As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.
The dielectric characteristic of fly ash is an important factor to influence the efficiency of electrostatic precipitators (ESP). By studying on the volt-ampere characteristic, the resistivity characteristic and the electric breakdown characteristic of fly ash burned coal, it is found that the relation among the voltage forced to the ash layer, the leak current flowed to the ash layer and the specific resistivity of fly ash does not always follow the classical ohm’s law, that is, V/I is not always constant. The volt-ampere characteristic curves of fly ash have different shapes while the voltage is in the different phases. Along with the voltage increasing, the specific resistivity is tending downward, and the range is less than 1 order of magnitude. Different fly ash has different capacity characteristic. And there are three methods to the breakdown of fly ash: the volume breakdown, the surface breakdown, and the interstice breakdown. The ways of breakdown is influenced with the particle characteristic, the surface characteristic and the electrostatic characteristic.
In this paper, a modified method to measure the degree of similarity between generalized fuzzy numbers based on Hausdorff distance is presented. Eighteen sets of generalized fuzzy numbers are used to compare the proposed method with the existing similarity measures. The results show that the proposed similarity measure can overcome the drawbacks of the existing methods.
Evaluation for target threat is an important part in the defensive decision making. As to each target, there are multiple attributes described by fuzzy or uncertain information which is represented with interval numbers. How to integrate these fuzzy information becomes a meaningful work. This paper integrates the fuzzy numbers by introducing the distance among interval numbers to find a special interval number whose distance is the optimal value from all other interval numbers, then the comparison between multi-attributive targets is transformed into the comparison among only several interval numbers. On this basis, this paper solves the question about how to make a sequence among the aerial targets according to their different threat degrees.Index Terms-integration of interval numbers,threat evaluating, multi-objective
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.