing, accessing, and sharing the patient medical information on the cloud needs security attention that data should not be compromised by the authorized user's components of E-healthcare systems. To achieve secure medical data storage, sharing, and accessing in cloud service provider, several cryptography algorithms are designed so far. However, such conventional solutions failed to achieve the trade-off between the requirements of EHR security solutions such as computational efficiency, service side verification, user side verifications, without the trusted third party, and strong security. Blockchain-based security solutions gained significant attention in the recent past due to the ability to provide strong security for data storage and sharing with the minimum computation efforts. The blockchain made focused on bitcoin technology among the researchers. Utilizing the blockchain which secure healthcare records management has been of recent interest. This paper presents the systematic study of modern blockchain-based solutions for securing medical data with or without cloud computing. We implement and evaluate the different methods using blockchain in this paper. According to the research studies, the research gaps, challenges, and future roadmap are the outcomes of this paper that boost emerging Healthcare 4.0 technology.

8.
Sensors (Basel) ; 22(15)2022 Jul 30.
Artigo em Inglês | MEDLINE | ID: mdl-35957281

RESUMO

Cloud computing offers many benefits including business flexibility, scalability and cost savings but despite these benefits, there exist threats that require adequate attention for secure service delivery. Threats in a cloud-based system need to be considered from a holistic perspective that accounts for data, application, infrastructure and service, which can pose potential risks. Data certainly plays a critical role within the whole ecosystem and organisations should take account of and protect data from any potential threats. Due to the variation of data types, status, and location, understanding the potential security concerns in cloud-based infrastructures is more complex than in a traditional system. The existing threat modeling approaches lack the ability to analyse and prioritise data-related threats. The main contribution of the paper is a novel data-driven threat analysis (d-TM) approach for the cloud-based systems. The main motivation of d-TM is the integration of data from three levels of abstractions, i.e., management, control, and business and three phases, i.e., storage, process and transmittance, within each level. The d-TM provides a systematic flow of attack surface analysis from the user agent to the cloud service provider based on the threat layers in cloud computing. Finally, a cloud-based use case scenario was used to demonstrate the applicability of the proposed approach. The result shows that d-TM revealed four critical threats out of the seven threats based on the identified assets. The threats targeted management and business data in general, while targeting data in process and transit more specifically.


Assuntos
Computação em Nuvem , Ecossistema , Segurança Computacional
9.
Front Bioeng Biotechnol ; 10: 865130, 2022.
Artigo em Inglês | MEDLINE | ID: mdl-35445001

RESUMO

In this paper, a multidisciplinary cross-fusion of bionics, robotics, computer vision, and cloud service networks was used as a research platform to study wide-field bionic compound eye target recognition and detection from multiple perspectives. The current research status of wide-field bionic compound-eye target recognition and detection was analyzed, and improvement directions were proposed. The surface microlens array arrangement was designed, and the spaced surface bionic compound eye design principle cloud service network model was established for the adopted spaced-type circumferential hierarchical microlens array arrangement. In order to realize the target localization of the compound eye system, the content of each step of the localization scheme was discussed in detail. The distribution of virtual spherical targets was designed by using the subdivision of the positive icosahedron to ensure the uniformity of the targets. The spot image was pre-processed to achieve spot segmentation. The energy symmetry-based spot center localization algorithm was explored and its localization effect was verified. A suitable spatial interpolation method was selected to establish the mapping relationship between target angle and spot coordinates. An experimental platform of wide-field bionic compound eye target recognition and detection system was acquired. A super-resolution reconstruction algorithm combining pixel rearrangement and an improved iterative inverse projection method was used for image processing. The model was trained and evaluated in terms of detection accuracy, leakage rate, time overhead, and other evaluation indexes, and the test results showed that the cloud service network-based wide-field bionic compound eye target recognition and detection performs well in terms of detection accuracy and leakage rate. Compared with the traditional algorithm, the correct rate of the algorithm was increased by 21.72%. Through the research of this paper, the wide-field bionic compound eye target recognition and detection and cloud service network were organically provide more technical support for the design of wide-field bionic compound eye target recognition and detection system.

10.
Math Biosci Eng ; 19(2): 1471-1495, 2022 01.
Artigo em Inglês | MEDLINE | ID: mdl-35135213

RESUMO

Cloud computing is an attractive model that provides users with a variety of services. Thus, the number of cloud services on the market is growing rapidly. Therefore, choosing the proper cloud service is an important challenge. Another major challenge is the availability of diverse cloud services with similar performance, which makes it difficult for users to choose the cloud service that suits their needs. Therefore, the existing service selection approaches is not able to solve the problem, and cloud service recommendation has become an essential and important need. In this paper, we present a new way for context-aware cloud service recommendation. Our proposed method seeks to solve the weakness in user clustering, which itself is due to reasons such as 1) lack of full use of contextual information such as cloud service placement, and 2) inaccurate method of determining the similarity of two vectors. The evaluation conducted by the WSDream dataset indicates a reduction in the cloud service recommendation process error rate. The volume of data used in the evaluation of this paper is 5 times that of the basic method. Also, according to the T-test, the service recommendation performance in the proposed method is significant.


Assuntos
Computação em Nuvem , Análise por Conglomerados
11.
J Imaging ; 7(12)2021 Dec 17.
Artigo em Inglês | MEDLINE | ID: mdl-34940745

RESUMO

Word spotting strategies employed in historical handwritten documents face many challenges due to variation in the writing style and intense degradation. In this paper, a new method that permits efficient and effective word spotting in handwritten documents is presented that relies upon document-oriented local features that take into account information around representative keypoints and a matching process that incorporates a spatial context in a local proximity search without using any training data. The method relies on a document-oriented keypoint and feature extraction, along with a fast feature matching method. This enables the corresponding methodological pipeline to be both effectively and efficiently employed in the cloud so that word spotting can be realised as a service in modern mobile devices. The effectiveness and efficiency of the proposed method in terms of its matching accuracy, along with its fast retrieval time, respectively, are shown after a consistent evaluation of several historical handwritten datasets.

12.
Sensors (Basel) ; 20(6)2020 Mar 19.
Artigo em Inglês | MEDLINE | ID: mdl-32204390

RESUMO

Docker containers are the lightweight-virtualization technology prevailing today for the provision of microservices. This work raises and discusses two main challenges in Docker containers' scheduling in cloud-fog-internet of things (IoT) networks. First, the convenience to integrate intelligent containers' schedulers based on soft-computing in the dominant open-source containers' management platforms: Docker Swarm, Google Kubernetes and Apache Mesos. Secondly, the need for specific intelligent containers' schedulers for the different interfaces in cloud-fog-IoT networks: cloud-to-fog, fog-to-IoT and cloud-to-fog. The goal of this work is to support the optimal allocation of microservices provided by the main cloud service providers today and used by millions of users worldwide in applications such as smart health, content delivery networks, smart health, etc. Particularly, the improvement is studied in terms of quality of service (QoS) parameters such as latency, load balance, energy consumption and runtime, based on the analysis of previous works and implementations. Moreover, the scientific-technical impact of smart containers' scheduling in the market is also discussed, showing the possible repercussion of the raised opportunities in the research line.

13.
Sensors (Basel) ; 19(20)2019 Oct 20.
Artigo em Inglês | MEDLINE | ID: mdl-31635186

RESUMO

The middleware framework for IoT collaboration services should provide efficient solutions to context awareness and uncertainty issues among multiple collaboration domains. However, existing middleware frameworks are mostly limited to a single system, and developing self-adaptive IoT collaboration services using existing frameworks requires developers to take considerable time and effort. Furthermore, the developed IoT collaboration services are often dependent on a particular domain, which cannot easily be referenced in other domains. This paper proposes a cloud-based middleware framework that provides a set of cloud services for self-adaptive IoT collaboration services. The proposed middleware framework is generic in the sense that it clearly separates domain-dependent components from the layers that leverage existing middleware frameworks. In addition, the proposed framework allows developers to upload domain-dependent components onto the cloud, search for registered components, and launch Virtual Machine (VM) running a new MAPE cycle via a convenient web-based interface. The feasibility of the proposed framework has been shown with a simulation of an IoT collaboration service that traces a criminal suspect. The performance evaluation shows that the proposed middleware framework runs with an overhead of only 6% compared to pure Java-based middleware and is scalable as the number of VMs increases up to 16.

14.
Entropy (Basel) ; 21(5)2019 May 02.
Artigo em Inglês | MEDLINE | ID: mdl-33267176

RESUMO

The popularity of cloud computing has made cloud services gradually become the leading computing model nowadays. The trustworthiness of cloud services depends mainly on construction processes. The trustworthiness measurement of cloud service construction processes (CSCPs) is crucial for cloud service developers. It can help to find out the causes of failures and to improve the development process, thereby ensuring the quality of cloud service. Herein, firstly, a trustworthiness hierarchy model of CSCP was proposed, and the influential factors of the processes were identified following the international standard ISO/IEC 12207 of the software development process.Further, a method was developed combined with the theory of information entropy and the concept of trustworthiness. It aimed to calculate the risk uncertainty and risk loss expectation affecting trustworthiness. Also, the trustworthiness of cloud service and its main construction processes were calculated. Finally, the feasibility of the measurement method were verified through a case study, and through comparing with AHP and CMM/CMMI methods, the advantages of this method were embodied.

15.
Sensors (Basel) ; 18(12)2018 Nov 23.
Artigo em Inglês | MEDLINE | ID: mdl-30477194

RESUMO

Nowadays, many intelligent vehicles are equipped with various sensors to recognize their surrounding environment and to measure the motion or position of the vehicle. In addition, the number of intelligent vehicles equipped with a mobile Internet modem is increasing. Based on the sensors and Internet connection, the intelligent vehicles are able to share the sensor information with other vehicles via a cloud service. The sensor information sharing via the cloud service promises to improve the safe and efficient operation of the multiple intelligent vehicles. This paper presents a cloud update framework of occupancy grid maps for multiple intelligent vehicles in a large-scale environment. An evidential theory is applied to create the occupancy grid maps to address sensor disturbance such as measurement noise, occlusion and dynamic objects. Multiple vehicles equipped with LiDARs, motion sensors, and a low-cost GPS receiver create the evidential occupancy grid map (EOGM) for their passing trajectory based on GraphSLAM. A geodetic quad-tree tile system is applied to manage the EOGM, which provides a common tiling format to cover the large-scale environment. The created EOGM tiles are uploaded to EOGM cloud and merged with old EOGM tiles in the cloud using Dempster combination of evidential theory. Experiments were performed to evaluate the multiple EOGM mapping and the cloud update framework for large-scale road environment.

16.
J Med Internet Res ; 20(9): e10135, 2018 09 24.
Artigo em Inglês | MEDLINE | ID: mdl-30249584

RESUMO

BACKGROUND: Most electronic health (eHealth) interventions offered to patients serve a single purpose and lack integration with other tools or systems. This is problematic because the majority of patients experience comorbidity and chronic disease, see multiple specialists, and therefore have different needs regarding access to patient data, communication with peers or providers, and self-monitoring of vital signs. A multicomponent digital health cloud service that integrates data sharing, collection, and communication could facilitate patient-centered care in combination with a hospital patient portal and care professionals. OBJECTIVE: This study aimed to assess the feasibility and functionality of a new cloud-based and multicomponent outpatient clinic, the "Virtual Outpatient Clinic" (VOC). METHODS: The VOC consists of 6 digital tools that facilitate self-monitoring (blood pressure, weight, and pain) and communication with peers and providers (chat and videoconferencing) connected to a cloud-based platform and the hospital patient portal to facilitate access to (self-collected) medical data. In this proof-of-concept study, 10 patients from both Departments of Internal Medicine and Dermatology (N=20) used all options of the VOC for 6 weeks. An eNurse offered support to participants during the study. We assessed the feasibility, usage statistics, content, adherence, and identified technical issues. Moreover, we conducted qualitative interviews with all participants by following a standard interview guide to identify user experiences, including barriers, facilitators, and potential effects. RESULTS: Most participants successfully used all options of the VOC and were positive about different tools and apps and the integral availability of their information. The adherence was 37% (7/19) for weight scale, 58% (11/19) for blood pressure monitor, and 70% (14/20) and 85% (17/20) for pain score and daily questions, respectively. The adherence for personal health record was 65% (13/20) and 60% (12/20) for the patient portal system. Qualitative data showed that performance and effort expectancy scored high among participants, indicating that using the VOC is convenient, easy, and time-saving. CONCLUSIONS: The VOC is a promising integrated Web-based technology that combines self-management, data sharing, and communication between patients and professionals. The system can be personalized by connecting various numbers of components, which could make it a relevant tool for other patient groups. Before a system, such as the VOC, can be implemented in daily practice, prospective studies focused on evaluating outcomes, costs, and patient-centeredness are needed.


Assuntos
Instituições de Assistência Ambulatorial , Computação em Nuvem , Registros Eletrônicos de Saúde , Educação de Pacientes como Assunto , Assistência Centrada no Paciente , Adolescente , Adulto , Idoso , Doença Crônica , Comunicação , Feminino , Hospitais , Humanos , Masculino , Pessoa de Meia-Idade , Países Baixos , Estudo de Prova de Conceito , Estudos Prospectivos , Adulto Jovem
17.
Neural Netw ; 108: 339-354, 2018 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-30245433

RESUMO

Trustworthiness is a comprehensive quality metric which is used to assess the quality of the services in service-oriented environments. However, trust prediction of cloud services based on the multi-faceted Quality of Service (QoS) attributes is a challenging task due to the complicated and non-linear relationships between the QoS values and the corresponding trust result. Recent research works reveal the significance of Artificial Neural Network (ANN) and its variants in providing a reasonable degree of success in trust prediction problems. However, the challenges with respect to weight assignment, training time and kernel functions make ANN and its variants under continuous advancements. Hence, this work presents a novel multi-level Hypergraph Coarsening based Robust Heteroscedastic Probabilistic Neural Network (HC-RHRPNN) to predict trustworthiness of cloud services to build high-quality service applications. HC-RHRPNN employs hypergraph coarsening to identify the informative samples, which were then used to train HRPNN to improve its prediction accuracy and minimize the runtime. The performance of HC-RHRPNN was evaluated using Quality of Web Service (QWS) dataset, a public QoS dataset in terms of classifier accuracy, precision, recall, and F-Score.


Assuntos
Computação em Nuvem/tendências , Modelos Estatísticos , Redes Neurais de Computação , Algoritmos , Computação em Nuvem/normas , Sistemas Computacionais/normas , Sistemas Computacionais/tendências , Previsões , Humanos
18.
J Adv Res ; 8(6): 569-576, 2017 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-28794902

RESUMO

Cloud computing is a pattern for delivering ubiquitous and on demand computing resources based on pay-as-you-use financial model. Typically, cloud providers advertise cloud service descriptions in various formats on the Internet. On the other hand, cloud consumers use available search engines (Google and Yahoo) to explore cloud service descriptions and find the adequate service. Unfortunately, general purpose search engines are not designed to provide a small and complete set of results, which makes the process a big challenge. This paper presents a generic-distrusted framework for cloud services marketplace to automate cloud services discovery and selection process, and remove the barriers between service providers and consumers. Additionally, this work implements two instances of generic framework by adopting two different matching algorithms; namely dominant and recessive attributes algorithm borrowed from gene science and semantic similarity algorithm based on unified cloud service ontology. Finally, this paper presents unified cloud services ontology and models the real-life cloud services according to the proposed ontology. To the best of the authors' knowledge, this is the first attempt to build a cloud services marketplace where cloud providers and cloud consumers can trend cloud services as utilities. In comparison with existing work, semantic approach reduced the execution time by 20% and maintained the same values for all other parameters. On the other hand, dominant and recessive attributes approach reduced the execution time by 57% but showed lower value for recall.

19.
Chongqing Medicine ; (36): 1963-1965, 2017.
Artigo em Chinês | WPRIM (Pacífico Ocidental) | ID: wpr-609995

RESUMO

Objective To explore the mental health status of physical examination population,and provide the basis for mental health guidance.Methods The SCL-90 scale in the cloud service system of PEM was used to evaluate the gender, marriage, age, education, income and other factors in the physical examination cases of our hospital.Results The positive rate of SCL-90 in 809 patients was 27.94%.Female scores,and the scores of somatization, obsessive-compulsive symptoms, depression, anxiety, terror of women were higher than those of men except paranoid.Unmarried population scores and the scores of all factors were higher than those of married and divorced people.The scores of all factors in the 18-<30 year-old cases was the highest among all cases;the scores of depression,hostility and paranoid was decreased with the increase of age;the score of somatization, obsessive-compulsive symptoms, interpersonal sensitivity, anxiety, terror,spirit of 50-60 year-old cases were the lowest among all cases.The higher the degree of education,and the more economic income, the lower the psychological evaluation of each factors scored.Conclusion The mental health problems of female,unmarried,low age,low education,low-income groups are grim.

20.
Appl Clin Inform ; 7(4): 983-993, 2016 10 26.
Artigo em Inglês | MEDLINE | ID: mdl-27781238

RESUMO

BACKGROUND: Cloud computing promises to essentially improve healthcare delivery performance. However, shifting sensitive medical records to third-party cloud providers could create an adoption hurdle because of security and privacy concerns. OBJECTIVES: This study examines the effect of confidentiality assurance in a cloud-computing environment on individuals' willingness to accept the infrastructure for inter-organizational sharing of medical data. METHODS: We empirically investigate our research question by a survey with over 260 full responses. For the setting with a high confidentiality assurance, we base on a recent multi-cloud architecture which provides very high confidentiality assurance through a secret-sharing mechanism: Health information is cryptographically encoded and distributed in a way that no single and no small group of cloud providers is able to decode it. RESULTS: Our results indicate the importance of confidentiality assurance in individuals' acceptance of health clouds for sensitive medical data. Specifically, this finding holds for a variety of practically relevant circumstances, i.e., in the absence and despite the presence of conventional offline alternatives and along with pseudonymization. On the other hand, we do not find support for the effect of confidentiality assurance in individuals' acceptance of health clouds for non-sensitive medical data. These results could support the process of privacy engineering for health-cloud solutions.


Assuntos
Computação em Nuvem , Confidencialidade/psicologia , Aceitação pelo Paciente de Cuidados de Saúde/psicologia , Adulto , Registros Eletrônicos de Saúde , Feminino , Humanos , Masculino , Inquéritos e Questionários
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA