WorldWideScience

Sample records for internet ware cloud

  1. Internet ware cloud computing :Challenges

    OpenAIRE

    Qamar, S; Lal, Niranjan; Singh, Mrityunjay

    2010-01-01

    After decades of engineering development and infrastructural investment, Internet connections have become commodity product in many countries, and Internet scale “cloud computing” has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internet ware Cloud Computing is termed as the next big thing in the modern corporate world. Apart from the present day software and technologies,...

  2. SeqWare Query Engine: storing and searching sequence data in the cloud

    Directory of Open Access Journals (Sweden)

    Merriman Barry

    2010-12-01

    Full Text Available Abstract Background Since the introduction of next-generation DNA sequencers the rapid increase in sequencer throughput, and associated drop in costs, has resulted in more than a dozen human genomes being resequenced over the last few years. These efforts are merely a prelude for a future in which genome resequencing will be commonplace for both biomedical research and clinical applications. The dramatic increase in sequencer output strains all facets of computational infrastructure, especially databases and query interfaces. The advent of cloud computing, and a variety of powerful tools designed to process petascale datasets, provide a compelling solution to these ever increasing demands. Results In this work, we present the SeqWare Query Engine which has been created using modern cloud computing technologies and designed to support databasing information from thousands of genomes. Our backend implementation was built using the highly scalable, NoSQL HBase database from the Hadoop project. We also created a web-based frontend that provides both a programmatic and interactive query interface and integrates with widely used genome browsers and tools. Using the query engine, users can load and query variants (SNVs, indels, translocations, etc with a rich level of annotations including coverage and functional consequences. As a proof of concept we loaded several whole genome datasets including the U87MG cell line. We also used a glioblastoma multiforme tumor/normal pair to both profile performance and provide an example of using the Hadoop MapReduce framework within the query engine. This software is open source and freely available from the SeqWare project (http://seqware.sourceforge.net. Conclusions The SeqWare Query Engine provided an easy way to make the U87MG genome accessible to programmers and non-programmers alike. This enabled a faster and more open exploration of results, quicker tuning of parameters for heuristic variant calling filters

  3. SeqWare Query Engine: storing and searching sequence data in the cloud

    Science.gov (United States)

    2010-01-01

    Background Since the introduction of next-generation DNA sequencers the rapid increase in sequencer throughput, and associated drop in costs, has resulted in more than a dozen human genomes being resequenced over the last few years. These efforts are merely a prelude for a future in which genome resequencing will be commonplace for both biomedical research and clinical applications. The dramatic increase in sequencer output strains all facets of computational infrastructure, especially databases and query interfaces. The advent of cloud computing, and a variety of powerful tools designed to process petascale datasets, provide a compelling solution to these ever increasing demands. Results In this work, we present the SeqWare Query Engine which has been created using modern cloud computing technologies and designed to support databasing information from thousands of genomes. Our backend implementation was built using the highly scalable, NoSQL HBase database from the Hadoop project. We also created a web-based frontend that provides both a programmatic and interactive query interface and integrates with widely used genome browsers and tools. Using the query engine, users can load and query variants (SNVs, indels, translocations, etc) with a rich level of annotations including coverage and functional consequences. As a proof of concept we loaded several whole genome datasets including the U87MG cell line. We also used a glioblastoma multiforme tumor/normal pair to both profile performance and provide an example of using the Hadoop MapReduce framework within the query engine. This software is open source and freely available from the SeqWare project (http://seqware.sourceforge.net). Conclusions The SeqWare Query Engine provided an easy way to make the U87MG genome accessible to programmers and non-programmers alike. This enabled a faster and more open exploration of results, quicker tuning of parameters for heuristic variant calling filters, and a common data

  4. SeqWare Query Engine: storing and searching sequence data in the cloud.

    Science.gov (United States)

    O'Connor, Brian D; Merriman, Barry; Nelson, Stanley F

    2010-12-21

    Since the introduction of next-generation DNA sequencers the rapid increase in sequencer throughput, and associated drop in costs, has resulted in more than a dozen human genomes being resequenced over the last few years. These efforts are merely a prelude for a future in which genome resequencing will be commonplace for both biomedical research and clinical applications. The dramatic increase in sequencer output strains all facets of computational infrastructure, especially databases and query interfaces. The advent of cloud computing, and a variety of powerful tools designed to process petascale datasets, provide a compelling solution to these ever increasing demands. In this work, we present the SeqWare Query Engine which has been created using modern cloud computing technologies and designed to support databasing information from thousands of genomes. Our backend implementation was built using the highly scalable, NoSQL HBase database from the Hadoop project. We also created a web-based frontend that provides both a programmatic and interactive query interface and integrates with widely used genome browsers and tools. Using the query engine, users can load and query variants (SNVs, indels, translocations, etc) with a rich level of annotations including coverage and functional consequences. As a proof of concept we loaded several whole genome datasets including the U87MG cell line. We also used a glioblastoma multiforme tumor/normal pair to both profile performance and provide an example of using the Hadoop MapReduce framework within the query engine. This software is open source and freely available from the SeqWare project (http://seqware.sourceforge.net). The SeqWare Query Engine provided an easy way to make the U87MG genome accessible to programmers and non-programmers alike. This enabled a faster and more open exploration of results, quicker tuning of parameters for heuristic variant calling filters, and a common data interface to simplify development of

  5. Future internet architecture and cloud ecosystem: A survey

    Science.gov (United States)

    Wan, Man; Yin, Shiqun

    2018-04-01

    The Internet has gradually become a social infrastructure, the existing TCP/IP architecture faces many challenges. So future Internet architecture become hot research. This paper introduces two ways of idea about the future research of Internet structure system, probes into the future Internet architecture and the environment of cloud ecosystem. Finally, we focuses the related research, and discuss basic principles and problems of OpenStack.

  6. CLOUD COMPUTING AND INTERNET OF THINGS FOR SMART CITY DEPLOYMENTS

    Directory of Open Access Journals (Sweden)

    GEORGE SUCIU

    2013-05-01

    Full Text Available Cloud Computing represents the new method of delivering hardware and software resources to the users, Internet of Things (IoT is currently one of the most popular ICT paradigms. Both concepts can have a major impact on how we build smart or/and smarter cities. Cloud computing represents the delivery of hardware and software resources on-demand over the Internet as a Service. At the same time, the IoT concept envisions a new generation of devices (sensors, both virtual and physical that are connected to the Internet and provide different services for value-added applications. In this paper we present our view on how to deploy Cloud computing and IoT for smart or/and smarter cities. We demonstrate that data gathered from heterogeneous and distributed IoT devices can be automatically managed, handled and reused with decentralized cloud services.

  7. On Study of Building Smart Campus under Conditions of Cloud Computing and Internet of Things

    Science.gov (United States)

    Huang, Chao

    2017-12-01

    two new concepts in the information era are cloud computing and internet of things, although they are defined differently, they share close relationship. It is a new measure to realize leap-forward development of campus by virtue of cloud computing, internet of things and other internet technologies to build smart campus. This paper, centering on the construction of smart campus, analyzes and compares differences between network in traditional campus and that in smart campus, and makes proposals on how to build smart campus finally from the perspectives of cloud computing and internet of things.

  8. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  9. The monitoring and managing application of cloud computing based on Internet of Things.

    Science.gov (United States)

    Luo, Shiliang; Ren, Bin

    2016-07-01

    Cloud computing and the Internet of Things are the two hot points in the Internet application field. The application of the two new technologies is in hot discussion and research, but quite less on the field of medical monitoring and managing application. Thus, in this paper, we study and analyze the application of cloud computing and the Internet of Things on the medical field. And we manage to make a combination of the two techniques in the medical monitoring and managing field. The model architecture for remote monitoring cloud platform of healthcare information (RMCPHI) was established firstly. Then the RMCPHI architecture was analyzed. Finally an efficient PSOSAA algorithm was proposed for the medical monitoring and managing application of cloud computing. Simulation results showed that our proposed scheme can improve the efficiency about 50%. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  10. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  11. Analysis of Laogang energy internet and construction of the cloud platform

    Science.gov (United States)

    Wang, Selan; Nie, Jianwen; Zhang, Daiyue; Li, Xia; Tai, Jun; Yu, Zhaohui; Lu, Yiqi; Xie, Da

    2018-02-01

    Laogang solid waste recycling base deals with about 70% waste domestic garbage of Shanghai every day. By recycling the garbage, great amount of energy including electricity, heat and gas can be produced. Meanwhile, the base itself consumes much energy as well. Therefore, an energy internet has been designed for the base to analyse the output and usage of the energy so that the energy utilization rate can be enhanced. In addition, a cloud platform has been established basing on the three-layer cloud technology: IaaS, PaaS and SaaS. This cloud platform mainly analysing electricity will judge whether the energy has been used suitably form all sides and furthermore, improve the operation of the whole energy internet in the base.

  12. 11th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing

    CERN Document Server

    Barolli, Leonard; Amato, Flora

    2017-01-01

    P2P, Grid, Cloud and Internet computing technologies have been very fast established as breakthrough paradigms for solving complex problems by enabling aggregation and sharing of an increasing variety of distributed computational resources at large scale. The aim of this volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to P2P, Grid, Cloud and Internet computing as well as to reveal synergies among such large scale computing paradigms. This proceedings volume presents the results of the 11th International Conference on P2P, Parallel, Grid, Cloud And Internet Computing (3PGCIC-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea.

  13. Twenty security considerations for cloud-supported Internet of Things

    OpenAIRE

    Singh, Jatinder; Pasquier, Thomas; Bacon, Jean Margaret; Ko, Hajoon; Eyers, David

    2015-01-01

    To realise the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and p...

  14. OpenCourseWare and Open Educational Resources: The Next Big Thing in Technology-Enhanced Education?

    Science.gov (United States)

    Caudill, Jason G.

    2012-01-01

    OpenCourseWare (OCW) and Open Educational Resources (OER) are two new and closely related educational technologies. Both provide open access to learning materials for students and instructors via the Internet. These are for the moment still very young technologies. While they have grown dramatically in just ten years there is still relatively…

  15. 76 FR 2708 - Porcelain-on-Steel Cooking Ware From Taiwan; Top-of-the-Stove Stainless Steel Cooking Ware From...

    Science.gov (United States)

    2011-01-14

    .... 701- TA-267 and 731-TA-304 (Third Review)] Porcelain-on-Steel Cooking Ware From Taiwan; Top-of-the-Stove Stainless Steel Cooking Ware From Korea AGENCY: United States International Trade Commission...-steel cooking ware from Taiwan and the antidumping and countervailing duty orders on imports of top-of...

  16. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications.

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan; Lee, Hyukjoon

    2017-03-01

    This paper presents a location-based interactive model of Internet of Things (IoT) and cloud integration (IoT-cloud) for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model.

  17. On Using Home Networks and Cloud Computing for a Future Internet of Things

    Science.gov (United States)

    Niedermayer, Heiko; Holz, Ralph; Pahl, Marc-Oliver; Carle, Georg

    In this position paper we state four requirements for a Future Internet and sketch our initial concept. The requirements: (1) more comfort, (2) integration of home networks, (3) resources like service clouds in the network, and (4) access anywhere on any machine. Future Internet needs future quality and future comfort. There need to be new possiblities for everyone. Our focus is on higher layers and related to the many overlay proposals. We consider them to run on top of a basic Future Internet core. A new user experience means to include all user devices. Home networks and services should be a fundamental part of the Future Internet. Home networks extend access and allow interaction with the environment. Cloud Computing can provide reliable resources beyond local boundaries. For access anywhere, we also need secure storage for data and profiles in the network, in particular for access with non-personal devices (Internet terminal, ticket machine, ...).

  18. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud for Mobile Cloud Computing Applications

    Directory of Open Access Journals (Sweden)

    Thanh Dinh

    2017-03-01

    Full Text Available This paper presents a location-based interactive model of Internet of Things (IoT and cloud integration (IoT-cloud for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model.

  19. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications †

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan; Lee, Hyukjoon

    2017-01-01

    This paper presents a location-based interactive model of Internet of Things (IoT) and cloud integration (IoT-cloud) for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model. PMID:28257067

  20. Star Ware: The Amateur Astronomer's Guide to Choosing, Buying, and Using Telescopes and Accessories, 3rd Edition

    Science.gov (United States)

    Harrington, Philip S.

    2002-05-01

    Praise for the Second Edition of Star Ware "Star Ware is still a tour de force that any experienced amateur will find invaluable, and which hardware-minded beginners will thoroughly enjoy." -Robert Burnham, Sky & Telescope magazine "Star Ware condenses between two covers what would normally take a telescope buyer many months to accumulate." -John Shibley, Astronomy magazine Now more than ever, the backyard astronomer has a dazzling array of choices when it comes to telescope shopping-which can make choosing just the right sky-watching equipment a formidable challenge. In this revised and updated edition of Star Ware, the essential guide to buying astronomical equipment, award-winning astronomy writer Philip Harrington does the work for you, analyzing and exploring today's astronomy market and offering point-by-point comparisons of everything you need. Whether you're an experienced amateur astronomer or just getting started, Star Ware, Third Edition will prepare you to explore the farthest reaches of space with: Extensive, expanded reviews of leading models and accessories, including dozens of new products, to help you buy smart A clear, step-by-step guide to all aspects of purchasing everything from telescopes and binoculars to filters, mounts, lenses, cameras, film, star charts, guides and references, and much more Eleven new do-it-yourself projects for making unique astronomical equipment at home Easy tips on maintenance, photography, and star-mapping to help you get the most out of your telescope Lists of where to find everything astronomical, including Internet sites and Web resources; distributors, dealers, and conventions; and corporate listings for products and services

  1. Analysis of the new health management based on health internet of things and cloud computing

    Science.gov (United States)

    Liu, Shaogang

    2018-05-01

    With the development and application of Internet of things and cloud technology in the medical field, it provides a higher level of exploration space for human health management. By analyzing the Internet of things technology and cloud technology, this paper studies a new form of health management system which conforms to the current social and technical level, and explores its system architecture, system characteristics and application. The new health management platform for networking and cloud can achieve the real-time monitoring and prediction of human health through a variety of sensors and wireless networks based on information and can be transmitted to the monitoring system, and then through the software analysis model, and gives the targeted prevention and treatment measures, to achieve real-time, intelligent health management.

  2. Mobile Agent based Market Basket Analysis on Cloud

    OpenAIRE

    Waghmare, Vijayata; Mukhopadhyay, Debajyoti

    2014-01-01

    This paper describes the design and development of a location-based mobile shopping application for bakery product shops. Whole application is deployed on cloud. The three-tier architecture consists of, front-end, middle-ware and back-end. The front-end level is a location-based mobile shopping application for android mobile devices, for purchasing bakery products of nearby places. Front-end level also displays association among the purchased products. The middle-ware level provides a web ser...

  3. Enhanced Internet Mobility and Privacy Using Public Cloud

    Directory of Open Access Journals (Sweden)

    Ping Zhang

    2017-01-01

    Full Text Available Internet mobile users are concerned more and more about their privacy nowadays as both researches and real world incidents show that leaking of communication and location privacy can lead to serious consequence, and many research works have been done to anonymize individual user from aggregated location data. However, just the communication itself between the mobile users and their peers or website could collect considerable privacy of the mobile users, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users and proposed a scalable system built on top of public cloud services that can hide mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.

  4. Convergence of Secure Vehicular Ad-Hoc Network and Cloud in Internet of Things

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Lin, Tao

    2016-01-01

    that VANET could be the basis of many new applications in the field of Internet of Things (IoT). The applications of VANET are not limited to be the driver for safety, traffic management, entertainment, commerce, etc. In the future, VANETs are expected to transport the enormous amount of information. Some......-as-a-Service (STaaS), Platform-as-a-Service (PaaS), etc. over the internet via Cloud vendors....

  5. Study on the application of mobile internet cloud computing platform

    Science.gov (United States)

    Gong, Songchun; Fu, Songyin; Chen, Zheng

    2012-04-01

    The innovative development of computer technology promotes the application of the cloud computing platform, which actually is the substitution and exchange of a sort of resource service models and meets the needs of users on the utilization of different resources after changes and adjustments of multiple aspects. "Cloud computing" owns advantages in many aspects which not merely reduce the difficulties to apply the operating system and also make it easy for users to search, acquire and process the resources. In accordance with this point, the author takes the management of digital libraries as the research focus in this paper, and analyzes the key technologies of the mobile internet cloud computing platform in the operation process. The popularization and promotion of computer technology drive people to create the digital library models, and its core idea is to strengthen the optimal management of the library resource information through computers and construct an inquiry and search platform with high performance, allowing the users to access to the necessary information resources at any time. However, the cloud computing is able to promote the computations within the computers to distribute in a large number of distributed computers, and hence implement the connection service of multiple computers. The digital libraries, as a typical representative of the applications of the cloud computing, can be used to carry out an analysis on the key technologies of the cloud computing.

  6. Cooperative Optimization QoS Cloud Routing Protocol Based on Bacterial Opportunistic Foraging and Chemotaxis Perception for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Shujuan Wang

    2015-01-01

    Full Text Available In order to strengthen the mobile Internet mobility management and cloud platform resources utilization, optimizing the cloud routing efficiency is established, based on opportunistic bacterial foraging bionics, and puts forward a chemotaxis perception of collaborative optimization QoS (Quality of Services cloud routing mechanism. The cloud routing mechanism is based on bacterial opportunity to feed and bacterial motility and to establish the data transmission and forwarding of the bacterial population behavior characteristics. This mechanism is based on the characteristics of drug resistance of bacteria and the structure of the field, and through many iterations of the individual behavior and population behavior the bacteria can be spread to the food gathering area with a certain probability. Finally, QoS cloud routing path would be selected and optimized based on bacterial bionic optimization and hedge mapping relationship between mobile Internet node and bacterial population evolution iterations. Experimental results show that, compared with the standard dynamic routing schemes, the proposed scheme has shorter transmission delay, lower packet error ratio, QoS cloud routing loading, and QoS cloud route request overhead.

  7. Switching Brains: Cloud-based Intelligent Resources Management for the Internet of Cognitive Things

    Directory of Open Access Journals (Sweden)

    R. Francisco

    2014-05-01

    Full Text Available Cognitive technologies can bring important benefits to our everyday life, enabling connected devices to do tasks that in the past only humans could do, leading to the Cognitive Internet of Things. Wireless Sensor and Actuator Networks (WSAN are often employed for communication between Internet objects. However, WSAN face some problems, namely sensors’ energy and CPU load consumption, which are common to other networked devices, such as mobile devices or robotic platforms. Additionally, cognitive functionalities often require large processing power, for running machine learning algorithms, computer vision processing, or behavioral and emotional architectures. Cloud massive storage capacity, large processing speeds and elasticity are appropriate to address these problems. This paper proposes a middleware that transfers flows of execution between devices and the cloud for computationally demanding applications (such as those integrating a robotic brain, to efficiently manage devices’ resources.

  8. KeyWare: an open wireless distributed computing environment

    Science.gov (United States)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  9. Study on ancient Chinese imitated GE ware by INAA and WDXRF

    International Nuclear Information System (INIS)

    Xie Guoxi; Feng Songlin; Feng Xiangqian; Wang Yanqing; Zhu Jihao; Yan Lingtong; Li Yongqiang; Han Hongye

    2007-01-01

    Imitated GE ware was one of the most famous products of Jingdezhen porcelain field in Ming dynasty (AD 1368-1644). The exterior features of its body and glaze are very marvelous. Black foot, purple mouth and crazing glaze are the main features of imitated GE ware. Until now, the key conditions of resulting these features are not clearly identified. In order to find the critical elements for firing these features, instrumental neutron activation analysis (INAA) and wavelength-dispersive X-ray fluorescence (WDXRF) were used to determine the element abundance patterns of imitated GE ware body and glaze. The experimental data was compared with that of imitated Longquan celadon and of Longquan celadon. The analytical results indicated that Fe, Ti and Na were the critical elements. The body of imitated GE ware which contains high Fe and Ti are the basic conditions of firing its black body, black foot and purple mouth. The glaze of imitated GE ware which contains high Na is the main condition of producing its crazing glaze. Na is the critical element which enlarges the difference in expansion coefficients between the glaze and body of imitated GE ware. Furthermore, Zijin soil was added into kaolin to make the body rich in Fe and Ti. And something which was rich in Na was used to produce crazing glaze in the manufacturing process of imitated GE ware

  10. Study on ancient Chinese imitated GE ware by INAA and WDXRF

    Science.gov (United States)

    Xie, Guoxi; Feng, Songlin; Feng, Xiangqian; Wang, Yanqing; Zhu, Jihao; Yan, Lingtong; Li, Yongqiang; Han, Hongye

    2007-11-01

    Imitated GE ware was one of the most famous products of Jingdezhen porcelain field in Ming dynasty (AD 1368-1644). The exterior features of its body and glaze are very marvelous. Black foot, purple mouth and crazing glaze are the main features of imitated GE ware. Until now, the key conditions of resulting these features are not clearly identified. In order to find the critical elements for firing these features, instrumental neutron activation analysis (INAA) and wavelength-dispersive X-ray fluorescence (WDXRF) were used to determine the element abundance patterns of imitated GE ware body and glaze. The experimental data was compared with that of imitated Longquan celadon and of Longquan celadon. The analytical results indicated that Fe, Ti and Na were the critical elements. The body of imitated GE ware which contains high Fe and Ti are the basic conditions of firing its black body, black foot and purple mouth. The glaze of imitated GE ware which contains high Na is the main condition of producing its crazing glaze. Na is the critical element which enlarges the difference in expansion coefficients between the glaze and body of imitated GE ware. Furthermore, Zijin soil was added into kaolin to make the body rich in Fe and Ti. And something which was rich in Na was used to produce crazing glaze in the manufacturing process of imitated GE ware.

  11. Study on ancient Chinese imitated GE ware by INAA and WDXRF

    Energy Technology Data Exchange (ETDEWEB)

    Xie Guoxi [Institute of High Energy Physics, Chinese Academy of Sciences, 19 Yu Quan Lu, Beijing 100049 (China); Graduated University of Chinese Academy of Sciences, Beijing 100049 (China); Feng Songlin [Institute of High Energy Physics, Chinese Academy of Sciences, 19 Yu Quan Lu, Beijing 100049 (China)], E-mail: fengsl@ihep.ac.cn; Feng Xiangqian; Wang Yanqing; Zhu Jihao; Yan Lingtong [Institute of High Energy Physics, Chinese Academy of Sciences, 19 Yu Quan Lu, Beijing 100049 (China); Li Yongqiang; Han Hongye [Beijing Institute of Cultural Relics, Beijing 100009 (China)

    2007-11-15

    Imitated GE ware was one of the most famous products of Jingdezhen porcelain field in Ming dynasty (AD 1368-1644). The exterior features of its body and glaze are very marvelous. Black foot, purple mouth and crazing glaze are the main features of imitated GE ware. Until now, the key conditions of resulting these features are not clearly identified. In order to find the critical elements for firing these features, instrumental neutron activation analysis (INAA) and wavelength-dispersive X-ray fluorescence (WDXRF) were used to determine the element abundance patterns of imitated GE ware body and glaze. The experimental data was compared with that of imitated Longquan celadon and of Longquan celadon. The analytical results indicated that Fe, Ti and Na were the critical elements. The body of imitated GE ware which contains high Fe and Ti are the basic conditions of firing its black body, black foot and purple mouth. The glaze of imitated GE ware which contains high Na is the main condition of producing its crazing glaze. Na is the critical element which enlarges the difference in expansion coefficients between the glaze and body of imitated GE ware. Furthermore, Zijin soil was added into kaolin to make the body rich in Fe and Ti. And something which was rich in Na was used to produce crazing glaze in the manufacturing process of imitated GE ware.

  12. A Cloud-Based Internet of Things Platform for Ambient Assisted Living

    Science.gov (United States)

    Cubo, Javier; Nieto, Adrián; Pimentel, Ernesto

    2014-01-01

    A common feature of ambient intelligence is that many objects are inter-connected and act in unison, which is also a challenge in the Internet of Things. There has been a shift in research towards integrating both concepts, considering the Internet of Things as representing the future of computing and communications. However, the efficient combination and management of heterogeneous things or devices in the ambient intelligence domain is still a tedious task, and it presents crucial challenges. Therefore, to appropriately manage the inter-connection of diverse devices in these systems requires: (1) specifying and efficiently implementing the devices (e.g., as services); (2) handling and verifying their heterogeneity and composition; and (3) standardizing and managing their data, so as to tackle large numbers of systems together, avoiding standalone applications on local servers. To overcome these challenges, this paper proposes a platform to manage the integration and behavior-aware orchestration of heterogeneous devices as services, stored and accessed via the cloud, with the following contributions: (i) we describe a lightweight model to specify the behavior of devices, to determine the order of the sequence of exchanged messages during the composition of devices; (ii) we define a common architecture using a service-oriented standard environment, to integrate heterogeneous devices by means of their interfaces, via a gateway, and to orchestrate them according to their behavior; (iii) we design a framework based on cloud computing technology, connecting the gateway in charge of acquiring the data from the devices with a cloud platform, to remotely access and monitor the data at run-time and react to emergency situations; and (iv) we implement and generate a novel cloud-based IoT platform of behavior-aware devices as services for ambient intelligence systems, validating the whole approach in real scenarios related to a specific ambient assisted living application

  13. A cloud-based Internet of Things platform for ambient assisted living.

    Science.gov (United States)

    Cubo, Javier; Nieto, Adrián; Pimentel, Ernesto

    2014-08-04

    A common feature of ambient intelligence is that many objects are inter-connected and act in unison, which is also a challenge in the Internet of Things. There has been a shift in research towards integrating both concepts, considering the Internet of Things as representing the future of computing and communications. However, the efficient combination and management of heterogeneous things or devices in the ambient intelligence domain is still a tedious task, and it presents crucial challenges. Therefore, to appropriately manage the inter-connection of diverse devices in these systems requires: (1) specifying and efficiently implementing the devices (e.g., as services); (2) handling and verifying their heterogeneity and composition; and (3) standardizing and managing their data, so as to tackle large numbers of systems together, avoiding standalone applications on local servers. To overcome these challenges, this paper proposes a platform to manage the integration and behavior-aware orchestration of heterogeneous devices as services, stored and accessed via the cloud, with the following contributions: (i) we describe a lightweight model to specify the behavior of devices, to determine the order of the sequence of exchanged messages during the composition of devices; (ii) we define a common architecture using a service-oriented standard environment, to integrate heterogeneous devices by means of their interfaces, via a gateway, and to orchestrate them according to their behavior; (iii) we design a framework based on cloud computing technology, connecting the gateway in charge of acquiring the data from the devices with a cloud platform, to remotely access and monitor the data at run-time and react to emergency situations; and (iv) we implement and generate a novel cloud-based IoT platform of behavior-aware devices as services for ambient intelligence systems, validating the whole approach in real scenarios related to a specific ambient assisted living application.

  14. 78 FR 60245 - Privacy Act Systems of Records; LabWare Laboratory Information Management System

    Science.gov (United States)

    2013-10-01

    ... of Records; LabWare Laboratory Information Management System AGENCY: Animal and Plant Health... system of records, entitled LabWare Laboratory Information Management System (LabWare LIMS), to maintain... Affairs, OMB. Thomas J. Vilsack, Secretary. SYSTEM NAME: LabWare Laboratory Information Management System...

  15. Research and development of intelligent controller for high-grade sanitary ware

    Science.gov (United States)

    Bao, Kongjun; Shen, Qingping

    2013-03-01

    With the social and economic development and people's living standards improve, more and more emphasis on modern society, people improve the quality of family life, the use of intelligent controller applications in high-grade sanitary ware physiotherapy students. Analysis of high-grade sanitary ware physiotherapy common functions pointed out in the production and use of the possible risks, proposed implementation of the system hardware and matching, given the system software implementation process. High-grade sanitary ware physiotherapy intelligent controller not only to achieve elegant and beautiful, simple, physical therapy, water power, deodorant, multi-function, intelligent control, to meet the consumers, the high-end sanitary ware market, strong demand, Accelerate the enterprise product Upgrade and improve the competitiveness of enterprises.

  16. CS-DRM: A Cloud-Based SIM DRM Scheme for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Liu Zhang

    2011-01-01

    Full Text Available With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremendous impact on digital content providers as well as the mobile industry that a large number of digital content have been pirated and illegally distributed. Digital Rights Management (DRM aims at protecting digital contents from being abused through regulating their usage. Unfortunately, to the best of our knowledge, fewer of these DRM schemes are concerned with the cost of the servers in a DRM system when the number of users scales up, and consider benefits of content providers who can be seen as tenants of a content server. In this paper, we propose CS-DRM, a cloud-based SIM DRM scheme, for the mobile Internet. The SIM card is introduced into CS-DRM to both reduce the cost and provide higher security. Also, the characteristics of cloud computing enable CS-DRM to bring benefits for content providers, and well satisfy the performance requirements with low cost when the number of users increases significantly. Furthermore, we have implemented a prototype of our DRM scheme, which demonstrates that CS-DRM is efficient, secure, and practicable.

  17. Diet and Mobility in the Corded Ware of Central Europe.

    Directory of Open Access Journals (Sweden)

    Karl-Göran Sjögren

    Full Text Available Isotopic investigations of two cemetery populations from the Corded Ware Culture in southern Germany reveal new information on the dating of these graves, human diet during this period, and individual mobility. Corded Ware Culture was present across much of temperate Europe ca. 2800-2200 cal. BC and is represented by distinctive artifacts and burial practices. Corded Ware was strongly influenced by the Yamnaya Culture that arose in the steppes of eastern Europe and western Eurasia after 3000 BC, as indicated by recent aDNA research. However, the development of CW on different chronological and spatial scales has to be evaluated. Examination of the CW burials from southern Germany supports an argument for substantial human mobility in this period. Several burials from gravefields and larger samples from two large cemeteries at Lauda-Königshofen "Wöllerspfad" and at Bergheinfeld "Hühnerberg" contributed the human remains for our study of bone and tooth enamel from the Corded Ware Culture. Our results suggest that Corded Ware groups in this region at least were subsisting on a mix of plant and animal foods and were highly mobile, especially the women. We interpret this as indicating a pattern of female exogamy, involving different groups with differing economic strategies.

  18. Diet and Mobility in the Corded Ware of Central Europe.

    Science.gov (United States)

    Sjögren, Karl-Göran; Price, T Douglas; Kristiansen, Kristian

    2016-01-01

    Isotopic investigations of two cemetery populations from the Corded Ware Culture in southern Germany reveal new information on the dating of these graves, human diet during this period, and individual mobility. Corded Ware Culture was present across much of temperate Europe ca. 2800-2200 cal. BC and is represented by distinctive artifacts and burial practices. Corded Ware was strongly influenced by the Yamnaya Culture that arose in the steppes of eastern Europe and western Eurasia after 3000 BC, as indicated by recent aDNA research. However, the development of CW on different chronological and spatial scales has to be evaluated. Examination of the CW burials from southern Germany supports an argument for substantial human mobility in this period. Several burials from gravefields and larger samples from two large cemeteries at Lauda-Königshofen "Wöllerspfad" and at Bergheinfeld "Hühnerberg" contributed the human remains for our study of bone and tooth enamel from the Corded Ware Culture. Our results suggest that Corded Ware groups in this region at least were subsisting on a mix of plant and animal foods and were highly mobile, especially the women. We interpret this as indicating a pattern of female exogamy, involving different groups with differing economic strategies.

  19. Cloud Computing: A study of cloud architecture and its patterns

    OpenAIRE

    Mandeep Handa,; Shriya Sharma

    2015-01-01

    Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Cloud computing can be defined as accessing third party software and services on web and paying as per usage. It facilitates scalability and virtualized resources over Internet as a service providing cost effective and scalable solution to customers. Cloud computing has...

  20. Big Data, Internet of Things and Cloud Convergence--An Architecture for Secure E-Health Applications.

    Science.gov (United States)

    Suciu, George; Suciu, Victor; Martian, Alexandru; Craciunescu, Razvan; Vulpe, Alexandru; Marcu, Ioana; Halunga, Simona; Fratu, Octavian

    2015-11-01

    Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.

  1. Phase and Micro-Structural Characterization of Sanitary-Ware Fired at Different Temperature

    OpenAIRE

    ATHER HASSAN; YASEEN IQBAL; SYED ZAFAR ILYAS

    2017-01-01

    The three main ingredients of sanitary-ware are clay, feldspar and quartz. This ware is being widely used and has therefore, attracted the attention of researchers from time to time. Consequently, it has been extensively investigated. The present study describes the phase and micro-structural analysis of sanitary-ware samples collected from local (Durr Ceramics Peshawar) industry. XRD (X-Ray Diffraction) of samples fired at 1100oC reveals the presence of ? ? ? ? ?-quartz and primary mullite o...

  2. Security and privacy in the clouds: a bird's eye view

    NARCIS (Netherlands)

    Pieters, Wolter; Gutwirth, Serge; Poullet, Yves; De Hert, Paul; Leenes, Ronald

    2011-01-01

    Over the last years, something called "cloud computing" has become a major theme in computer science and information security. Essentially, it concerns delivering information technology as a service, by enabling the renting of soft-ware, computing power and storage. In this contribution, we give a

  3. +Cloud: An Agent-Based Cloud Computing Platform

    OpenAIRE

    González, Roberto; Hernández de la Iglesia, Daniel; de la Prieta Pintado, Fernando; Gil González, Ana Belén

    2017-01-01

    Cloud computing is revolutionizing the services provided through the Internet, and is continually adapting itself in order to maintain the quality of its services. This study presents the platform +Cloud, which proposes a cloud environment for storing information and files by following the cloud paradigm. This study also presents Warehouse 3.0, a cloud-based application that has been developed to validate the services provided by +Cloud.

  4. Getting Started with the Internet of Things Connecting Sensors and Microcontrollers to the Cloud

    CERN Document Server

    Pfister, Cuno

    2011-01-01

    What is the Internet of Things? It's billions of embedded computers, sensors, and actuators all connected online. If you have basic programming skills, you can use these powerful little devices to create a variety of useful systems-such as a device that waters plants when the soil becomes dry. This hands-on guide shows you how to start building your own fun and fascinating projects. Learn to program embedded devices using the .NET Micro Framework and the Netduino Plus board. Then connect your devices to the Internet with Pachube, a cloud platform for sharing real-time sensor data. All you ne

  5. Archaeological and chemical analysis of Tell el Yahudiyeh ware

    International Nuclear Information System (INIS)

    Kaplan, M.F.; Harbottle, G.; Sayre, E.V.

    1978-01-01

    Typological and geographic analyses indicate that Tell el Yahudiyeh ware (found in Cyprus, Egypt, Nubia, and the Levant during the Middle Bronze period, c. 1750-1550 B.C.) were probably manufactured in two areas, the Nile Valley and the Levant. Activation analysis was carried out and correlated with the archaeological analyses. Results confirm the two ''families'' of the ware, one Egyptian and one Levantine. Speculations are offered on the social interaction of the period. 11 figures, 2 tables

  6. [The Key Technology Study on Cloud Computing Platform for ECG Monitoring Based on Regional Internet of Things].

    Science.gov (United States)

    Yang, Shu; Qiu, Yuyan; Shi, Bo

    2016-09-01

    This paper explores the methods of building the internet of things of a regional ECG monitoring, focused on the implementation of ECG monitoring center based on cloud computing platform. It analyzes implementation principles of automatic identifi cation in the types of arrhythmia. It also studies the system architecture and key techniques of cloud computing platform, including server load balancing technology, reliable storage of massive smalfi les and the implications of quick search function.

  7. Cloud Infrastructure & Applications - CloudIA

    Science.gov (United States)

    Sulistio, Anthony; Reich, Christoph; Doelitzscher, Frank

    The idea behind Cloud Computing is to deliver Infrastructure-as-a-Services and Software-as-a-Service over the Internet on an easy pay-per-use business model. To harness the potentials of Cloud Computing for e-Learning and research purposes, and to small- and medium-sized enterprises, the Hochschule Furtwangen University establishes a new project, called Cloud Infrastructure & Applications (CloudIA). The CloudIA project is a market-oriented cloud infrastructure that leverages different virtualization technologies, by supporting Service-Level Agreements for various service offerings. This paper describes the CloudIA project in details and mentions our early experiences in building a private cloud using an existing infrastructure.

  8. Cloud Computing Quality

    Directory of Open Access Journals (Sweden)

    Anamaria Şiclovan

    2013-02-01

    Full Text Available Cloud computing was and it will be a new way of providing Internet services and computers. This calculation approach is based on many existing services, such as the Internet, grid computing, Web services. Cloud computing as a system aims to provide on demand services more acceptable as price and infrastructure. It is exactly the transition from computer to a service offered to the consumers as a product delivered online. This paper is meant to describe the quality of cloud computing services, analyzing the advantages and characteristics offered by it. It is a theoretical paper.Keywords: Cloud computing, QoS, quality of cloud computing

  9. Extending the Internet to make demand management e-smart

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, M. D. [emWare Inc., Salt Lake City, UT (United States)

    2001-06-01

    A new cost-effective solution to managing peak power demand by utility companies is described. The system was developed by Carrier Corporation, in conjunction with Silicon Energy, AT and T and emWare Inc. The program is known as 'ComfortChoice'. The heart of the system is a new generation of energy management interface (Emi) thermostat which is Internet-enabled. These thermostats allow the utility company to adjust the customer's temperature set point during peak energy time to reduce energy usage, while giving the customer complete freedom to override the utility company's settings and to control the thermostat remotely via a Web browser interface on a PC. The device-networking system runs on the EMIT software package, developed by emWare Inc, which is ideal for electronic devices with 8- or 16-bit micro-controllers, like thermostats and other everyday devices, and enable bringing the Internet into homes in a cost-effective platform. It is particularly well-suited to controlling power and resource management, heating and cooling systems, building and home automation, telemedicine and health services to network-enable new and existing products, making them e-smart. In addition to being enabled to monitor, diagnose, upgrade and control these devices over the Internet, the embedded micro internet-working technology (EMIT) also offers improved service, greater convenience, and increased cost savings. Productivity and safety are also claimed to be enhanced.

  10. Waring's Problem and the Circle Method

    Indian Academy of Sciences (India)

    other interests include classical music and mountaineering. the problems they worked on. Their proof of a slightly. Keywords weaker form of Ramanujan's original formula was pub-. Waring's problem, circle method, ... arc is fairly simple while it is the minor arc estimation that accounts for the 'major' amount of work involved!

  11. A View from the Clouds

    Science.gov (United States)

    Chudnov, Daniel

    2010-01-01

    Cloud computing is definitely a thing now, but it's not new and it's not even novel. Back when people were first learning about the Internet in the 1990s, every diagram that one saw showing how the Internet worked had a big cloud in the middle. That cloud represented the diverse links, routers, gateways, and protocols that passed traffic around in…

  12. Problematic Internet use and physical health.

    Science.gov (United States)

    Kelley, Kevin J; Gruber, Elon M

    2013-06-01

    Background and aims A considerable body of literature has emerged over the past two decades assessing the relationship between problematic or addictive use of the Internet and various indices of psychological well-being. Conversely, comparatively little research has assessed the relationship between problematic or addictive use of the Internet and one's physical health. Method The current study assesses this relationship using a sample of college students (N = 133) who responded online to two questionnaires: the Problematic Internet Use Questionnaire (PIUQ; Demetrovics, Szeredi&Rózsa, 2008) and the SF-36v2 Health Survey (Ware et al., 2008). Results The findings indicate that problematic Internet use is associated with poorer physical health. These results are consistent with other data that assessed the relationship between these two variables. Furthermore, this relationship supersedes the influence of the number of hours spent online per day. Conclusions The findings are discussed in terms of the limitations of the study design and conclusions that can be drawn from this preliminary empirical effort.

  13. The cuisine of the Pitted Ware Culture

    DEFF Research Database (Denmark)

    Philippsen, Bente; Persson, Per

    The Pitted Ware Culture is a Middle Neolithic culture in southwestern Scandinavia. It appears about thousand years after the introduction of agriculture to this area. In some regions, it is characterized by an almost fully “Mesolithic” economy with a heavy reliance on seal hunting. In Djursland, ...

  14. Provenance studies of Sgraffiato and Late Green Glazed wares from Siraf, Iran

    International Nuclear Information System (INIS)

    Michel, H.V.; Asaro, F.; Frierman, J.D.

    1975-03-01

    Results of neutron activation analyses of 23 elements in ceramic archaeological specimens are given. Various wares are divided into the following categories: early Sgraffiato, late Sgraffiato, late Green A, late Green B, and Samarra ware. Results are given on the following elements: Al, Ca, Dy, Mn, Na, K, U, Sm, La, Ti, Lu, Co, Sc, Fe, Cs, Cr, Ni, Eu, Ce, Hf, Ta, Th, and Yb. (JGB)

  15. COMPARATIVE STUDY OF CLOUD COMPUTING AND MOBILE CLOUD COMPUTING

    OpenAIRE

    Nidhi Rajak*, Diwakar Shukla

    2018-01-01

    Present era is of Information and Communication Technology (ICT) and there are number of researches are going on Cloud Computing and Mobile Cloud Computing such security issues, data management, load balancing and so on. Cloud computing provides the services to the end user over Internet and the primary objectives of this computing are resource sharing and pooling among the end users. Mobile Cloud Computing is a combination of Cloud Computing and Mobile Computing. Here, data is stored in...

  16. A Revolution in Information Technology - Cloud Computing

    OpenAIRE

    Divya BHATT

    2012-01-01

    What is the Internet? It is collection of “interconnected networks” represented as a Cloud in network diagrams and Cloud Computing is a metaphor for certain parts of the Internet. The IT enterprises and individuals are searching for a way to reduce the cost of computation, storage and communication. Cloud Computing is an Internet-based technology providing “On-Demand” solutions for addressing these scenarios that should be flexible enough for adaptation and responsive to requirements. The hug...

  17. CLOUD COMPUTING TECHNOLOGY TRENDS

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-05-01

    Full Text Available Cloud computing has been a tremendous innovation, through which applications became available online, accessible through an Internet connection and using any computing device (computer, smartphone or tablet. According to one of the most recent studies conducted in 2012 by Everest Group and Cloud Connect, 57% of companies said they already use SaaS application (Software as a Service, and 38% reported using standard tools PaaS (Platform as a Service. However, in the most cases, the users of these solutions highlighted the fact that one of the main obstacles in the development of this technology is the fact that, in cloud, the application is not available without an Internet connection. The new challenge of the cloud system has become now the offline, specifically accessing SaaS applications without being connected to the Internet. This topic is directly related to user productivity within companies as productivity growth is one of the key promises of cloud computing system applications transformation. The aim of this paper is the presentation of some important aspects related to the offline cloud system and regulatory trends in the European Union (EU.

  18. A Survey on Cloud Security Issues and Techniques

    OpenAIRE

    Sharma, Shubhanjali; Gupta, Garima; Laxmi, P. R.

    2014-01-01

    Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. ...

  19. Cloud Computing dan Dampaknya Terhadap Bisnis

    OpenAIRE

    James Tandy; Siswono Siswono

    2013-01-01

    The purpose of this paper is to provide an overview of cloud computing and its development as well as the advantages and disadvantages of cloud computing implementation at some companies. Some literature studies from journals, textbooks and internet sources are discussed. Based on these searches it is known that the cloud computing as a technology that utilizes internet services uses a central server to the virtual nature of data and application maintenance purposes. The existence of Cloud Co...

  20. Providing Availability, Performance, and Scalability By Using Cloud Database

    OpenAIRE

    Prof. Dr. Alaa Hussein Al-Hamami; RafalAdeeb Al-Khashab

    2014-01-01

    With the development of the internet, new technical and concepts have attention to all users of the internet especially in the development of information technology, such as concept is cloud. Cloud computing includes different components, of which cloud database has become an important one. A cloud database is a distributed database that delivers computing as a service or in form of virtual machine image instead of a product via the internet; its advantage is that database can...

  1. A cloud-based production system for information and service integration: an internet of things case study on waste electronics

    Science.gov (United States)

    Wang, Xi Vincent; Wang, Lihui

    2017-08-01

    Cloud computing is the new enabling technology that offers centralised computing, flexible data storage and scalable services. In the manufacturing context, it is possible to utilise the Cloud technology to integrate and provide industrial resources and capabilities in terms of Cloud services. In this paper, a function block-based integration mechanism is developed to connect various types of production resources. A Cloud-based architecture is also deployed to offer a service pool which maintains these resources as production services. The proposed system provides a flexible and integrated information environment for the Cloud-based production system. As a specific type of manufacturing, Waste Electrical and Electronic Equipment (WEEE) remanufacturing experiences difficulties in system integration, information exchange and resource management. In this research, WEEE is selected as the example of Internet of Things to demonstrate how the obstacles and bottlenecks are overcome with the help of Cloud-based informatics approach. In the case studies, the WEEE recycle/recovery capabilities are also integrated and deployed as flexible Cloud services. Supporting mechanisms and technologies are presented and evaluated towards the end of the paper.

  2. Research on Influence of Cloud Environment on Traditional Network Security

    Science.gov (United States)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  3. Open Course Ware, Distance Education, and 21st Century Geoscience Education

    Science.gov (United States)

    Connors, M. G.

    2010-12-01

    Open Course Ware (OCW) allows the highest quality educational materials (including videos of lectures from the best classroom lecturers) to find a wide audience. This audience may include many who wish to obtain credentials for formal study yet who are unable to be campus-based students. This opens a role for formal, credentialed and accredited distance education (DE) to efficiently integrate OCW into DE courses. OCW materials will in this manner be able to be used for education of credential-seeking students who would not otherwise benefit from them. Modern presentation methods using the Internet and video (including mobile device) technologies may offer pedagogical advantages over even traditional classroom learning. A detailed analysis of the development of Athabasca University’s PHYS 302 Vibrations and Waves course (based mainly on MIT’s OCW), and application of lessons learned to development of PHYS 305 Electromagnetism is presented. These courses are relevant to the study of geophysics, but examples of GEOL (Geology) courses will also be mentioned, along with an broad overview of OCW resources in Geoscience.

  4. CLOUD COMPUTING OVERVIEW AND CHALLENGES: A REVIEW PAPER

    OpenAIRE

    Satish Kumar*, Vishal Thakur, Payal Thakur, Ashok Kumar Kashyap

    2017-01-01

    Cloud computing era is the most resourceful, elastic, utilized and scalable period for internet technology to use the computing resources over the internet successfully. Cloud computing did not provide only the speed, accuracy, storage capacity and efficiency for computing but it also lead to propagate the green computing and resource utilization. In this research paper, a brief description of cloud computing, cloud services and cloud security challenges is given. Also the literature review o...

  5. MVC for content management on the cloud

    OpenAIRE

    McGruder, Crystal A.

    2011-01-01

    Approved for public release; distribution is unlimited. Cloud computing portrays a new model for providing IT services over the Internet. In cloud computing, resources are accessed from the Internet through web-based tools. Although cloud computing offers reduced cost, increased storage, high automation, flexibility, mobility, and the ability of IT to shift focus, there are other concerns such as the management, organization and structure of content on the cloud that large organizations sh...

  6. The Future of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Anamaroa SIclovan

    2011-12-01

    Full Text Available Cloud computing was and it will be a new way of providing Internet services and computers. This calculation approach is based on many existing services, such as the Internet, grid computing, Web services. Cloud computing as a system aims to provide on demand services more acceptable as price and infrastructure. It is exactly the transition from computer to a service offeredto the consumers as a product delivered online. This represents an advantage for the organization both regarding the cost and the opportunity for the new business. This paper presents the future perspectives in cloud computing. The paper presents some issues of the cloud computing paradigm. It is a theoretical paper.Keywords: Cloud Computing, Pay-per-use

  7. Convergence Of Cloud Computing Internet Of Things And Machine Learning The Future Of Decision Support Systems

    Directory of Open Access Journals (Sweden)

    Gilberto Crespo-Perez

    2017-07-01

    Full Text Available The objective of this research was to develop a framework for understanding the Convergence of Cloud Computing Machine Learning and Internet of Things as the future of Decision Support Systems. To develop this framework the researchers analyzed and synthesized 35 research articles from 2006 to 2017. The results indicated that when the data is massive it is necessary to use computational algorithms and complex analytical techniques. The Internet of Things in combination with the large accumulation of data and data mining improves the learning of automatic intelligence for business. This is due to the fact that the technology has the intelligence to infer and provide solutions based on past experiences and past events.

  8. Economic Analyses of Ware Yam Production in Orlu Agricultural ...

    African Journals Online (AJOL)

    Economic Analyses of Ware Yam Production in Orlu Agricultural Zone of Imo State. ... International Journal of Agriculture and Rural Development ... statistics, gross margin analysis, marginal analysis and multiple regression analysis. Results ...

  9. Emerging Cloud Computing Security Threats

    OpenAIRE

    Ahmat, Kamal

    2015-01-01

    Cloud computing is one of the latest emerging innovations of the modern internet and technological landscape. With everyone from the White house to major online technological leaders like Amazon and Google using or offering cloud computing services it is truly presents itself as an exciting and innovative method to store and use data on the internet.

  10. KnoWare: A System for Citizen-based Environmental Monitoring

    Directory of Open Access Journals (Sweden)

    Joseph T. Chao

    2016-05-01

    Full Text Available Non-expert scientists are frequently involved in research requiring data acquisition over large geographic areas. Despite mutual benefits for such “citizen science”, barriers also exist, including 1 difficulty maintaining user engagement with timely feedback, and 2 the challenge of providing non-experts with the means to generate reliable data. We have developed a system that addresses these barriers. Our technologies, KnoWare and InSpector, allow users to: collect reliable scientific measurements, map geo-tagged data, and intuitively visualize the results in real-time. KnoWare comprises a web portal and an iOS app with two core functions. First, users can generate scientific ‘queries’ that entail a call for information posed to a crowd with customized options for participant responses and viewing data. Second, users can respond to queries with their GPS-enabled mobile device, which results in their geo- and time-stamped responses populating a web-accessible map in real time. KnoWare can also interface with additional applications to diversify the types of data that can be reported. We demonstrate this capability with a second iOS app called InSpector that performs quantitative water quality measurements. When used in combina-tion, these technologies create a workflow to facilitate the collection, sharing and interpretation of scientific data by non-expert scientists.

  11. Modeling Dissolved Solids in the Rincon Valley, New Mexico Using RiverWare

    Science.gov (United States)

    Abudu, S.; Ahn, S. R.; Sheng, Z.

    2017-12-01

    Simulating transport and storage of dissolved solids in surface water and underlying alluvial aquifer is essential to evaluate the impacts of surface water operations, groundwater pumping, and climate variability on the spatial and temporal variability of salinity in the Rio Grande Basin. In this study, we developed a monthly RiverWare water quantity and quality model to simulate the both concentration and loads of dissolved solids for the Rincon Valley, New Mexico from Caballo Reservoir to Leasburg Dam segment of the Rio Grande. The measured flows, concentration and loads of dissolved solids in the main stream and drains were used to develop RiveWare model using 1980-1988 data for calibration, and 1989-1995 data for validation. The transport of salt is tracked using discretized salt and post-process approaches. Flow and salt exchange between the surface water and adjacent groundwater objects is computed using "soil moisture salt with supplemental flow" method in the RiverWare. In the groundwater objects, the "layered salt" method is used to simulate concentration of the dissolved solids in the shallow groundwater storage. In addition, the estimated local inflows under different weather conditions by using a calibrated Soil Water Assessment Tool (SWAT) were fed into the RiverWare to refine the simulation of the flow and dissolved solids. The results show the salt concentration and loads increased at Leasburg Dam, which indicates the river collects salts from the agricultural return flow and the underlying aquifer. The RiverWare model with the local inflow fed by SWAT delivered the better quantification of temporal and spatial salt exchange patterns between the river and the underlying aquifer. The results from the proposed modeling approach can be used to refine the current mass-balance budgets for dissolved-solids transport in the Rio Grande, and provide guidelines for planning and decision-making to control salinity in arid river environment.

  12. Internet of Cloud: Security and Privacy issues

    OpenAIRE

    Cook, Allan; Robinson, Michael; Ferrag, Mohamed Amine; Maglaras, Leandros A.; He, Ying; Jones, Kevin; Janicke, Helge

    2017-01-01

    The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. We thoroughly investigate current security and privacy preservation solutions th...

  13. 75 FR 62144 - Porcelain-on-Steel Cooking Ware From China and Taiwan; Top-of-the-Stove Stainless Steel Cooking...

    Science.gov (United States)

    2010-10-07

    ...); (Investigation Nos. 701-TA-267 and 731-TA-304 (Third Review))] Porcelain-on-Steel Cooking Ware From China and Taiwan; Top-of- the-Stove Stainless Steel Cooking Ware From Korea AGENCY: United States International... porcelain-on-steel cooking ware from China and Taiwan and the antidumping and countervailing duty orders on...

  14. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

    OpenAIRE

    Dong, Qingkuan; Tong, Jiaqing; Chen, Yuan

    2015-01-01

    With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Th...

  15. Cloud Computing dan Dampaknya Terhadap Bisnis

    Directory of Open Access Journals (Sweden)

    James Tandy

    2013-12-01

    Full Text Available The purpose of this paper is to provide an overview of cloud computing and its development as well as the advantages and disadvantages of cloud computing implementation at some companies. Some literature studies from journals, textbooks and internet sources are discussed. Based on these searches it is known that the cloud computing as a technology that utilizes internet services uses a central server to the virtual nature of data and application maintenance purposes. The existence of Cloud Computing itself causes a change in the way thetechnology information system works at an company. Security and data storage systems have become important factors for the company.Cloud Computing technology provides a great advantage for most enterprises.

  16. Moving towards Cloud Security

    OpenAIRE

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  17. Security Architecture of Cloud Computing

    OpenAIRE

    V.KRISHNA REDDY; Dr. L.S.S.REDDY

    2011-01-01

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages o...

  18. Impact of different cloud deployments on real-time video applications for mobile video cloud users

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2015-02-01

    The latest trend to access mobile cloud services through wireless network connectivity has amplified globally among both entrepreneurs and home end users. Although existing public cloud service vendors such as Google, Microsoft Azure etc. are providing on-demand cloud services with affordable cost for mobile users, there are still a number of challenges to achieve high-quality mobile cloud based video applications, especially due to the bandwidth-constrained and errorprone mobile network connectivity, which is the communication bottleneck for end-to-end video delivery. In addition, existing accessible clouds networking architectures are different in term of their implementation, services, resources, storage, pricing, support and so on, and these differences have varied impact on the performance of cloud-based real-time video applications. Nevertheless, these challenges and impacts have not been thoroughly investigated in the literature. In our previous work, we have implemented a mobile cloud network model that integrates localized and decentralized cloudlets (mini-clouds) and wireless mesh networks. In this paper, we deploy a real-time framework consisting of various existing Internet cloud networking architectures (Google Cloud, Microsoft Azure and Eucalyptus Cloud) and a cloudlet based on Ubuntu Enterprise Cloud over wireless mesh networking technology for mobile cloud end users. It is noted that the increasing trend to access real-time video streaming over HTTP/HTTPS is gaining popularity among both research and industrial communities to leverage the existing web services and HTTP infrastructure in the Internet. To study the performance under different deployments using different public and private cloud service providers, we employ real-time video streaming over the HTTP/HTTPS standard, and conduct experimental evaluation and in-depth comparative analysis of the impact of different deployments on the quality of service for mobile video cloud users. Empirical

  19. Creating Values out of Internet of Things: An Industrial Perspective

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-01-01

    Full Text Available Internet of Things based cloud is envisaged to extract values other than the specified purpose for which it is to be utilized. It is hereby apprehended that different genre of values, rather business values, could efficiently be assimilated from the Internet of Things cloud platforms. It is also investigated to identify numerous domains of applications that are currently being associated with the similar cloud platforms. A case study on various types of value generation methods has been performed. A novel Internet of Things cloud stack is proposed to disseminate and aggregate the business values. Few research challenges are observed that shall need appropriate indulgence to generate more business values out of Internet of Things based cloud. This paper also seeks few research and industry related problems that need to be resolved. It further recommends several key parameters to the enterprise and government policymakers that should immediately be dealt with for long-term success.

  20. Hybrid cloud for dummies

    CERN Document Server

    Hurwitz, Judith; Halper, Fern; Kirsch, Dan

    2012-01-01

    Understand the cloud and implement a cloud strategy for your business Cloud computing enables companies to save money by leasing storage space and accessing technology services through the Internet instead of buying and maintaining equipment and support services. Because it has its own unique set of challenges, cloud computing requires careful explanation. This easy-to-follow guide shows IT managers and support staff just what cloud computing is, how to deliver and manage cloud computing services, how to choose a service provider, and how to go about implementation. It also covers security and

  1. The Effect of the Flipped Classroom Approach to OpenCourseWare Instruction on Students' Self-Regulation

    Science.gov (United States)

    Sun, Jerry Chih-Yuan; Wu, Yu-Ting; Lee, Wei-I

    2017-01-01

    The purpose of this study was to investigate the effect of the flipped classroom approach to OpenCourseWare instruction on students' self-regulation. OpenCourseWare was integrated into the flipped classroom model (experimental group) and distance learning (control group). Overall, 181 freshmen taking a physics course were allowed to choose their…

  2. Research on cloud computing solutions

    OpenAIRE

    Liudvikas Kaklauskas; Vaida Zdanytė

    2015-01-01

    Cloud computing can be defined as a new style of computing in which dynamically scala-ble and often virtualized resources are provided as a services over the Internet. Advantages of the cloud computing technology include cost savings, high availability, and easy scalability. Voas and Zhang adapted six phases of computing paradigms, from dummy termi-nals/mainframes, to PCs, networking computing, to grid and cloud computing. There are four types of cloud computing: public cloud, private cloud, ...

  3. Cloud Computing Cryptography "State-of-the-Art"

    OpenAIRE

    Omer K. Jasim; Safia Abbas; El-Sayed M. El-Horbaty; Abdel-Badeeh M. Salem

    2013-01-01

    Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing e...

  4. SECURE INTERNET OF THINGS-BASED CLOUD FRAMEWORK TO CONTROL ZIKA VIRUS OUTBREAK.

    Science.gov (United States)

    Sareen, Sanjay; Sood, Sandeep K; Gupta, Sunil Kumar

    2017-01-01

    Zika virus (ZikaV) is currently one of the most important emerging viruses in the world which has caused outbreaks and epidemics and has also been associated with severe clinical manifestations and congenital malformations. Traditional approaches to combat the ZikaV outbreak are not effective for detection and control. The aim of this study is to propose a cloud-based system to prevent and control the spread of Zika virus disease using integration of mobile phones and Internet of Things (IoT). A Naive Bayesian Network (NBN) is used to diagnose the possibly infected users, and Google Maps Web service is used to provide the geographic positioning system (GPS)-based risk assessment to prevent the outbreak. It is used to represent each ZikaV infected user, mosquito-dense sites, and breeding sites on the Google map that helps the government healthcare authorities to control such risk-prone areas effectively and efficiently. The performance and accuracy of the proposed system are evaluated using dataset for 2 million users. Our system provides high accuracy for initial diagnosis of different users according to their symptoms and appropriate GPS-based risk assessment. The cloud-based proposed system contributed to the accurate NBN-based classification of infected users and accurate identification of risk-prone areas using Google Maps.

  5. Cloud Computing: Architecture and Services

    OpenAIRE

    Ms. Ravneet Kaur

    2018-01-01

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. It is a method for delivering information technology (IT) services where resources are retrieved from the Internet through web-based tools and applications, as opposed to a direct connection to a server. Rather than keeping files on a proprietary hard drive or local storage device, cloud-based storage makes it possib...

  6. Flying to the Cloud : Governments Seek Gains from Cloud Computing

    OpenAIRE

    Melhem, Samia; Kim, Seunghyun

    2016-01-01

    The transition to cloud computing broadly means shifting programs and data from personal or office hardware to shared hardware that many individuals and organizations access over the Internet. That migration is happening fast. By 2019, according to the information technology company Cisco, 83 percent of all global data center traffic will come from cloud services. And the profitability of ...

  7. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    Science.gov (United States)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  8. Cloud computing for radiologists

    OpenAIRE

    Amit T Kharat; Amjad Safvi; S S Thind; Amarjit Singh

    2012-01-01

    Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as...

  9. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  10. Exploring the BIG Five of e-leadership by developing digital strategies with mobile, cloud, big data, social media, and the Internet of things

    NARCIS (Netherlands)

    Spil, Ton; Pris, Miran; Kijl, Björn

    2017-01-01

    Recent developments in digital technologies -- 1) mobile technology, 2) cloud computing, 3) big data, 4) social media, and 5) the Internet of Things -- show that these so-called BIG Five technologies are increasingly transforming organizations by enabling business innovation. This paper aims to

  11. 75 FR 49549 - ABC & D Recycling, Inc.-Lease and Operation Exemption-a Line of Railroad in Ware, MA

    Science.gov (United States)

    2010-08-13

    ... DEPARTMENT OF TRANSPORTATION Surface Transportation Board [Docket No. FD 35397] ABC & D Recycling, Inc.--Lease and Operation Exemption--a Line of Railroad in Ware, MA ABC & D Recycling, Inc. (ABC & D..., ABC & D Recycling, Inc.--Lease and Operation Exemption--a Line of Railroad in Ware, Massachusetts (STB...

  12. The Education Value of Cloud Computing

    Science.gov (United States)

    Katzan, Harry, Jr.

    2010-01-01

    Cloud computing is a technique for supplying computer facilities and providing access to software via the Internet. Cloud computing represents a contextual shift in how computers are provisioned and accessed. One of the defining characteristics of cloud software service is the transfer of control from the client domain to the service provider.…

  13. Cloud Computing. Technology Briefing. Number 1

    Science.gov (United States)

    Alberta Education, 2013

    2013-01-01

    Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…

  14. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  15. Bioinformatics clouds for big data manipulation

    KAUST Repository

    Dai, Lin; Gao, Xin; Guo, Yan; Xiao, Jingfa; Zhang, Zhang

    2012-01-01

    -supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues

  16. Networking for the Cloud: Challenges and Trends

    NARCIS (Netherlands)

    Drago, Idilio; de Oliveira Schmidt, R.; Hofstede, R.J.; Sperotto, Anna; Karimzadeh Motallebi Azar, Morteza; Haverkort, Boudewijn R.H.M.; Pras, Aiko

    2013-01-01

    Cloud services have changed the way computing power is delivered to customers, by offering computing and storage capacity in remote data centers on demand over the Internet. The success of the cloud model, however, has not come without challenges. Cloud providers have repeatedly been related to

  17. Urology on the internet - introduction and update

    Directory of Open Access Journals (Sweden)

    Inumpudi Anand

    2000-01-01

    Full Text Available The Internet, which has truly united the developed and developing nations, is an extensive network of inter-linked computers storing immense bytes of information, which can be accessed by anyone transcending all geographi-cal barriers and this has become the ultimate frontier to access information. The Urology and Andrology informa-tion on Internet is exponentially growing. The urologist need not know the intricacies of the hardware and soft-ware but can start right away navigating through this web. We reviewed methods available to take advantage of this network to provide a glimpse to busy urologists to accrue the benefits easily and efficiently rather than to be lost in the information-ocean by surfing individually. By getting connected to Internet, an urologist of any part of the world gains enormous information by interacting with other urologists of the rest of the world. This could be of use to gain knowledge and to offer the best and the most modern treatment to the patient. Internet has revolutionised the scientific publication by virtue of its faster and accurate transmission of manuscripts. We can send manuscripts by this channel and also access journals obviating the lag period inherent in snail mail. The on-line journals have virtually brought the library to the desktop.

  18. A Taxonomy and Future Directions for Sustainable Cloud Computing: 360 Degree View

    OpenAIRE

    Gill, Sukhpal Singh; Buyya, Rajkumar

    2017-01-01

    The cloud computing paradigm offers on-demand services over the Internet and supports a wide variety of applications. With the recent growth of Internet of Things (IoT) based applications the usage of cloud services is increasing exponentially. The next generation of cloud computing must be energy-efficient and sustainable to fulfill the end-user requirements which are changing dynamically. Presently, cloud providers are facing challenges to ensure the energy efficiency and sustainability of ...

  19. MULTI TENANCY SECURITY IN CLOUD COMPUTING

    OpenAIRE

    Manjinder Singh*, Charanjit Singh

    2017-01-01

    The word Cloud is used as a metaphor for the internet, based on standardised use of a cloud like shape to denote a network. Cloud Computing is advanced technology for resource sharing through network with less cost as compare to other technologies. Cloud infrastructure supports various models IAAS, SAAS, PAAS. The term virtualization in cloud computing is very useful today. With the help of virtualization, more than one operating system is supported with all resources on single H/W. We can al...

  20. State of the Art of Network Security Perspectives in Cloud Computing

    Science.gov (United States)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  1. On technical security issues in cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg; Gruschka, Nils

    2009-01-01

    , however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection sphere of the data owner. Most of the discussions on this topics are mainly driven by arguments related to organisational......The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality...... means. This paper focusses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations....

  2. Improving the Performance of Highly Constrained Water Resource Systems using Multiobjective Evolutionary Algorithms and RiverWare

    Science.gov (United States)

    Smith, R.; Kasprzyk, J. R.; Zagona, E. A.

    2015-12-01

    Instead of building new infrastructure to increase their supply reliability, water resource managers are often tasked with better management of current systems. The managers often have existing simulation models that aid their planning, and lack methods for efficiently generating and evaluating planning alternatives. This presentation discusses how multiobjective evolutionary algorithm (MOEA) decision support can be used with the sophisticated water infrastructure model, RiverWare, in highly constrained water planning environments. We first discuss a study that performed a many-objective tradeoff analysis of water supply in the Tarrant Regional Water District (TRWD) in Texas. RiverWare is combined with the Borg MOEA to solve a seven objective problem that includes systemwide performance objectives and individual reservoir storage reliability. Decisions within the formulation balance supply in multiple reservoirs and control pumping between the eastern and western parts of the system. The RiverWare simulation model is forced by two stochastic hydrology scenarios to inform how management changes in wet versus dry conditions. The second part of the presentation suggests how a broader set of RiverWare-MOEA studies can inform tradeoffs in other systems, especially in political situations where multiple actors are in conflict over finite water resources. By incorporating quantitative representations of diverse parties' objectives during the search for solutions, MOEAs may provide support for negotiations and lead to more widely beneficial water management outcomes.

  3. Cloud ERP and Cloud Accounting Software in Romania

    Directory of Open Access Journals (Sweden)

    Gianina MIHAI

    2015-05-01

    Full Text Available Nowadays, Cloud Computing becomes a more and more fashionable concept in the IT environment. There is no unanimous opinion on the definition of this concept, as it covers several versions of the newly emerged stage in the IT. But in fact, Cloud Computing should not suggest anything else than simplicity. Thus, in short, simple terms, Cloud Computing can be defined as a solution to use external IT resources (servers, storage media, applications and services, via Internet. Cloud computing is nothing more than the promise of an easy accessible technology. If the promise will eventually turn into something certain yet remains to be seen. In our opinion it is too early to make an assertion. In this article, our purpose is to find out what is the Romanian offer of ERP and Accounting software applications in Cloud and / or as services in SaaS version. Thus, we conducted an extensive study whose results we’ll present in the following.

  4. Current Trends in Cloud Computing A Survey of Cloud Computing Systems

    OpenAIRE

    Harjit Singh

    2012-01-01

    Cloud computing that has become an increasingly important trend, is a virtualization technology that uses the internet and central remote servers to offer the sharing of resources that include infrastructures, software, applications and business processes to the market environment to fulfill the elastic demand. In today’s competitive environment, the service vitality, elasticity, choices and flexibility offered by this scalable technology are too attractive that makes the cloud computing to i...

  5. Cloud Computing Security Issue: Survey

    Science.gov (United States)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  6. Cloud Computing: Exploring the scope

    OpenAIRE

    Maurya, Brajesh Kumar

    2010-01-01

    Cloud computing refers to a paradigm shift to overall IT solutions while raising the accessibility, scalability and effectiveness through its enabling technologies. However, migrated cloud platforms and services cost benefits as well as performances are neither clear nor summarized. Globalization and the recessionary economic times have not only raised the bar of a better IT delivery models but also have given access to technology enabled services via internet. Cloud computing has va...

  7. Re-theorising mobility and the formation of culture and language among the Corded Ware Culture in Europe

    DEFF Research Database (Denmark)

    Kristiansen, Kristian; Allentoft, Morten E.; Frei, Karin M.

    2017-01-01

    North European Neolithic cultures. The original herding economy of the Yamnaya migrants gradually gave way to new practices of crop cultivation, which led to the adoption of new words for those crops. The result of this hybridisation process was the formation of a new material culture, the Corded Ware......Recent genetic, isotopic and linguistic research has dramatically changed our understanding of how the Corded Ware Culture in Europe was formed. Here the authors explain it in terms of local adaptations and interactions between migrant Yamnaya people from the Pontic-Caspian steppe and indigenous...... Culture, and of a new dialect, Proto-Germanic. Despite a degree of hostility between expanding Corded Ware groups and indigenous Neolithic groups, stable isotope data suggest that exogamy provided a mechanism facilitating their integration. This article should be read in conjunction with that by Heyd...

  8. Community Cloud Computing

    Science.gov (United States)

    Marinos, Alexandros; Briscoe, Gerard

    Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. Our response is an alternative model for the Cloud conceptualisation, providing a paradigm for Clouds in the community, utilising networked personal computers for liberation from the centralised vendor model. Community Cloud Computing (C3) offers an alternative architecture, created by combing the Cloud with paradigms from Grid Computing, principles from Digital Ecosystems, and sustainability from Green Computing, while remaining true to the original vision of the Internet. It is more technically challenging than Cloud Computing, having to deal with distributed computing issues, including heterogeneous nodes, varying quality of service, and additional security constraints. However, these are not insurmountable challenges, and with the need to retain control over our digital lives and the potential environmental consequences, it is a challenge we must pursue.

  9. Cloud Computing Law

    CERN Document Server

    Millard, Christopher

    2013-01-01

    This book is about the legal implications of cloud computing. In essence, ‘the cloud’ is a way of delivering computing resources as a utility service via the internet. It is evolving very rapidly with substantial investments being made in infrastructure, platforms and applications, all delivered ‘as a service’. The demand for cloud resources is enormous, driven by such developments as the deployment on a vast scale of mobile apps and the rapid emergence of ‘Big Data’. Part I of this book explains what cloud computing is and how it works. Part II analyses contractual relationships between cloud service providers and their customers, as well as the complex roles of intermediaries. Drawing on primary research conducted by the Cloud Legal Project at Queen Mary University of London, cloud contracts are analysed in detail, including the appropriateness and enforceability of ‘take it or leave it’ terms of service, as well as the scope for negotiating cloud deals. Specific arrangements for public sect...

  10. Cloud Computing Security Latest Issues amp Countermeasures

    OpenAIRE

    Shelveen Pandey; Mohammed Farik

    2015-01-01

    Abstract Cloud computing describes effective computing services provided by a third-party organization known as cloud service provider for organizations to perform different tasks over the internet for a fee. Cloud service providers computing resources are dynamically reallocated per demand and their infrastructure platform and software and other resources are shared by multiple corporate and private clients. With the steady increase in the number of cloud computing subscribers of these shar...

  11. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  12. API, Cloud computing, WebGIS and cartography

    Directory of Open Access Journals (Sweden)

    Andrea Favretto

    2013-05-01

    Full Text Available This paper explores some of the digital mapping processes available on the Internet in order to analyse their cartographic congruence. It will focus on WebGIS-based cartography in relation to what is produced using Mash-up site maps. These websites often use Googlebased maps in order to produce their own cartography. Thus, we can identify two main typologies of Internet mapping sites, which are characterized by the ownership or non-ownership of their cartographic bases. This paper will critically assess the cartography employed in the two different instances. A concise introduction to the Cloud Computing Internet propagated phenomenon is also premised in order to provide the reader with an accurate frame of reference. Cloud Computing has encouraged a significant Internet participation via the Application Programming Interface software (API, leading to mash-up cartographic websites.

  13. Cloud Computing: An Overview

    Science.gov (United States)

    Qian, Ling; Luo, Zhiguo; Du, Yujian; Guo, Leitao

    In order to support the maximum number of user and elastic service with the minimum resource, the Internet service provider invented the cloud computing. within a few years, emerging cloud computing has became the hottest technology. From the publication of core papers by Google since 2003 to the commercialization of Amazon EC2 in 2006, and to the service offering of AT&T Synaptic Hosting, the cloud computing has been evolved from internal IT system to public service, from cost-saving tools to revenue generator, and from ISP to telecom. This paper introduces the concept, history, pros and cons of cloud computing as well as the value chain and standardization effort.

  14. Advantages and disadvantages of using intravenous tissue Plasminogen activator as salvage therapy for inoperable HeartWare thrombosis.

    Science.gov (United States)

    Basken, Robyn; Bazzell, Charles M; Smith, Richard; Janardhanan, Rajesh; Khalpey, Zain

    2017-07-01

    Device thrombosis is a devastating complication of left ventricular assist devices. The definitive treatment has been device exchange or explant. Evidence of increasing morbidity and mortality with device exchange has shifted strategies toward conservative management. In this report, we detail the use of thrombolytics as salvage therapy in a patient with an occlusive HeartWare ventricular assist device (HeartWare Inc., Framingham, MA) thrombus, resulting in long-term survival without further intervention. © 2017 Wiley Periodicals, Inc.

  15. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  16. Towards the internet of services

    CERN Document Server

    Wahlster, Wolfgang; Wess, Stefan; Friedrich, Hermann; Widenka, Thomas

    2014-01-01

    The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on se­mantic technologies and the future Internet of Everything. Semantic technologies now enable mass cus­tomization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial econ­omy, the service economy, and the emerging data economy, leading to

  17. Soft ware upgrade for Mobile Laboratories in Estonia, Latvia and Lithuania

    DEFF Research Database (Denmark)

    Bargholz, Kim; Andersen, Frank

    1998-01-01

    In July-August 1998 the soft ware for controlling the measurements in the mobile laboratories have been upgraded. The mobile laboratories are sponsored by Danish east aid projects in cooperation with Rotaray Denmark.The equipment used is 4 L NaI(Tl) detectors mounted on the roof of the cars toget...

  18. Business plan Locally produced and branded ware potato, Zambezi Valley, Mozambique

    NARCIS (Netherlands)

    Haverkort, A.J.; Saavedra Gonzalez, Y.R.

    2015-01-01

    This business plan has been prepared for local entrepreneurs who would like to expand their business portfolio or to start an agricultural value chain business in the potato sector in the region of Tete. The four-year business plan intends to create a locally produced and branded ware potato value

  19. Cloud Computing Organizational Benefits : A Managerial concern

    OpenAIRE

    Mandala, Venkata Bhaskar Reddy; Chandra, Marepalli Sharat

    2012-01-01

    Context: Software industry is looking for new methods and opportunities to reduce the project management problems and operational costs. Cloud Computing concept is providing answers to these problems. Cloud Computing is made possible with the availability of high internet bandwidth. Cloud Computing is providing wide range of various services to varied customer base. Cloud Computing has some key elements such as on-demand services, large pool of configurable computing resources and minimal man...

  20. Cloud Computing for radiologists.

    Science.gov (United States)

    Kharat, Amit T; Safvi, Amjad; Thind, Ss; Singh, Amarjit

    2012-07-01

    Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as applications, client, infrastructure, storage, services, and processing power, Cloud computing can help imaging units rapidly scale and descale operations and avoid huge spending on maintenance of costly applications and storage. Cloud computing allows flexibility in imaging. It sets free radiology from the confines of a hospital and creates a virtual mobile office. The downsides to Cloud computing involve security and privacy issues which need to be addressed to ensure the success of Cloud computing in the future.

  1. Cloud Computing for radiologists

    International Nuclear Information System (INIS)

    Kharat, Amit T; Safvi, Amjad; Thind, SS; Singh, Amarjit

    2012-01-01

    Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as applications, client, infrastructure, storage, services, and processing power, Cloud computing can help imaging units rapidly scale and descale operations and avoid huge spending on maintenance of costly applications and storage. Cloud computing allows flexibility in imaging. It sets free radiology from the confines of a hospital and creates a virtual mobile office. The downsides to Cloud computing involve security and privacy issues which need to be addressed to ensure the success of Cloud computing in the future

  2. Cloud computing for radiologists

    Directory of Open Access Journals (Sweden)

    Amit T Kharat

    2012-01-01

    Full Text Available Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as applications, client, infrastructure, storage, services, and processing power, Cloud computing can help imaging units rapidly scale and descale operations and avoid huge spending on maintenance of costly applications and storage. Cloud computing allows flexibility in imaging. It sets free radiology from the confines of a hospital and creates a virtual mobile office. The downsides to Cloud computing involve security and privacy issues which need to be addressed to ensure the success of Cloud computing in the future.

  3. DIDACTIC POTENTIAL OF CLOUD TECHNOLOGIES FOR MENAGMENT OF EDUCATIONAL INSTITUTION

    Directory of Open Access Journals (Sweden)

    А А Заславский

    2016-12-01

    Full Text Available The article introduces the basic definitions and differences between Services in the cloud, cloud services, cloud applications and cloud storage data. The basic cloud types that can be used on the Internet and the LAN of educational organization (Intranet. Possibilities of use of cloud services to improve of effective management at educational organization of internal and external communications of educational organizations, as well as to ensure joint work of employees of the educational organization.A list of core competencies an employee of an educational organization, which will be developed for use in the activity of cloud services and cloud applications. We describe the positive aspects of the use of cloud services and cloud-based technologies for the management of the educational institution, identifies possible risks of using cloud technologies, presents options for the use of cloud technology over the Internet and the Intranet network. We present a list of software included with every category of cloud services described types: storage and file synchronization, storage of bookmarks and notes, time management, software applications. At the article is introduced the basic definition and classification of cloud services, offered examples of methodical use of cloud services in the management of the educational organization.

  4. Advanced cloud fault tolerance system

    Science.gov (United States)

    Sumangali, K.; Benny, Niketa

    2017-11-01

    Cloud computing has become a prevalent on-demand service on the internet to store, manage and process data. A pitfall that accompanies cloud computing is the failures that can be encountered in the cloud. To overcome these failures, we require a fault tolerance mechanism to abstract faults from users. We have proposed a fault tolerant architecture, which is a combination of proactive and reactive fault tolerance. This architecture essentially increases the reliability and the availability of the cloud. In the future, we would like to compare evaluations of our proposed architecture with existing architectures and further improve it.

  5. An Internet-Based Accounting Information Systems Project

    Science.gov (United States)

    Miller, Louise

    2012-01-01

    This paper describes a student project assignment used in an accounting information systems course. We are now truly immersed in the internet age, and while many required accounting information systems courses and textbooks introduce database design, accounting software development, cloud computing, and internet security, projects involving the…

  6. A survey on User’s security in cloud

    OpenAIRE

    Indal Singh; Rajesh Rai

    2014-01-01

    Cloud computing is a new wave in the field of information technology. Some see it as an emerging field in computer science. It consists of a set of resources and services offered through the Internet. Hence, “cloud computing” is also called “Internet computing.” The word “cloud” is a metaphor for describing the Web as a space where computing has been preinstalled and exists as a service. Operating systems, applications, storage, data, and processing capacity all exist on the W...

  7. Towards Practical Privacy-Preserving Internet Services

    Science.gov (United States)

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  8. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  9. A Survey Paper on Privacy Issue in Cloud Computing

    OpenAIRE

    Yousra Abdul Alsahib S. Aldeen; Mazleena Salleh; Mohammad Abdur Razzaque

    2015-01-01

    In past few years, cloud computing is one of the popular paradigm to host and deliver services over Internet. It is having popularity by offering multiple computing services as cloud storage, cloud hosting and cloud servers etc., for various types of businesses as well as in academics. Though there are several benefits of cloud computing, it suffers from security and privacy challenges. Privacy of cloud system is a serious concern for the customers. Considering the privacy within the cloud th...

  10. Cloud Computing : Research Issues and Implications

    OpenAIRE

    Marupaka Rajenda Prasad; R. Lakshman Naik; V. Bapuji

    2013-01-01

    Cloud computing is a rapidly developing and excellent promising technology. It has aroused the concern of the computer society of whole world. Cloud computing is Internet-based computing, whereby shared information, resources, and software, are provided to terminals and portable devices on-demand, like the energy grid. Cloud computing is the product of the combination of grid computing, distributed computing, parallel computing, and ubiquitous computing. It aims to build and forecast sophisti...

  11. Navigating the Challenges of the Cloud

    Science.gov (United States)

    Ovadia, Steven

    2010-01-01

    Cloud computing is increasingly popular in education. Cloud computing is "the delivery of computer services from vast warehouses of shared machines that enables companies and individuals to cut costs by handing over the running of their email, customer databases or accounting software to someone else, and then accessing it over the internet."…

  12. Security Challenges of the Internet of Things

    OpenAIRE

    Goeke, Lisa

    2017-01-01

    The ‘Internet of Things’ is the buzz phrase that describes a new era of computation. Briefly, the Internet of Things can be defined as the interaction of smart objects that are connected to the Internet. These objects can sense, share and process information, upload them in the cloud, and make them available to the user via a large amount of different applications. Despite all of these promising innovations, the Internet of Things, as every other technology, faces multiple security...

  13. High quality voice synthesis middle ware; Kohinshitsu onsei gosei middle war

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    Toshiba Corp. newly developed a natural voice synthesis system, TOS Drive TTS (TOtally speaker Driven Text-To-Speech) system, in which natural high-quality read-aloud is greatly improved, and also developed as its application a voice synthesis middle ware. In the newly developed system, using as a model a narrator's voice recorded preliminarily, a metrical control dictionary is automatically learned that reproduces the characteristics of metrical patters such as intonation or rhythm of a human voice, as is a voice bases dictionary that reproduces the characteristics of a voice quality, enabling natural voice synthesis to be realized that picks up human voice characteristics. The system is high quality and also very compact, while the voice synthesis middle ware utilizing this technology is adaptable to various platforms such as MPU or OS. The system is very suitable for audio response in the ITS field having car navigation systems as the core; besides, expanded application is expected to an audio response system that used to employ a sound recording and reproducing system. (translated by NEDO)

  14. Becoming digital toward a post-internet society

    CERN Document Server

    Mosco, Vincent

    2017-01-01

    This book examines the convergence of Cloud Computing, Big Data, and the Internet of Things to forge the Next Internet. Ubiquitous computing enables universal communication, concentration of power, privacy erosion, environmental degradation, and massive automation and this title explores solving these issues to create a democratic digital world.

  15. Securing the Data in Clouds with Hyperelliptic Curve Cryptography

    OpenAIRE

    Mukhopadhyay, Debajyoti; Shirwadkar, Ashay; Gaikar, Pratik; Agrawal, Tanmay

    2014-01-01

    In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility, which provides various services over a network, it is prone to network based attacks. Hence security in clouds is the most important in case of cloud computing. Cloud Security concerns the customer to fully rely on storing data on clouds. Th...

  16. Recent Progress in Data Engineering and Internet Technology Volume 1

    CERN Document Server

    Gaol, Ford Lumban

    2013-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  17. Recent Progress in Data Engineering and Internet Technology Volume 2

    CERN Document Server

    Gaol, Ford Lumban

    2012-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  18. Analysis on the security of cloud computing

    Science.gov (United States)

    He, Zhonglin; He, Yuhua

    2011-02-01

    Cloud computing is a new technology, which is the fusion of computer technology and Internet development. It will lead the revolution of IT and information field. However, in cloud computing data and application software is stored at large data centers, and the management of data and service is not completely trustable, resulting in safety problems, which is the difficult point to improve the quality of cloud service. This paper briefly introduces the concept of cloud computing. Considering the characteristics of cloud computing, it constructs the security architecture of cloud computing. At the same time, with an eye toward the security threats cloud computing faces, several corresponding strategies are provided from the aspect of cloud computing users and service providers.

  19. IMPLEMENTING SALES CRM ON CLOUD SERVICES USING SALESOFORCE.COM

    OpenAIRE

    Rohit Parashar*, ER. Kamal Kumar Ranga

    2016-01-01

    Cloud computing provides lot of new ways to build and run applications that are accessed over the Internet as utilities, rather than as pieces of software running on client or server machine. Business applications, like customer relationship management (CRM) are promoted to be delivered via a Web browser in this paper, rather than delivering it as “traditional software”. As with the Internet, applications that run in the cloud have grown ubiquitous that almost every business user interacts wi...

  20. Pots, plates and provenance: sourcing Indian coarse wares from Mleiha using X-ray fluorescence (XRF) spectrometry analysis

    International Nuclear Information System (INIS)

    Reddy, A; Attaelmanan, A G; Mouton, M

    2012-01-01

    The identification of more than 25% of the pottery sherds from the late PIR.D period (ca. 2nd - mid. 3rd c. AD) assemblage from the recently excavated building H at Mleiha as Indian is based on form and fabric, but using only visual assessment. Petrographic analysis of the fabrics can provide more precise indicators of the geographical origin of the wares. In this study, a total of 21 sherds from various key sites in Western India were compared with 7 different 'Indian' coarse-ware vessels sampled at Mleiha using X-ray fluorescence (XRF) spectrometry. The analyses were conducted on powdered samples collected from the core of each sherd. Each sample was irradiated for 1000 seconds using a 1.2 mm diameter X-ray beam. The resulting spectra were used for quantification of the X-ray intensity and elemental concentration. Levels of correlation in the elemental ratios of the sherds were statistically tested using an F-test as well as a Chi-test. Initial review of the XRF results indicates that the Maharashtra and Gujarat regions of India are probable source areas for at least two of the types of wares. Collection of additional samples from these areas and other regions of India, and further statistical analysis through methods such as Principal Component Analysis will help to isolate groups of wares from India and correlate them with types of vessels imported into the Oman peninsula in antiquity.

  1. Cloud computing.

    Science.gov (United States)

    Wink, Diane M

    2012-01-01

    In this bimonthly series, the author examines how nurse educators can use Internet and Web-based technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes how cloud computing can be used in nursing education.

  2. Architecture of the SDP in the Cloud Environment

    Science.gov (United States)

    Cho, Jae-Hyoung; Lee, Jae-Oh

    Recently, cloud computing, which is Internet-based computing, is attracting type of business. Besides, network is integrated wire and wireless (including mobile) by the IP Multimedia Subsystem (IMS). Therefore, cloud computing needs to support the IMS and common platform in order to support between the IMS and cloud computing. So, in this paper we consider about deployment of the IMS and suggest Service Delivery Platform (SDP) that is common platform for cloud computing.

  3. Cloud Computing Security Issues - Challenges and Opportunities

    OpenAIRE

    Vaikunth, Pai T.; Aithal, P. S.

    2017-01-01

    Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing ...

  4. Development and Usage of Software as a Service for a Cloud and Non-Cloud Based Environment- An Empirical Study

    OpenAIRE

    Pratiyush Guleria Guleria; Vikas Sharma; Manish Arora

    2012-01-01

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture and utility computing. The computer applications nowadays are becoming more and more complex; there is an ever increasing demand for computing resources. As this demand has risen, the concepts of cloud computing and grid computing...

  5. Mineralogy and microstructure of hydrated phases during the pozzolanic reaction in the sanitary ware waste/Ca(OH)2 system

    OpenAIRE

    Medina, César; Sáez del Bosque, Isabel F.; Asensio, Eloy; Frías, Moisés; Sánchez de Rojas, M Isabel

    2016-01-01

    Despite technological improvements in its production process, the sanitary ware industry inevitably generates a certain volume of discards, products whose quality is not up to standard. The present paper is the first to scientifically explore claybased sanitary ware waste (SW) with a view to its valorization as an addition in the design of new, more environmentally friendly cements. The focus is on characterization of the waste and its pozzolanicity, as well as the struct...

  6. Cloud Computing Security Latest Issues amp Countermeasures

    Directory of Open Access Journals (Sweden)

    Shelveen Pandey

    2015-08-01

    Full Text Available Abstract Cloud computing describes effective computing services provided by a third-party organization known as cloud service provider for organizations to perform different tasks over the internet for a fee. Cloud service providers computing resources are dynamically reallocated per demand and their infrastructure platform and software and other resources are shared by multiple corporate and private clients. With the steady increase in the number of cloud computing subscribers of these shared resources over the years security on the cloud is a growing concern. In this review paper the current cloud security issues and practices are described and a few innovative solutions are proposed that can help improve cloud computing security in the future.

  7. Inside Dropbox: Understanding Personal Cloud Storage Services

    NARCIS (Netherlands)

    Drago, Idilio; Mellia, Marco; Munafò, Maurizio M.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    2012-01-01

    Personal cloud storage services are gaining popularity. With a rush of providers to enter the market and an increasing offer of cheap storage space, it is to be expected that cloud storage will soon generate a high amount of Internet traffic. Very little is known about the architecture and the

  8. Cloud Computing in the EU Policy Sphere

    NARCIS (Netherlands)

    Sluijs, J.P.J.B.; Larouche, P.; Sauter, W.

    2011-01-01

    Cloud computing is a new development that is based on the premise that data and applications are stored centrally and can be accessed through the Internet. Our Article sets up a broad analysis of how the emergence of clouds relates to European law. We single out European competition law, network

  9. Cloud Computing: The Future of Computing

    OpenAIRE

    Aggarwal, Kanika

    2013-01-01

    Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. The basic principles of cloud computing is to make the computing be assigned in a great number of distributed computers, rather then local computer ...

  10. Distributed Processing in Cloud Computing

    OpenAIRE

    Mavridis, Ilias; Karatza, Eleni

    2016-01-01

    Proceedings of the First PhD Symposium on Sustainable Ultrascale Computing Systems (NESUS PhD 2016) Timisoara, Romania. February 8-11, 2016. Cloud computing offers a wide range of resources and services through the Internet that can been used for various purposes. The rapid growth of cloud computing has exempted many companies and institutions from the burden of maintaining expensive hardware and software infrastructure. With characteristics like high scalability, availability ...

  11. Benchmarking personal cloud storage

    NARCIS (Netherlands)

    Drago, Idilio; Bocchi, Enrico; Mellia, Marco; Slatman, Herman; Pras, Aiko

    2013-01-01

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all -

  12. Proposed scheduling algorithm for deployment of fail-safe cloud services

    OpenAIRE

    Kollberg, Simon

    2014-01-01

    The cloud is a fairly new concept in computer science, altough almost everyone has been or is in contact with it on a regular basis. As more and more systems and applications are migrating from the desktop and into the cloud, keeping a high availability in cloud services is becoming increasingly important. Seeing that the cloud users are dependant on the cloud services being online and accessable via the Internet, creating fault tolerant cloud systems is key to keeping the cloud stable and tr...

  13. Military clouds: utilization of cloud computing systems at the battlefield

    Science.gov (United States)

    Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai

    2012-05-01

    Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.

  14. Towards Media Intercloud Standardization Evaluating Impact of Cloud Storage Heterogeneity

    OpenAIRE

    Aazam, Mohammad; StHilaire, Marc; Huh, EuiNam

    2016-01-01

    Digital media has been increasing very rapidly, resulting in cloud computing's popularity gain. Cloud computing provides ease of management of large amount of data and resources. With a lot of devices communicating over the Internet and with the rapidly increasing user demands, solitary clouds have to communicate to other clouds to fulfill the demands and discover services elsewhere. This scenario is called intercloud computing or cloud federation. Intercloud computing still lacks standard ar...

  15. Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

    Directory of Open Access Journals (Sweden)

    Qian Meng

    2017-01-01

    Full Text Available User authentication has been widely deployed to prevent unauthorized access in the new era of Internet of Everything (IOE. When user passes the legal authentication, he/she can do series of operations in database. We mainly concern issues of data security and comparable queries over ciphertexts in IOE. In traditional database, a Short Comparable Encryption (SCE scheme has been widely used by authorized users to conduct comparable queries over ciphertexts, but existing SCE schemes still incur high storage and computational overhead as well as economic burden. In this paper, we first propose a basic Short Comparable Encryption scheme based on sliding window method (SCESW, which can significantly reduce computational and storage burden as well as enhance work efficiency. Unfortunately, as the cloud service provider is a semitrusted third party, public auditing mechanism needs to be furnished to protect data integrity. To further protect data integrity and reduce management overhead, we present an enhanced SCESW scheme based on position-aware Merkle tree, namely, PT-SCESW. Security analysis proves that PT-SCESW and SCESW schemes can guarantee completeness and weak indistinguishability in standard model. Performance evaluation indicates that PT-SCESW scheme is efficient and feasible in practical applications, especially for smarter and smaller computing devices in IOE.

  16. A Study on Cloud Computing and its Security Issues

    OpenAIRE

    Mr. Venkata Sreedhar Ventrapragada; Daniel Ravuri; G Jyothi

    2013-01-01

    Cloud computing” was coined for what happens whenservices and applications are propelled into the internet“cloud.” Cloud computing refers to the many different types ofservices and applications being delivered in the internet cloud,and the devices used to access these services and applicationsdo not require any special applications. Advances in serviceoriented architecture (SOA) have brought the world close tothe once imaginary vision of establishing and running a virtualbusiness, a business...

  17. Cloud Computing Impelementation Using Model Roadmap for Cloud Computing Adoption (ROCCA on IT Consultant Industry

    Directory of Open Access Journals (Sweden)

    Panji Arief Perdana

    2017-09-01

    increase the performance PT Matrica Consulting Service based on the characteristics of the cloud which is flexible and secure to be accessed as long as it is connected to the Internet and maintained properly.

  18. THE EXPANSION OF ACCOUNTING TO THE CLOUD

    OpenAIRE

    Otilia DIMITRIU; Marian MATEI

    2014-01-01

    The world today is witnessing an explosion of technologies that are remodelling our entire reality. The traditional way of thinking in the business field has shifted towards a new IT breakthrough: cloud computing. The cloud paradigm has emerged as a natural step in the evolution of the internet and has captivated everyone’s attention. The accounting profession itself has found a mean to optimize its activity through cloud-based applications. By reviewing the latest and most relevant studies a...

  19. Investigation of Cloud Computing: Applications and Challenges

    OpenAIRE

    Amid Khatibi Bardsiri; Anis Vosoogh; Fatemeh Ahoojoosh

    2014-01-01

    Cloud computing is a model for saving data or knowledge in distance servers through Internet. It can be save the required memory space and reduce cost of extending memory capacity in users’ own machines and etc., Therefore, Cloud Computing has several benefits for individuals as well as organizations. It provides protection for personal and organizational data. Further, with the help of cloud service, one business owner, organization manager or service provider will be able to make privacy an...

  20. Analysis of seed and ware potato production systems and yield constraints in Argentina

    NARCIS (Netherlands)

    Caldiz, D.O.

    2000-01-01

    The aim of this thesis is to analyze the seed and ware potato production systems in Argentina and their possible yield constraints in order to develop specific strategies to increase seed quality and tuber yield.

    This thesis starts with a survey of the actual potato

  1. Framework for Monitoring and Evaluation of Users in Trusted Cloud

    OpenAIRE

    Nazeer T. Mohammed Saeed; Sanjay T. Singh

    2013-01-01

    In the cloud computing, due to users directly use and operate the software and OS, and even basic programming environment and network infrastructure which provided by the cloud services providers(CSP), so the impact and destruction for the software and hardware cloud resources in cloud computing are worse than the current Internet users who use it to share resources. Therefore, that whether user behavior is trusted, how to evaluate user behavior trust is an important research content in cloud...

  2. Research on cloud computing solutions

    Directory of Open Access Journals (Sweden)

    Liudvikas Kaklauskas

    2015-07-01

    Full Text Available Cloud computing can be defined as a new style of computing in which dynamically scala-ble and often virtualized resources are provided as a services over the Internet. Advantages of the cloud computing technology include cost savings, high availability, and easy scalability. Voas and Zhang adapted six phases of computing paradigms, from dummy termi-nals/mainframes, to PCs, networking computing, to grid and cloud computing. There are four types of cloud computing: public cloud, private cloud, hybrid cloud and community. The most common and well-known deployment model is Public Cloud. A Private Cloud is suited for sensitive data, where the customer is dependent on a certain degree of security.According to the different types of services offered, cloud computing can be considered to consist of three layers (services models: IaaS (infrastructure as a service, PaaS (platform as a service, SaaS (software as a service. Main cloud computing solutions: web applications, data hosting, virtualization, database clusters and terminal services. The advantage of cloud com-puting is the ability to virtualize and share resources among different applications with the objective for better server utilization and without a clustering solution, a service may fail at the moment the server crashes.DOI: 10.15181/csat.v2i2.914

  3. Provenience studies of the Ko-Kutani ware by neutron activation analysis

    International Nuclear Information System (INIS)

    Kawashima, Tatsuro.

    1990-01-01

    The instrumental neutron activation analysis has been applied to the multielemental analysis of eight samples of the Ko-Kutani ware including the Aote's that is one of semi-porcelain body. Each sample was compared with concentration of the useful index element, such as Ta, Sc, Ba, Hf, Th and rare earth, to discriminate the Arita group from the Kutani group. Eight samples were judged as products of the Arita, just as in previous paper. (author)

  4. A Review on Broker Based Cloud Service Model

    Directory of Open Access Journals (Sweden)

    Nagarajan Rajganesh

    2016-09-01

    Full Text Available Cloud computing emerged as a utility oriented computing that facilitates resource sharing under pay-as-you-go model. Nowadays, cloud offerings are not limited to range of services and anything can be shared as a service through the Internet. In this work, a detailed literature survey with respect to cloud service discovery and composition has been accounted. A proposed architecture with the inclusion of cloud broker is presented in our work. It focuses the importance of suitable service selection and its ranking towards fulfilling the customer’s service requirements. The proposed cloud broker advocates techniques such as reasoning and decision making capabilities for the improved cloud service selection and composition.

  5. PARTICAL SWARM OPTIMIZATION OF TASK SCHEDULING IN CLOUD COMPUTING

    OpenAIRE

    Payal Jaglan*, Chander Diwakar

    2016-01-01

    Resource provisioning and pricing modeling in cloud computing makes it an inevitable technology both on developer and consumer end. Easy accessibility of software and freedom of hardware configuration increase its demand in IT industry. It’s ability to provide a user-friendly environment, software independence, quality, pricing index and easy accessibility of infrastructure via internet. Task scheduling plays an important role in cloud computing systems. Task scheduling in cloud computing mea...

  6. Formal Specification and Analysis of Cloud Computing Management

    Science.gov (United States)

    2012-01-24

    te r Cloud Computing in a Nutshell We begin this introduction to Cloud Computing with a famous quote by Larry Ellison: “The interesting thing about...the wording of some of our ads.” — Larry Ellison, Oracle CEO [106] In view of this statement, we summarize the essential aspects of Cloud Computing...1] M. Abadi, M. Burrows , M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. ACM Transactions on Internet Technology, 5(2):299–327

  7. ASTER cloud coverage reassessment using MODIS cloud mask products

    Science.gov (United States)

    Tonooka, Hideyuki; Omagari, Kunjuro; Yamamoto, Hirokazu; Tachikawa, Tetsushi; Fujita, Masaru; Paitaer, Zaoreguli

    2010-10-01

    In the Advanced Spaceborne Thermal Emission and Reflection radiometer (ASTER) Project, two kinds of algorithms are used for cloud assessment in Level-1 processing. The first algorithm based on the LANDSAT-5 TM Automatic Cloud Cover Assessment (ACCA) algorithm is used for a part of daytime scenes observed with only VNIR bands and all nighttime scenes, and the second algorithm based on the LANDSAT-7 ETM+ ACCA algorithm is used for most of daytime scenes observed with all spectral bands. However, the first algorithm does not work well for lack of some spectral bands sensitive to cloud detection, and the two algorithms have been less accurate over snow/ice covered areas since April 2008 when the SWIR subsystem developed troubles. In addition, they perform less well for some combinations of surface type and sun elevation angle. We, therefore, have developed the ASTER cloud coverage reassessment system using MODIS cloud mask (MOD35) products, and have reassessed cloud coverage for all ASTER archived scenes (>1.7 million scenes). All of the new cloud coverage data are included in Image Management System (IMS) databases of the ASTER Ground Data System (GDS) and NASA's Land Process Data Active Archive Center (LP DAAC) and used for ASTER product search by users, and cloud mask images are distributed to users through Internet. Daily upcoming scenes (about 400 scenes per day) are reassessed and inserted into the IMS databases in 5 to 7 days after each scene observation date. Some validation studies for the new cloud coverage data and some mission-related analyses using those data are also demonstrated in the present paper.

  8. A Study of the Evaluation Dimensions and Criteria for OpenCourseWare Websites

    Directory of Open Access Journals (Sweden)

    Yi-Ju Wang

    2015-04-01

    Full Text Available OpenCourseWare (OCW, a set of free-of-use learning materials established by universities, became quite a success over the years and aroused the users’ willingness to learn online. However, the design of OCW websites, including the structure, organization of learning resources and interfaces is multi-variant and disordered. The system and arrangement are still lacking of an evaluation standard. The goal of this study is to establish and verify the dimensions and the criteria that are suitable for evaluation of OCW websites. To achieve the research goal, the researchers performed document analysis and the Delphi Method. Sixteen experts in a total took part in the Delphi panel. By giving three rounds of questionnaire to those experts in the self-developed e-Delphi system, the researcher gathered their opinions then analyzed them back and forth. The final edition of the Evaluation Dimensions and Criteria for OpenCourseWare Website includes seven dimensions with fifty-seven criteria. Finally, concrete suggestions for OCW website establishment and administration were provided. Implications and recommendations for future research were also addressed.

  9. DATA SECURITY ISSUES IN CLOUD COMPUTING: REVIEW

    Directory of Open Access Journals (Sweden)

    Hussam Alddin Shihab Ahmed

    2016-02-01

    Full Text Available Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for computing resources like systems, stockpiling, servers, administrations and applications. Securing the Data is considered one of the principle significant challenges and concerns for cloud computing. This persistent problem is getting more affective due to the changes in improving cloud computing technology. From the perspective of the Clients, cloud computing is a security hazard especially when it comes to assurance affirmation issues and data security, remain the most basically which backs off for appropriation of Cloud Computing administrations. This paper audits and breaks down the essential issue of cloud computing and depicts the information security and protection of privacy issues in cloud.

  10. Transition to the Cloud

    DEFF Research Database (Denmark)

    Hedman, Jonas; Xiao, Xiao

    2016-01-01

    The rising of cloud computing has dramatically changed the way software companies provide and distribute their IT product and related services over the last decades. Today, most software is bought offthe-shelf and distributed over the Internet. This transition is greatly influencing how software...... companies operate. In this paper, we present a case study of an ERP vendor for SMB (small and mediumsize business) in making a transition towards a cloud-based business model. Through the theoretical lens of ecosystem, we are able to analyze the evolution of the vendor and its business network as a whole......, and find that the relationship between vendor and Value-added-Reseller (VAR) is greatly affected. We conclude by presenting critical issues and challenges for managing such cloud transition....

  11. High Performance Networks From Supercomputing to Cloud Computing

    CERN Document Server

    Abts, Dennis

    2011-01-01

    Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by an array of applications ranging from communication intensive climatology, complex material simulations and molecular dynamics to such Internet applications as Web search, language translation, collaborative Internet applications, streaming video and voice-over-IP. For both Supercomputing and Cloud Computing the network enables distributed applicati

  12. Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

    OpenAIRE

    Hicham Toumi; Bouchra Marzak; Amal Talea; Ahmed Eddaoui; Mohamed Talea

    2017-01-01

    Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client...

  13. THE EXPANSION OF ACCOUNTING TO THE CLOUD

    Directory of Open Access Journals (Sweden)

    Otilia DIMITRIU

    2014-06-01

    Full Text Available The world today is witnessing an explosion of technologies that are remodelling our entire reality. The traditional way of thinking in the business field has shifted towards a new IT breakthrough: cloud computing. The cloud paradigm has emerged as a natural step in the evolution of the internet and has captivated everyone’s attention. The accounting profession itself has found a mean to optimize its activity through cloud-based applications. By reviewing the latest and most relevant studies and practitioners’ reports, this paper is focused on the implications of cloud accounting, as the fusion between cloud technologies and accounting. We addressed this innovative topic through a business-oriented approach and we brought forward a new accounting model that might revolutionize the economic landscape.

  14. Cloud Interaction and Safety Features of Mobile Devices

    Directory of Open Access Journals (Sweden)

    Mirsat Yeşiltepe

    2018-02-01

    Full Text Available In this paper, two current popular mobile operating system, still in relation to the conceptof cloud began to supplant the internet almost Word today, the differences, the concept of cloudsecurity mechanisms they use for themselves and are dealt with in this environment. One ofcomparing mobile operation system is representing open source and the other for close source one.The other issue discussed in this article is how the mobile environment interacts with the cloud thanthe cloud communication with the computers.

  15. An overview of cloud services adoption challenges in higher education institutions

    OpenAIRE

    Alharthi, Abdulrahman; Yahya, Fara; Walters, Robert John; Wills, Gary

    2015-01-01

    Information Technology (IT) plays an important role in enabling education services be delivered to users. Most education online services in universities have been run on the cloud to provide services to support students, lecturers, researchers and administration staff. These are enabled with the emergence of cloud computing in the world of IT. Cloud computing offers on demand Internet-based computing services. This paper presents an overview of cloud computing adoption in higher education, ma...

  16. Dynamic virtual machine allocation policy in cloud computing complying with service level agreement using CloudSim

    Science.gov (United States)

    Aneri, Parikh; Sumathy, S.

    2017-11-01

    Cloud computing provides services over the internet and provides application resources and data to the users based on their demand. Base of the Cloud Computing is consumer provider model. Cloud provider provides resources which consumer can access using cloud computing model in order to build their application based on their demand. Cloud data center is a bulk of resources on shared pool architecture for cloud user to access. Virtualization is the heart of the Cloud computing model, it provides virtual machine as per application specific configuration and those applications are free to choose their own configuration. On one hand, there is huge number of resources and on other hand it has to serve huge number of requests effectively. Therefore, resource allocation policy and scheduling policy play very important role in allocation and managing resources in this cloud computing model. This paper proposes the load balancing policy using Hungarian algorithm. Hungarian Algorithm provides dynamic load balancing policy with a monitor component. Monitor component helps to increase cloud resource utilization by managing the Hungarian algorithm by monitoring its state and altering its state based on artificial intelligent. CloudSim used in this proposal is an extensible toolkit and it simulates cloud computing environment.

  17. Data in the Cloud

    Science.gov (United States)

    Bull, Glen; Garofalo, Joe

    2010-01-01

    The ability to move from one representation of data to another is one of the key characteristics of expert mathematicians and scientists. Cloud computing will offer more opportunities to create and display multiple representations of data, making this skill even more important in the future. The advent of the Internet led to widespread…

  18. Proposed Network Intrusion Detection System ‎Based on Fuzzy c Mean Algorithm in Cloud ‎Computing Environment

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Nowadays cloud computing had become is an integral part of IT industry, cloud computing provides Working environment allow a user of environmental to share data and resources over the internet. Where cloud computing its virtual grouping of resources offered over the internet, this lead to different matters related to the security and privacy in cloud computing. And therefore, create intrusion detection very important to detect outsider and insider intruders of cloud computing with high detection rate and low false positive alarm in the cloud environment. This work proposed network intrusion detection module using fuzzy c mean algorithm. The kdd99 dataset used for experiments .the proposed system characterized by a high detection rate with low false positive alarm

  19. Evolution of Cloud Computing and Enabling Technologies

    OpenAIRE

    Rabi Prasad Padhy; Manas Ranjan Patra

    2012-01-01

    We present an overview of the history of forecasting software over the past 25 years, concentrating especially on the interaction between computing and technologies from mainframe computing to cloud computing. The cloud computing is latest one. For delivering the vision of  various  of computing models, this paper lightly explains the architecture, characteristics, advantages, applications and issues of various computing models like PC computing, internet computing etc and related technologie...

  20. Biobjective VoIP Service Management in Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  1. Evaluation of device-independent internet spatial location

    OpenAIRE

    Komosný, Dan; Pang, Paul; Mehic, Miralem; Vozňák, Miroslav

    2017-01-01

    Device-independent Internet spatial location is needed for many purposes, such as data personalisation and social behaviour analysis. Internet spatial databases provide such locations based the IP address of a device. The free to use databases are natively included into many UNIX and Linux operating systems. These systems are predominantly used for e-shops, social networks, and cloud data storage. Using a constructed ground truth dataset, we comprehensively evaluate these databases for null r...

  2. Cloud Computing and Virtual Desktop Infrastructures in Afloat Environments

    OpenAIRE

    Gillette, Stefan E.

    2012-01-01

    The phenomenon of “cloud computing” has become ubiquitous among users of the Internet and many commercial applications. Yet, the U.S. Navy has conducted limited research in this nascent technology. This thesis explores the application and integration of cloud computing both at the shipboard level and in a multi-ship environment. A virtual desktop infrastructure, mirroring a shipboard environment, was built and analyzed in the Cloud Lab at the Naval Postgraduate School, which offers a potentia...

  3. Usage of Cloud Computing Simulators and Future Systems For Computational Research

    OpenAIRE

    Lakshminarayanan, Ramkumar; Ramalingam, Rajasekar

    2016-01-01

    Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers and devices on demand, like the electricity grid. Currently, IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service) are used as a business model for Cloud Computing. Nowadays, the adoption and deployment of Cloud Computing is increasing in various domains, forcing researchers to conduct research in the area of Cloud Computing ...

  4. Analysis of late mid-Neolithic pottery illuminates the presenceof a Corded Ware Culture on the Baltic Island of Gotland

    Directory of Open Access Journals (Sweden)

    Erik Palmgren

    2015-12-01

    Full Text Available In this paper, we discuss variations seen in the ornamentation and modes of manufacturing pottery from the end of the mid-Neolithic 4600–4300 BP on the Island of Gotland in the Baltic Sea. The Pitted Ware cultural groups have been discussed as a western influence from the Swedish mainland, but the aDNA on skeletal remains point to eastern influences. We analyse and discuss pottery from the well-investigated Ajvide Pitted Ware site and what these variations mean in term of intra- and inter-island relationships, ethnicity and change, and we suggest the development of what could be described as a hybrid culture.

  5. Cloud Computing v českém prostředí

    OpenAIRE

    Margaris, Nikos

    2011-01-01

    Focus of this diploma thesis is on Cloud Computing -- a new delivery model of IS/ICT services for companies. Cloud Computing services are IT resources available to users via internet on pay-as-you-use basis. The aim of the thesis is define underlying Cloud Computing concepts and evaluate the current state of Cloud Computing adoption in the Czech Republic. We discuss the framework for definition of Cloud Computing concepts in the theoretical part of the thesis drawing on resources available in...

  6. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles

    OpenAIRE

    Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V.; Imran, Muhammad; Zhou, Keliang

    2016-01-01

    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and Io...

  7. Bioinformatics clouds for big data manipulation.

    Science.gov (United States)

    Dai, Lin; Gao, Xin; Guo, Yan; Xiao, Jingfa; Zhang, Zhang

    2012-11-28

    As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics. This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor.

  8. Wireless-Uplinks-Based Energy-Efficient Scheduling in Mobile Cloud Computing

    OpenAIRE

    Xing Liu; Chaowei Yuan; Zhen Yang; Enda Peng

    2015-01-01

    Mobile cloud computing (MCC) combines cloud computing and mobile internet to improve the computational capabilities of resource-constrained mobile devices (MDs). In MCC, mobile users could not only improve the computational capability of MDs but also save operation consumption by offloading the mobile applications to the cloud. However, MCC faces the problem of energy efficiency because of time-varying channels when the offloading is being executed. In this paper, we address the issue of ener...

  9. An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment

    OpenAIRE

    Pritesh Jain; Vaishali Chourey; Dheeraj Rane

    2011-01-01

    Cloud Computing has emerged as a major information and communications technology trend and has been proved as a key technology for market development and analysis for the users of several field. The practice of computing across two or more data centers separated by the Internet is growing in popularity due to an explosion in scalable computing demands. However, one of the major challenges that faces the cloud computing is how to secure and protect the data and processes the data of the user. ...

  10. Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter

    Directory of Open Access Journals (Sweden)

    Shyamala Loganathan

    2015-01-01

    Full Text Available Cloud computing is an on-demand computing model, which uses virtualization technology to provide cloud resources to users in the form of virtual machines through internet. Being an adaptable technology, cloud computing is an excellent alternative for organizations for forming their own private cloud. Since the resources are limited in these private clouds maximizing the utilization of resources and giving the guaranteed service for the user are the ultimate goal. For that, efficient scheduling is needed. This research reports on an efficient data structure for resource management and resource scheduling technique in a private cloud environment and discusses a cloud model. The proposed scheduling algorithm considers the types of jobs and the resource availability in its scheduling decision. Finally, we conducted simulations using CloudSim and compared our algorithm with other existing methods, like V-MCT and priority scheduling algorithms.

  11. Internet of Things novel advances and envisioned applications

    CERN Document Server

    Geetha, M

    2017-01-01

    This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society. .

  12. Cloud Computing and Internet of Things Concepts Applied on Buildings Data Analysis

    Directory of Open Access Journals (Sweden)

    Hebean Florin-Adrian

    2017-12-01

    Full Text Available Used and developed initially for the IT industry, the Cloud computing and Internet of Things concepts are found at this moment in a lot of sectors of activity, building industry being one of them. These are defined like a global computing, monitoring and analyze network, which is composed of hardware and software resources, with the feature of allocating and dynamically relocating the shared resources, in accordance with user requirements. Data analysis and process optimization techniques based on these new concepts are used increasingly more in the buildings industry area, especially for an optimal operations of the buildings installations and also for increasing occupants comfort. The multitude of building data taken from HVAC sensor, from automation and control systems and from the other systems connected to the network are optimally managed by these new analysis techniques. Through analysis techniques can be identified and manage the issues the arise in operation of building installations like critical alarms, nonfunctional equipment, issues regarding the occupants comfort, for example the upper and lower temperature deviation to the set point and other issues related to equipment maintenance. In this study, a new approach regarding building control is presented and also a generalized methodology for applying data analysis to building services data is described. This methodology is then demonstrated using two case studies.

  13. TINJAUAN KEAMANAN SISTEM PADA TEKNOLOGI CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Yuli Fauziah

    2014-01-01

    Full Text Available Dalam perspektif teknologi informasi, cloud computing atau komputasi awan dapat diartikan sebagai suatu teknologi yang memanfaatkan internet sebagai resource untuk komputasi yang dapat di-request oleh pengguna dan merupakan sebuah layanan dengan pusat server bersifat virtual atau berada dalam cloud (internet itu sendiri. Banyak perusahaan yang ingin memindahkan aplikasi dan storage-nya ke dalam cloudcomputing. Teknologi ini menjadi trend dikalangan peneliti dan praktisi IT untuk menggali potensi yang dapat ditawarkan kepada masyarakat luas. Tetapi masih banyak isu keamanan yang muncul, karena teknologi yang masih baru. Salah satu isu keamanannya adalah Theft of Information, yaitu pencurian terhadap data yang disimpan di dalam Storage aplikasi yang menggunakan teknologi Cloud Computing. Kerugian yang akan diperoleh oleh pengguna teknologi ini sangat besar, karena informasi yang dicuri menyangkut data rahasia milik perusahaan, maupun data-data penting lainnya.Beberapa tindakan untuk mencegah terjadinya pencurian data ini, yaitu dengan  menghindari jenis ancaman keamanan berupa kehilangan atau kebocoran data dan pembajakan account atau service, serta Identity Management dan access control adalah kebutuhan yang utama bagi SaaS Cloud computing perusahaan. Dan salah satu metode yang digunakan dalam keamanan data aspek autentikasi dan otorisasi pada aplikasi atau service cloud computing adalah teknologi Single-sign-on. Teknologi Single-sign-on (SSO adalah teknologi yang mengizinkan pengguna jaringan agar dapat mengakses sumber daya dalam jaringan hanya dengan menggunakan satu akun pengguna saja. Teknologi ini sangat diminati, khususnya dalam jaringan yang sangat besar dan bersifat heterogen, juga pada jaringan cloud computing. Dengan menggunakan SSO, seorang pengguna hanya cukup melakukan proses autentikasi sekali saja untuk mendapatkan izin akses terhadap semua layanan yang terdapat di dalam jaringan. Kata Kunci : Storage, Aplikasi, Software as a

  14. Cloud Computing - A Unified Approach for Surveillance Issues

    Science.gov (United States)

    Rachana, C. R.; Banu, Reshma, Dr.; Ahammed, G. F. Ali, Dr.; Parameshachari, B. D., Dr.

    2017-08-01

    Cloud computing describes highly scalable resources provided as an external service via the Internet on a basis of pay-per-use. From the economic point of view, the main attractiveness of cloud computing is that users only use what they need, and only pay for what they actually use. Resources are available for access from the cloud at any time, and from any location through networks. Cloud computing is gradually replacing the traditional Information Technology Infrastructure. Securing data is one of the leading concerns and biggest issue for cloud computing. Privacy of information is always a crucial pointespecially when an individual’s personalinformation or sensitive information is beingstored in the organization. It is indeed true that today; cloud authorization systems are notrobust enough. This paper presents a unified approach for analyzing the various security issues and techniques to overcome the challenges in the cloud environment.

  15. Tell el Yahudiyeh Ware: a re-evaluation

    International Nuclear Information System (INIS)

    Kaplan, M.F.; Harbottle, G.; Sayre, E.V.

    1980-01-01

    The TY (Tell el Yahudiyeh ware) project has implications for understanding the cultural interactions. The Second Intermediate Period (1750-1550 B.C.), one during which centraized government in Egypt collapses and, it is generally assumed, so does her trade network. Foreigners - the Hyksos - are able to enter the country and rule at least part of it. Results of this study (which includes activation analysis), however, indicate the TY is primarily an Egyptian pottery which appeared before the Hyksos entered and may have continued in use after they left. It cannot, therefore, be tightly associated with the Hyksos nor can it be used to judge the extent of their influence. Its wide distribution shows that Egypt continued to trade goods outside her boundaries throughout this period. Finally, not only goods travelled between what were generally considered to have been hostile neighbors, but the trade appears to have included ideas and technology as well

  16. Evaluation of Future Internet Technologies for Processing and Distribution of Satellite Imagery

    Science.gov (United States)

    Becedas, J.; Perez, R.; Gonzalez, G.; Alvarez, J.; Garcia, F.; Maldonado, F.; Sucari, A.; Garcia, J.

    2015-04-01

    Satellite imagery data centres are designed to operate a defined number of satellites. For instance, difficulties when new satellites have to be incorporated in the system appear. This occurs because traditional infrastructures are neither flexible nor scalable. With the appearance of Future Internet technologies new solutions can be provided to manage large and variable amounts of data on demand. These technologies optimize resources and facilitate the appearance of new applications and services in the traditional Earth Observation (EO) market. The use of Future Internet technologies for the EO sector were validated with the GEO-Cloud experiment, part of the Fed4FIRE FP7 European project. This work presents the final results of the project, in which a constellation of satellites records the whole Earth surface on a daily basis. The satellite imagery is downloaded into a distributed network of ground stations and ingested in a cloud infrastructure, where the data is processed, stored, archived and distributed to the end users. The processing and transfer times inside the cloud, workload of the processors, automatic cataloguing and accessibility through the Internet are evaluated to validate if Future Internet technologies present advantages over traditional methods. Applicability of these technologies is evaluated to provide high added value services. Finally, the advantages of using federated testbeds to carry out large scale, industry driven experiments are analysed evaluating the feasibility of an experiment developed in the European infrastructure Fed4FIRE and its migration to a commercial cloud: SoftLayer, an IBM Company.

  17. The Role of Networks in Cloud Computing

    Science.gov (United States)

    Lin, Geng; Devine, Mac

    The confluence of technology advancements and business developments in Broadband Internet, Web services, computing systems, and application software over the past decade has created a perfect storm for cloud computing. The "cloud model" of delivering and consuming IT functions as services is poised to fundamentally transform the IT industry and rebalance the inter-relationships among end users, enterprise IT, software companies, and the service providers in the IT ecosystem (Armbrust et al., 2009; Lin, Fu, Zhu, & Dasmalchi, 2009).

  18. Cloud Fingerprinting: Using Clock Skews To Determine Co Location Of Virtual Machines

    Science.gov (United States)

    2016-09-01

    expenses. However, because the cloud infrastructure is located off-site from an organization and the cloud is available to anyone who pays for its...Defense DNS Domain Name Service EC2 Elastic Cloud Computing EoR End of Row GCE Google Compute Engine IaaS Infrastructure -as-a-Service ICMP Internet...de facto method for both managing and processing this data [1]. The high demand for cloud services has caused many companies to offer easy solutions at

  19. Mobile Cloud Computing for Telemedicine Solutions

    Directory of Open Access Journals (Sweden)

    Mihaela GHEORGHE

    2014-01-01

    Full Text Available Mobile Cloud Computing is a significant technology which combines emerging domains such as mobile computing and cloud computing which has conducted to the development of one of the most IT industry challenging and innovative trend. This is still at the early stage of devel-opment but its main characteristics, advantages and range of services which are provided by an internet-based cluster system have a strong impact on the process of developing telemedi-cine solutions for overcoming the wide challenges the medical system is confronting with. Mo-bile Cloud integrates cloud computing into the mobile environment and has the advantage of overcoming obstacles related to performance (e.g. battery life, storage, and bandwidth, envi-ronment (e.g. heterogeneity, scalability, availability and security (e.g. reliability and privacy which are commonly present at mobile computing level. In this paper, I will present a compre-hensive overview on mobile cloud computing including definitions, services and the use of this technology for developing telemedicine application.

  20. Distributed and cloud computing from parallel processing to the Internet of Things

    CERN Document Server

    Hwang, Kai; Fox, Geoffrey C

    2012-01-01

    Distributed and Cloud Computing, named a 2012 Outstanding Academic Title by the American Library Association's Choice publication, explains how to create high-performance, scalable, reliable systems, exposing the design principles, architecture, and innovative applications of parallel, distributed, and cloud computing systems. Starting with an overview of modern distributed models, the book provides comprehensive coverage of distributed and cloud computing, including: Facilitating management, debugging, migration, and disaster recovery through virtualization Clustered systems for resear

  1. Cloud Computing: Opportunities and Challenges for Businesses

    Directory of Open Access Journals (Sweden)

    İbrahim Halil Seyrek

    2011-12-01

    Full Text Available Cloud computing represents a new approach for supplying and using information technology services. Considering its benefits for firms and the potential of changes that it may lead to, it is envisioned that cloud computing can be the most important innovation in information technology since the development of the internet. In this study, firstly, the development of cloud computing and related technologies are explained and classified by giving current application examples. Then the benefits of this new computing model for businesses are elaborated especially in terms of cost, flexibility and service quality. In spite of its benefits, cloud computing also poses some risks for firms, of which security is one of the most important, and there are some challenges in its implementation. This study points out the risks that companies should be wary about and some legal challenges related to cloud computing. Lastly, approaches that companies may take against cloud computing and different strategies that they may adopt are discussed and some recommendations are made

  2. Cloud manufacturing distributed computing technologies for global and sustainable manufacturing

    CERN Document Server

    Mehnen, Jörn

    2013-01-01

    Global networks, which are the primary pillars of the modern manufacturing industry and supply chains, can only cope with the new challenges, requirements and demands when supported by new computing and Internet-based technologies. Cloud Manufacturing: Distributed Computing Technologies for Global and Sustainable Manufacturing introduces a new paradigm for scalable service-oriented sustainable and globally distributed manufacturing systems.   The eleven chapters in this book provide an updated overview of the latest technological development and applications in relevant research areas.  Following an introduction to the essential features of Cloud Computing, chapters cover a range of methods and applications such as the factors that actually affect adoption of the Cloud Computing technology in manufacturing companies and new geometrical simplification method to stream 3-Dimensional design and manufacturing data via the Internet. This is further supported case studies and real life data for Waste Electrical ...

  3. Bioinformatics clouds for big data manipulation

    Directory of Open Access Journals (Sweden)

    Dai Lin

    2012-11-01

    Full Text Available Abstract As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS, Software as a Service (SaaS, Platform as a Service (PaaS, and Infrastructure as a Service (IaaS, and present our perspectives on the adoption of cloud computing in bioinformatics. Reviewers This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor.

  4. Bioinformatics clouds for big data manipulation

    KAUST Repository

    Dai, Lin

    2012-11-28

    As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics.This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor. 2012 Dai et al.; licensee BioMed Central Ltd.

  5. Spreadsheets in the Cloud { Not Ready Yet

    Directory of Open Access Journals (Sweden)

    Bruce D. McCullogh

    2013-01-01

    Full Text Available Cloud computing is a relatively new technology that facilitates collaborative creation and modification of documents over the internet in real time. Here we provide an introductory assessment of the available statistical functions in three leading cloud spreadsheets namely Google Spreadsheet, Microsoft Excel Web App, and Zoho Sheet. Our results show that the developers of cloud-based spreadsheets are not performing basic quality control, resulting in statistical computations that are misleading and erroneous. Moreover, the developers do not provide sufficient information regarding the software and the hardware, which can change at any time without notice. Indeed, rerunning the tests after several months we obtained different and sometimes worsened results.

  6. Planning our smart cities in the internet of things architects, software ...

    African Journals Online (AJOL)

    This paper presents a cloud centric vision for worldwide implementation of Internet of Things that, gives an indication of what to expect of modern day architects and how they are expected to function in the Internet of Thing world to make building of our much taunted smart cities a feasible reality. The key enabling ...

  7. ROBUST AND EFFICIENT PRIVACY PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE

    OpenAIRE

    Tessy Vincent*, Mrs.Krishnaveni.V.V

    2017-01-01

    Cloud computing is gaining more popularity because of its guaranteed services like online data storage and backup solutions, Web-based e-mail services, virtualized infrastructure etc. User is allowed to access the data stored in a cloud anytime, anywhere using internet connected device with low cost. To provide security to outsourced data in cloud storage against various corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes c...

  8. Cloud-based Architecture Capabilities Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    Vang, Leng [Idaho National Lab. (INL), Idaho Falls, ID (United States); Prescott, Steven R [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Curtis [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-09-01

    In collaborating scientific research arena it is important to have an environment where analysts have access to a shared of information documents, software tools and be able to accurately maintain and track historical changes in models. A new cloud-based environment would be accessible remotely from anywhere regardless of computing platforms given that the platform has available of Internet access and proper browser capabilities. Information stored at this environment would be restricted based on user assigned credentials. This report reviews development of a Cloud-based Architecture Capabilities (CAC) as a web portal for PRA tools.

  9. Towards Information Security Metrics Framework for Cloud Computing

    OpenAIRE

    Muhammad Imran Tariq

    2012-01-01

    Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet.  Cost and security are influential issues to deploy cloud computing in large enterprise.  Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard...

  10. Architecting Cloud-Enabled Systems: A Systematic Survey of Challenges and Solutions

    DEFF Research Database (Denmark)

    Chauhan, Aufeef; Babar, Muhammad Ali; Benatallah, Boualem

    2016-01-01

    architectures for cloud-based systems. Our key conclusions are that a large number of primary studies focus on middleware services aimed at achieving scalability, performance, response time and efficient resource optimization. Architecting cloud-based systems presents unique challenges as the systems...... to be designed range from pervasive embedded systems and enterprise applications to smart devices with Internet of Things (IoTs). We also conclude that there is a huge potential of research on architecting cloud-based systems in areas related to green computing, energy efficient systems, mobile cloud computing...

  11. Internet of Robotic Things – Converging Sensing/Actuating, Hyperconnectivity, Artificial Intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias Z.; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing new developments in various application domains, such as the Internet of Mobile Things (IoMT), Autonomous Internet of Things (A-IoT), Autonomous System of Things (ASoT), Internet of Autonomous Things (IoAT), Internet of Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc. that are progressing/advancing by using IoT technology. The IoT influence represents new development and deployment challenges in diffe...

  12. Provenance analysis of the Pliocene Ware Formation in the Guajira Peninsula, northern Colombia: Paleodrainage implications

    Science.gov (United States)

    Pérez-Consuegra, Nicolás; Parra, Mauricio; Jaramillo, Carlos; Silvestro, Daniele; Echeverri, Sebastián; Montes, Camilo; Jaramillo, José María; Escobar, Jaime

    2018-01-01

    The Cocinetas Basin in the Guajira Peninsula, the northernmost tip of South America, today has a dry climate with low rainfall (ten months) and no year-long rivers or permanent standing bodies of fresh water. In contrast, the fossil and geological record indicate that the Cocinetas Basin was much wetter during the Miocene-Pliocene (∼17-2.8 Ma). Water needed to sustain the paleofauna could either have originated from local sources or been brought by a larger river system (e.g. proto Magdalena/Orinoco river) with headwaters either in Andean ranges or the Guyana shield. We present a provenance study of the Pliocene Ware Formation, using petrographic analysis of conglomerate clasts and heavy minerals, and U-Pb dating of 140 detrital zircons. Clasts and heavy minerals are typical of ensialic metamorphic and igneous sources. The detrital zircon age distribution indicates the Guajira ranges as the most probable sediment source. The overall results indicate that the fluvial system of the Ware Formation drained the surrounding ranges. The water was probably derived by local precipitation onto the Guajira peninsula.

  13. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  14. Cloud Computing Based E-Learning System

    Science.gov (United States)

    Al-Zoube, Mohammed; El-Seoud, Samir Abou; Wyne, Mudasser F.

    2010-01-01

    Cloud computing technologies although in their early stages, have managed to change the way applications are going to be developed and accessed. These technologies are aimed at running applications as services over the internet on a flexible infrastructure. Microsoft office applications, such as word processing, excel spreadsheet, access database…

  15. Edge computing technologies for Internet of Things: a primer

    Directory of Open Access Journals (Sweden)

    Yuan Ai

    2018-04-01

    Full Text Available With the rapid development of mobile internet and Internet of Things applications, the conventional centralized cloud computing is encountering severe challenges, such as high latency, low Spectral Efficiency (SE, and non-adaptive machine type of communication. Motivated to solve these challenges, a new technology is driving a trend that shifts the function of centralized cloud computing to edge devices of networks. Several edge computing technologies originating from different backgrounds to decrease latency, improve SE, and support the massive machine type of communication have been emerging. This paper comprehensively presents a tutorial on three typical edge computing technologies, namely mobile edge computing, cloudlets, and fog computing. In particular, the standardization efforts, principles, architectures, and applications of these three technologies are summarized and compared. From the viewpoint of radio access network, the differences between mobile edge computing and fog computing are highlighted, and the characteristics of fog computing-based radio access network are discussed. Finally, open issues and future research directions are identified as well. Keywords: Internet of Things (IoT, Mobile edge computing, Cloudlets, Fog computing

  16. Enterprise Cloud Adoption: Leveraging on the Business and ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-06-01

    Jun 1, 2013 ... which access these services via the Internet. [9]. In support of .... Denial of Service attack? • What happens .... replicated, distributed file system Cloud providers have ... Usually, the fear of performance degradation and log size.

  17. Security Analysis in the Migration to Cloud Environments

    Directory of Open Access Journals (Sweden)

    Eduardo Fernández-Medina

    2012-05-01

    Full Text Available Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most consistently raised as consumers look to move their data and applications to the cloud. We justify the importance and motivation of security in the migration of legacy systems and we carry out an analysis of different approaches related to security in migration processes to cloud with the aim of finding the needs, concerns, requirements, aspects, opportunities and benefits of security in the migration process of legacy systems.

  18. An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jin-Xin Hu

    2017-01-01

    Full Text Available Internet of Things (IoT is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.

  19. Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm

    OpenAIRE

    Lingna He; Qingshui Li; Linan Zhu

    2012-01-01

    In order to replace the traditional Internet software usage patterns and enterprise management mode, this paper proposes a new business calculation mode- cloud computing, resources scheduling strategy is the key technology in cloud computing, Based on the study of cloud computing system structure and the mode of operation, The key research for cloud computing the process of the work scheduling and resource allocation problems based on ant colony algorithm , Detailed analysis and design of the...

  20. Llums i ombres de l’Open Course Ware: envers l’OCW 2.0

    Directory of Open Access Journals (Sweden)

    Rosanna Mestre

    2009-12-01

    Full Text Available El Open Course Ware es una altruista iniciativa orientada a la educación superior que aporta beneficios tanto a estudiantes y profesores, como a las instituciones que la promueven. Pero también tiene ciertas limitaciones que podrían ser paliadas parcialmente si sus gestores miraran al futuro desde una perspectiva más ambiciosa con el fin de garantizar no sólo repositorios abiertos, sino también apoyo pedagógico y reconocimiento de títulos. Exigiría soluciones imaginativas y comprometidas para algunas cuestiones clave pero podría convertirse en una respuesta accesible para la inminente demanda global de formación universitaria. Las bases de esta especie de OCW 2.0 ya están construidas.Open Course Ware is an altruistic initiative for higher education that has benefits for both students and professors, and institutions that promote it. But it also has certain limitations that might be diminished partly if decision makers looked at the future from a more ambitious perspective in order to guarantee not only open repositories, but also teaching assessment and degreegranting. It would require imaginative and engaged solutions to some key issues, but it could be a reasonable answer for the impending worldwide demand for higher education. The bases for this sort of OCW 2.0 are built already.L’Open Course Ware és una altruista iniciativa orientada a l’educació superior que aporta beneficis tant a estudiants i professors, com a les institucions que la promouen. Però també té certes limitacions que podrien ser pal·liades parcialment si els seus gestors miraren al futur des d’una perspectiva més ambiciosa per tal de garantir no sols repositoris oberts, sinó també suport pedagògic i reconeixement de títols. Exigiria solucions imaginatives i compromeses per a algunes qu?estions clau, però podria esdevenir una resposta accessible per a la imminent demanda global de formació universitària. Les bases d’aquesta mena d

  1. A hybrid optical switch architecture to integrate IP into optical networks to provide flexible and intelligent bandwidth on demand for cloud computing

    Science.gov (United States)

    Yang, Wei; Hall, Trevor J.

    2013-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users. As a consequence, the nature of the Internet traffic has been fundamentally transformed from a pure packet-based pattern to today's predominantly flow-based pattern. Cloud computing has also brought about an unprecedented growth in the Internet traffic. In this paper, a hybrid optical switch architecture is presented to deal with the flow-based Internet traffic, aiming to offer flexible and intelligent bandwidth on demand to improve fiber capacity utilization. The hybrid optical switch is capable of integrating IP into optical networks for cloud-based traffic with predictable performance, for which the delay performance of the electronic module in the hybrid optical switch architecture is evaluated through simulation.

  2. Re-theorising mobility and the formation of culture and language among the Corded Ware Culture in Europe

    DEFF Research Database (Denmark)

    Kristiansen, Kristian; Allentoft, Morten E.; Frei, Karin M.

    2017-01-01

    Recent genetic, isotopic and linguistic research has dramatically changed our understanding of how the Corded Ware Culture in Europe was formed. Here the authors explain it in terms of local adaptations and interactions between migrant Yamnaya people from the Pontic-Caspian steppe and indigenous ...

  3. An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment

    OpenAIRE

    Er. Parul Indoria; Prof. Abhishek Didel

    2013-01-01

    Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable ...

  4. Teaching, Learning, and Collaborating in the Cloud: Applications of Cloud Computing for Educators in Post-Secondary Institutions

    Science.gov (United States)

    Aaron, Lynn S.; Roche, Catherine M.

    2012-01-01

    "Cloud computing" refers to the use of computing resources on the Internet instead of on individual personal computers. The field is expanding and has significant potential value for educators. This is discussed with a focus on four main functions: file storage, file synchronization, document creation, and collaboration--each of which has…

  5. Total dissolved gas prediction and optimization in RiverWare

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, Kevin M. [Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States); Witt, Adam M. [Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States); Hadjerioua, Boualem [Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)

    2015-09-01

    Management and operation of dams within the Columbia River Basin (CRB) provides the region with irrigation, hydropower production, flood control, navigation, and fish passage. These various system-wide demands can require unique dam operations that may result in both voluntary and involuntary spill, thereby increasing tailrace levels of total dissolved gas (TDG) which can be fatal to fish. Appropriately managing TDG levels within the context of the systematic demands requires a predictive framework robust enough to capture the operationally related effects on TDG levels. Development of the TDG predictive methodology herein attempts to capture the different modes of hydro operation, thereby making it a viable tool to be used in conjunction with a real-time scheduling model such as RiverWare. The end result of the effort will allow hydro operators to minimize system-wide TDG while meeting hydropower operational targets and constraints. The physical parameters such as spill and hydropower flow proportions, accompanied by the characteristics of the dam such as plant head levels and tailrace depths, are used to develop the empirically-based prediction model. In the broader study, two different models are developed a simplified and comprehensive model. The latter model incorporates more specific bubble physics parameters for the prediction of tailrace TDG levels. The former model is presented herein and utilizes an empirically based approach to predict downstream TDG levels based on local saturation depth, spillway and powerhouse flow proportions, and entrainment effects. Representative data collected from each of the hydro projects is used to calibrate and validate model performance and the accuracy of predicted TDG uptake. ORNL, in conjunction with IIHR - Hydroscience & Engineering, The University of Iowa, carried out model adjustments to adequately capture TDG levels with respect to each plant while maintaining a generalized model configuration. Validation results

  6. Developing cloud-based Business Process Management (BPM): a survey

    Science.gov (United States)

    Mercia; Gunawan, W.; Fajar, A. N.; Alianto, H.; Inayatulloh

    2018-03-01

    In today’s highly competitive business environment, modern enterprises are dealing difficulties to cut unnecessary costs, eliminate wastes and delivery huge benefits for the organization. Companies are increasingly turning to a more flexible IT environment to help them realize this goal. For this reason, the article applies cloud based Business Process Management (BPM) that enables to focus on modeling, monitoring and process management. Cloud based BPM consists of business processes, business information and IT resources, which help build real-time intelligence systems, based on business management and cloud technology. Cloud computing is a paradigm that involves procuring dynamically measurable resources over the internet as an IT resource service. Cloud based BPM service enables to address common problems faced by traditional BPM, especially in promoting flexibility, event-driven business process to exploit opportunities in the marketplace.

  7. The Impact of Cloud Computing Technologies in E-learning

    Directory of Open Access Journals (Sweden)

    Hosam Farouk El-Sofany

    2013-01-01

    Full Text Available Cloud computing is a new computing model which is based on the grid computing, distributed computing, parallel computing and virtualization technologies define the shape of a new technology. It is the core technology of the next generation of network computing platform, especially in the field of education, cloud computing is the basic environment and platform of the future E-learning. It provides secure data storage, convenient internet services and strong computing power. This article mainly focuses on the research of the application of cloud computing in E-learning environment. The research study shows that the cloud platform is valued for both students and instructors to achieve the course objective. The paper presents the nature, benefits and cloud computing services, as a platform for e-learning environment.

  8. 77 FR 60119 - Proposed Consent Agreements: DesignerWare, LLC, Timothy Kelly and Ronald P. Koller, Aspen Way...

    Science.gov (United States)

    2012-10-02

    ... the news release describing it. The FTC Act and other laws that the Commission administers permit the...' private information would not be possible. RTO stores also used Detective Mode to send fake ``software.... DesignerWare created several different fake registration forms that its servers displayed on consumers...

  9. A Novel Market-Oriented Dynamic Collaborative Cloud Service Platform

    Science.gov (United States)

    Hassan, Mohammad Mehedi; Huh, Eui-Nam

    In today's world the emerging Cloud computing (Weiss, 2007) offer a new computing model where resources such as computing power, storage, online applications and networking infrastructures can be shared as "services" over the internet. Cloud providers (CPs) are incentivized by the profits to be made by charging consumers for accessing these services. Consumers, such as enterprises, are attracted by the opportunity for reducing or eliminating costs associated with "in-house" provision of these services.

  10. mPano: cloud-based mobile panorama view from single picture

    Science.gov (United States)

    Li, Hongzhi; Zhu, Wenwu

    2013-09-01

    Panorama view provides people an informative and natural user experience to represent the whole scene. The advances on mobile augmented reality, mobile-cloud computing, and mobile internet can enable panorama view on mobile phone with new functionalities, such as anytime anywhere query where a landmark picture is and what the whole scene looks like. To generate and explore panorama view on mobile devices faces significant challenges due to the limitations of computing capacity, battery life, and memory size of mobile phones, as well as the bandwidth of mobile Internet connection. To address the challenges, this paper presents a novel cloud-based mobile panorama view system that can generate and view panorama-view on mobile devices from a single picture, namely "Pano". In our system, first, we propose a novel iterative multi-modal image retrieval (IMIR) approach to get spatially adjacent images using both tag and content information from the single picture. Second, we propose a cloud-based parallel server synthing approach to generate panorama view in cloud, against today's local-client synthing approach that is almost impossible for mobile phones. Third, we propose predictive-cache solution to reduce latency of image delivery from cloud server to the mobile client. We have built a real mobile panorama view system and perform experiments. The experimental results demonstrated the effectiveness of our system and the proposed key component technologies, especially for landmark images.

  11. An infrastructure with a unified control plane to integrate IP into optical metro networks to provide flexible and intelligent bandwidth on demand for cloud computing

    Science.gov (United States)

    Yang, Wei; Hall, Trevor

    2012-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users and the nature of the Internet traffic will undertake a fundamental transformation. Consequently, the current Internet will no longer suffice for serving cloud traffic in metro areas. This work proposes an infrastructure with a unified control plane that integrates simple packet aggregation technology with optical express through the interoperation between IP routers and electrical traffic controllers in optical metro networks. The proposed infrastructure provides flexible, intelligent, and eco-friendly bandwidth on demand for cloud computing in metro areas.

  12. Exploring the Strategies for a Community College Transition into a Cloud-Computing Environment

    Science.gov (United States)

    DeBary, Narges

    2017-01-01

    The use of the Internet has resulted in the birth of an innovative virtualization technology called cloud computing. Virtualization can tremendously improve the instructional and operational systems of a community college. Although the incidental adoption of the cloud solutions in the community colleges of higher education has been increased,…

  13. Cloudweaver: Adaptive and Data-Driven Workload Manager for Generic Clouds

    Science.gov (United States)

    Li, Rui; Chen, Lei; Li, Wen-Syan

    Cloud computing denotes the latest trend in application development for parallel computing on massive data volumes. It relies on clouds of servers to handle tasks that used to be managed by an individual server. With cloud computing, software vendors can provide business intelligence and data analytic services for internet scale data sets. Many open source projects, such as Hadoop, offer various software components that are essential for building a cloud infrastructure. Current Hadoop (and many others) requires users to configure cloud infrastructures via programs and APIs and such configuration is fixed during the runtime. In this chapter, we propose a workload manager (WLM), called CloudWeaver, which provides automated configuration of a cloud infrastructure for runtime execution. The workload management is data-driven and can adapt to dynamic nature of operator throughput during different execution phases. CloudWeaver works for a single job and a workload consisting of multiple jobs running concurrently, which aims at maximum throughput using a minimum set of processors.

  14. Minimally Invasive Implantation of HeartWare Assist Device and Simultaneous Tricuspid Valve Reconstruction Through Partial Upper Sternotomy.

    Science.gov (United States)

    Hillebrand, Julia; Hoffmeier, Andreas; Djie Tiong Tjan, Tonny; Sindermann, Juergen R; Schmidt, Christoph; Martens, Sven; Scherer, Mirela

    2017-05-01

    Left ventricular assist device (LVAD) implantation is a well-established therapy to support patients with end-stage heart failure. However, the operative procedure is associated with severe trauma. Third generation LVADs like the HeartWare assist device (HeartWare, Inc., Framingham, MA, USA) are characterized by enhanced technology despite smaller size. These devices offer new minimally invasive surgical options. Tricuspid regurgitation requiring valve repair is frequent in patients with the need for mechanical circulatory support as it is strongly associated with ischemic and nonischemic cardiomyopathy. We report on HeartWare LVAD implantation and simultaneous tricuspid valve reconstruction through minimally invasive access by partial upper sternotomy to the fifth left intercostal space. Four male patients (mean age 51.72 ± 11.95 years) suffering from chronic heart failure due to dilative (three patients) and ischemic (one patient) cardiomyopathy and also exhibiting concomitant tricuspid valve insufficiency due to annular dilation underwent VAD implantation and tricuspid valve annuloplasty. Extracorporeal circulation was established via the ascending aorta, superior vena cava, and right atrium. In all four cases the LVAD implantation and tricuspid valve repair via partial median sternotomy was successful. During the operative procedure, no conversion to full sternotomy was necessary. One patient needed postoperative re-exploration because of pericardial effusion. No postoperative focal neurologic injury was observed. New generation VADs are advantageous because of the possibility of minimally invasive implantation procedure which can therefore minimize surgical trauma. Concomitant tricuspid valve reconstruction can also be performed simultaneously through partial upper sternotomy. Nevertheless, minimally invasive LVAD implantation is a challenging operative technique. © 2016 International Center for Artificial Organs and Transplantation and Wiley Periodicals

  15. pCloud: A Cloud-based Power Market Simulation Environment

    Energy Technology Data Exchange (ETDEWEB)

    Rudkevich, Aleksandr; Goldis, Evgeniy

    2012-12-02

    This research conducted by the Newton Energy Group, LLC (NEG) is dedicated to the development of pCloud: a Cloud-based Power Market Simulation Environment. pCloud is offering power industry stakeholders the capability to model electricity markets and is organized around the Software as a Service (SaaS) concept -- a software application delivery model in which software is centrally hosted and provided to many users via the internet. During the Phase I of this project NEG developed a prototype design for pCloud as a SaaS-based commercial service offering, system architecture supporting that design, ensured feasibility of key architecture's elements, formed technological partnerships and negotiated commercial agreements with partners, conducted market research and other related activities and secured funding for continue development of pCloud between the end of Phase I and beginning of Phase II, if awarded. Based on the results of Phase I activities, NEG has established that the development of a cloud-based power market simulation environment within the Windows Azure platform is technologically feasible, can be accomplished within the budget and timeframe available through the Phase II SBIR award with additional external funding. NEG believes that pCloud has the potential to become a game-changing technology for the modeling and analysis of electricity markets. This potential is due to the following critical advantages of pCloud over its competition: - Standardized access to advanced and proven power market simulators offered by third parties. - Automated parallelization of simulations and dynamic provisioning of computing resources on the cloud. This combination of automation and scalability dramatically reduces turn-around time while offering the capability to increase the number of analyzed scenarios by a factor of 10, 100 or even 1000. - Access to ready-to-use data and to cloud-based resources leading to a reduction in software, hardware, and IT costs

  16. Privacy in the Internet: Myth or reality

    Directory of Open Access Journals (Sweden)

    Mikarić Bratislav

    2016-01-01

    Full Text Available The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? What are the ways to control what personal information we will publicly share with others and is there a safe way to protect privacy on the world's global computer network? The paper gives an overview of the situation in the field, as well as tips for achieving the desired level of data protection.

  17. The Internet of Things

    CERN Document Server

    Greengard, Samuel

    2015-01-01

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of personal computers and the Internet...

  18. Construction of Urban Design Support System using Cloud Computing Type Virtual Reality and Case Study

    OpenAIRE

    Zhenhan, Lei; Shunta, Shimizu; Natuska, Ota; Yuji, Ito; Yuesong, Zhang

    2017-01-01

    This paper contributes a design support system based on cloud-computing type virtual reality (cloud-based VR) for urban planning and urban design. A platform for Cloud-based VR technology, i.e. a VR-Cloud server, is used to open a VR dataset to public collaboration over the Internet. The digital attributes representing the design scheme of design concepts includes the land use zone, building regulations, urban design style, and other design details of architectural design, landscape, and traf...

  19. Provide a model to improve the performance of intrusion detection systems in the cloud

    OpenAIRE

    Foroogh Sedighi

    2016-01-01

    High availability of tools and service providers in cloud computing and the fact that cloud computing services are provided by internet and deal with public, have caused important challenges for new computing model. Cloud computing faces problems and challenges such as user privacy, data security, data ownership, availability of services, and recovery after breaking down, performance, scalability, programmability. So far, many different methods are presented for detection of intrusion in clou...

  20. Cloud Computing : Goals, Issues, SOA, Integrated Technologies and Future -scope

    Directory of Open Access Journals (Sweden)

    V. Madhu Viswanatham

    2016-10-01

    Full Text Available The expansion of networking infrastructure has provided a novel way to store and access resources in a reliable, convenient and affordable means of technology called the Cloud. The cloud has become so popular and established its dominance in many recent world innovations and has highly influenced the trend of the Business process Management with the advantage of shared resources. The ability to remain disaster tolerant, on-demand scalability, flexible deployment and cost effectiveness has made the future world technologies like Internet of Things, to determine the cloud as their data and processing center. However, along with the implementation of cloud based technologies, we must also address the issues involved in its realization. This paper is a review on the advancements, scopes and issues involved in realizing a secured cloud powered environments.

  1. A Platform for Learning Internet of Things

    Science.gov (United States)

    Bogdanovic, Zorica; Simic, Konstantin; Milutinovic, Miloš; Radenkovic, Božidar; Despotovic-Zrakic, Marijana

    2014-01-01

    This paper presents a model for conducting Internet of Things (IoT) classes based on a web-service oriented cloud platform. The goal of the designed model is to provide university students with knowledge about IoT concepts, possibilities, and business models, and allow them to develop basic system prototypes using general-purpose microdevices and…

  2. Understanding the Self-Directed Online Learning Preferences, Goals, Achievements, and Challenges of MIT OpenCourseWare Subscribers

    Science.gov (United States)

    Bonk, Curtis J.; Lee, Mimi Miyoung; Kou, Xiaojing; Xu, Shuya; Sheu, Feng-Ru

    2015-01-01

    This research targeted the learning preferences, goals and motivations, achievements, challenges, and possibilities for life change of self-directed online learners who subscribed to the monthly OpenCourseWare (OCW) e-newsletter from MIT. Data collection included a 25-item survey of 1,429 newsletter subscribers; 613 of whom also completed an…

  3. Research on Data Mining of the Internet of Things Based on Cloud Computing Platform

    Science.gov (United States)

    Zhang, Wenqing

    2018-02-01

    Based on the development of society and the progress of information technology, China’s information industry has made great progress and has gradually become an important pillar of national economic development. In this context, the gradual integration of information technology had promoted the construction of the Internet of Things system, so as to promote the human life developed in the direction of modernization intelligently. At present, in the process of forming the development of the Internet of Things the first need to fully tap the data, which thus provide users with better service, for the development of large-scale development of the Internet. This paper analyzes the meaning of Internet of things, and discusses the characteristics of Internet of things and data mining, hoping to promote the improvement on the Internet of Things system in China, and thus promote the realization of higher efficiency.

  4. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  5. Reviews on Security Issues and Challenges in Cloud Computing

    Science.gov (United States)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  6. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  7. A REVIEW ON SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING MODEL OF RESOURCE MANAGEMENT

    OpenAIRE

    T. Vaikunth Pai; Dr. P. S. Aithal

    2017-01-01

    Cloud computing services refer to set of IT-enabled services delivered to a customer as services over the Internet on a leased basis and have the capability to extend up or down their service requirements or needs. Usually, cloud computing services are delivered by third party vendors who own the infrastructure. It has several advantages include scalability, elasticity, flexibility, efficiency and outsourcing non-core activities of an organization. Cloud computing offers an innovative busines...

  8. Evaluating the Acceptance of Cloud-Based Productivity Computer Solutions in Small and Medium Enterprises

    Science.gov (United States)

    Dominguez, Alfredo

    2013-01-01

    Cloud computing has emerged as a new paradigm for on-demand delivery and consumption of shared IT resources over the Internet. Research has predicted that small and medium organizations (SMEs) would be among the earliest adopters of cloud solutions; however, this projection has not materialized. This study set out to investigate if behavior…

  9. 76 FR 7534 - Porcelain-on-Steel Cooking Ware from the People's Republic of China: Final Results of the...

    Science.gov (United States)

    2011-02-10

    ... Ware from the People's Republic of China: Final Results of the Expedited Sunset Review of the... People's Republic of China (``PRC'') pursuant to section 751(c) of the Tariff Act of 1930, as amended (``Act''). See Initiation of Five-Year (``Sunset'') Review, 75 FR 60731 (October 1, 2010) (``Sunset...

  10. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  11. .Planning Our Smart Cities In The Internet Of Things Architects ...

    African Journals Online (AJOL)

    2016-12-01

    Dec 1, 2016 ... ... IoT (Internet of Things) was developed in parallel to Wireless Sensor Networks, and ... interpret and transmit the data coming from all these sensors. The cloud is .... devices or data sources with limited power and unreliable ...

  12. Cloud computing technologies applied in the virtual education of civil servants

    Directory of Open Access Journals (Sweden)

    Teodora GHERMAN

    2016-03-01

    Full Text Available From the perspective of education, e-learning through the use of Cloud Computing technologies represent one of the most important directions of educational software development, because Cloud Computing are in a rapid development and applies to all areas of the Information Society, including education. Systems require resources for virtual education on web platform (e-learning numerous hardware and software. The convenience of Internet learning, creating a learning environment based on web has become one of the strengths in virtual education research, including applied Cloud Computing technologies in virtual education of civil servants. The article presents Cloud Computing technologies as a platform for virtual education on web platforms, their advantages and disadvantages towards other technologies.

  13. 75 FR 11991 - ABC & D Recycling, Inc.-Lease and Operation Exemption-a Line of Railroad in Ware, MA

    Science.gov (United States)

    2010-03-12

    ... DEPARTMENT OF TRANSPORTATION Surface Transportation Board [STB Finance Docket No. 35356] ABC & D Recycling, Inc.--Lease and Operation Exemption--a Line of Railroad in Ware, MA ABC & D Recycling, Inc. (ABC & D), a noncarrier, has filed a verified notice of exemption under 49 CFR 1150.31 to lease from O...

  14. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  15. Static Load Balancing Algorithms In Cloud Computing Challenges amp Solutions

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2015-08-01

    Full Text Available Abstract Cloud computing provides on-demand hosted computing resources and services over the Internet on a pay-per-use basis. It is currently becoming the favored method of communication and computation over scalable networks due to numerous attractive attributes such as high availability scalability fault tolerance simplicity of management and low cost of ownership. Due to the huge demand of cloud computing efficient load balancing becomes critical to ensure that computational tasks are evenly distributed across servers to prevent bottlenecks. The aim of this review paper is to understand the current challenges in cloud computing primarily in cloud load balancing using static algorithms and finding gaps to bridge for more efficient static cloud load balancing in the future. We believe the ideas suggested as new solution will allow researchers to redesign better algorithms for better functionalities and improved user experiences in simple cloud systems. This could assist small businesses that cannot afford infrastructure that supports complex amp dynamic load balancing algorithms.

  16. The Needs of Virtual Machines Implementation in Private Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Edy Kristianto

    2015-12-01

    Full Text Available The Internet of Things (IOT becomes the purpose of the development of information and communication technology. Cloud computing has a very important role in supporting the IOT, because cloud computing allows to provide services in the form of infrastructure (IaaS, platform (PaaS, and Software (SaaS for its users. One of the fundamental services is infrastructure as a service (IaaS. This study analyzed the requirement that there must be based on a framework of NIST to realize infrastructure as a service in the form of a virtual machine to be built in a cloud computing environment.

  17. Geometric data perturbation-based personal health record transactions in cloud computing.

    Science.gov (United States)

    Balasubramaniam, S; Kavitha, V

    2015-01-01

    Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.

  18. Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing

    Science.gov (United States)

    Balasubramaniam, S.; Kavitha, V.

    2015-01-01

    Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud. PMID:25767826

  19. Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing

    Directory of Open Access Journals (Sweden)

    S. Balasubramaniam

    2015-01-01

    Full Text Available Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.

  20. Unidata Cyberinfrastructure in the Cloud

    Science.gov (United States)

    Ramamurthy, M. K.; Young, J. W.

    2016-12-01

    Data services, software, and user support are critical components of geosciences cyber-infrastructure to help researchers to advance science. With the maturity of and significant advances in cloud computing, it has recently emerged as an alternative new paradigm for developing and delivering a broad array of services over the Internet. Cloud computing is now mature enough in usability in many areas of science and education, bringing the benefits of virtualized and elastic remote services to infrastructure, software, computation, and data. Cloud environments reduce the amount of time and money spent to procure, install, and maintain new hardware and software, and reduce costs through resource pooling and shared infrastructure. Given the enormous potential of cloud-based services, Unidata has been moving to augment its software, services, data delivery mechanisms to align with the cloud-computing paradigm. To realize the above vision, Unidata has worked toward: * Providing access to many types of data from a cloud (e.g., via the THREDDS Data Server, RAMADDA and EDEX servers); * Deploying data-proximate tools to easily process, analyze, and visualize those data in a cloud environment cloud for consumption by any one, by any device, from anywhere, at any time; * Developing and providing a range of pre-configured and well-integrated tools and services that can be deployed by any university in their own private or public cloud settings. Specifically, Unidata has developed Docker for "containerized applications", making them easy to deploy. Docker helps to create "disposable" installs and eliminates many configuration challenges. Containerized applications include tools for data transport, access, analysis, and visualization: THREDDS Data Server, Integrated Data Viewer, GEMPAK, Local Data Manager, RAMADDA Data Server, and Python tools; * Leveraging Jupyter as a central platform and hub with its powerful set of interlinking tools to connect interactively data servers

  1. CLOUD TECHNOLOGY AS A WAY OF UKRAINIAN EDUCATION DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    T. Zaytseva

    2014-06-01

    Full Text Available This article is devoted to defining the forms and the required components cloud technology usage during studying of subject teachers. In order to improve the learning process it’s necessary to use such powerful technology as ‘cloud computing’. They support traditional forms of education and also are a new step in the development of education. Cloud technologies are-effective, efficient and flexible way to satisfy the needs of students during getting of new knowledge. Nowadays a characteristic feature of our time is rapid growing of using cloud technology. That is why we are spectators of implementation of cloud technologies and services in the system of higher and secondary education, too. A common information space in education using mostly cloud technologies that provide Microsoft and Google is creating now. Google Apps for Education containing free tools that allows teachers and students to communicate, teach and learn more effectively and efficiently. Significant advantage of using cloud services is providing application development and storage of large amounts of data on servers in distributed information processing centers via the Internet. That is why cloud technology is a powerful tool to activate students' self-guidance work. Surely, growing demand for professionals who knows the technology of cloud computing will increase slowly.

  2. A new Information publishing system Based on Internet of things

    Science.gov (United States)

    Zhu, Li; Ma, Guoguang

    2018-03-01

    A new information publishing system based on Internet of things is proposed, which is composed of four level hierarchical structure, including the screen identification layer, the network transport layer, the service management layer and the publishing application layer. In the architecture, the screen identification layer has realized the internet of screens in which geographically dispersed independent screens are connected to the internet by the customized set-top boxes. The service management layer uses MQTT protocol to implement a lightweight broker-based publish/subscribe messaging mechanism in constrained environments such as internet of things to solve the bandwidth bottleneck. Meanwhile the cloud-based storage technique is used to storage and manage the promptly increasing multimedia publishing information. The paper has designed and realized a prototype SzIoScreen, and give some related test results.

  3. Study on User Authority Management for Safe Data Protection in Cloud Computing Environments

    Directory of Open Access Journals (Sweden)

    Su-Hyun Kim

    2015-03-01

    Full Text Available In cloud computing environments, user data are encrypted using numerous distributed servers before storing such data. Global Internet service companies, such as Google and Yahoo, recognized the importance of Internet service platforms and conducted self-research and development to create and utilize large cluster-based cloud computing platform technology based on low-priced commercial nodes. As diverse data services become possible in distributed computing environments, high-capacity distributed management is emerging as a major issue. Meanwhile, because of the diverse forms of using high-capacity data, security vulnerability and privacy invasion by malicious attackers or internal users can occur. As such, when various sensitive data are stored in cloud servers and used from there, the problem of data spill might occur because of external attackers or the poor management of internal users. Data can be managed through encryption to prevent such problems. However, existing simple encryption methods involve problems associated with the management of access to data stored in cloud environments. Therefore, in the present paper, a technique for data access management by user authority, based on Attribute-Based Encryption (ABE and secret distribution techniques, is proposed.

  4. Demand Side Management Using the Internet of Energy Based on LoRaWAN Technology

    DEFF Research Database (Denmark)

    Shahryari, Kolsoom; Anvari-Moghaddam, Amjad; Shahryari, Shadi

    2017-01-01

    into cloud because of a long range, low power, wide area and low bit rate wireless telecommunication system which is called LoRaWAN. All devices in fog domain are connected by long range wide area network (LoRa) into a smart gateway. The gateway which bridges fog domain and cloud, is introduced......The smart grid, as a communication network, allows numerous connected devices such as sensors, relays and actuators to interact and cooperate with each other. An Internet-based solution for electricity that provides bidirectional flow of information and power is internet of energy (IoE) which...... is an extension of smart grid concept. A large number of connected devices and the huge amount of data generated by IoE and issues related to data transmission, process and storage, force IoE to be integrated by cloud computing. Furthermore, in order to enhance the performance and reduce the volume of transmitted...

  5. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  6. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service

    Science.gov (United States)

    Ahmad, Mushtaq

    Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.

  7. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud.

    Science.gov (United States)

    Munisamy, Shyamala Devi; Chokkalingam, Arun

    2015-01-01

    Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  8. Research on cloud-based remote measurement and analysis system

    Science.gov (United States)

    Gao, Zhiqiang; He, Lingsong; Su, Wei; Wang, Can; Zhang, Changfan

    2015-02-01

    The promising potential of cloud computing and its convergence with technologies such as cloud storage, cloud push, mobile computing allows for creation and delivery of newer type of cloud service. Combined with the thought of cloud computing, this paper presents a cloud-based remote measurement and analysis system. This system mainly consists of three parts: signal acquisition client, web server deployed on the cloud service, and remote client. This system is a special website developed using asp.net and Flex RIA technology, which solves the selective contradiction between two monitoring modes, B/S and C/S. This platform supplies customer condition monitoring and data analysis service by Internet, which was deployed on the cloud server. Signal acquisition device is responsible for data (sensor data, audio, video, etc.) collection and pushes the monitoring data to the cloud storage database regularly. Data acquisition equipment in this system is only conditioned with the function of data collection and network function such as smartphone and smart sensor. This system's scale can adjust dynamically according to the amount of applications and users, so it won't cause waste of resources. As a representative case study, we developed a prototype system based on Ali cloud service using the rotor test rig as the research object. Experimental results demonstrate that the proposed system architecture is feasible.

  9. Developing a Novel USB-PLC Controller for a Mechatronics Cloud Laboratory

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-04-01

    Full Text Available This study proposes the development and implementation of a novel Universal Serial Bus (USB-Programmable Logic Controller (PLC, called a USB-PLC controller, for a mechatronics cloud laboratory. The aim of a mechatronics cloud laboratory is to provide state of the art research quality equipment to students, allowing them to conduct hands-on experiments via the Internet. One objective of the cloud laboratory is to not only provide equipment for conducting set experiments, but also to provide a means for students to access research equipment in order to conduct individual research experiments. The proposed controller for these cloud laboratory experiments has been chosen in order to expose the students to as many different engineering and technology disciplines as possible.

  10. GIS IN THE CLOUD: USING WEBGIS FOR TEACHING SECONDARY GEOGRAPHY

    Directory of Open Access Journals (Sweden)

    Andrew J. Milson

    Full Text Available RESUMEN:There is no doubt among most geography educators that GIS is an important tool for teaching and learning, but its use has been slowed by issues such as the cost of the software and the management of large spatial data files. The move to cloud computing is one trend that is promising for GIS in education. The "cloud" refers to a virtual network that provides many users with access to files, services, and applications. In this article I argue that cloud computing and WebGIS have the potential to transform geography education. I will describe three case studies that make use of these emerging tools in classrooms in the US, and discuss the lessons that we can learn from these cases. PALABRAS CLAVE WEBSIG; SIG; enseñanza de la geografía; la nube de Internet; ArcGIS Online; ArcGIS Explorer Desktop (AGX. ABSTRACT There is no doubt among most geography educators that GIS is an important tool for teaching and learning, but its use has been slowed by issues such as the cost of the software and the management of large spatial data files. The move to cloud computingis one trend that is promising for GIS in education. The "cloud" refers to a virtual network that provides many users with access to files, services, and applications. In this article I argue that cloud computing and WebGIS have the potential to transform geography education. I will describe three case studies that make use of these emerging tools in classrooms in the US, and discuss the lessons that we can learn from these cases. KEY WORDS WEBGIS; GIS; cloud computing; ArcGIS Online; ArcGIS Explorer Desktop (AGX. RÉSUMÉ Il n'ya aucun doute parmi les éducateurs les plus géographie que le SIG est un outil important pour l'enseignement et l'apprentissage, mais son utilisation a été ralentie par des problèmes tels que le coût du logiciel et la gestion des grands fichiers de données spatiales. Le passage au nuage de l'internet est une tendance qui est prometteur pour les SIG dans l

  11. Research on the digital education resources of sharing pattern in independent colleges based on cloud computing environment

    Science.gov (United States)

    Xiong, Ting; He, Zhiwen

    2017-06-01

    Cloud computing was first proposed by Google Company in the United States, which was based on the Internet center, providing a standard and open network sharing service approach. With the rapid development of the higher education in China, the educational resources provided by colleges and universities had greatly gap in the actual needs of teaching resources. therefore, Cloud computing of using the Internet technology to provide shared methods liked the timely rain, which had become an important means of the Digital Education on sharing applications in the current higher education. Based on Cloud computing environment, the paper analyzed the existing problems about the sharing of digital educational resources in Jiangxi Province Independent Colleges. According to the sharing characteristics of mass storage, efficient operation and low input about Cloud computing, the author explored and studied the design of the sharing model about the digital educational resources of higher education in Independent College. Finally, the design of the shared model was put into the practical applications.

  12. BUSINESS MODELLING AND DATABASE DESIGN IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Mihai-Constantin AVORNICULUI

    2015-04-01

    Full Text Available Electronic commerce is growing constantly from one year to another in the last decade, few are the areas that also register such a growth. It covers the exchanges of computerized data, but also electronic messaging, linear data banks and electronic transfer payment. Cloud computing, a relatively new concept and term, is a model of access services via the internet to distributed systems of configurable calculus resources at request which can be made available quickly with minimum management effort and intervention from the client and the provider. Behind an electronic commerce system in cloud there is a data base which contains the necessary information for the transactions in the system. Using business modelling, we get many benefits, which makes the design of the database used by electronic commerce systems in cloud considerably easier.

  13. Towards autonomous vehicular clouds

    Directory of Open Access Journals (Sweden)

    Stephan Olariu

    2011-09-01

    Full Text Available The dawn of the 21st century has seen a growing interest in vehicular networking and its myriad potential applications. The initial view of practitioners and researchers was that radio-equipped vehicles could keep the drivers informed about potential safety risks and increase their awareness of road conditions. The view then expanded to include access to the Internet and associated services. This position paper proposes and promotes a novel and more comprehensive vision namely, that advances in vehicular networks, embedded devices and cloud computing will enable the formation of autonomous clouds of vehicular computing, communication, sensing, power and physical resources. Hence, we coin the term, autonomous vehicular clouds (AVCs. A key feature distinguishing AVCs from conventional cloud computing is that mobile AVC resources can be pooled dynamically to serve authorized users and to enable autonomy in real-time service sharing and management on terrestrial, aerial, or aquatic pathways or theaters of operations. In addition to general-purpose AVCs, we also envision the emergence of specialized AVCs such as mobile analytics laboratories. Furthermore, we envision that the integration of AVCs with ubiquitous smart infrastructures including intelligent transportation systems, smart cities and smart electric power grids will have an enormous societal impact enabling ubiquitous utility cyber-physical services at the right place, right time and with right-sized resources.

  14. Cloud Computing Concepts for Academic Collaboration

    Directory of Open Access Journals (Sweden)

    K.K. Jabbour

    2013-05-01

    Full Text Available The aim of this paper is to explain how cloud computing technologies improve academic collaboration. To accomplish that, we have to explore the current trend of the global computer network field. During the past few years, technology has evolved in many ways; many valuable web applications and services have been introduced to internet users. Social networking, synchronous/asynchronous communication, on-line video conferencing, and wikis are just a few examples of those web technologies that altered the way people interact nowadays. By utilizing some of the latest web tools and services and combining them with the most recent semantic Cloud Computing techniques, a wide and growing array of technology services and applications are provided, which are highly specialized or distinctive to individual or to educational campuses. Therefore, cloud computing can facilitate a new way of world academic collaboration; and introduce students to new and different ways that can help them manage massive workloads.

  15. smaRTI: Deploying the internet of things in retail supply chains

    OpenAIRE

    Anderseck, Björn; Hille, Alexander

    2013-01-01

    This paper describes a cloud based tracking and tracing system based on the principals of the internet of things. The ’things’ are returnable assets in retail supply chains. They are used to gain a very high transparency over the hole supply chain, including redistribution processes, by making them smart with autoID-technologies. A cloud based IT solution connects the supply chain partners and makes information visible where it is needed. The system is strictly developed with a user friendly ...

  16. SnowCloud - a Framework to Predict Streamflow in Snowmelt-dominated Watersheds Using Cloud-based Computing

    Science.gov (United States)

    Sproles, E. A.; Crumley, R. L.; Nolin, A. W.; Mar, E.; Lopez-Moreno, J. J.

    2017-12-01

    Streamflow in snowy mountain regions is extraordinarily challenging to forecast, and prediction efforts are hampered by the lack of timely snow data—particularly in data sparse regions. SnowCloud is a prototype web-based framework that integrates remote sensing, cloud computing, interactive mapping tools, and a hydrologic model to offer a new paradigm for delivering key data to water resource managers. We tested the skill of SnowCloud to forecast monthly streamflow with one month lead time in three snow-dominated headwaters. These watersheds represent a range of precipitation/runoff schemes: the Río Elqui in northern Chile (200 mm/yr, entirely snowmelt); the John Day River, Oregon, USA (635 mm/yr, primarily snowmelt); and the Río Aragon in the northern Spain (850 mm/yr, snowmelt dominated). Model skill corresponded to snowpack contribution with Nash-Sutcliffe Efficiencies of 0.86, 0.52, and 0.21 respectively. SnowCloud does not require the user to possess advanced programming skills or proprietary software. We access NASA's MOD10A1 snow cover product to calculate the snow metrics globally using Google Earth Engine's geospatial analysis and cloud computing service. The analytics and forecast tools are provided through a web-based portal that requires only internet access and minimal training. To test the efficacy of SnowCloud we provided the tools and a series of tutorials in English and Spanish to water resource managers in Chile, Spain, and the United States. Participants assessed their user experience and provided feedback, and the results of our multi-cultural assessment are also presented. While our results focus on SnowCloud, they outline methods to develop cloud-based tools that function effectively across cultures and languages. Our approach also addresses the primary challenges of science-based computing; human resource limitations, infrastructure costs, and expensive proprietary software. These challenges are particularly problematic in developing

  17. Intelligent Middle-Ware Architecture for Mobile Networks

    Science.gov (United States)

    Rayana, Rayene Ben; Bonnin, Jean-Marie

    Recent advances in electronic and automotive industries as well as in wireless telecommunication technologies have drawn a new picture where each vehicle became “fully networked”. Multiple stake-holders (network operators, drivers, car manufacturers, service providers, etc.) will participate in this emerging market, which could grow following various models. To free the market from technical constraints, it is important to return to the basics of the Internet, i.e., providing embarked devices with a fully operational Internet connectivity (IPv6).

  18. Cloud Computing Benefits for Educational Institutions

    OpenAIRE

    Lakshminarayanan, Ramkumar; Kumar, Binod; Raju, M.

    2013-01-01

    Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Currently, IaaS (Infrastructure as a Service), PaaS (Platform as a Service...

  19. EDUCATIONAL USE OF CLOUD COMPUTING AND AT-MEGA MICROCONTROLLER - A CASE STUDY OF AN ALARM SYSTEM

    Directory of Open Access Journals (Sweden)

    Tomasz Cieplak

    2016-06-01

    Full Text Available The article shows a case study of Cloud Computing model combined with AT-Mega microcontrollers for educational purposes. The presented system takes advantage of many aspects of Internet of Things model, thus conjoining Cloud Management system with measurement-execution module based on Arduino platform. One benefit of this solution is a cost-effective way of showcasing machine and device integration with distinct cloud services. This article is based on practical experience with students' projects and an home alarm system with use of a Cloud Computing services will be described.

  20. SmartCityWare

    DEFF Research Database (Denmark)

    Mohamed, Nader; Al-Jaroodi, Jameela; Jawhar, Imad

    2017-01-01

    Smart cities are becoming a reality. Various aspects of modern cities are being automated and integrated with information and communication technologies to achieve higher functionality, optimized resources utilization, and management, and improved quality of life for the residents. Smart cities...... rely heavily on utilizing various software, hardware, and communication technologies to improve the operations in areas, such as healthcare, transportation, energy, education, logistics, and many others, while reducing costs and resources consumption. One of the promising technologies to support...... technology is Fog Computing, which extends the traditional Cloud Computing paradigm to the edge of the network to enable localized and real-time support for operating-enhanced smart city services. However, proper integration and efficient utilization of CoT and Fog Computing is not an easy task. This paper...

  1. Understanding the Performance of Low Power Raspberry Pi Cloud for Big Data

    Directory of Open Access Journals (Sweden)

    Wajdi Hajji

    2016-06-01

    Full Text Available Nowadays, Internet-of-Things (IoT devices generate data at high speed and large volume. Often the data require real-time processing to support high system responsiveness which can be supported by localised Cloud and/or Fog computing paradigms. However, there are considerably large deployments of IoT such as sensor networks in remote areas where Internet connectivity is sparse, challenging the localised Cloud and/or Fog computing paradigms. With the advent of the Raspberry Pi, a credit card-sized single board computer, there is a great opportunity to construct low-cost, low-power portable cloud to support real-time data processing next to IoT deployments. In this paper, we extend our previous work on constructing Raspberry Pi Cloud to study its feasibility for real-time big data analytics under realistic application-level workload in both native and virtualised environments. We have extensively tested the performance of a single node Raspberry Pi 2 Model B with httperf and a cluster of 12 nodes with Apache Spark and HDFS (Hadoop Distributed File System. Our results have demonstrated that our portable cloud is useful for supporting real-time big data analytics. On the other hand, our results have also unveiled that overhead for CPU-bound workload in virtualised environment is surprisingly high, at 67.2%. We have found that, for big data applications, the virtualisation overhead is fractional for small jobs but becomes more significant for large jobs, up to 28.6%.

  2. Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ahmad Shokuh Saljoughi

    2018-01-01

    Full Text Available Today, cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major issues facing cloud service providers and their customers. Since cloud computing is a virtual pool of resources provided in an open environment (Internet, cloud-based services entail security risks. Detection of intrusions and attacks through unauthorized users is one of the biggest challenges for both cloud service providers and cloud users. In the present study, artificial intelligence techniques, e.g. MLP Neural Network sand particle swarm optimization algorithm, were used to detect intrusion and attacks. The methods were tested for NSL-KDD, KDD-CUP datasets. The results showed improved accuracy in detecting attacks and intrusions by unauthorized users.

  3. Hard Ware Implementation of Diamond Search Algorithm for Motion Estimation and Object Tracking

    International Nuclear Information System (INIS)

    Hashimaa, S.M.; Mahmoud, I.I.; Elazm, A.A.

    2009-01-01

    Object tracking is very important task in computer vision. Fast search algorithms emerged as important search technique to achieve real time tracking results. To enhance the performance of these algorithms, we advocate the hardware implementation of such algorithms. Diamond search block matching motion estimation has been proposed recently to reduce the complexity of motion estimation. In this paper we selected the diamond search algorithm (DS) for implementation using FPGA. This is due to its fundamental role in all fast search patterns. The proposed architecture is simulated and synthesized using Xilinix and modelsim soft wares. The results agree with the algorithm implementation in Matlab environment.

  4. Mapping in the cloud

    CERN Document Server

    Peterson, Michael P

    2014-01-01

    This engaging text provides a solid introduction to mapmaking in the era of cloud computing. It takes students through both the concepts and technology of modern cartography, geographic information systems (GIS), and Web-based mapping. Conceptual chapters delve into the meaning of maps and how they are developed, covering such topics as map layers, GIS tools, mobile mapping, and map animation. Methods chapters take a learn-by-doing approach to help students master application programming interfaces and build other technical skills for creating maps and making them available on the Internet. Th

  5. Grids, Clouds and Virtualization

    CERN Document Server

    Cafaro, Massimo

    2011-01-01

    Research into grid computing has been driven by the need to solve large-scale, increasingly complex problems for scientific applications. Yet the applications of grid computing for business and casual users did not begin to emerge until the development of the concept of cloud computing, fueled by advances in virtualization techniques, coupled with the increased availability of ever-greater Internet bandwidth. The appeal of this new paradigm is mainly based on its simplicity, and the affordable price for seamless access to both computational and storage resources. This timely text/reference int

  6. Penerapan Cloud Computing Pada Sistem Reservasi Homestay Dieng Berbasis Web

    Directory of Open Access Journals (Sweden)

    Rusydi Umar, Alan Fajar Sudrajat

    2017-10-01

    Full Text Available Homestay is one of the places needed as lodging facilities in the tourist area. In recent years, lodging business is greatly increasing. Business lodging in Dieng is one of the promising venture business' due to the increasing number of the tourists who interested to visit the tourist  places in Dieng and they need the hotel services. However, there are some managers who are unable to promote their lodging through the internet. Therefore, this research will make a software as a service in a cloud computing, regarding the Homestay Reservation System service in order to make the managers able to promote their homestay to public through the internet and it will make customers able to make a reservation through the software. This software was made by following waterfall paradigm in software engineering, start from analysis, design, implementation and testing. Testing result showed that the application deserved to be used.Keywords: information, cloud computing, homestay, reservation

  7. Customized products and cloud service information system development research

    Directory of Open Access Journals (Sweden)

    Hung Chien-Wen

    2017-01-01

    Full Text Available This study presents a cloud service customized product information system to enable businesses to provide customized product marketing on the Internet to meet consumer demand for customized products. The cloud service of the information system development strategic framework proposed in this study contains three elements: (1 e-commerce services, (2 promotion type modules, and (3 cloud services customized promotional products. In this study, a mining cloud information system to detect customer behavior is proposed. The association rules from relational database design are utilized to mine consumer behavior to generate cross-selling proposals for customer products and marketing for a retailing mall in Taiwan. The study is composed of several parts, as follows. A market segment and application of association rules in data exploration techniques (Association Rule Mining and sequence-like exploration (Sequential Pattern Mining, efficient analysis of customers, consumer behavior, identification of candidates for promotional products, and using cloud service delivery and evaluation of targets to evaluate candidates for promotional products for production. However, in addition to cloud service customized promotional products, the quantity of promotional products sales varies for different customers. We strive to achieve increased customer loyalty and profits through the use of active cloud service customized promotional products.

  8. Resource-Aware Load Balancing Scheme using Multi-objective Optimization in Cloud Computing

    OpenAIRE

    Kavita Rana; Vikas Zandu

    2016-01-01

    Cloud computing is a service based, on-demand, pay per use model consisting of an interconnected and virtualizes resources delivered over internet. In cloud computing, usually there are number of jobs that need to be executed with the available resources to achieve optimal performance, least possible total time for completion, shortest response time, and efficient utilization of resources etc. Hence, job scheduling is the most important concern that aims to ensure that use’s requirement are ...

  9. Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud

    Directory of Open Access Journals (Sweden)

    Shyamala Devi Munisamy

    2015-01-01

    Full Text Available Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider’s premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.

  10. Proactive vs reactive failure recovery assessment in combined fog-to-cloud (F2C) systems

    OpenAIRE

    Souza, Vitor Barbosa Carlos de; Masip Bruin, Xavier; Marín Tordera, Eva; Ramirez Almonte, Wilson; Sánchez López, Sergio

    2017-01-01

    The increasing number of end user devices at the edge of the network, along with their ever increasing computing capacity, as well as the advances in Data Center technologies, paved the way for the generation of Internet of Things (IoT). Several IoT services have been deployed leveraging Cloud Computing and, more recently, Fog Computing. In order to enable efficient control of cloud and fog premises, Fog-to-Cloud (F2C) has been recently proposed as a distributed architecture for coordinated m...

  11. [Design and Application of High-risk Pregnancy Monitoring & Warning Internet Platform Based on Internet of Things].

    Science.gov (United States)

    Lu, Heqing; Zhang, Xiaofeng; Li, Bin

    2017-09-30

    Through illustrating the designing of high-risk pregnancy maternal-fetal monitoring system based on the internet of things, this paper introduced the specific application of using wearable medical devices to provide maternal-fetal mobile medical services. With the help of big data and cloud obstetrics platform, the monitoring and warning network was further improved, the level-to-level administration of high-risk pregnancy was realized, the level of perinatal health care was enhanced and the risk of critical emergency of pregnancy decreased.

  12. Cloud Based Educational Systems 
And Its Challenges And Opportunities And Issues

    Directory of Open Access Journals (Sweden)

    Prantosh Kr. PAUL

    2014-01-01

    Full Text Available Cloud Computing (CC is actually is a set of hardware, software, networks, storage, services an interface combines to deliver aspects of computing as a service. Cloud Computing (CC actually uses the central remote servers to maintain data and applications. Practically Cloud Computing (CC is extension of Grid computing with independency and smarter tools and technological gradients. Healthy Cloud Computing helps in sharing of software, hardware, application and other packages with the help of internet tools and wireless media. Cloud Computing, has benefits in several field and applications domain such as Agriculture, Business and Commerce, Health Care, Hospitality and Tourism, Education and Training sector and so on. In Education Systems, it may be applicable in general regular education and other education systems including general and vocational training. This paper is talks about opportunities that provide Cloud Computing (CC; however the intention would be challenges and issues in relation to Education, Education Systems and Training programme.

  13. An Efficient Virtual Machine Consolidation Scheme for Multimedia Cloud Computing.

    Science.gov (United States)

    Han, Guangjie; Que, Wenhui; Jia, Gangyong; Shu, Lei

    2016-02-18

    Cloud computing has innovated the IT industry in recent years, as it can delivery subscription-based services to users in the pay-as-you-go model. Meanwhile, multimedia cloud computing is emerging based on cloud computing to provide a variety of media services on the Internet. However, with the growing popularity of multimedia cloud computing, its large energy consumption cannot only contribute to greenhouse gas emissions, but also result in the rising of cloud users' costs. Therefore, the multimedia cloud providers should try to minimize its energy consumption as much as possible while satisfying the consumers' resource requirements and guaranteeing quality of service (QoS). In this paper, we have proposed a remaining utilization-aware (RUA) algorithm for virtual machine (VM) placement, and a power-aware algorithm (PA) is proposed to find proper hosts to shut down for energy saving. These two algorithms have been combined and applied to cloud data centers for completing the process of VM consolidation. Simulation results have shown that there exists a trade-off between the cloud data center's energy consumption and service-level agreement (SLA) violations. Besides, the RUA algorithm is able to deal with variable workload to prevent hosts from overloading after VM placement and to reduce the SLA violations dramatically.

  14. Demand Side Management Using the Internet of Energy based on Fog and Cloud Computing

    DEFF Research Database (Denmark)

    Shahryari, Kolsoom; Anvari-Moghaddam, Amjad

    2017-01-01

    The smart grid, as a communication network, allows numerous connected devices such as sensors, relays and actuators to interact and cooperate with each other. An Internet-based solution for electricity that provides bidirectional flow of information and power is internet of energy (IoE) which...

  15. Generic-distributed framework for cloud services marketplace based on unified ontology

    Directory of Open Access Journals (Sweden)

    Samer Hasan

    2017-11-01

    Full Text Available Cloud computing is a pattern for delivering ubiquitous and on demand computing resources based on pay-as-you-use financial model. Typically, cloud providers advertise cloud service descriptions in various formats on the Internet. On the other hand, cloud consumers use available search engines (Google and Yahoo to explore cloud service descriptions and find the adequate service. Unfortunately, general purpose search engines are not designed to provide a small and complete set of results, which makes the process a big challenge. This paper presents a generic-distrusted framework for cloud services marketplace to automate cloud services discovery and selection process, and remove the barriers between service providers and consumers. Additionally, this work implements two instances of generic framework by adopting two different matching algorithms; namely dominant and recessive attributes algorithm borrowed from gene science and semantic similarity algorithm based on unified cloud service ontology. Finally, this paper presents unified cloud services ontology and models the real-life cloud services according to the proposed ontology. To the best of the authors’ knowledge, this is the first attempt to build a cloud services marketplace where cloud providers and cloud consumers can trend cloud services as utilities. In comparison with existing work, semantic approach reduced the execution time by 20% and maintained the same values for all other parameters. On the other hand, dominant and recessive attributes approach reduced the execution time by 57% but showed lower value for recall.

  16. Generic-distributed framework for cloud services marketplace based on unified ontology.

    Science.gov (United States)

    Hasan, Samer; Valli Kumari, V

    2017-11-01

    Cloud computing is a pattern for delivering ubiquitous and on demand computing resources based on pay-as-you-use financial model. Typically, cloud providers advertise cloud service descriptions in various formats on the Internet. On the other hand, cloud consumers use available search engines (Google and Yahoo) to explore cloud service descriptions and find the adequate service. Unfortunately, general purpose search engines are not designed to provide a small and complete set of results, which makes the process a big challenge. This paper presents a generic-distrusted framework for cloud services marketplace to automate cloud services discovery and selection process, and remove the barriers between service providers and consumers. Additionally, this work implements two instances of generic framework by adopting two different matching algorithms; namely dominant and recessive attributes algorithm borrowed from gene science and semantic similarity algorithm based on unified cloud service ontology. Finally, this paper presents unified cloud services ontology and models the real-life cloud services according to the proposed ontology. To the best of the authors' knowledge, this is the first attempt to build a cloud services marketplace where cloud providers and cloud consumers can trend cloud services as utilities. In comparison with existing work, semantic approach reduced the execution time by 20% and maintained the same values for all other parameters. On the other hand, dominant and recessive attributes approach reduced the execution time by 57% but showed lower value for recall.

  17. QAaaS in a Cloud IoT Ecosystem

    Directory of Open Access Journals (Sweden)

    Bogdan GHILIC-MICU

    2017-01-01

    Full Text Available The current transition state of the global society, both from economic and (mostly technological perspective, goes – again – into overtime. Borrowed from fundamental domains and applied into science and research, the latest technological developments are built on graphene, silicene, phosphorene and stanene. The fourth industrial revolution changes perceptions and redefines the status of the individual, transforming him from con-sumer into pro-sumer of energy. Spintronics stimulates the production of accessories specific to the Internet of Things (IoT, like smart clothes connected to internet and implanted phones. Additionally, technology influences software development methodologies facing us with paradigms that transcend philosophies like green, grid, cloud computing and advance toward a superior manifestation of computer programming: Fog Computing (with the next level being presumably Rainbow Computing. Within this avalanche of transformations, technologies and paradigms, one aspect that has to evolve continuously is the quality assurance (QA. Hidden under various concept or methodology encapsulations, quality assurance in all fields and mostly in technological development and software paradigm play a key role. In an ecosystem defined by the context of Cloud IoT, quality assurance as service becomes a real challenge. In this paper we highlight the ways the ecosystem engages in its development not only things, beings, energies, sensors or objects but also technologies. One such popular technology is cloud computing which, in the context of IoT, sees a spectacular development of its own cluster of services, a potential such service being QAaaS.

  18. A home healthcare system in the cloud-addressing security and privacy challenges

    NARCIS (Netherlands)

    Deng, M.; Petkovic, M.; Nalin, M.; Baroni, I.

    2011-01-01

    Cloud computing is an emerging technology that is expected to support Internet scale critical applications which could be essential to the healthcare sector. Its scalability, resilience, adaptability, connectivity, cost reduction, and high performance features have high potential to lift the

  19. Send your data into the cloud and make it… vaporize

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Cloud computing” --- the term is as nebulous as real clouds.   Basically, it means storing data somewhere on the Internet. This certainly has advantages, since this data will be available anytime from anywhere. For example, the Google mailbox is available from everywhere; “Dropbox” provides a central storage for any type of files; “ZAPR” and “TeamViewer”, once installed, allow you to share your local files by just sending around links, or give third parties full remote access to your PC, respectively. In addition, there is a growing number of cloud synchronisation services (e.g. “iCloud”/”MobileMe”, “Firefox Sync”, “Dropbox”) which provide (semi-)automatic back-ups of all local files of a laptop, PC or mobile phone. But hold on. What actually is transferred into the cloud? Personal files like bank statements? Passwords, especially CE...

  20. Bulut Bilişim ve Mali Etkileri: Bulutta Vergi=Cloud Computing And Its Financial Effects: Tax On Cloud

    Directory of Open Access Journals (Sweden)

    Metin TURAN

    2014-12-01

    Full Text Available Bulut bilişim genel olarak yazılımın, altyapının ve platformun hizmet olarak sunulması ve bu bilişim kaynaklarına çoğunlukla İnternet üzerinden yerden bağımsız erişim sağlanmasıdır. Bulut bilişim İnternetin gelişmesi ve kullanımının artması ile yaygınlaşmıştır. Bu çalışmanın amacı, kullanılan ya da hizmete sunulan bulut bilişim hizmetleri için oluşan vergi konusunu analiz etmektir. Çalışmada, kurum ve kuruluşların bulut bilişim hizmetleri dolayısıyla hangi tür vergilere tabi oldukları incelenmiş ve ortaya çıkan sorunlar belirtilerek çözüm önerileri sunulmuştur. Bu kapsamda, vergi kanunları ve ikincil mevzuat içerik analizi yöntemi ile incelenmiş ve Türkiye’de vergi mevzuatında doğrudan ve dolaylı olarak bulut bilişime yönelik çeşitli hükümlerin bulunduğu görülmüştür./In general, cloud computing is that software, platform and infrastructure as a service become available, and provide location independent access to these computing resources from anywhere, mostly via the Internet. Cloud computing has become widespread with development of Internet and its increasing use. This study aims to analyze the tax issue arising from cloud computing consumed or provided. In the study, institutions and organizations were examined due to cloud computing to which kind of tax they are subject and solutions recommendations were presented by indicating issues arised. In this context, the tax laws and secondary legislation were examined by content analysis and, it was seen that in Turkey, there were directly and indirectly some provisions in Tax legislation for cloud computing.

  1. Switching Brains: Cloud-based Intelligent Resources Management for the Internet of Cognitive Things

    OpenAIRE

    R. Francisco; A.M. Arsenio

    2014-01-01

    Cognitive technologies can bring important benefits to our everyday life, enabling connected devices to do tasks that in the past only humans could do, leading to the Cognitive Internet of Things. Wireless Sensor and Actuator Networks (WSAN) are often employed for communication between Internet objects. However, WSAN face some problems, namely sensors’ energy and CPU load consumption, which are common to other networked devices, such as mobile devices or robotic platforms. Additionally, cogni...

  2. Internet Hospitals in China: Cross-Sectional Survey.

    Science.gov (United States)

    Xie, Xiaoxu; Zhou, Weimin; Lin, Lingyan; Fan, Si; Lin, Fen; Wang, Long; Guo, Tongjun; Ma, Chuyang; Zhang, Jingkun; He, Yuan; Chen, Yixin

    2017-07-04

    The Internet hospital, an innovative approach to providing health care, is rapidly developing in China because it has the potential to provide widely accessible outpatient service delivery via Internet technologies. To date, China's Internet hospitals have not been systematically investigated. The aim of this study was to describe the characteristics of China's Internet hospitals, and to assess their health service capacity. We searched Baidu, the popular Chinese search engine, to identify Internet hospitals, using search terms such as "Internet hospital," "web hospital," or "cloud hospital." All Internet hospitals in mainland China were eligible for inclusion if they were officially registered. Our search was carried out until March 31, 2017. We identified 68 Internet hospitals, of which 43 have been put into use and 25 were under construction. Of the 43 established Internet hospitals, 13 (30%) were in the hospital informatization stage, 24 (56%) were in the Web ward stage, and 6 (14%) were in full Internet hospital stage. Patients accessed outpatient service delivery via website (74%, 32/43), app (42%, 18/43), or offline medical consultation facility (37%, 16/43) from the Internet hospital. Furthermore, 25 (58%) of the Internet hospitals asked doctors to deliver health services at a specific Web clinic, whereas 18 (42%) did not. The consulting methods included video chat (60%, 26/43), telephone (19%, 8/43), and graphic message (28%, 12/43); 13 (30%) Internet hospitals cannot be consulted online any more. Only 6 Internet hospitals were included in the coverage of health insurance. The median number of doctors available online was zero (interquartile range [IQR] 0 to 5; max 16,492). The median consultation fee per time was ¥20 (approximately US $2.90, IQR ¥0 to ¥200). Internet hospitals provide convenient outpatient service delivery. However, many of the Internet hospitals are not yet mature and are faced with various issues such as online doctor scarcity and

  3. Capturing and analyzing wheelchair maneuvering patterns with mobile cloud computing.

    Science.gov (United States)

    Fu, Jicheng; Hao, Wei; White, Travis; Yan, Yuqing; Jones, Maria; Jan, Yih-Kuen

    2013-01-01

    Power wheelchairs have been widely used to provide independent mobility to people with disabilities. Despite great advancements in power wheelchair technology, research shows that wheelchair related accidents occur frequently. To ensure safe maneuverability, capturing wheelchair maneuvering patterns is fundamental to enable other research, such as safe robotic assistance for wheelchair users. In this study, we propose to record, store, and analyze wheelchair maneuvering data by means of mobile cloud computing. Specifically, the accelerometer and gyroscope sensors in smart phones are used to record wheelchair maneuvering data in real-time. Then, the recorded data are periodically transmitted to the cloud for storage and analysis. The analyzed results are then made available to various types of users, such as mobile phone users, traditional desktop users, etc. The combination of mobile computing and cloud computing leverages the advantages of both techniques and extends the smart phone's capabilities of computing and data storage via the Internet. We performed a case study to implement the mobile cloud computing framework using Android smart phones and Google App Engine, a popular cloud computing platform. Experimental results demonstrated the feasibility of the proposed mobile cloud computing framework.

  4. THE USE OF «CLOUD COMPUTING» IS AT HIGHER SCHOOL

    Directory of Open Access Journals (Sweden)

    T. Arkhipova

    2013-08-01

    Full Text Available To improve the training process is necessary to use such powerful technologies, as ‘cloud computing’. Supporting traditional training forms, it’s the new epoch of education development. It’s also economic, effective and flexible way to satisfy the needs of taught in new knowledge getting. ‘Cloud computing’ is a dynamically scaled way to access external resources for computing as a service provided with the help of Internet. The user does not need any special knowledge about the ‘cloud’ infrastructure or the control skills of this ‘cloud technology’. This article discusses the uses of ‘cloud computing’ by the teachers of the department of Computer Science in Kherson State University to train future professionals. Teachers often use a mixed hybrid model of cloud computing which allows using state, public and private resources providing a major advantage for their deployment. Formation of knowledge and skills using modern resources including cloud computing is one of the most important components of professional competence of the future teacher in Computer Science and software engineer who is one of the main representatives of the list of information technology specialis

  5. Application-oriented offloading in heterogeneous networks for mobile cloud computing

    Science.gov (United States)

    Tseng, Fan-Hsun; Cho, Hsin-Hung; Chang, Kai-Di; Li, Jheng-Cong; Shih, Timothy K.

    2018-04-01

    Nowadays Internet applications have become more complicated that mobile device needs more computing resources for shorter execution time but it is restricted to limited battery capacity. Mobile cloud computing (MCC) is emerged to tackle the finite resource problem of mobile device. MCC offloads the tasks and jobs of mobile devices to cloud and fog environments by using offloading scheme. It is vital to MCC that which task should be offloaded and how to offload efficiently. In the paper, we formulate the offloading problem between mobile device and cloud data center and propose two algorithms based on application-oriented for minimum execution time, i.e. the Minimum Offloading Time for Mobile device (MOTM) algorithm and the Minimum Execution Time for Cloud data center (METC) algorithm. The MOTM algorithm minimizes offloading time by selecting appropriate offloading links based on application categories. The METC algorithm minimizes execution time in cloud data center by selecting virtual and physical machines with corresponding resource requirements of applications. Simulation results show that the proposed mechanism not only minimizes total execution time for mobile devices but also decreases their energy consumption.

  6. A survey of intrusion detection techniques in Cloud

    OpenAIRE

    Modi, C.; Patel, D.; Patel, H.; Borisaniya, B.; Patel, A.; Rajarajan, M.

    2013-01-01

    Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and...

  7. Cloud manufacturing: a service-oriented manufacturing paradigm. A review paper

    Directory of Open Access Journals (Sweden)

    Siderska Julia

    2018-03-01

    Full Text Available This paper introduces cloud manufacturing (CMfg as a new manufacturing paradigm that joins the emerging technologies – such as the Internet of Things, cloud computing, and service-oriented technologies – for solving complex problems in manufacturing applications and performing large-scale collaborative manufacturing. Using scientific publications indexed in Scopus database during the period 2012–2017, the concept and fundamentals of CMfg are presented and discussed given the results of the most recent research. While focusing on the current state of the art, the recent research trends within CMfg concept were also identified. The review involved the methods of bibliometric analysis and network analysis. A prototype of CMfg and the existing related work conducted by various researchers are presented, and the map of co-occurrence is introduced to indicate the most commonly occurring issues related to the “cloud manufacturing” term. The VOSviewer software was used for this purpose. Finally, cloud-based manufacturing areas for further research are identified.

  8. Enhanced Survey and Proposal to secure the data in Cloud Computing Environment

    OpenAIRE

    MR.S.SUBBIAH; DR.S.SELVA MUTHUKUMARAN; DR.T.RAMKUMAR

    2013-01-01

    Cloud computing have the power to eliminate the cost of setting high end computing infrastructure. It is a promising area or design to give very flexible architecture, accessible through the internet. In the cloud computing environment the data will be reside at any of the data centers. Due to that, some data center may leak the data stored on there, beyond the reach and control of the users. For this kind of misbehaving data centers, the service providers should take care of the security and...

  9. Dynamic Optical Networks for Future Internet Environments

    Science.gov (United States)

    Matera, Francesco

    2014-05-01

    This article reports an overview on the evolution of the optical network scenario taking into account the exponential growth of connected devices, big data, and cloud computing that is driving a concrete transformation impacting the information and communication technology world. This hyper-connected scenario is deeply affecting relationships between individuals, enterprises, citizens, and public administrations, fostering innovative use cases in practically any environment and market, and introducing new opportunities and new challenges. The successful realization of this hyper-connected scenario depends on different elements of the ecosystem. In particular, it builds on connectivity and functionalities allowed by converged next-generation networks and their capacity to support and integrate with the Internet of Things, machine-to-machine, and cloud computing. This article aims at providing some hints of this scenario to contribute to analyze impacts on optical system and network issues and requirements. In particular, the role of the software-defined network is investigated by taking into account all scenarios regarding data centers, cloud computing, and machine-to-machine and trying to illustrate all the advantages that could be introduced by advanced optical communications.

  10. Factors Influencing the Adoption of Cloud Computing by Small and Medium Enterprises (SMEs) in Developing Economies

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei; Essandoh, Kofi Asare

    2014-01-01

    The key motivation of this paper is to assess the factors which influence small and medium enterprises (SMEs) in a developing economy to adopt cloud computing. Recently, service providers offering a wide range of cloud-based ICT solutions to businesses have emerged into prominence. However......, competence of cloud vendors, resistance to new technology, compatibility and existence of IT infrastructure are realized as key factors influencing cloud computing adoption. These findings will go a long way in helping service providers and technology policymakers to develop solutions and strategies...... communication, scalability and business continuity as the main drivers of cloud adoption, whereas lack of knowledge, poor internet connectivity, security of cloud services, lack of trust and interoperability with existing systems were identified as barriers to adoption. Top management support, trialability...

  11. Using latency as a QoS indicator for global cloud computing services

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Tahir; Dubalski, Bozydar

    2013-01-01

    Many globally distributed cloud computing (CC) applications and services running over the Internet, between globally dispersed clients and servers, will require certain levels of QoS in order to deliver and give a sufficiently smooth user experience. This would be essential for real-time streaming...

  12. Cloud Instrument Powered by Solar Cell Sends Data to Pachube

    Directory of Open Access Journals (Sweden)

    Doru Ursutiu

    2010-11-01

    Full Text Available Despite the economic downturn, there have been quite a few new developments in the world of remote measurements lately. Tag4M (www.tag4m.com introduced the concept of cloud instrument where sensors connected to WiFi tags send data to off-the-shelf Access Points which are part of the WiFi infrastructure that exists in enterprises, retail outlets, factories, and warehouses. Access Points route the data to the Internet where specialized web applications receive the information for processing and display. One of these specialized web applications is Pachube, (http://www.pachube.com which bills itself as a “real-time data brokerage platform”. Pachube enables people to tag and share real time sensor data from objects, devices and spaces around the world. This article presents the pachube cloud instrument where sensors connected to Tag4M WiFi tags send digitized data to www.pachube.com for public display. The article contains very detailed analysis of the solar cell power source that is used to continuously power the Tag4M tag during this application. Cloud Instruments powered by solar cells enable people around the world to share real time sensor data using web pages on the Internet. This is a very interesting and exciting technology development that we want to bring to your attention.

  13. Volunteered Cloud Computing for Disaster Management

    Science.gov (United States)

    Evans, J. D.; Hao, W.; Chettri, S. R.

    2014-12-01

    Disaster management relies increasingly on interpreting earth observations and running numerical models; which require significant computing capacity - usually on short notice and at irregular intervals. Peak computing demand during event detection, hazard assessment, or incident response may exceed agency budgets; however some of it can be met through volunteered computing, which distributes subtasks to participating computers via the Internet. This approach has enabled large projects in mathematics, basic science, and climate research to harness the slack computing capacity of thousands of desktop computers. This capacity is likely to diminish as desktops give way to battery-powered mobile devices (laptops, smartphones, tablets) in the consumer market; but as cloud computing becomes commonplace, it may offer significant slack capacity -- if its users are given an easy, trustworthy mechanism for participating. Such a "volunteered cloud computing" mechanism would also offer several advantages over traditional volunteered computing: tasks distributed within a cloud have fewer bandwidth limitations; granular billing mechanisms allow small slices of "interstitial" computing at no marginal cost; and virtual storage volumes allow in-depth, reversible machine reconfiguration. Volunteered cloud computing is especially suitable for "embarrassingly parallel" tasks, including ones requiring large data volumes: examples in disaster management include near-real-time image interpretation, pattern / trend detection, or large model ensembles. In the context of a major disaster, we estimate that cloud users (if suitably informed) might volunteer hundreds to thousands of CPU cores across a large provider such as Amazon Web Services. To explore this potential, we are building a volunteered cloud computing platform and targeting it to a disaster management context. Using a lightweight, fault-tolerant network protocol, this platform helps cloud users join parallel computing projects

  14. Reconciliation of the cloud computing model with US federal electronic health record regulations.

    Science.gov (United States)

    Schweitzer, Eugene J

    2012-01-01

    Cloud computing refers to subscription-based, fee-for-service utilization of computer hardware and software over the Internet. The model is gaining acceptance for business information technology (IT) applications because it allows capacity and functionality to increase on the fly without major investment in infrastructure, personnel or licensing fees. Large IT investments can be converted to a series of smaller operating expenses. Cloud architectures could potentially be superior to traditional electronic health record (EHR) designs in terms of economy, efficiency and utility. A central issue for EHR developers in the US is that these systems are constrained by federal regulatory legislation and oversight. These laws focus on security and privacy, which are well-recognized challenges for cloud computing systems in general. EHRs built with the cloud computing model can achieve acceptable privacy and security through business associate contracts with cloud providers that specify compliance requirements, performance metrics and liability sharing.

  15. Designing Cloud Infrastructure for Big Data in E-government

    Directory of Open Access Journals (Sweden)

    Jelena Šuh

    2015-03-01

    Full Text Available The development of new information services and technologies, especially in domains of mobile communications, Internet of things, and social media, has led to appearance of the large quantities of unstructured data. The pervasive computing also affects the e-government systems, where big data emerges and cannot be processed and analyzed in a traditional manner due to its complexity, heterogeneity and size. The subject of this paper is the design of the cloud infrastructure for big data storage and processing in e-government. The goal is to analyze the potential of cloud computing for big data infrastructure, and propose a model for effective storing, processing and analyzing big data in e-government. The paper provides an overview of current relevant concepts related to cloud infrastructure design that should provide support for big data. The second part of the paper gives a model of the cloud infrastructure based on the concepts of software defined networks and multi-tenancy. The final goal is to support projects in the field of big data in e-government

  16. Management issues during HeartWare left ventricular assist device implantation and the role of transesophageal echocardiography

    Directory of Open Access Journals (Sweden)

    Sanjay Orathi Patangi

    2013-01-01

    Full Text Available Left ventricular assist devices (LVAD are increasingly used for mechanical circulatory support of patients with severe heart failure, primarily as a bridge to heart transplantation. Transesophageal echocardiography (TEE plays a major role in the clinical decision making during insertion of the devices and in the post-operative management of these patients. The detection of structural and device-related mechanical abnormalities is critical for optimal functioning of assist device. In this review article, we describe the usefulness of TEE for optimal perioperative management of patients presenting for HeartWare LVAD insertion.

  17. Cloud-Based Architectures for Auto-Scalable Web Geoportals towards the Cloudification of the GeoVITe Swiss Academic Geoportal

    Directory of Open Access Journals (Sweden)

    Ionuț Iosifescu-Enescu

    2017-06-01

    Full Text Available Cloud computing has redefined the way in which Spatial Data Infrastructures (SDI and Web geoportals are designed, managed, and maintained. The cloudification of a geoportal represents the migration of a full-stack geoportal application to an internet-based private or public cloud. This work introduces two generic and open cloud-based architectures for auto-scalable Web geoportals, illustrated with the use case of the cloudification efforts of the Swiss academic geoportal GeoVITe. The presented cloud-based architectural designs for auto-scalable Web geoportals consider the most important functional and non-functional requirements and are adapted to both public and private clouds. The availability of such generic cloud-based architectures advances the cloudification of academic SDIs and geoportals.

  18. Model Infrastruktur dan Manajemen Platform Server Berbasis Cloud Computing

    Directory of Open Access Journals (Sweden)

    Mulki Indana Zulfa

    2017-11-01

    Full Text Available Cloud computing is a new technology that is still very rapidly growing. This technology makes the Internet as the main media for the management of data and applications remotely. Cloud computing allows users to run an application without having to think about infrastructure and its platforms. Other technical aspects such as memory, storage, backup and restore, can be done very easily. This research is intended to modeling the infrastructure and management of computer platform in computer network of Faculty of Engineering, University of Jenderal Soedirman. The first stage in this research is literature study, by finding out the implementation model in previous research. Then the result will be combined with a new approach to existing resources and try to implement directly on the existing server network. The results showed that the implementation of cloud computing technology is able to replace the existing platform network.

  19. Making Spatial Statistics Service Accessible On Cloud Platform

    OpenAIRE

    Mu, X.; Wu, J.; Li, T; Zhong, Y.; Gao, X.

    2014-01-01

    Web service can bring together applications running on diverse platforms, users can access and share various data, information and models more effectively and conveniently from certain web service platform. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With the rampant growth of massive data and restriction of net, traditional web services platforms have some prominent problems existi...

  20. Migration of formaldehyde from melamine-ware: UK 2008 survey results.

    Science.gov (United States)

    Potter, E L J; Bradley, E L; Davies, C R; Barnes, K A; Castle, L

    2010-06-01

    Fifty melamine-ware articles were tested for the migration of formaldehyde - with hexamethylenetetramine (HMTA) expressed as formaldehyde - to see whether the total specific migration limit (SML(T)) was being observed. The SML(T), given in European Commission Directive 2002/72/EC as amended, is 15 mg kg(-1). Fourier transform-infrared (FT-IR) spectroscopy was carried out on the articles to confirm the plastic type. Articles were exposed to the food simulant 3% (w/v) aqueous acetic acid under conditions representing their worst foreseeable use. Formaldehyde and HMTA in food simulants were determined by a spectrophotometric derivatization procedure. Positive samples were confirmed by a second spectrophotometric procedure using an alternative derivatization agent. As all products purchased were intended for repeat use, three sequential exposures to the simulant were carried out. Formaldehyde was detected in the simulant exposed to 43 samples. Most of the levels found were well below the limits set in law such that 84% of the samples tested were compliant. However, eight samples had formaldehyde levels that were clearly above the legal maximum at six to 65 times the SML(T).

  1. Cloud-based adaptive exon prediction for DNA analysis.

    Science.gov (United States)

    Putluri, Srinivasareddy; Zia Ur Rahman, Md; Fathima, Shaik Yasmeen

    2018-02-01

    Cloud computing offers significant research and economic benefits to healthcare organisations. Cloud services provide a safe place for storing and managing large amounts of such sensitive data. Under conventional flow of gene information, gene sequence laboratories send out raw and inferred information via Internet to several sequence libraries. DNA sequencing storage costs will be minimised by use of cloud service. In this study, the authors put forward a novel genomic informatics system using Amazon Cloud Services, where genomic sequence information is stored and accessed for processing. True identification of exon regions in a DNA sequence is a key task in bioinformatics, which helps in disease identification and design drugs. Three base periodicity property of exons forms the basis of all exon identification techniques. Adaptive signal processing techniques found to be promising in comparison with several other methods. Several adaptive exon predictors (AEPs) are developed using variable normalised least mean square and its maximum normalised variants to reduce computational complexity. Finally, performance evaluation of various AEPs is done based on measures such as sensitivity, specificity and precision using various standard genomic datasets taken from National Center for Biotechnology Information genomic sequence database.

  2. A scoping review of cloud computing in healthcare.

    Science.gov (United States)

    Griebel, Lena; Prokosch, Hans-Ulrich; Köpcke, Felix; Toddenroth, Dennis; Christoph, Jan; Leb, Ines; Engel, Igor; Sedlmayr, Martin

    2015-03-19

    Cloud computing is a recent and fast growing area of development in healthcare. Ubiquitous, on-demand access to virtually endless resources in combination with a pay-per-use model allow for new ways of developing, delivering and using services. Cloud computing is often used in an "OMICS-context", e.g. for computing in genomics, proteomics and molecular medicine, while other field of application still seem to be underrepresented. Thus, the objective of this scoping review was to identify the current state and hot topics in research on cloud computing in healthcare beyond this traditional domain. MEDLINE was searched in July 2013 and in December 2014 for publications containing the terms "cloud computing" and "cloud-based". Each journal and conference article was categorized and summarized independently by two researchers who consolidated their findings. 102 publications have been analyzed and 6 main topics have been found: telemedicine/teleconsultation, medical imaging, public health and patient self-management, hospital management and information systems, therapy, and secondary use of data. Commonly used features are broad network access for sharing and accessing data and rapid elasticity to dynamically adapt to computing demands. Eight articles favor the pay-for-use characteristics of cloud-based services avoiding upfront investments. Nevertheless, while 22 articles present very general potentials of cloud computing in the medical domain and 66 articles describe conceptual or prototypic projects, only 14 articles report from successful implementations. Further, in many articles cloud computing is seen as an analogy to internet-/web-based data sharing and the characteristics of the particular cloud computing approach are unfortunately not really illustrated. Even though cloud computing in healthcare is of growing interest only few successful implementations yet exist and many papers just use the term "cloud" synonymously for "using virtual machines" or "web

  3. Learning in the cloud: a new challenge for a global teaching system in optics and photonics

    Science.gov (United States)

    Sultana, Razia; Christ, Andreas; Feisst, Markus; Curticapean, Dan

    2014-07-01

    Nowadays, it is assumed of many applications, companies and parts of the society to be always available online. However, according to [Times, Oct, 31 2011], 73% of the world population do not use the internet and thus aren't "online" at all. The most common reasons for not being "online" are expensive personal computer equipment and high costs for data connections, especially in developing countries that comprise most of the world's population (e.g. parts of Africa, Asia, Central and South America). However it seems that these countries are leap-frogging the "PC and landline" age and moving directly to the "mobile" age. Decreasing prices for smart phones with internet connectivity and PC-like operating systems make it more affordable for these parts of the world population to join the "always-online" community. Storing learning content in a way accessible to everyone, including mobile and smart phones, seems therefore to be beneficial. This way, learning content can be accessed by personal computers as well as by mobile and smart phones and thus be accessible for a big range of devices and users. A new trend in the Internet technologies is to go to "the cloud". This paper discusses the changes, challenges and risks of storing learning content in the "cloud". The experiences were gathered during the evaluation of the necessary changes in order to make our solutions and systems "cloud-ready".

  4. Cloud Computing and Validated Learning for Accelerating Innovation in IoT

    Science.gov (United States)

    Suciu, George; Todoran, Gyorgy; Vulpe, Alexandru; Suciu, Victor; Bulca, Cristina; Cheveresan, Romulus

    2015-01-01

    Innovation in Internet of Things (IoT) requires more than just creation of technology and use of cloud computing or big data platforms. It requires accelerated commercialization or aptly called go-to-market processes. To successfully accelerate, companies need a new type of product development, the so-called validated learning process.…

  5. Mash-up of techniques between data crawling/transfer, data preservation/stewardship and data processing/visualization technologies on a science cloud system designed for Earth and space science: a report of successful operation and science projects of the NICT Science Cloud

    Science.gov (United States)

    Murata, K. T.

    2014-12-01

    Data-intensive or data-centric science is 4th paradigm after observational and/or experimental science (1st paradigm), theoretical science (2nd paradigm) and numerical science (3rd paradigm). Science cloud is an infrastructure for 4th science methodology. The NICT science cloud is designed for big data sciences of Earth, space and other sciences based on modern informatics and information technologies [1]. Data flow on the cloud is through the following three techniques; (1) data crawling and transfer, (2) data preservation and stewardship, and (3) data processing and visualization. Original tools and applications of these techniques have been designed and implemented. We mash up these tools and applications on the NICT Science Cloud to build up customized systems for each project. In this paper, we discuss science data processing through these three steps. For big data science, data file deployment on a distributed storage system should be well designed in order to save storage cost and transfer time. We developed a high-bandwidth virtual remote storage system (HbVRS) and data crawling tool, NICTY/DLA and Wide-area Observation Network Monitoring (WONM) system, respectively. Data files are saved on the cloud storage system according to both data preservation policy and data processing plan. The storage system is developed via distributed file system middle-ware (Gfarm: GRID datafarm). It is effective since disaster recovery (DR) and parallel data processing are carried out simultaneously without moving these big data from storage to storage. Data files are managed on our Web application, WSDBank (World Science Data Bank). The big-data on the cloud are processed via Pwrake, which is a workflow tool with high-bandwidth of I/O. There are several visualization tools on the cloud; VirtualAurora for magnetosphere and ionosphere, VDVGE for google Earth, STICKER for urban environment data and STARStouch for multi-disciplinary data. There are 30 projects running on the NICT

  6. Surface Coating Technique of Northern Black Polished Ware by the Microscopic Analysis

    Directory of Open Access Journals (Sweden)

    Dilruba Sharmin

    2012-12-01

    Full Text Available An organic substance has been identified in the top layer of Northern Black Polished Ware (NBPW excavated from the Wari-Boteshwar and Mahasthangarh sites in Bangladesh. NBPW is the most distinctive ceramic of Early Historic period and the technique of its surface gloss acquired numerous theories. This particular paper is an analytical study of collected NBPW sherds from these two sites including surface observations using binocular and scanning electron microscopes and Thin Section Analysis of potsherds. Thin section analysis identified two different layers of coating on the surface of the NBPW. One layer is a ‘slip’ (ground coat and the other is a ‘top layer or top coat ’. The slip was made from refined clay and the top layer was derived from organic substance. Microscopic analysis confirmed the solid and non-clayey characteristics of the top coat.

  7. Cloud computing: vývoj a současný stav

    Directory of Open Access Journals (Sweden)

    Václav Sova Martinovský

    2018-06-01

    Full Text Available This article introduces the area of cloud computing with emphasis on businesses and organizations. It includes research of published papers on topic of cloud computing based on metaanalysis and SLR. Summary of relevant advantages both from the user and provider perspective was assembled as well as a list of barriers to even broader adoption of the cloud computing technology. Three databases (EBSCO, ProQuest and Web of Science were used as a source of data for the literature review phase. An analysis of the number of articles dealing with the cloud computing top has been carried out to date. The annual number of publications is compared to the size of the cloud computing market. Frequency analysis at a keyword level was performed in the 25,000-records dataset gathered from the WoS database. This analysis was conducted over the entire monitored period, and only for 2017, to capture the latest trends. There were identified the most frequently used key words in publications about cloud computing: virtualization, security, big data, mobile cloud computing and internet of things. For each of these keywords, a brief summary is given based on the literature search, with an emphasis on the outlook for the future and market position.

  8. Cloud computing in pharmaceutical R&D: business risks and mitigations.

    Science.gov (United States)

    Geiger, Karl

    2010-05-01

    Cloud computing provides information processing power and business services, delivering these services over the Internet from centrally hosted locations. Major technology corporations aim to supply these services to every sector of the economy. Deploying business processes 'in the cloud' requires special attention to the regulatory and business risks assumed when running on both hardware and software that are outside the direct control of a company. The identification of risks at the correct service level allows a good mitigation strategy to be selected. The pharmaceutical industry can take advantage of existing risk management strategies that have already been tested in the finance and electronic commerce sectors. In this review, the business risks associated with the use of cloud computing are discussed, and mitigations achieved through knowledge from securing services for electronic commerce and from good IT practice are highlighted.

  9. Coarse-Grain QoS-Aware Dynamic Instance Provisioning for Interactive Workload in the Cloud

    Directory of Open Access Journals (Sweden)

    Jianxiong Wan

    2014-01-01

    Full Text Available Cloud computing paradigm renders the Internet service providers (ISPs with a new approach to deliver their service with less cost. ISPs can rent virtual machines from the Infrastructure-as-a-Service (IaaS provided by the cloud rather than purchasing them. In addition, commercial cloud providers (CPs offer diverse VM instance rental services in various time granularities, which provide another opportunity for ISPs to reduce cost. We investigate a Coarse-grain QoS-aware Dynamic Instance Provisioning (CDIP problem for interactive workload in the cloud from the perspective of ISPs. We formulate the CDIP problem as an optimization problem where the objective is to minimize the VM instance rental cost and the constraint is the percentile delay bound. Since the Internet traffic shows a strong self-similar property, it is hard to get an analytical form of the percentile delay constraint. To address this issue, we purpose a lookup table structure together with a learning algorithm to estimate the performance of the instance provisioning policy. This approach is further extended with two function approximations to enhance the scalability of the learning algorithm. We also present an efficient dynamic instance provisioning algorithm, which takes full advantage of the rental service diversity, to determine the instance rental policy. Extensive simulations are conducted to validate the effectiveness of the proposed algorithms.

  10. Cloud Optimized Image Format and Compression

    Science.gov (United States)

    Becker, P.; Plesea, L.; Maurer, T.

    2015-04-01

    Cloud based image storage and processing requires revaluation of formats and processing methods. For the true value of the massive volumes of earth observation data to be realized, the image data needs to be accessible from the cloud. Traditional file formats such as TIF and NITF were developed in the hay day of the desktop and assumed fast low latency file access. Other formats such as JPEG2000 provide for streaming protocols for pixel data, but still require a server to have file access. These concepts no longer truly hold in cloud based elastic storage and computation environments. This paper will provide details of a newly evolving image storage format (MRF) and compression that is optimized for cloud environments. Although the cost of storage continues to fall for large data volumes, there is still significant value in compression. For imagery data to be used in analysis and exploit the extended dynamic range of the new sensors, lossless or controlled lossy compression is of high value. Compression decreases the data volumes stored and reduces the data transferred, but the reduced data size must be balanced with the CPU required to decompress. The paper also outlines a new compression algorithm (LERC) for imagery and elevation data that optimizes this balance. Advantages of the compression include its simple to implement algorithm that enables it to be efficiently accessed using JavaScript. Combing this new cloud based image storage format and compression will help resolve some of the challenges of big image data on the internet.

  11. Benefits and challenges of cloud ERP systems – A systematic literature review

    Directory of Open Access Journals (Sweden)

    Mohamed A. Abd Elmonem

    2016-12-01

    Full Text Available Enterprise Resource Planning (ERP systems provide extensive benefits and facilities to the whole enterprise. ERP systems help the enterprise to share and transfer data and information across all functions units inside and outside the enterprise. Sharing data and information between enterprise departments helps in many aspects and aims to achieve different objectives. Cloud computing is a computing model which takes place over the internet and provides scalability, reliability, availability and low cost of computer reassures. Implementing and running ERP systems over the cloud offers great advantages and benefits, in spite of its many difficulties and challenges. In this paper, we follow the Systematic Literature Review (SLR research method to explore the benefits and challenges of implementing ERP systems over a cloud environment.

  12. A New Approach to Integrate Internet-of-Things and Software-as-a-Service Model for Logistic Systems: A Case Study

    Directory of Open Access Journals (Sweden)

    Shang-Liang Chen

    2014-03-01

    Full Text Available Cloud computing is changing the ways software is developed and managed in enterprises, which is changing the way of doing business in that dynamically scalable and virtualized resources are regarded as services over the Internet. Traditional manufacturing systems such as supply chain management (SCM, customer relationship management (CRM, and enterprise resource planning (ERP are often developed case by case. However, effective collaboration between different systems, platforms, programming languages, and interfaces has been suggested by researchers. In cloud-computing-based systems, distributed resources are encapsulated into cloud services and centrally managed, which allows high automation, flexibility, fast provision, and ease of integration at low cost. The integration between physical resources and cloud services can be improved by combining Internet of things (IoT technology and Software-as-a-Service (SaaS technology. This study proposes a new approach for developing cloud-based manufacturing systems based on a four-layer SaaS model. There are three main contributions of this paper: (1 enterprises can develop their own cloud-based logistic management information systems based on the approach proposed in this paper; (2 a case study based on literature reviews with experimental results is proposed to verify that the system performance is remarkable; (3 challenges encountered and feedback collected from T Company in the case study are discussed in this paper for the purpose of enterprise deployment.

  13. A New Approach to Integrate Internet-of-Things and Software-as-a-Service Model for Logistic Systems: A Case Study

    Science.gov (United States)

    Chen, Shang-Liang; Chen, Yun-Yao; Hsu, Chiang

    2014-01-01

    Cloud computing is changing the ways software is developed and managed in enterprises, which is changing the way of doing business in that dynamically scalable and virtualized resources are regarded as services over the Internet. Traditional manufacturing systems such as supply chain management (SCM), customer relationship management (CRM), and enterprise resource planning (ERP) are often developed case by case. However, effective collaboration between different systems, platforms, programming languages, and interfaces has been suggested by researchers. In cloud-computing-based systems, distributed resources are encapsulated into cloud services and centrally managed, which allows high automation, flexibility, fast provision, and ease of integration at low cost. The integration between physical resources and cloud services can be improved by combining Internet of things (IoT) technology and Software-as-a-Service (SaaS) technology. This study proposes a new approach for developing cloud-based manufacturing systems based on a four-layer SaaS model. There are three main contributions of this paper: (1) enterprises can develop their own cloud-based logistic management information systems based on the approach proposed in this paper; (2) a case study based on literature reviews with experimental results is proposed to verify that the system performance is remarkable; (3) challenges encountered and feedback collected from T Company in the case study are discussed in this paper for the purpose of enterprise deployment. PMID:24686728

  14. A new approach to integrate Internet-of-things and software-as-a-service model for logistic systems: a case study.

    Science.gov (United States)

    Chen, Shang-Liang; Chen, Yun-Yao; Hsu, Chiang

    2014-03-28

    Cloud computing is changing the ways software is developed and managed in enterprises, which is changing the way of doing business in that dynamically scalable and virtualized resources are regarded as services over the Internet. Traditional manufacturing systems such as supply chain management (SCM), customer relationship management (CRM), and enterprise resource planning (ERP) are often developed case by case. However, effective collaboration between different systems, platforms, programming languages, and interfaces has been suggested by researchers. In cloud-computing-based systems, distributed resources are encapsulated into cloud services and centrally managed, which allows high automation, flexibility, fast provision, and ease of integration at low cost. The integration between physical resources and cloud services can be improved by combining Internet of things (IoT) technology and Software-as-a-Service (SaaS) technology. This study proposes a new approach for developing cloud-based manufacturing systems based on a four-layer SaaS model. There are three main contributions of this paper: (1) enterprises can develop their own cloud-based logistic management information systems based on the approach proposed in this paper; (2) a case study based on literature reviews with experimental results is proposed to verify that the system performance is remarkable; (3) challenges encountered and feedback collected from T Company in the case study are discussed in this paper for the purpose of enterprise deployment.

  15. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles.

    Science.gov (United States)

    Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V; Imran, Muhammad; Zhou, Keliang

    2016-01-11

    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction.

  16. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles

    Directory of Open Access Journals (Sweden)

    Jiafu Wan

    2016-01-01

    Full Text Available The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I and Vehicle to Vehicle (V2V communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction.

  17. Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs

    Directory of Open Access Journals (Sweden)

    Ishan Senarathna

    2018-06-01

    Full Text Available Cloud computing is a recent computing paradigm enabling organizations to have access to sophisticated computing services via the Internet on a fee-for-service basis. It provides Small and Medium-sized Enterprises (SMEs with opportunities to become as technologically advanced as their larger counterparts, without significant financial outlays. This paper examined the important factors that influence SMEs’ adoption of cloud computing technology. Drawing upon aspects of the Technology, Organization and Environment framework and Diffusion of Innovation Theory, we developed a research model of SMEs’ adoption of cloud computing and tested it through an online survey of 149 Australian SMEs. Data was analyzed using multiple regression methods, with results showing that SMEs were influenced by factors related to advantaging their organizational capability (i.e., relative advantage, quality of service and awareness rather than risk-related factors (i.e., security, privacy and flexibility. The findings offer insights to SMEs owners, Cloud service providers and government in establishing Cloud computing adoption strategies for SMEs.

  18. Reconciliation of the cloud computing model with US federal electronic health record regulations

    Science.gov (United States)

    2011-01-01

    Cloud computing refers to subscription-based, fee-for-service utilization of computer hardware and software over the Internet. The model is gaining acceptance for business information technology (IT) applications because it allows capacity and functionality to increase on the fly without major investment in infrastructure, personnel or licensing fees. Large IT investments can be converted to a series of smaller operating expenses. Cloud architectures could potentially be superior to traditional electronic health record (EHR) designs in terms of economy, efficiency and utility. A central issue for EHR developers in the US is that these systems are constrained by federal regulatory legislation and oversight. These laws focus on security and privacy, which are well-recognized challenges for cloud computing systems in general. EHRs built with the cloud computing model can achieve acceptable privacy and security through business associate contracts with cloud providers that specify compliance requirements, performance metrics and liability sharing. PMID:21727204

  19. Implementing Iris in the Railway Control Office Application for Secure Saas in Cloud Environment

    OpenAIRE

    Dr. K. Meena; Dr. M. Manimekalai

    2015-01-01

    Technology plays a vital role in each and every part of the world. In particular ―Cloud‖ computing - a moderately recent term, characterizes the path to develop the advancement in the world of computer science. Further, Cloud provides an affordable environment for its users through different forms of services such as SaaS (Software as a service), PaaS (Platform as a service), and IaaS (Infrastructure as a Service). Cloud computing is also an Internet-based computing where a large ...

  20. Settlement duration and materiality: formal chronological models for the development of Barnhouse, a Grooved Ware settlement in Orkney

    OpenAIRE

    Richards, Colin; Jones, Andrew Meirion; MacSween, Ann; Sheridan, Alison; Dunbar, Elaine; Reimer, Paula; Bayliss, Alex; Griffiths, Seren; Whittle, Alasdair

    2016-01-01

    Radiocarbon dating and Bayesian chronological modelling, undertaken as part of the investigation by the Times of Their Lives project into the development of Late Neolithic settlement and pottery in Orkney, has provided precise new dating for the Grooved Ware settlement of Barnhouse, excavated in 1985–91. Previous understandings of the site and its pottery are presented. A Bayesian model based on 70 measurements on 62 samples (of which 50 samples are thought to date accurately the deposits fro...

  1. Proposed Network Intrusion Detection System ‎In Cloud Environment Based on Back ‎Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Cloud computing is distributed architecture, providing computing facilities and storage resource as a service over the internet. This low-cost service fulfills the basic requirements of users. Because of the open nature and services introduced by cloud computing intruders impersonate legitimate users and misuse cloud resource and services. To detect intruders and suspicious activities in and around the cloud computing environment, intrusion detection system used to discover the illegitimate users and suspicious action by monitors different user activities on the network .this work proposed based back propagation artificial neural network to construct t network intrusion detection in the cloud environment. The proposed module evaluated with kdd99 dataset the experimental results shows promising approach to detect attack with high detection rate and low false alarm rate

  2. Network Edge Intelligence for the Emerging Next-Generation Internet

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2010-11-01

    Full Text Available The success of the Content Delivery Networks (CDN in the recent years has demonstrated the increased benefits of the deployment of some form of “intelligence” within the network. Cloud computing, on the other hand, has shown the benefits of economies of scale and the use of a generic infrastructure to support a variety of services. Following that trend, we propose to move away from the smart terminal-dumb network dichotomy to a model where some degree of intelligence is put back into the network, specifically at the edge, with the support of Cloud technology. In this paper, we propose the deployment of an Edge Cloud, which integrates a variety of user-side and server-side services. On the user side, surrogate, an application running on top of the Cloud, supports a virtual client. The surrogate hides the underlying network infrastructure from the user, thus allowing for simpler, more easily managed terminals. Network side services supporting delivery of and exploiting content are also deployed on this infrastructure, giving the Internet Service Providers (ISP many opportunities to become directly involved in content and service delivery.

  3. Energy efficiency models and optimization algoruthm to enhance on-demand resource delivery in a cloud computing environment / Thusoyaone Joseph Moemi

    OpenAIRE

    Moemi, Thusoyaone Joseph

    2013-01-01

    Online hosed services are what is referred to as Cloud Computing. Access to these services is via the internet. h shifts the traditional IT resource ownership model to renting. Thus, high cost of infrastructure cannot limit the less privileged from experiencing the benefits that this new paradigm brings. Therefore, c loud computing provides flexible services to cloud user in the form o f software, platform and infrastructure as services. The goal behind cloud computing is to provi...

  4. Efficacies of sodium hypochlorite and quaternary ammonium sanitizers for reduction of norovirus and selected bacteria during ware-washing operations.

    Directory of Open Access Journals (Sweden)

    Lizanel Feliciano

    Full Text Available Cross-contamination of ready-to-eat (RTE foods with pathogens on contaminated tableware and food preparation utensils is an important factor associated with foodborne illnesses. To prevent this, restaurants and food service establishments are required to achieve a minimum microbial reduction of 5 logs from these surfaces. This study evaluated the sanitization efficacies of ware-washing protocols (manual and mechanical used in restaurants to clean tableware items. Ceramic plates, drinking glasses and stainless steel forks were used as the food contact surfaces. These were contaminated with cream cheese and reduced-fat milk inoculated with murine norovirus (MNV-1, Escherichia coli K-12 and Listeria innocua. The sanitizing solutions tested were sodium hypochlorite (chlorine, quaternary ammonium (QAC and tap water (control. During the study, the survivability and response to the experimental conditions of the bacterial species was compared with that of MNV-1. The results showed that current ware-washing protocols used to remove bacteria from tableware items were not sufficient to achieve a 5 log reduction in MNV-1 titer. After washing, a maximum of 3 log reduction in the virus were obtained. It was concluded that MNV-1 appeared to be more resistant to both the washing process and the sanitizers when compared with E. coli K-12 and L. innocua.

  5. Retention of Employees in Ceramic Sanitary Ware Factories in India: Role of Work Life Balance, Career Development and Supervisor Support

    OpenAIRE

    S. Umamaheswari; Jayasree Krishnan

    2016-01-01

    The study examines the role of work life balance, career development and supervisor support on organization commitment over employees of unattended, ceramic sanitary ware factories in India. It also verifies the influence of organization commitment on retention and its mediating role. Findings reveal that organization commitment influences retention and all the above factors enhance it. Moreover, organization commitment partially mediates the relationship between proposed factors and retentio...

  6. Human face recognition using eigenface in cloud computing environment

    Science.gov (United States)

    Siregar, S. T. M.; Syahputra, M. F.; Rahmat, R. F.

    2018-02-01

    Doing a face recognition for one single face does not take a long time to process, but if we implement attendance system or security system on companies that have many faces to be recognized, it will take a long time. Cloud computing is a computing service that is done not on a local device, but on an internet connected to a data center infrastructure. The system of cloud computing also provides a scalability solution where cloud computing can increase the resources needed when doing larger data processing. This research is done by applying eigenface while collecting data as training data is also done by using REST concept to provide resource, then server can process the data according to existing stages. After doing research and development of this application, it can be concluded by implementing Eigenface, recognizing face by applying REST concept as endpoint in giving or receiving related information to be used as a resource in doing model formation to do face recognition.

  7. Attack on Privacy-Preserving Public Auditing Schemes for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2017-01-01

    Full Text Available With the development of Internet, cloud computing has emerged to provide service to data users. But, it is necessary for an auditor on behalf of users to check the integrity of the data stored in the cloud. The cloud server also must ensure the privacy of the data. In a usual public integrity check scheme, the linear combination of data blocks is needed for verification. But, after times of auditing on the same data blocks, based on collected linear combinations, the auditor might derive these blocks. Recently, a number of public auditing schemes with privacy-preserving are proposed. With blinded linear combinations of data blocks, the authors of these schemes believed that the auditor cannot derive any information about the data blocks and claimed that their schemes are provably secure in the random oracle model. In this paper, with detailed security analysis of these schemes, we show that these schemes are vulnerable to an attack from the malicious cloud server who modifies the data blocks and succeeds in forging proof information for data integrity check.

  8. QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm

    Directory of Open Access Journals (Sweden)

    Weihang Shi

    2015-01-01

    Full Text Available It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE seriously. In our paper, based on construction algorithms of cooperative cognitive cloud platform and optimization algorithm of opportunities weight particle swarm clustering, the QoE guarantee mechanism was proposed. The mechanism, through the sending users of requests and the cognitive neighbor users’ cooperation, combined the cooperation of subcloud platforms and constructed the optimal cloud platform with the different service. At the same time, the particle swarm optimization algorithm could be enhanced dynamically according to all kinds of opportunity request weight, which could optimize the cooperative cognitive cloud platform. Finally, the QoE guarantee scheme was proposed with the opportunity weight particle swarm optimization algorithm and collaborative cognitive cloud platform. The experimental results show that the proposed mechanism compared is superior to the QoE guarantee scheme based on cooperative cloud and QoE guarantee scheme based on particle swarm optimization, compared with optimization fitness and high cloud computing service execution efficiency and high throughput performance advantages.

  9. Estudio de las mejoras de aplicar Fog Computing en la distribución de servicios en Cloud Computing

    OpenAIRE

    Rodríguez, Nelson R.; Murazzo, María Antonia; Chávez, Susana Beatriz; Martín, Adriana Elba; Medel, Diego; Mercado, Jorge; Montiveros, Matías

    2017-01-01

    La amplia adopción de Internet de las cosas (IoT) por parte de los usuarios y la industria, sumada a las estimaciones de crecimiento por parte de las consultoras, anticipa la generación de cantidades excesivas de datos hacia el Cloud. Sin bien el modelo tradicional de Cloud Computing ha dado respuesta a IT y ha tenido en crecimiento notable en los últimos años, está mostrando dificultades con estas nuevas tendencias. En consecuencia aparecieron nuevos requerimientos de IoT que Cloud no puede ...

  10. Examining Effects of Virtual Machine Settings on Voice over Internet Protocol in a Private Cloud Environment

    Science.gov (United States)

    Liao, Yuan

    2011-01-01

    The virtualization of computing resources, as represented by the sustained growth of cloud computing, continues to thrive. Information Technology departments are building their private clouds due to the perception of significant cost savings by managing all physical computing resources from a single point and assigning them to applications or…

  11. Assessing Measurements of QoS for global Cloud Computing Services

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, M. Tahir; Júnior, Joaquim Celestino

    2011-01-01

    Many global distributed cloud computing applications and services running over the Internet, between globally dispersed clients and servers, will require certain levels of Quality of Service (QoS) in order to deliver and give a sufficiently smooth user experience. This would be essential for real......-time streaming multimedia applications like online gaming and watching movies on a pay as you use basis hosted in a cloud computing environment. However, guaranteeing or even predicting QoS in global and diverse networks supporting complex hosting of application services is a very challenging issue that needs...... a stepwise refinement approach to be solved as the technology of cloud computing matures. In this paper, we investigate if latency in terms of simple Ping measurements can be used as an indicator for other QoS parameters such as jitter and throughput. The experiments were carried out on a global scale...

  12. Evaluation of Device-Independent Internet Spatial Location

    Directory of Open Access Journals (Sweden)

    Dan Komosny

    2017-05-01

    Full Text Available Device-independent Internet spatial location is needed for many purposes, such as data personalisation and social behaviour analysis. Internet spatial databases provide such locations based the IP address of a device. The free to use databases are natively included into many UNIX and Linux operating systems. These systems are predominantly used for e-shops, social networks, and cloud data storage. Using a constructed ground truth dataset, we comprehensively evaluate these databases for null responses, returned country/region/city, and distance error. The created ground truth dataset differs from others by covering cities with both low and high populations and maintaining only devices that follow the rule of one IP address per ISP (Internet Service Provider and per city. We define two new performance metrics that show the effect of city population and trustworthiness of the results. We also evaluate the databases against an alternative measurement-based approach. We study the reasons behind the results. The data evaluated comes from Europe. The results may be of use for engineers, developers and researchers that use the knowledge of geographical location for related data processing and analysis, such as marketing.

  13. Implementation of Genetic Algorithm for Solving De Jong Test Function on Cloud Environment and Compare Its Performance with Local Host Environment

    OpenAIRE

    Syed Tauhid Zuhori

    2012-01-01

    In this day, Cloud Computing has gained large attention not only from IT specialists but also from many clients. It is global network (internet)-based computing, where shared resources, software and information are provided to computers and other devices on-demand, like the electricity bill. Firstly Cost can be reduced and the technology is also known as green saver or power technology. Secondly, the dynamic and flexible scalability of cloud computing. The third is that cloud computing is pla...

  14. RFID-based Electronic Identity Security Cloud Platform in Cyberspace

    OpenAIRE

    Bing Chen; Chengxiang Tan; Bo Jin; Xiang Zou; Yuebo Dai

    2012-01-01

    With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic identity security cloud platform in cyberspace to implement an efficient security management of cyb...

  15. Experiences in messaging middle-ware for high-level control applications

    International Nuclear Information System (INIS)

    Wanga, N.; Shasharina, S.; Matykiewicz, J.; Rooparani Pundaleeka

    2012-01-01

    Existing high-level applications in accelerator control and modeling systems leverage many different languages, tools and frameworks that do not inter-operate with one another. As a result, the accelerator control community is moving toward the proven Service-Oriented Architecture (SOA) approach to address the inter-operability challenges among heterogeneous high-level application modules. Such SOA approach enables developers to package various control subsystems and activities into 'services' with well-defined 'interfaces' and make leveraging heterogeneous high-level applications via flexible composition possible. Examples of such applications include presentation panel clients based on Control System Studio (CSS) and middle-layer applications such as model/data servers. This paper presents our experiences in developing a demonstrative high-level application environment using emerging messaging middle-ware standards. In particular, we utilize new features in EPICS v4 and other emerging standards such as Data Distribution Service (DDS) and Extensible Type Interface by the Object Management Group. We first briefly review examples we developed previously. We then present our current effort in integrating DDS into such a SOA environment for control systems. Specifically, we illustrate how we are integrating DDS into CSS and develop a Python DDS mapping. (authors)

  16. Informal Education of Adults in the Land of WoodenWare

    Directory of Open Access Journals (Sweden)

    Bojan Žnidaršič

    1997-12-01

    Full Text Available The fundamental aim of the project entitled the Land of Wooden Ware is developing a healthy environment and improving the conditions of life and work in rural areas. The project covers topographically varied, scarcely populated and demographically endangered areas in 11 municipalities (around 140,000 hectares. With respect to various standards, the entire expanse is a homogeneous region. Through a holistic approach, including education for permanent progress, direct expert help and other forms of help, the project aims to change the nega tive demographic curve and preserve the environment. The practical method used to achieve the goals set is direct work with people. The introductory phase includes exhibitions, articles in local and national media, etc., and will be followed by an extensive opinion poll among households. The results will serve as the basis for the preparation of lectures and workshops. The educational phase will dose with a study circle which will provide deeper insight into the subject. The entire effort (which includes the inhabitants, the municipality and VITRA is based on the desire to present rural regions as business opportunities for eco­farming, ecotourism, efficient use of renewable sources of energy, etc.

  17. Connected car: Engines diagnostic via Internet of Things (IoT)

    Science.gov (United States)

    Hamid, A. F. A.; Rahman, M. T. A.; Khan, S. F.; Adom, A. H.; Rahim, M. A.; Rahim, N. A.; Ismail, M. H. N.; Norizan, A.

    2017-10-01

    This paper is about an experiment for performing engines diagnostic using wireless sensing Internet of Thing (IoT). The study is to overcome problem of current standard On Board Diagnosis (OBD-II) data acquisition method that only can be perform in offline or wired method. From this paper it show a method to determined how the data from engines can be collected, make the data can be easily understand by human and sending data over the wireless internet connection via platform of IOT. This study is separate into three stages that is CAN-bus data collection, CAN data conversion and send data to cloud storage. Every stage is experimented with a two different method and consist five data parameter that is Revolution per Minute (RPM), Manifold Air Pressure (MAP), load-fuel, barometric pressure and engine temperature. The experiment use Arduino Uno as microcontroller, CAN-bus converter and ESP8266 wifi board as transfer medium for data to internet.

  18. Using electronic health records and Internet search information for accurate influenza forecasting.

    Science.gov (United States)

    Yang, Shihao; Santillana, Mauricio; Brownstein, John S; Gray, Josh; Richardson, Stewart; Kou, S C

    2017-05-08

    Accurate influenza activity forecasting helps public health officials prepare and allocate resources for unusual influenza activity. Traditional flu surveillance systems, such as the Centers for Disease Control and Prevention's (CDC) influenza-like illnesses reports, lag behind real-time by one to 2 weeks, whereas information contained in cloud-based electronic health records (EHR) and in Internet users' search activity is typically available in near real-time. We present a method that combines the information from these two data sources with historical flu activity to produce national flu forecasts for the United States up to 4 weeks ahead of the publication of CDC's flu reports. We extend a method originally designed to track flu using Google searches, named ARGO, to combine information from EHR and Internet searches with historical flu activities. Our regularized multivariate regression model dynamically selects the most appropriate variables for flu prediction every week. The model is assessed for the flu seasons within the time period 2013-2016 using multiple metrics including root mean squared error (RMSE). Our method reduces the RMSE of the publicly available alternative (Healthmap flutrends) method by 33, 20, 17 and 21%, for the four time horizons: real-time, one, two, and 3 weeks ahead, respectively. Such accuracy improvements are statistically significant at the 5% level. Our real-time estimates correctly identified the peak timing and magnitude of the studied flu seasons. Our method significantly reduces the prediction error when compared to historical publicly available Internet-based prediction systems, demonstrating that: (1) the method to combine data sources is as important as data quality; (2) effectively extracting information from a cloud-based EHR and Internet search activity leads to accurate forecast of flu.

  19. Internet of Persons and Things inspired on Brain Models and Neurophysiology

    Directory of Open Access Journals (Sweden)

    Fernando Luis - Ferreira

    2013-01-01

    Full Text Available Living in the twenty first century and being part of a modern society entails being entirely acquainted with the Internet. Business success, research and study rely on intense usage of the Internet, doing most of the ac tivities based on information gathered at the Internet and using diverse kind of services available. The recent development in devices and services, either for computational or mobile operations, has revealed a diversity of paths for the Internet to have impact in our lives, either professional or personal. Without notice, every activity we do is becoming somehow connected to the web in multiple forms that can range from the search of information, the communication between people and information storage at the cloud. Everything seems to be so useful and so destined to promote our life and supply our needs for work, learning or recreation activities. As for the social aspects, Internet has a multitude of opportunities to communicate, to share ideas and to get feedback or news, as it happens, with online newspapers, the blogosphere and social networks. With this pervasive and sometimes implicit integration of the Internet in our lives, we are migrating from traditional way of life to an Internet supported life style with many daily Internet based activities executed by each human being. However, despite this movement of almost putting us in the innards of Internet, we didn’t yet notice a structural change in such infrastructure to cope with our human nature and, in particular, with the way we perceive and feel the world. This article exposes the vision of the authors for a possible shift in Internet paradigms towards effective support of the human nature

  20. A review of metaheuristic scheduling techniques in cloud computing

    Directory of Open Access Journals (Sweden)

    Mala Kalra

    2015-11-01

    Full Text Available Cloud computing has become a buzzword in the area of high performance distributed computing as it provides on-demand access to shared pool of resources over Internet in a self-service, dynamically scalable and metered manner. Cloud computing is still in its infancy, so to reap its full benefits, much research is required across a broad array of topics. One of the important research issues which need to be focused for its efficient performance is scheduling. The goal of scheduling is to map tasks to appropriate resources that optimize one or more objectives. Scheduling in cloud computing belongs to a category of problems known as NP-hard problem due to large solution space and thus it takes a long time to find an optimal solution. There are no algorithms which may produce optimal solution within polynomial time to solve these problems. In cloud environment, it is preferable to find suboptimal solution, but in short period of time. Metaheuristic based techniques have been proved to achieve near optimal solutions within reasonable time for such problems. In this paper, we provide an extensive survey and comparative analysis of various scheduling algorithms for cloud and grid environments based on three popular metaheuristic techniques: Ant Colony Optimization (ACO, Genetic Algorithm (GA and Particle Swarm Optimization (PSO, and two novel techniques: League Championship Algorithm (LCA and BAT algorithm.

  1. Mobile Cloud Business Process Management System for the Internet of Things: Review, Challenges and Blueprint

    OpenAIRE

    Chang, Chii; Srirama, Satish Narayana; Buyya, Rajkumar

    2015-01-01

    The Internet of Things (IoT) represents a comprehensive environment that consists of large number of sensors and mediators interconnecting heterogeneous physical objects to the Internet. IoT applications can be found in many areas such as smart city, smart workplace, smart plants, smart agriculture and various ubiquitous computing areas. Meanwhile, Business Process Management Systems (BPMS) has become a successful and efficient solution for coordinated management and optimised utilisation of ...

  2. Dynamic Capabilities for Managing Emerging Technologies : Organizational and Managerial Antecedents of Effective Adoption of Cloud Computing

    NARCIS (Netherlands)

    S. Khanagha (Saeed)

    2015-01-01

    markdownabstract__Abstract__ The advancement of information and communication technologies has brought a digital age, where massive computing power, high speed and ubiquitous access to internet and more recently Cloud Computing Technology are expected to transform a wide range of organizations,

  3. Towards Cloud Computing SLA Risk Management: Issues and Challenges

    OpenAIRE

    Morin, Jean-Henry; Aubert, Jocelyn; Gateau, Benjamin

    2012-01-01

    Cloud Computing has become mainstream technology offering a commoditized approach to software, platform and infrastructure as a service over the Internet on a global scale. This raises important new security issues beyond traditional perimeter based approaches. This paper attempts to identify these issues and their corresponding challenges, proposing to use risk and Service Level Agreement (SLA) management as the basis for a service level framework to improve governance, risk and compliance i...

  4. Wireless-Uplinks-Based Energy-Efficient Scheduling in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Xing Liu

    2015-01-01

    Full Text Available Mobile cloud computing (MCC combines cloud computing and mobile internet to improve the computational capabilities of resource-constrained mobile devices (MDs. In MCC, mobile users could not only improve the computational capability of MDs but also save operation consumption by offloading the mobile applications to the cloud. However, MCC faces the problem of energy efficiency because of time-varying channels when the offloading is being executed. In this paper, we address the issue of energy-efficient scheduling for wireless uplink in MCC. By introducing Lyapunov optimization, we first propose a scheduling algorithm that can dynamically choose channel to transmit data based on queue backlog and channel statistics. Then, we show that the proposed scheduling algorithm can make a tradeoff between queue backlog and energy consumption in a channel-aware MCC system. Simulation results show that the proposed scheduling algorithm can reduce the time average energy consumption for offloading compared to the existing algorithm.

  5. Open Reading Frame Phylogenetic Analysis on the Cloud

    Directory of Open Access Journals (Sweden)

    Che-Lun Hung

    2013-01-01

    Full Text Available Phylogenetic analysis has become essential in researching the evolutionary relationships between viruses. These relationships are depicted on phylogenetic trees, in which viruses are grouped based on sequence similarity. Viral evolutionary relationships are identified from open reading frames rather than from complete sequences. Recently, cloud computing has become popular for developing internet-based bioinformatics tools. Biocloud is an efficient, scalable, and robust bioinformatics computing service. In this paper, we propose a cloud-based open reading frame phylogenetic analysis service. The proposed service integrates the Hadoop framework, virtualization technology, and phylogenetic analysis methods to provide a high-availability, large-scale bioservice. In a case study, we analyze the phylogenetic relationships among Norovirus. Evolutionary relationships are elucidated by aligning different open reading frame sequences. The proposed platform correctly identifies the evolutionary relationships between members of Norovirus.

  6. Real-time Monitoring System for Rotating Machinery with IoT-based Cloud Platform

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Haedong; Kim, Suhyun; Woo, Sunhee; Kim, Songhyun; Lee, Seungchul [Ulsan Nat’l Institute Science and Technology, Ulsan (Korea, Republic of)

    2017-06-15

    The objective of this research is to improve the efficiency of data collection from many machine components on smart factory floors using IoT(Internet of things) techniques and cloud platform, and to make it easy to update outdated diagnostic schemes through online deployment methods from cloud resources. The short-term analysis is implemented by a micro-controller, and it includes machine-learning algorithms for inferring snapshot information of the machine components. For long-term analysis, time-series and high-dimension data are used for root cause analysis by combining a cloud platform and multivariate analysis techniques. The diagnostic results are visualized in a webbased display dashboard for an unconstrained user access. The implementation is demonstrated to identify its performance in data acquisition and analysis for rotating machinery.

  7. Real-time Monitoring System for Rotating Machinery with IoT-based Cloud Platform

    International Nuclear Information System (INIS)

    Jeong, Haedong; Kim, Suhyun; Woo, Sunhee; Kim, Songhyun; Lee, Seungchul

    2017-01-01

    The objective of this research is to improve the efficiency of data collection from many machine components on smart factory floors using IoT(Internet of things) techniques and cloud platform, and to make it easy to update outdated diagnostic schemes through online deployment methods from cloud resources. The short-term analysis is implemented by a micro-controller, and it includes machine-learning algorithms for inferring snapshot information of the machine components. For long-term analysis, time-series and high-dimension data are used for root cause analysis by combining a cloud platform and multivariate analysis techniques. The diagnostic results are visualized in a webbased display dashboard for an unconstrained user access. The implementation is demonstrated to identify its performance in data acquisition and analysis for rotating machinery.

  8. Assessment of In-Cloud Enterprise Resource Planning System Performed in a Virtual Cluster

    Directory of Open Access Journals (Sweden)

    Bao Rong Chang

    2015-01-01

    Full Text Available This paper introduces a high-performed high-availability in-cloud enterprise resources planning (in-cloud ERP which has deployed in the virtual machine cluster. The proposed approach can resolve the crucial problems of ERP failure due to unexpected downtime and failover between physical hosts in enterprises, causing operation termination and hence data loss. Besides, the proposed one together with the access control authentication and network security is capable of preventing intrusion hacked and/or malicious attack via internet. Regarding system assessment, cost-performance (C-P ratio, a remarkable cost effectiveness evaluation, has been applied to several remarkable ERP systems. As a result, C-P ratio evaluated from the experiments shows that the proposed approach outperforms two well-known benchmark ERP systems, namely, in-house ECC 6.0 and in-cloud ByDesign.

  9. Formation of Massive Molecular Cloud Cores by Cloud-cloud Collision

    OpenAIRE

    Inoue, Tsuyoshi; Fukui, Yasuo

    2013-01-01

    Recent observations of molecular clouds around rich massive star clusters including NGC3603, Westerlund 2, and M20 revealed that the formation of massive stars could be triggered by a cloud-cloud collision. By using three-dimensional, isothermal, magnetohydrodynamics simulations with the effect of self-gravity, we demonstrate that massive, gravitationally unstable, molecular cloud cores are formed behind the strong shock waves induced by the cloud-cloud collision. We find that the massive mol...

  10. Arrowheads as indicators of interpersonal violence and group identity among the Neolithic Pitted Ware hunters of southwestern Scandinavia

    DEFF Research Database (Denmark)

    Iversen, Rune

    2016-01-01

    millennium BC. Based on a study of more than 1500 arrowheads from Denmark and western Sweden, this paper explains the stylistic variation of the Pitted Ware arrowheads as functional determined representing two main categories: relatively short and wide hunting arrowheads (type A) and long and slender war...... arrowheads (type C). Type B represents a multifunctional group of arrowheads that mixes features from type A and C. Furthermore, diverging production schemes (schema opératoire) used for the shaping of hunting arrowheads has helped to identify social groupings within the larger southwestern Scandinavian...

  11. Smart SOA platforms in cloud computing architectures

    CERN Document Server

    Exposito , Ernesto

    2014-01-01

    This book is intended to introduce the principles of the Event-Driven and Service-Oriented Architecture (SOA 2.0) and its role in the new interconnected world based on the cloud computing architecture paradigm. In this new context, the concept of "service" is widely applied to the hardware and software resources available in the new generation of the Internet. The authors focus on how current and future SOA technologies provide the basis for the smart management of the service model provided by the Platform as a Service (PaaS) layer.

  12. Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment.

    Science.gov (United States)

    Ahmed, Abdulghani Ali; Xue Li, Chua

    2018-01-01

    Cloud storage service allows users to store their data online, so that they can remotely access, maintain, manage, and back up data from anywhere via the Internet. Although helpful, this storage creates a challenge to digital forensic investigators and practitioners in collecting, identifying, acquiring, and preserving evidential data. This study proposes an investigation scheme for analyzing data remnants and determining probative artifacts in a cloud environment. Using pCloud as a case study, this research collected the data remnants available on end-user device storage following the storing, uploading, and accessing of data in the cloud storage. Data remnants are collected from several sources, including client software files, directory listing, prefetch, registry, network PCAP, browser, and memory and link files. Results demonstrate that the collected remnants data are beneficial in determining a sufficient number of artifacts about the investigated cybercrime. © 2017 American Academy of Forensic Sciences.

  13. Cloud computing geospatial application for water resources based on free and open source software and open standards - a prototype

    Science.gov (United States)

    Delipetrev, Blagoj

    2016-04-01

    Presently, most of the existing software is desktop-based, designed to work on a single computer, which represents a major limitation in many ways, starting from limited computer processing, storage power, accessibility, availability, etc. The only feasible solution lies in the web and cloud. This abstract presents research and development of a cloud computing geospatial application for water resources based on free and open source software and open standards using hybrid deployment model of public - private cloud, running on two separate virtual machines (VMs). The first one (VM1) is running on Amazon web services (AWS) and the second one (VM2) is running on a Xen cloud platform. The presented cloud application is developed using free and open source software, open standards and prototype code. The cloud application presents a framework how to develop specialized cloud geospatial application that needs only a web browser to be used. This cloud application is the ultimate collaboration geospatial platform because multiple users across the globe with internet connection and browser can jointly model geospatial objects, enter attribute data and information, execute algorithms, and visualize results. The presented cloud application is: available all the time, accessible from everywhere, it is scalable, works in a distributed computer environment, it creates a real-time multiuser collaboration platform, the programing languages code and components are interoperable, and it is flexible in including additional components. The cloud geospatial application is implemented as a specialized water resources application with three web services for 1) data infrastructure (DI), 2) support for water resources modelling (WRM), 3) user management. The web services are running on two VMs that are communicating over the internet providing services to users. The application was tested on the Zletovica river basin case study with concurrent multiple users. The application is a state

  14. A Brief Analysis of Development Situations and Trend of Cloud Computing

    Science.gov (United States)

    Yang, Wenyan

    2017-12-01

    in recent years, the rapid development of Internet technology has radically changed people's work, learning and lifestyles. More and more activities are completed by virtue of computers and networks. The amount of information and data generated is bigger day by day, and people rely more on computer, which makes computing power of computer fail to meet demands of accuracy and rapidity from people. The cloud computing technology has experienced fast development, which is widely applied in the computer industry as a result of advantages of high precision, fast computing and easy usage. Moreover, it has become a focus in information research at present. In this paper, the development situations and trend of cloud computing shall be analyzed and researched.

  15. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

    Directory of Open Access Journals (Sweden)

    Nithya Chidambaram

    2016-01-01

    Full Text Available With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access. The files stored in the cloud are encrypted with RSA algorithm and digital fingerprint for the same has been generated through MD5 message digest before storage. The RSA provides unreadability of data to anyone without the private key. MD5 makes it impossible for any changes on data to go unnoticed. After the application of RSA and MD5 before storage, the data becomes resistant to access or modifications by any third party and to intruders of cloud storage system. This application is tested in Amazon Elastic Compute Cloud Web Services.

  16. The Development of Cloud Energy Management

    Directory of Open Access Journals (Sweden)

    Chin-Chi Cheng

    2015-05-01

    Full Text Available The energy management service (EMS has been utilized for saving energy since 1982 by managing the energy usage of site or facilities through the microprocessor, computer, Ethernet, internet, and wireless sensor network. The development and represented function groups of EMS are illustrated in the supplementary file of this paper. Along with this tendency, a cloud EMS, named the intelligent energy management network (iEN, was launched by Chunghwa Telecom in 2011 and tested during a pilot run from 2012 to 2013. The cloud EMS integrated three service modes together, including infrastructure as a service (IaaS, platform as a service (PaaS, and software as a service (SaaS. This cloud EMS could reduce the facility cost and enable a continuously improved service for energy conservation. From the literature review, 32 selected EMS cases of whole site and single facility were chosen for calculating the energy savings and payback rate. According to the literature, the average energy savings by applying EMS are 11.6% and 21.4% for the whole site and single facility, respectively. The iEN was applied on 55 demo sites with the similar scale, the same kind of machines and approaching conditions. The testing sites include a factory, a complex building, and a residual building, 12 lighting systems and 8 air conditioning systems. According to the testing results, the average energy savings by applying iEN are 10% and 23.5% for the whole site and single facility, respectively. Comparing with the reported EMS cases, it was found that the energy savings by adopting the cloud EMS were only 70%–80% compared with those using the traditional EMS. Although the cloud EMS presented less energy savings, it revolutionized the traditional EMS by its innovative business model. Compared with the averaged 1.7 years payback period of the traditional EMS, more than 70% of the cloud EMS cases could pay back immediately for the service fees and without the equipment investment.

  17. Gender, internet experience, Internet identification, and internet anxiety: a ten-year followup.

    Science.gov (United States)

    Joiner, Richard; Gavin, Jeff; Brosnan, Mark; Cromby, John; Gregory, Helen; Guiller, Jane; Maras, Pam; Moon, Amy

    2012-07-01

    In 2002, we found gender differences in the use of the Internet. Since then, however, the Internet has changed considerably. We therefore conducted a follow-up study in 2012. The study involved 501 students (389 females and 100 males, 12 participants unspecified gender) and we measured Internet use, Internet anxiety, and Internet identification. We found that males had a greater breadth of Internet use; they used the Internet more for games and entertainment than females. The differentiation between males and females in terms of Internet use is evident, and in some ways is even more distinct than 10 years ago. In our previous research we had found no gender differences in the use of the Internet for communication, whereas in the current study we have found that females use the Internet for communication than males and were using social network sites more than males. We also found, consistent with our previous study, that Internet identification and Internet anxiety were related to Internet use.

  18. Application of Docker Swarm cluster for testing programs, developed for system of devices within paradigm of Internet of things

    Science.gov (United States)

    Shichkina, Y. A.; Kupriyanov, M. S.; Moldachev, S. O.

    2018-05-01

    Today, a description of various Internet devices very often appears on the Internet. For the efficient operation of the Industrial Internet of things, it is necessary to provide a modern level of data processing starting from getting them from devices ending with returning them to devices in a processed form. Current solutions of the Internet of Things are mainly focused on the development of centralized decisions, projecting the Internet of Things on the set of cloud-based platforms that are open, but limit the ability of participants of the Internet of Things to adapt these systems to their own problems. Therefore, it is often necessary to create specialized software for specific areas of the Internet of Things. This article describes the solution of the problem of virtualization of the system of devices based on the Docker system. This solution allows developers to test any software on any number of devices forming a mesh.

  19. Distributed Monitoring and Resource Management for Large Cloud Environments

    OpenAIRE

    Wuhib, Fetahi Zebenigus

    2010-01-01

    Over the last decade, the number, size and complexity of large-scale networked systems has been growing fast, and this trend is expected to accelerate. The best known example of a large-scale networked system is probably the Internet, while large datacenters for cloud services are the most recent ones. In such environments, a key challenge is to develop scalable and adaptive technologies for management functions. This thesis addresses the challenge by engineering several protocols  for distri...

  20. Relationship between cloud radiative forcing, cloud fraction and cloud albedo, and new surface-based approach for determining cloud albedo

    OpenAIRE

    Y. Liu; W. Wu; M. P. Jensen; T. Toto

    2011-01-01

    This paper focuses on three interconnected topics: (1) quantitative relationship between surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo; (2) surfaced-based approach for measuring cloud albedo; (3) multiscale (diurnal, annual and inter-annual) variations and covariations of surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo. An analytical expression is first derived to quantify the relationship between cloud radiative forcing, cloud fractio...

  1. Cost comparison of running web applications in the cloud using monolithic, microservice, and AWS Lambda architectures

    NARCIS (Netherlands)

    Villamizar, Mario; Garcés, Oscar; Ochoa, Lina; Castro, Harold; Salamanca, Lorena; Verano, Mauricio; Casallas, Rubby; Gil, Santiago; Valencia, Carlos; Zambrano, Angee; Lang, Mery

    2017-01-01

    Large Internet companies like Amazon, Netflix, and LinkedIn are using the microservice architecture pattern to deploy large applications in the cloud as a set of small services that can be independently developed, tested, deployed, scaled, operated, and upgraded. However, aside from gaining agility,

  2. Clean Energy Use for Cloud Computing Federation Workloads

    Directory of Open Access Journals (Sweden)

    Yahav Biran

    2017-08-01

    Full Text Available Cloud providers seek to maximize their market share. Traditionally, they deploy datacenters with sufficient capacity to accommodate their entire computing demand while maintaining geographical affinity to its customers. Achieving these goals by a single cloud provider is increasingly unrealistic from a cost of ownership perspective. Moreover, the carbon emissions from underutilized datacenters place an increasing demand on electricity and is a growing factor in the cost of cloud provider datacenters. Cloud-based systems may be classified into two categories: serving systems and analytical systems. We studied two primary workload types, on-demand video streaming as a serving system and MapReduce jobs as an analytical systems and suggested two unique energy mix usage for processing that workloads. The recognition that on-demand video streaming now constitutes the bulk portion of traffic to Internet consumers provides a path to mitigate rising energy demand. On-demand video is usually served through Content Delivery Networks (CDN, often scheduled in backend and edge datacenters. This publication describes a CDN deployment solution that utilizes green energy to supply on-demand streaming workload. A cross-cloud provider collaboration will allow cloud providers to both operate near their customers and reduce operational costs, primarily by lowering the datacenter deployments per provider ratio. Our approach optimizes cross-datacenters deployment. Specifically, we model an optimized CDN-edge instance allocation system that maximizes, under a set of realistic constraints, green energy utilization. The architecture of this cross-cloud coordinator service is based on Ubernetes, an open source container cluster manager that is a federation of Kubernetes clusters. It is shown how, under reasonable constraints, it can reduce the projected datacenter’s carbon emissions growth by 22% from the currently reported consumption. We also suggest operating

  3. Future Internet Including 5G and Beyond: Presentation held at ICTP 2015, 1st IEEE International Conference on Telecommunications and Photonics, BUET, Dhaka, 26 - 28 December 2015

    OpenAIRE

    Khondoker, Rahamatullah

    2015-01-01

    The aim of Future Internet is to provide 24/7/365 satisfactory secure connectivity for everyone and everything which will bring changes in the society and industry. To achieve this goal, researchers are working to improve existing Radio, Core, and Management technologies and adding new concepts and technologies like Software Defined Networking (SDN), Network Function Virtualization (NFV), Cloud Computing, Fog Computing / Internet of Things (IoT), Cyberphysical Systems, Industrial Internet (fo...

  4. Ceramic ware waste as coarse aggregate for structural concrete production.

    Science.gov (United States)

    García-González, Julia; Rodríguez-Robles, Desirée; Juan-Valdés, Andrés; Morán-Del Pozo, Julia M; Guerra-Romero, M Ignacio

    2015-01-01

    The manufacture of any kind of product inevitably entails the production of waste. The quantity of waste generated by the ceramic industry, a very important sector in Spain, is between 5% and 8% of the final output and it is therefore necessary to find an effective waste recovery method. The aim of the study reported in the present article was to seek a sustainable means of managing waste from the ceramic industry through the incorporation of this type of waste in the total replacement of conventional aggregate (gravel) used in structural concrete. Having verified that the recycled ceramic aggregates met all the technical requirements imposed by current Spanish legislation, established in the Code on Structural Concrete (EHE-08), then it is prepared a control concrete mix and the recycled concrete mix using 100% recycled ceramic aggregate instead of coarse natural aggregate. The concretes obtained were subjected to the appropriate tests in order to conduct a comparison of their mechanical properties. The results show that the concretes made using ceramic sanitary ware aggregate possessed the same mechanical properties as those made with conventional aggregate. It is therefore possible to conclude that the reuse of recycled ceramic aggregate to produce recycled concrete is a feasible alternative for the sustainable management of this waste.

  5. Interview with Marius Ghercioiu about Art in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Doru Ursutiu

    2010-11-01

    Full Text Available My name is Marius Ghercioiu, and I am a virtual measurements engineer and entrepreneur. My company Cores Electronic LLC (www.tag4m.com offers a product line named Tag4M that converts sensor data to web pages using cloud instruments. A sensor becomes a Cloud Instrument when it is connected to a WiFi tag. The tag digitizes the data to send it on to Access Points, where the data is routed to the Internet and a Server IP. Here a customized Database is collecting the data for feed into applications like metering, charting, control, display, analysis, modeling, data mining, etc. with display on Web Page Instruments. Tag4M covers the WiFi tag and the web page instrument.

  6. It Is More than Knowledge Seeking: Examining the Effects of OpenCourseWare Lectures on Vocabulary Acquisition in English as a Foreign Language (EFL) Context

    Science.gov (United States)

    Yang, Hui-Chi; Sun, Yu-Chih

    2013-01-01

    OpenCourseWare (OCW) has received increasing attention over the past few years in higher education. These courses provide appealing opportunities to view classes taught in well-established universities worldwide. The current study aims to examine how OCW lectures can serve as authentic learning materials to facilitate vocabulary acquisition for…

  7. Cloud@Home: A New Enhanced Computing Paradigm

    Science.gov (United States)

    Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco

    Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).

  8. Learners’ views about cloud computing-based group activities

    Directory of Open Access Journals (Sweden)

    Yildirim Serkan

    2017-01-01

    Full Text Available Thanks to its use independently of time and place during the process of software development and by making it easier to access to information with mobile technologies, cloud based environments attracted the attention of education world and this technology started to be used in various activities. In this study, for programming education, the effects of extracurricular group assignments in cloud based environments on learners were evaluated in terms of group work satisfaction, ease of use and user satisfaction. Within the scope of computer programming education lasting eight weeks, a total of 100 students participated in the study including 34 men and 66 women. Participants were divided into groups of at least three people considering the advantages of cooperative learning in programming education. In this study carried out in both conventional and cloud based environments, between groups factorial design was used as research design. The data collected by questionnaires of opinions of group work were examined with quantitative analysis method. According to the study results extracurricular learning activities as group activity created satisfaction. However, perceptions of easy use of the environment and user satisfaction were partly positive. Despite the similar understandings; male participants were easier to perceive use of cloud computing based environments. Some variables such as class level, satisfaction, computer and internet usage time do not have any effect on satisfaction and perceptions of ease of use. Evening class students stated that they found it easy to use cloud based learning environments and became more satisfied with using these environments besides being happier with group work than daytime students.

  9. [Chapter 2. Internet of Things help to collect Big Data].

    Science.gov (United States)

    Brouard, Benoît

    2017-10-27

    According to the report ?The Internet of Things Market? the number of connected devices will reach 68 billion in 2020. In 2012, the total amount of data was 500 petabytes. So, after the race to increase power computation, now the stake is in the capacity to store all these data in the cloud, to open their access and to analyze these data properly. The use of these data is a major challenge for medical research and public health.

  10. Designing a Patient Monitoring System Using Cloud and Semantic Web Technologies

    OpenAIRE

    Chryssa Thermolia; Ekaterini S. Bei; Stelios Sotiriadis; Kostas Stravoskoufos; Euripides G.M. Petrakis

    2015-01-01

    Moving into a new era of healthcare, new tools and devices are developed to extend and improve health services, such as remote patient monitoring and risk prevention. In this concept, Internet of Things (IoT) and Cloud Computing present great advantages by providing remote and efficient services, as well as cooperation between patients, clinicians, researchers and other health professionals. This paper focuses on patients suffering from bipolar disorder, a brain disorder ...

  11. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques

    Science.gov (United States)

    Bhadauria, Rohit; Sanyal, Sugata

    2012-06-01

    Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow multi-fold increase in the capacity or capabilities of the existing and new software. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data-centers may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it.

  12. Resource Symmetric Dispatch Model for Internet of Things on Advanced Logistics

    OpenAIRE

    Guofeng Qin; Lisheng Wang; Qiyan Li

    2016-01-01

    Business applications in advanced logistics service are highly concurrent. In this paper, we propose a resource symmetric dispatch model for the concurrent and cooperative tasks of the Internet of Things. In the model, the terminals receive and deliver commands, data, and information with mobile networks, wireless networks, and sensor networks. The data and information are classified and processed by the clustering servers in the cloud service platform. The cluster service, resource dispatch,...

  13. Cloud-Enhanced Robotic System for Smart City Crowd Control

    Directory of Open Access Journals (Sweden)

    Akhlaqur Rahman

    2016-12-01

    Full Text Available Cloud robotics in smart cities is an emerging paradigm that enables autonomous robotic agents to communicate and collaborate with a cloud computing infrastructure. It complements the Internet of Things (IoT by creating an expanded network where robots offload data-intensive computation to the ubiquitous cloud to ensure quality of service (QoS. However, offloading for robots is significantly complex due to their unique characteristics of mobility, skill-learning, data collection, and decision-making capabilities. In this paper, a generic cloud robotics framework is proposed to realize smart city vision while taking into consideration its various complexities. Specifically, we present an integrated framework for a crowd control system where cloud-enhanced robots are deployed to perform necessary tasks. The task offloading is formulated as a constrained optimization problem capable of handling any task flow that can be characterized by a Direct Acyclic Graph (DAG. We consider two scenarios of minimizing energy and time, respectively, and develop a genetic algorithm (GA-based approach to identify the optimal task offloading decisions. The performance comparison with two benchmarks shows that our GA scheme achieves desired energy and time performance. We also show the adaptability of our algorithm by varying the values for bandwidth and movement. The results suggest their impact on offloading. Finally, we present a multi-task flow optimal path sequence problem that highlights how the robot can plan its task completion via movements that expend the minimum energy. This integrates path planning with offloading for robotics. To the best of our knowledge, this is the first attempt to evaluate cloud-based task offloading for a smart city crowd control system.

  14. The Internet of Citizens. A lawyer’s view on some technological developments in the United Kingdom and India

    OpenAIRE

    Noto La Diega, Guido

    2017-01-01

    This article is a useful tool for both Asian and European readers as regards some of the state-of-the-art technologies revolving around the Internet of Things (‘IoT’) and their intersection with cloud computing (the Clouds of Things, ‘CoT’) in both the continents. The main legal issues will be presented, with a focus on intellectual property, consumer protection, and privacy. India and the United Kingdom are selected because they are at the forefront of the IoT innovation in their respective ...

  15. Design and development of a run-time monitor for multi-core architectures in cloud computing.

    Science.gov (United States)

    Kang, Mikyung; Kang, Dong-In; Crago, Stephen P; Park, Gyung-Leen; Lee, Junghoon

    2011-01-01

    Cloud computing is a new information technology trend that moves computing and data away from desktops and portable PCs into large data centers. The basic principle of cloud computing is to deliver applications as services over the Internet as well as infrastructure. A cloud is a type of parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources. The large-scale distributed applications on a cloud require adaptive service-based software, which has the capability of monitoring system status changes, analyzing the monitored information, and adapting its service configuration while considering tradeoffs among multiple QoS features simultaneously. In this paper, we design and develop a Run-Time Monitor (RTM) which is a system software to monitor the application behavior at run-time, analyze the collected information, and optimize cloud computing resources for multi-core architectures. RTM monitors application software through library instrumentation as well as underlying hardware through a performance counter optimizing its computing configuration based on the analyzed data.

  16. Design and Development of a Run-Time Monitor for Multi-Core Architectures in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Junghoon Lee

    2011-03-01

    Full Text Available Cloud computing is a new information technology trend that moves computing and data away from desktops and portable PCs into large data centers. The basic principle of cloud computing is to deliver applications as services over the Internet as well as infrastructure. A cloud is a type of parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources. The large-scale distributed applications on a cloud require adaptive service-based software, which has the capability of monitoring system status changes, analyzing the monitored information, and adapting its service configuration while considering tradeoffs among multiple QoS features simultaneously. In this paper, we design and develop a Run-Time Monitor (RTM which is a system software to monitor the application behavior at run-time, analyze the collected information, and optimize cloud computing resources for multi-core architectures. RTM monitors application software through library instrumentation as well as underlying hardware through a performance counter optimizing its computing configuration based on the analyzed data.

  17. Cloud-Top Entrainment in Stratocumulus Clouds

    Science.gov (United States)

    Mellado, Juan Pedro

    2017-01-01

    Cloud entrainment, the mixing between cloudy and clear air at the boundary of clouds, constitutes one paradigm for the relevance of small scales in the Earth system: By regulating cloud lifetimes, meter- and submeter-scale processes at cloud boundaries can influence planetary-scale properties. Understanding cloud entrainment is difficult given the complexity and diversity of the associated phenomena, which include turbulence entrainment within a stratified medium, convective instabilities driven by radiative and evaporative cooling, shear instabilities, and cloud microphysics. Obtaining accurate data at the required small scales is also challenging, for both simulations and measurements. During the past few decades, however, high-resolution simulations and measurements have greatly advanced our understanding of the main mechanisms controlling cloud entrainment. This article reviews some of these advances, focusing on stratocumulus clouds, and indicates remaining challenges.

  18. Cloud type comparisons of AIRS, CloudSat, and CALIPSO cloud height and amount

    Directory of Open Access Journals (Sweden)

    B. H. Kahn

    2008-03-01

    Full Text Available The precision of the two-layer cloud height fields derived from the Atmospheric Infrared Sounder (AIRS is explored and quantified for a five-day set of observations. Coincident profiles of vertical cloud structure by CloudSat, a 94 GHz profiling radar, and the Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observation (CALIPSO, are compared to AIRS for a wide range of cloud types. Bias and variability in cloud height differences are shown to have dependence on cloud type, height, and amount, as well as whether CloudSat or CALIPSO is used as the comparison standard. The CloudSat-AIRS biases and variability range from −4.3 to 0.5±1.2–3.6 km for all cloud types. Likewise, the CALIPSO-AIRS biases range from 0.6–3.0±1.2–3.6 km (−5.8 to −0.2±0.5–2.7 km for clouds ≥7 km (<7 km. The upper layer of AIRS has the greatest sensitivity to Altocumulus, Altostratus, Cirrus, Cumulonimbus, and Nimbostratus, whereas the lower layer has the greatest sensitivity to Cumulus and Stratocumulus. Although the bias and variability generally decrease with increasing cloud amount, the ability of AIRS to constrain cloud occurrence, height, and amount is demonstrated across all cloud types for many geophysical conditions. In particular, skill is demonstrated for thin Cirrus, as well as some Cumulus and Stratocumulus, cloud types infrared sounders typically struggle to quantify. Furthermore, some improvements in the AIRS Version 5 operational retrieval algorithm are demonstrated. However, limitations in AIRS cloud retrievals are also revealed, including the existence of spurious Cirrus near the tropopause and low cloud layers within Cumulonimbus and Nimbostratus clouds. Likely causes of spurious clouds are identified and the potential for further improvement is discussed.

  19. Design and Implementation of IoT Cloud Moveable SCADA Supported by GSM for Industrial Applications

    Directory of Open Access Journals (Sweden)

    Mahmoud Shaker Nasr

    2017-05-01

    Full Text Available The world at the beginning of a new era of innovation and development with the rise of the industrial Internet or Internet of Things, IoT. It takes the space through the convergence of the global industrial system with the power of advanced computing, analytics, and low cost sensor devices and innovation of communication allowed by the Internet. One of the most important developments is IoT SCADA systems, which are considered as infrastructure of society because of their potential enormous in several industrial applications. This paper presents the design of a new generation of SCADA, named moveable SCADA , based on IoT cloud, and supported by GSM for more flexibility and reliability. The system is applied to industrial application that consists of three-control processes which are temperature, liquid level and motor processes. The three control processes data acquisition and controllers are implemented using embedded microcontroller system while a gateway is used to transfer the data proceed in field supervisor at first as well as main supervisor and monitoring engineer through IoT cloud. The system supported by GSM unit to support the system in case of internet failure. Also a camera is added to the system in order to monitor any location, any location (determined by any of the authorities in the field where the camera is mounted. The proposed SCADA is implemented practically and tested for many cases; the presented obtained results demonstrate that the system operation is very fair and meet the required targets.

  20. Fog Computing and Edge Computing Architectures for Processing Data From Diabetes Devices Connected to the Medical Internet of Things.

    Science.gov (United States)

    Klonoff, David C

    2017-07-01

    The Internet of Things (IoT) is generating an immense volume of data. With cloud computing, medical sensor and actuator data can be stored and analyzed remotely by distributed servers. The results can then be delivered via the Internet. The number of devices in IoT includes such wireless diabetes devices as blood glucose monitors, continuous glucose monitors, insulin pens, insulin pumps, and closed-loop systems. The cloud model for data storage and analysis is increasingly unable to process the data avalanche, and processing is being pushed out to the edge of the network closer to where the data-generating devices are. Fog computing and edge computing are two architectures for data handling that can offload data from the cloud, process it nearby the patient, and transmit information machine-to-machine or machine-to-human in milliseconds or seconds. Sensor data can be processed near the sensing and actuating devices with fog computing (with local nodes) and with edge computing (within the sensing devices). Compared to cloud computing, fog computing and edge computing offer five advantages: (1) greater data transmission speed, (2) less dependence on limited bandwidths, (3) greater privacy and security, (4) greater control over data generated in foreign countries where laws may limit use or permit unwanted governmental access, and (5) lower costs because more sensor-derived data are used locally and less data are transmitted remotely. Connected diabetes devices almost all use fog computing or edge computing because diabetes patients require a very rapid response to sensor input and cannot tolerate delays for cloud computing.

  1. Bringing optical networks to the Cloud: an architecture for a sustainable future Internet

    NARCIS (Netherlands)

    Vicat-Blanc, P.; Figuerola, S.; Chen, X.; Landi, G.; Escalona, E.; Develder, C.; Tzanakaki, A.; Demchenko, Y.; García Espín, J.A.; Ferrer, J.; López, E.; Soudan, S.; Buysse, J.; Jukan, A.; Ciulli, N.; Brogle, M.; van Laarhoven, L.; Belter, B.; Anhalt, F.; Nejabati, R.; Simeonidou, D.; Ngo, C.; de Laat, C.; Biancani, M.; Roth, M.; Donadio, P.; Jiménez, J.; Antoniak-Lewandowska, M.; Gumaste, A.; Domingue, J.; Galis, A.; Gavras, A.; Zahariadis, T.; Lambert, D.; Cleary, F.; Daras, P.; Krco, S.; Müller, H.; Li, M.-S.; Schaffers, H.; Lotz, V.; Alvarez, F.; Stiller, B.; Karnouskos, S.; Avessta, S.; Nilsson, M.

    2011-01-01

    Over the years, the Internet has become a central tool for society. The extent of its growth and usage raises critical issues associated with its design principles that need to be addressed before it reaches its limits. Many emerging applications have increasing requirements in terms of bandwidth,

  2. A comparison of shock-cloud and wind-cloud interactions: effect of increased cloud density contrast on cloud evolution

    Science.gov (United States)

    Goldsmith, K. J. A.; Pittard, J. M.

    2018-05-01

    The similarities, or otherwise, of a shock or wind interacting with a cloud of density contrast χ = 10 were explored in a previous paper. Here, we investigate such interactions with clouds of higher density contrast. We compare the adiabatic hydrodynamic interaction of a Mach 10 shock with a spherical cloud of χ = 103 with that of a cloud embedded in a wind with identical parameters to the post-shock flow. We find that initially there are only minor morphological differences between the shock-cloud and wind-cloud interactions, compared to when χ = 10. However, once the transmitted shock exits the cloud, the development of a turbulent wake and fragmentation of the cloud differs between the two simulations. On increasing the wind Mach number, we note the development of a thin, smooth tail of cloud material, which is then disrupted by the fragmentation of the cloud core and subsequent `mass-loading' of the flow. We find that the normalized cloud mixing time (tmix) is shorter at higher χ. However, a strong Mach number dependence on tmix and the normalized cloud drag time, t_{drag}^' }, is not observed. Mach-number-dependent values of tmix and t_{drag}^' } from comparable shock-cloud interactions converge towards the Mach-number-independent time-scales of the wind-cloud simulations. We find that high χ clouds can be accelerated up to 80-90 per cent of the wind velocity and travel large distances before being significantly mixed. However, complete mixing is not achieved in our simulations and at late times the flow remains perturbed.

  3. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment

    Science.gov (United States)

    Dorairaj, Sudha Devi; Kaliannan, Thilagavathy

    2015-01-01

    Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions. PMID:26258165

  4. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Sudha Devi Dorairaj

    2015-01-01

    Full Text Available Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party’s premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.

  5. An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment.

    Science.gov (United States)

    Dorairaj, Sudha Devi; Kaliannan, Thilagavathy

    2015-01-01

    Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.

  6. Cloud Computing, Tieto Cloud Server Model

    OpenAIRE

    Suikkanen, Saara

    2013-01-01

    The purpose of this study is to find out what is cloud computing. To be able to make wise decisions when moving to cloud or considering it, companies need to understand what cloud is consists of. Which model suits best to they company, what should be taken into account before moving to cloud, what is the cloud broker role and also SWOT analysis of cloud? To be able to answer customer requirements and business demands, IT companies should develop and produce new service models. IT house T...

  7. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  8. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  9. Planning and management of cloud computing networks

    Science.gov (United States)

    Larumbe, Federico

    The evolution of the Internet has a great impact on a big part of the population. People use it to communicate, query information, receive news, work, and as entertainment. Its extraordinary usefulness as a communication media made the number of applications and technological resources explode. However, that network expansion comes at the cost of an important power consumption. If the power consumption of telecommunication networks and data centers is considered as the power consumption of a country, it would rank at the 5 th place in the world. Furthermore, the number of servers in the world is expected to grow by a factor of 10 between 2013 and 2020. This context motivates us to study techniques and methods to allocate cloud computing resources in an optimal way with respect to cost, quality of service (QoS), power consumption, and environmental impact. The results we obtained from our test cases show that besides minimizing capital expenditures (CAPEX) and operational expenditures (OPEX), the response time can be reduced up to 6 times, power consumption by 30%, and CO2 emissions by a factor of 60. Cloud computing provides dynamic access to IT resources as a service. In this paradigm, programs are executed in servers connected to the Internet that users access from their computers and mobile devices. The first advantage of this architecture is to reduce the time of application deployment and interoperability, because a new user only needs a web browser and does not need to install software on local computers with specific operating systems. Second, applications and information are available from everywhere and with any device with an Internet access. Also, servers and IT resources can be dynamically allocated depending on the number of users and workload, a feature called elasticity. This thesis studies the resource management of cloud computing networks and is divided in three main stages. We start by analyzing the planning of cloud computing networks to get a

  10. Hard Real-Time Task Scheduling in Cloud Computing Using an Adaptive Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Amjad Mahmood

    2017-04-01

    Full Text Available In the Infrastructure-as-a-Service cloud computing model, virtualized computing resources in the form of virtual machines are provided over the Internet. A user can rent an arbitrary number of computing resources to meet their requirements, making cloud computing an attractive choice for executing real-time tasks. Economical task allocation and scheduling on a set of leased virtual machines is an important problem in the cloud computing environment. This paper proposes a greedy and a genetic algorithm with an adaptive selection of suitable crossover and mutation operations (named as AGA to allocate and schedule real-time tasks with precedence constraint on heterogamous virtual machines. A comprehensive simulation study has been done to evaluate the performance of the proposed algorithms in terms of their solution quality and efficiency. The simulation results show that AGA outperforms the greedy algorithm and non-adaptive genetic algorithm in terms of solution quality.

  11. Security and Privacy in the Medical Internet of Things: A Review

    Directory of Open Access Journals (Sweden)

    Wencheng Sun

    2018-01-01

    Full Text Available Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up. Instead of going to the hospital for help, patients’ health-related parameters can be monitored remotely, continuously, and in real time, then processed, and transferred to medical data center, such as cloud storage, which greatly increases the efficiency, convenience, and cost performance of healthcare. The amount of data handled by MIoT devices grows exponentially, which means higher exposure of sensitive data. The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns. This paper focuses on the security and privacy requirements related to data flow in MIoT. In addition, we make in-depth study on the existing solutions to security and privacy issues, together with the open challenges and research issues for future work.

  12. Sparks in the Fog: Social and Economic Mechanisms as Enablers for Community Network Clouds

    Directory of Open Access Journals (Sweden)

    Muhammad Amin KHAN

    2014-10-01

    Full Text Available Internet and communication technologies have lowered the costs of enabling individuals and communities to collaborate together. This collaboration has provided new services like user-generated content and social computing, as evident from success stories like Wikipedia. Through collaboration, collectively built infrastructures like community wireless mesh networks where users provide the communication network, have also emerged. Community networks have demonstrated successful bandwidth sharing, but have not been able to extend their collective effort to other computing resources like storage and processing. The success of cloud computing has been enabled by economies of scale and the need for elastic, flexible and on-demand provisioning of computing services. The consolidation of today’s cloud technologies offers now the possibility of collectively built community clouds, building upon user-generated content and user-provided networks towards an ecosystem of cloud services. We explore in this paper how social and economic mechanisms can play a role in overcoming the barriers of voluntary resource provisioning in such community clouds, by analysing the costs involved in building these services and how they give value to the participants. We indicate socio-economic policies and how they can be implemented in community networks, to ease the uptake and ensure the sustainability of community clouds.

  13. MAINS: MULTI-AGENT INTELLIGENT SERVICE ARCHITECTURE FOR CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    T. Joshva Devadas

    2014-04-01

    Full Text Available Computing has been transformed to a model having commoditized services. These services are modeled similar to the utility services water and electricity. The Internet has been stunningly successful over the course of past three decades in supporting multitude of distributed applications and a wide variety of network technologies. However, its popularity has become the biggest impediment to its further growth with the handheld devices mobile and laptops. Agents are intelligent software system that works on behalf of others. Agents are incorporated in many innovative applications in order to improve the performance of the system. Agent uses its possessed knowledge to react with the system and helps to improve the performance. Agents are introduced in the cloud computing is to minimize the response time when similar request is raised from an end user in the globe. In this paper, we have introduced a Multi Agent Intelligent system (MAINS prior to cloud service models and it was tested using sample dataset. Performance of the MAINS layer was analyzed in three aspects and the outcome of the analysis proves that MAINS Layer provides a flexible model to create cloud applications and deploying them in variety of applications.

  14. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  15. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  16. From machine-to-machine to the Internet of Things

    CERN Document Server

    Holler, Jan; Mulligan, Catherine; Avesand, Stefan; Karnouskos, Stamatis; Boyle, David

    2014-01-01

    This book outlines the background and overall vision for the Internet of Things (IoT) and M2M communications and services, including major standards. Key technologies are described: Everything from physical instrumentation devices to the cloud infrastructures used to collect data, derive information and map it to current processes, as well as system architectures and regulatory requirements. Real world service use case studies provide the hands-on knowledge needed to successfully develop and implement M2M and IoT technologies sustainably and profitably. Finally, the future vision for M2M tech

  17. Security and Privacy in the Medical Internet of Things: A Review

    OpenAIRE

    Sun, Wencheng; Cai, Zhiping; Li, Yangyang; Liu, Fang; Fang, Shengqun; Wang, Guoyan

    2018-01-01

    Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up. Instead of going to the hospital for help, patients’ health-related parameters can be monitored remotely, continuously, and in real time, then processed, and transferred to medical data center, such as cloud storage, which greatly increases the efficiency, convenience, and cost performance of healthcare. The amount...

  18. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  19. A home healthcare system in the cloud - Addressing security and privacy challenges

    OpenAIRE

    Deng M.; Petkovic M.; Nalin M.; Baroni I.

    2011-01-01

    Cloud computing is an emerging technology that is expected to support Internet scale critical applications which could be essential to the healthcare sector. Its scalability, resilience, adaptability, connectivity, cost reduction, and high performance features have high potential to lift the efficiency and quality of healthcare. However,it is also important to understand specific risks related to security and privacy that this technology brings. This paper focuses on a home healthcare system ...

  20. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  1. Silicon Photonics Cloud (SiCloud)

    DEFF Research Database (Denmark)

    DeVore, P. T. S.; Jiang, Y.; Lynch, M.

    2015-01-01

    Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths.......Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths....

  2. CIMS: A Context-Based Intelligent Multimedia System for Ubiquitous Cloud Computing

    Directory of Open Access Journals (Sweden)

    Abhilash Sreeramaneni

    2015-06-01

    Full Text Available Mobile users spend a tremendous amount of time surfing multimedia contents over the Internet to pursue their interests. A resource-constrained smart device demands more intensive computing tasks and lessens the battery life. To address the resource limitations (i.e., memory, lower maintenance cost, easier access, computing tasks in mobile devices, mobile cloud computing is needed. Several approaches have been proposed to confront the challenges of mobile cloud computing, but difficulties still remain. However, in the coming years, context collecting, processing, and interchanging the results on a heavy network will cause vast computations and reduce the battery life in mobiles. In this paper, we propose a “context-based intelligent multimedia system” (CIMS for ubiquitous cloud computing. The main goal of this research is to lessen the computing percentage, storage complexities, and battery life for mobile users by using pervasive cloud computing. Moreover, to reduce the computing and storage concerns in mobiles, the cloud server collects several groups of user profiles with similarities by executing K-means clustering on users’ data (context and multimedia contents. The distribution process conveys real-time notifications to smartphone users, according to what is stated in his/her profile. We considered a mobile cloud offloading system, which decides the offloading actions to/from cloud servers. Context-aware decision-making (CAD customizes the mobile device performance with different specifications such as short response time and lesser energy consumption. The analysis says that our CIMS takes advantage of cost-effective features to produce high-quality information for mobile (or smart device users in real time. Moreover, our CIMS lessens the computation and storage complexities for mobile users, as well as cloud servers. Simulation analysis suggests that our approach is more efficient than existing domains.

  3. Cloud Processed CCN Suppress Stratus Cloud Drizzle

    Science.gov (United States)

    Hudson, J. G.; Noble, S. R., Jr.

    2017-12-01

    Conversion of sulfur dioxide to sulfate within cloud droplets increases the sizes and decreases the critical supersaturation, Sc, of cloud residual particles that had nucleated the droplets. Since other particles remain at the same sizes and Sc a size and Sc gap is often observed. Hudson et al. (2015) showed higher cloud droplet concentrations (Nc) in stratus clouds associated with bimodal high-resolution CCN spectra from the DRI CCN spectrometer compared to clouds associated with unimodal CCN spectra (not cloud processed). Here we show that CCN spectral shape (bimodal or unimodal) affects all aspects of stratus cloud microphysics and drizzle. Panel A shows mean differential cloud droplet spectra that have been divided according to traditional slopes, k, of the 131 measured CCN spectra in the Marine Stratus/Stratocumulus Experiment (MASE) off the Central California coast. K is generally high within the supersaturation, S, range of stratus clouds (< 0.5%). Because cloud processing decreases Sc of some particles, it reduces k. Panel A shows higher concentrations of small cloud droplets apparently grown on lower k CCN than clouds grown on higher k CCN. At small droplet sizes the concentrations follow the k order of the legend, black, red, green, blue (lowest to highest k). Above 13 µm diameter the lines cross and the hierarchy reverses so that blue (highest k) has the highest concentrations followed by green, red and black (lowest k). This reversed hierarchy continues into the drizzle size range (panel B) where the most drizzle drops, Nd, are in clouds grown on the least cloud-processed CCN (blue), while clouds grown on the most processed CCN (black) have the lowest Nd. Suppression of stratus cloud drizzle by cloud processing is an additional 2nd indirect aerosol effect (IAE) that along with the enhancement of 1st IAE by higher Nc (panel A) are above and beyond original IAE. However, further similar analysis is needed in other cloud regimes to determine if MASE was

  4. Performing quantum computing experiments in the cloud

    Science.gov (United States)

    Devitt, Simon J.

    2016-09-01

    Quantum computing technology has reached a second renaissance in the past five years. Increased interest from both the private and public sector combined with extraordinary theoretical and experimental progress has solidified this technology as a major advancement in the 21st century. As anticipated my many, some of the first realizations of quantum computing technology has occured over the cloud, with users logging onto dedicated hardware over the classical internet. Recently, IBM has released the Quantum Experience, which allows users to access a five-qubit quantum processor. In this paper we take advantage of this online availability of actual quantum hardware and present four quantum information experiments. We utilize the IBM chip to realize protocols in quantum error correction, quantum arithmetic, quantum graph theory, and fault-tolerant quantum computation by accessing the device remotely through the cloud. While the results are subject to significant noise, the correct results are returned from the chip. This demonstrates the power of experimental groups opening up their technology to a wider audience and will hopefully allow for the next stage of development in quantum information technology.

  5. Applying analytic hierarchy process to assess healthcare-oriented cloud computing service systems.

    Science.gov (United States)

    Liao, Wen-Hwa; Qiu, Wan-Li

    2016-01-01

    Numerous differences exist between the healthcare industry and other industries. Difficulties in the business operation of the healthcare industry have continually increased because of the volatility and importance of health care, changes to and requirements of health insurance policies, and the statuses of healthcare providers, which are typically considered not-for-profit organizations. Moreover, because of the financial risks associated with constant changes in healthcare payment methods and constantly evolving information technology, healthcare organizations must continually adjust their business operation objectives; therefore, cloud computing presents both a challenge and an opportunity. As a response to aging populations and the prevalence of the Internet in fast-paced contemporary societies, cloud computing can be used to facilitate the task of balancing the quality and costs of health care. To evaluate cloud computing service systems for use in health care, providing decision makers with a comprehensive assessment method for prioritizing decision-making factors is highly beneficial. Hence, this study applied the analytic hierarchy process, compared items related to cloud computing and health care, executed a questionnaire survey, and then classified the critical factors influencing healthcare cloud computing service systems on the basis of statistical analyses of the questionnaire results. The results indicate that the primary factor affecting the design or implementation of optimal cloud computing healthcare service systems is cost effectiveness, with the secondary factors being practical considerations such as software design and system architecture.

  6. PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ji Li

    2017-01-01

    Full Text Available The amount of Internet data is significantly increasing due to the development of network technology, inducing the appearance of big data. Experiments have shown that deep mining and analysis on large datasets would introduce great benefits. Although cloud computing supports data analysis in an outsourced and cost-effective way, it brings serious privacy issues when sending the original data to cloud servers. Meanwhile, the returned analysis result suffers from malicious inference attacks and also discloses user privacy. In this paper, to conquer the above privacy issues, we propose a general framework for Preserving Multiparty Data Privacy (PMDP for short in cloud computing. The PMDP framework can protect numeric data computing and publishing with the assistance of untrusted cloud servers and achieve delegation of storage simultaneously. Our framework is built upon several cryptography primitives (e.g., secure multiparty computation and differential privacy mechanism, which guarantees its security against semihonest participants without collusion. We further instantiate PMDP with specific algorithms and demonstrate its security, efficiency, and advantages by presenting security analysis and performance discussion. Moreover, we propose a security enhanced framework sPMDP to resist malicious inside participants and outside adversaries. We illustrate that both PMDP and sPMDP are reliable and scale well and thus are desirable for practical applications.

  7. Cloud Computing: Virtual Clusters, Data Security, and Disaster Recovery

    Science.gov (United States)

    Hwang, Kai

    Dr. Kai Hwang is a Professor of Electrical Engineering and Computer Science and Director of Internet and Cloud Computing Lab at the Univ. of Southern California (USC). He received the Ph.D. in Electrical Engineering and Computer Science from the Univ. of California, Berkeley. Prior to joining USC, he has taught at Purdue Univ. for many years. He has also served as a visiting Chair Professor at Minnesota, Hong Kong Univ., Zhejiang Univ., and Tsinghua Univ. He has published 8 books and over 210 scientific papers in computer science/engineering.

  8. Using a cloud to replenish parched groundwater modeling efforts

    Science.gov (United States)

    Hunt, Randall J.; Luchette, Joseph; Schreuder, Willem A.; Rumbaugh, James O.; Doherty, John; Tonkin, Matthew J.; Rumbaugh, Douglas B.

    2010-01-01

    Groundwater models can be improved by introduction of additional parameter flexibility and simultaneous use of soft-knowledge. However, these sophisticated approaches have high computational requirements. Cloud computing provides unprecedented access to computing power via the Internet to facilitate the use of these techniques. A modeler can create, launch, and terminate “virtual” computers as needed, paying by the hour, and save machine images for future use. Such cost-effective and flexible computing power empowers groundwater modelers to routinely perform model calibration and uncertainty analysis in ways not previously possible.

  9. Using a cloud to replenish parched groundwater modeling efforts.

    Science.gov (United States)

    Hunt, Randall J; Luchette, Joseph; Schreuder, Willem A; Rumbaugh, James O; Doherty, John; Tonkin, Matthew J; Rumbaugh, Douglas B

    2010-01-01

    Groundwater models can be improved by introduction of additional parameter flexibility and simultaneous use of soft-knowledge. However, these sophisticated approaches have high computational requirements. Cloud computing provides unprecedented access to computing power via the Internet to facilitate the use of these techniques. A modeler can create, launch, and terminate "virtual" computers as needed, paying by the hour, and save machine images for future use. Such cost-effective and flexible computing power empowers groundwater modelers to routinely perform model calibration and uncertainty analysis in ways not previously possible.

  10. Internet-of-Things – A Layered Model for Business Environment

    Directory of Open Access Journals (Sweden)

    Logica BANICA

    2017-12-01

    Full Text Available The new concept of Internet of Things (IoT will increase the pace of globalization in business, overcoming spatial and temporal barriers, language and economic development. But, as any new concept emerged, it still has no widespread functional models and standards and, moreover, companies are not ready to accept all the changes proposed by IoT in the business environment. In this paper, as a case study, we propose an IoT model, based on collaboration between Fog/Edge and Cloud Computing, for developing a business in distribution and retail domain, with a multi-stores and multi-warehouses structures. The entire system is monitored by a hierarchical synchronization model, having the master clock server placed in the Cloud layer, and then, in subordinate relation, to the next level, the Fog/Edge layer, from which start signals simultaneously to the servers in the warehouses and to stores.

  11. Cloud vertical profiles derived from CALIPSO and CloudSat and a comparison with MODIS derived clouds

    Science.gov (United States)

    Kato, S.; Sun-Mack, S.; Miller, W. F.; Rose, F. G.; Minnis, P.; Wielicki, B. A.; Winker, D. M.; Stephens, G. L.; Charlock, T. P.; Collins, W. D.; Loeb, N. G.; Stackhouse, P. W.; Xu, K.

    2008-05-01

    CALIPSO and CloudSat from the a-train provide detailed information of vertical distribution of clouds and aerosols. The vertical distribution of cloud occurrence is derived from one month of CALIPSO and CloudSat data as a part of the effort of merging CALIPSO, CloudSat and MODIS with CERES data. This newly derived cloud profile is compared with the distribution of cloud top height derived from MODIS on Aqua from cloud algorithms used in the CERES project. The cloud base from MODIS is also estimated using an empirical formula based on the cloud top height and optical thickness, which is used in CERES processes. While MODIS detects mid and low level clouds over the Arctic in April fairly well when they are the topmost cloud layer, it underestimates high- level clouds. In addition, because the CERES-MODIS cloud algorithm is not able to detect multi-layer clouds and the empirical formula significantly underestimates the depth of high clouds, the occurrence of mid and low-level clouds is underestimated. This comparison does not consider sensitivity difference to thin clouds but we will impose an optical thickness threshold to CALIPSO derived clouds for a further comparison. The effect of such differences in the cloud profile to flux computations will also be discussed. In addition, the effect of cloud cover to the top-of-atmosphere flux over the Arctic using CERES SSF and FLASHFLUX products will be discussed.

  12. Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Abdelali Saidi

    2017-03-01

    Full Text Available Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.

  13. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-02-07

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  14. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Science.gov (United States)

    Celesti, Antonio; Fazio, Maria; Villari, Massimo

    2017-01-01

    Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214

  15. Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO

    Directory of Open Access Journals (Sweden)

    Antonio Celesti

    2017-02-01

    Full Text Available Nowadays, in the panorama of Internet of Things (IoT, finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.

  16. Resource Symmetric Dispatch Model for Internet of Things on Advanced Logistics

    Directory of Open Access Journals (Sweden)

    Guofeng Qin

    2016-04-01

    Full Text Available Business applications in advanced logistics service are highly concurrent. In this paper, we propose a resource symmetric dispatch model for the concurrent and cooperative tasks of the Internet of Things. In the model, the terminals receive and deliver commands, data, and information with mobile networks, wireless networks, and sensor networks. The data and information are classified and processed by the clustering servers in the cloud service platform. The cluster service, resource dispatch, and load balance are cooperative for management and monitoring of every application case during the logistics service lifecycle. In order to support the high performance of cloud service, resource symmetric dispatch algorithm among clustering servers and load balancing method among multi-cores in one server, including NIO (Non-blocking Input/Output and RMI (Remote Method Invocation are utilized to dispatch the cooperation of computation and service resources.

  17. Analisis Implementasi Infrastructure as A Service Menggunakan Ubuntu Cloud Infrastruktur

    Directory of Open Access Journals (Sweden)

    Norma Fitra Puspa Rahma

    2014-01-01

    Full Text Available Semakin canggih dan berkembangnya teknologi informasi di berbagai aspek kehidupan, meniscayakan perguruan tinggi sebagai institusi pengembang ilmu pengetahuan dan teknologi (IPTEK untuk merespon positif. Hal ini akan berdampak juga dalam perkembangan perangkar keras yang secara tidak langsung harus mengikuti perkembangan teknologi informasi yang ada sehingga akan dilakukan penambahan perangkat yang akan menyebabkan penambahan biaya untuk membeli perangkat yang baru. Hal tersebut dapat dipenuhi dengan menggunakan teknologi cloud computing. Cloud computing merupakan model komputasi, dimana sumber daya seperti daya komputasi, penyimpanan, jaringan dan perangkat lunak disediakan sebagai laayanan di internet. Sumber daya komputasi tersebut dapat dipenuhi oleh layanan layanan cloud Infrastructure as a Service (IaaS.Infrastructure as a Service tersebut dibangun dengan menngunakan Infrastruktur Cloud Ubuntu. Sistem Operasi yang digunakan adalah Ubuntu Server 12.04 LTS dan serta perangkat lunak yang digunakan untuk membangun infrastruktur adalah OpenStack versi essex. Hasil dari tugas akhir ini adalah terciptanya mesin virtual berdasarkan spesifikasi CPU, memory, dan disk yang dipilih melalui flavor yaitu m1.tiny dengan spesifikasi memori 512 MB, disk 0 GB, ephemeral 0 GB, vCPU 1. Image yang digunakan pada instance adalahsServer Ubuntu 12.04.3 LTS. Kecepatan CPU yang didapat pada mesin virtual tersebut adalah 3000,106 MHz. Penggunaan CPU pada instance dengan nama “webserver” meliputi 0,3% dengan sisa 0,97%, Memori 422764k dari total keseluruhan 503496.

  18. Impact of OpenCourseWare Publication on Higher Education Participation and Student Recruitment

    Directory of Open Access Journals (Sweden)

    Stephen Carson

    2012-10-01

    Full Text Available The free and open publication of course materials (OpenCourseWare or OCW was initially undertaken by Massachusetts Institute of Technology (MIT and other universities primarily to share educational resources among educators (Abelson, 2007. OCW, however, and more in general open educational resources (OER1, have also provided well-documented opportunities for all learners, including the so-called “informal learners” and “independent learners” (Carson, 2005; Mulder, 2006, p. 35. Universities have also increasingly documented clear benefits for specific target groups such as secondary education students and lifelong learners seeking to enter formal postsecondary education programs.In addition to benefitting learners, OCW publication has benefitted the publishing institutions themselves by providing recruiting advantages. Finally enrollment figures from some institutions indicate that even in the case of the free and open publication of materials from online programs, OCW does not negatively affect enrollment. This paper reviews evaluation conducted at Massachusetts Institute of Technology, Johns Hopkins Bloomberg School of Public Health (JHSPH, and Open Universiteit Nederland (OUNL concerning OCW effects on higher education participation and student recruitment.

  19. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  20. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  1. Identification and ranking of the risk factors of cloud computing in State-Owned organizations

    Directory of Open Access Journals (Sweden)

    Noor Mohammad Yaghoubi

    2015-05-01

    Full Text Available Rapid development of processing and storage technologies and the success of the Internet have made computing resources cheaper, more powerful and more available than before. This technological trend has enabled the realization of a new computing model called cloud computing. Recently, the State-Owned organizations have begun to utilize cloud computing architectures, platforms, and applications to deliver services and meet constituents’ needs. Despite all of the advantages and opportunities of cloud computing technology, there are so many risks that State-Owned organizations need to know about before their migration to cloud environment. The purpose of this study is to identify and rank the risks factors of cloud computing in State-Owned organizations by making use of IT experts’ opinion. Firstly, by reviewing key articles, a comprehensive list of risks factors were extracted and classified into two categories: tangible and intangible. Then, six experts were interviewed about these risks and their classifications, and 10 risks were identified. After that, process of ranking the risks was done by seeking help from 52 experts and by fuzzy analytic hierarchy process. The results show that experts have identified intangible risks as the most important risks in cloud computing usage by State-Owned organizations. As the results indicate, "data confidentiality" risk has the highest place among the other risks.

  2. A new privacy preserving technique for cloud service user endorsement using multi-agents

    Directory of Open Access Journals (Sweden)

    D. Chandramohan

    2016-01-01

    Full Text Available In data analysis the present focus on storage services are leveraged to attain its crucial part while user data get compromised. In the recent years service user’s valuable information has been utilized by unauthorized users and service providers. This paper examines the privacy awareness and importance of user’s secrecy preserving in the current cloud computing era. Gradually the information kept under the cloud environment gets increased due to its elasticity and availability. However, highly sensitive information is in a serious attack from various sources. Once private information gets misused, the probability of privacy breaching increases which thereby reduces user’s trust on cloud providers. In the modern internet world, information management and maintenance is one among the most decisive tasks. Information stored in the cloud by the finance, healthcare, government sectors, etc. makes it all the more challenging since such tasks are to be handled globally. The present scenario therefore demands a new Petri-net Privacy Preserving Framework (PPPF for safeguarding user’s privacy and, providing consistent and breach-less services from the cloud. This paper illustrates the design of PPPF and mitigates the cloud provider’s trust among users. The proposed technique conveys and collaborates with Privacy Preserving Cohesion Technique (PPCT, to develop validate, promote, adapt and also increase the need for data privacy. Moreover, this paper focuses on clinching and verification of unknown user intervention into the confidential data present in storage area and ensuring the performance of the cloud services. It also acts as an information preserving guard for high secrecy data storage areas.

  3. Docencia y libre acceso: el Open Course Ware de la Universitat de València

    Directory of Open Access Journals (Sweden)

    Beatriz Gallardo Paúls

    2008-12-01

    Full Text Available En este artículo presentamos la Oficina OCW de la Universitat de València atendiendo al contexto general de aparición y sus características específicas. En primer lugar, contextualizamos el Open Course Ware en el ámbito de los movimientos Open y repasamos algunas de sus iniciativas. Después nos centramos en la caracterización de los usuarios/destinatarios prototípicos del OCW como “nativos digitales”, atendiendo a la distinción de dos modelos epistemológicos: la inteligencia colectiva (nativos y el paradigma del experto (inmigrantes digitales, algunas de cuyas premisas básicas se explican solamente por la aparición de las tecnologías digitales. Tras esta contextualización teórica, exponemos las características que definen el proyecto OCW, de la Universitat de València

  4. Design and Implementation of Cloud Platform for Intelligent Logistics in the Trend of Intellectualization

    Institute of Scientific and Technical Information of China (English)

    Mengke Yang; Movahedipour Mahmood; Xiaoguang Zhou; Salam Shafaq; Latif Zahid

    2017-01-01

    Intellectualization has become a new trend for telecom industry, driven by in-telligent technology including cloud comput-ing, big data, and Internet of things. In order to satisfy the service demand of intelligent logistics, this paper designed an intelligent logistics platform containing the main ap-plications such as e-commerce, self-service transceiver, big data analysis, path location and distribution optimization. The intelligent logistics service platform has been built based on cloud computing to collect, store and han-dling multi-source heterogeneous mass data from sensors, RFID electronic tag, vehicle ter-minals and APP, so that the open-access cloud services including distribution, positioning, navigation, scheduling and other data services can be provided for the logistics distribution applications. And then the architecture of in-telligent logistics cloud platform containing software layer (SaaS), platform layer (PaaS) and infrastructure (IaaS) has been constructed accordance with the core technology relative high concurrent processing technique, hetero-geneous terminal data access, encapsulation and data mining. Therefore, intelligent logis-tics cloud platform can be carried out by the service mode for implementation to accelerate the construction of the symbiotic win-win logistics ecological system and the benign de-velopment of the ICT industry in the trend of intellectualization in China.

  5. Now and next-generation sequencing techniques: future of sequence analysis using cloud computing.

    Science.gov (United States)

    Thakur, Radhe Shyam; Bandopadhyay, Rajib; Chaudhary, Bratati; Chatterjee, Sourav

    2012-01-01

    Advances in the field of sequencing techniques have resulted in the greatly accelerated production of huge sequence datasets. This presents immediate challenges in database maintenance at datacenters. It provides additional computational challenges in data mining and sequence analysis. Together these represent a significant overburden on traditional stand-alone computer resources, and to reach effective conclusions quickly and efficiently, the virtualization of the resources and computation on a pay-as-you-go concept (together termed "cloud computing") has recently appeared. The collective resources of the datacenter, including both hardware and software, can be available publicly, being then termed a public cloud, the resources being provided in a virtual mode to the clients who pay according to the resources they employ. Examples of public companies providing these resources include Amazon, Google, and Joyent. The computational workload is shifted to the provider, which also implements required hardware and software upgrades over time. A virtual environment is created in the cloud corresponding to the computational and data storage needs of the user via the internet. The task is then performed, the results transmitted to the user, and the environment finally deleted after all tasks are completed. In this discussion, we focus on the basics of cloud computing, and go on to analyze the prerequisites and overall working of clouds. Finally, the applications of cloud computing in biological systems, particularly in comparative genomics, genome informatics, and SNP detection are discussed with reference to traditional workflows.

  6. Retention of Employees in Ceramic Sanitary Ware Factories in India: Role of Work Life Balance, Career Development and Supervisor Support

    Directory of Open Access Journals (Sweden)

    S. Umamaheswari

    2016-05-01

    Full Text Available The study examines the role of work life balance, career development and supervisor support on organization commitment over employees of unattended, ceramic sanitary ware factories in India. It also verifies the influence of organization commitment on retention and its mediating role. Findings reveal that organization commitment influences retention and all the above factors enhance it. Moreover, organization commitment partially mediates the relationship between proposed factors and retention. It also found that organization’s career development provision alone is not enough and need to be modified according to the employer’s expectation. Managerial implications and suggestions for future research were discussed.

  7. Stratocumulus Cloud Top Radiative Cooling and Cloud Base Updraft Speeds

    Science.gov (United States)

    Kazil, J.; Feingold, G.; Balsells, J.; Klinger, C.

    2017-12-01

    Cloud top radiative cooling is a primary driver of turbulence in the stratocumulus-topped marine boundary. A functional relationship between cloud top cooling and cloud base updraft speeds may therefore exist. A correlation of cloud top radiative cooling and cloud base updraft speeds has been recently identified empirically, providing a basis for satellite retrieval of cloud base updraft speeds. Such retrievals may enable analysis of aerosol-cloud interactions using satellite observations: Updraft speeds at cloud base co-determine supersaturation and therefore the activation of cloud condensation nuclei, which in turn co-determine cloud properties and precipitation formation. We use large eddy simulation and an off-line radiative transfer model to explore the relationship between cloud-top radiative cooling and cloud base updraft speeds in a marine stratocumulus cloud over the course of the diurnal cycle. We find that during daytime, at low cloud water path (CWP correlated, in agreement with the reported empirical relationship. During the night, in the absence of short-wave heating, CWP builds up (CWP > 50 g m-2) and long-wave emissions from cloud top saturate, while cloud base heating increases. In combination, cloud top cooling and cloud base updrafts become weakly anti-correlated. A functional relationship between cloud top cooling and cloud base updraft speed can hence be expected for stratocumulus clouds with a sufficiently low CWP and sub-saturated long-wave emissions, in particular during daytime. At higher CWPs, in particular at night, the relationship breaks down due to saturation of long-wave emissions from cloud top.

  8. Identify and rank key factors influencing the adoption of cloud computing for a healthy Electronics

    Directory of Open Access Journals (Sweden)

    Javad Shukuhy

    2015-02-01

    Full Text Available Cloud computing as a new technology with Internet infrastructure and new approaches can be significant benefits in providing medical services electronically. Aplying this technology in E-Health requires consideration of various factors. The main objective of this study is to identify and rank the factors influencing the adoption of e-health cloud. Based on the Technology-Organization-Environment (TOE framework and Human-Organization-Technology fit (HOT-fit model, 16 sub-factors were identified in four major factors. With survey of 60 experts, academics and experts in health information technology and with the help of fuzzy analytic hierarchy process had ranked these sub-factors and factors. In the literature, considering newness this study, no internal or external study, have not alluded these number of criteria. The results show that when deciding to adopt cloud computing in E-Health, respectively, must be considered technological, human, organizational and environmental factors.

  9. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  10. Towards Internet of Things (IOTS):Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing

    OpenAIRE

    Piyare, Rajeev; Lee, Seong Ro

    2013-01-01

    Cloud computing provides great benefits for applications hosted on the Web that also have special computational and storage requirements. This paper proposes an extensible and flexible architecture for integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an interoperable application layer that can be directly integrated into other application domains for remote monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN)...

  11. The Improvement and Performance of Mobile Environment Using Both Cloud and Text Computing

    OpenAIRE

    S.Saravana Kumar; J.Lakshmi Priya; P.Hannah Jennifer; N.Jeff Monica; Fathima

    2013-01-01

    In this research paper presents an design model for file sharing system for ubiquitos mobile devices using both cloud and text computing. File s haring is one of the rationales for computer networks with increasing demand for file sharing ap plications and technologies in small and large enterprise networks and on the Internet. File transfer is an important process in any form of computing as we need to really share the data ac ross. ...

  12. 2008 AESON JOURNAL

    African Journals Online (AJOL)

    OLUWOLE AKINNAGBE

    internet access in the rural areas and high cost of ICTs hard and soft wares, among ..... renewable energy-based power systems (solar photovoltaic (PV), small wind-electric turbines), are ... Fear that things will go wrong in using ICT. 0.78. 0.62.

  13. Electronic Commerce

    Indian Academy of Sciences (India)

    2000-11-30

    Nov 30, 2000 ... switching is that the time taken for a message to reach a destina- tion cannot be predicted. ... internet protocol to allow real-time data transmission also. The routing of data as .... More complex soft- ware agents would be ...

  14. Formation of giant molecular clouds in global spiral structures: the role of orbital dynamics and cloud-cloud collisions

    International Nuclear Information System (INIS)

    Roberts, W.W. Jr.; Stewart, G.R.

    1987-01-01

    The different roles played by orbital dynamics and dissipative cloud-cloud collisions in the formation of giant molecular clouds (GMCs) in a global spiral structure are investigated. The interstellar medium (ISM) is simulated by a system of particles, representing clouds, which orbit in a spiral-perturbed, galactic gravitational field. The overall magnitude and width of the global cloud density distribution in spiral arms is very similar in the collisional and collisionless simulations. The results suggest that the assumed number density and size distribution of clouds and the details of individual cloud-cloud collisions have relatively little effect on these features. Dissipative cloud-cloud collisions play an important steadying role for the cloud system's global spiral structure. Dissipative cloud-cloud collisions also damp the relative velocity dispersion of clouds in massive associations and thereby aid in the effective assembling of GMC-like complexes

  15. Evaluation of Passive Multilayer Cloud Detection Using Preliminary CloudSat and CALIPSO Cloud Profiles

    Science.gov (United States)

    Minnis, P.; Sun-Mack, S.; Chang, F.; Huang, J.; Nguyen, L.; Ayers, J. K.; Spangenberg, D. A.; Yi, Y.; Trepte, C. R.

    2006-12-01

    During the last few years, several algorithms have been developed to detect and retrieve multilayered clouds using passive satellite data. Assessing these techniques has been difficult due to the need for active sensors such as cloud radars and lidars that can "see" through different layers of clouds. Such sensors have been available only at a few surface sites and on aircraft during field programs. With the launch of the CALIPSO and CloudSat satellites on April 28, 2006, it is now possible to observe multilayered systems all over the globe using collocated cloud radar and lidar data. As part of the A- Train, these new active sensors are also matched in time ad space with passive measurements from the Aqua Moderate Resolution Imaging Spectroradiometer (MODIS) and Advanced Microwave Scanning Radiometer - EOS (AMSR-E). The Clouds and the Earth's Radiant Energy System (CERES) has been developing and testing algorithms to detect ice-over-water overlapping cloud systems and to retrieve the cloud liquid path (LWP) and ice water path (IWP) for those systems. One technique uses a combination of the CERES cloud retrieval algorithm applied to MODIS data and a microwave retrieval method applied to AMSR-E data. The combination of a CO2-slicing cloud retireval technique with the CERES algorithms applied to MODIS data (Chang et al., 2005) is used to detect and analyze such overlapped systems that contain thin ice clouds. A third technique uses brightness temperature differences and the CERES algorithms to detect similar overlapped methods. This paper uses preliminary CloudSat and CALIPSO data to begin a global scale assessment of these different methods. The long-term goals are to assess and refine the algorithms to aid the development of an optimal combination of the techniques to better monitor ice 9and liquid water clouds in overlapped conditions.

  16. A Proposed Smart E-Learning System Using Cloud Computing Services: PaaS, IaaS and Web 3.0

    Directory of Open Access Journals (Sweden)

    Dr.Mona M. Nasr

    2012-09-01

    Full Text Available E-learning systems need to improve its infrastructure, which can devote the required computation and storage resources for e-learning systems. Microsoft cloud computing technologies although in their early stages, have managed to change the way applications are going to be developed and accessed. The objective of the paper is to combine various technologies to design architecture which describe E-learning systems. Web 3.0 uses widget aggregation, intelligent retrieval, user interest modeling and semantic annotation. These technologies are aimed at running applications as services over the internet on a flexible infrastructure. Cloud computing provides a low cost solution to academic institutions for their researchers, faculty and learners. In this paper we integrate cloud computing as a platform with web 3.0 for building intelligent e-learning systems.

  17. ADAPTATION OF JOHNSON SEQUENCING ALGORITHM FOR JOB SCHEDULING TO MINIMISE THE AVERAGE WAITING TIME IN CLOUD COMPUTING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    SOUVIK PAL

    2016-09-01

    Full Text Available Cloud computing is an emerging paradigm of Internet-centric business computing where Cloud Service Providers (CSPs are providing services to the customer according to their needs. The key perception behind cloud computing is on-demand sharing of resources available in the resource pool provided by CSP, which implies new emerging business model. The resources are provisioned when jobs arrive. The job scheduling and minimization of waiting time are the challenging issue in cloud computing. When a large number of jobs are requested, they have to wait for getting allocated to the servers which in turn may increase the queue length and also waiting time. This paper includes system design for implementation which is concerned with Johnson Scheduling Algorithm that provides the optimal sequence. With that sequence, service times can be obtained. The waiting time and queue length can be reduced using queuing model with multi-server and finite capacity which improves the job scheduling model.

  18. Predicting Cloud Computing Technology Adoption by Organizations: An Empirical Integration of Technology Acceptance Model and Theory of Planned Behavior

    Science.gov (United States)

    Ekufu, ThankGod K.

    2012-01-01

    Organizations are finding it difficult in today's economy to implement the vast information technology infrastructure required to effectively conduct their business operations. Despite the fact that some of these organizations are leveraging on the computational powers and the cost-saving benefits of computing on the Internet cloud, others…

  19. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  20. Cloud Computing Fundamentals

    Science.gov (United States)

    Furht, Borko

    In the introductory chapter we define the concept of cloud computing and cloud services, and we introduce layers and types of cloud computing. We discuss the differences between cloud computing and cloud services. New technologies that enabled cloud computing are presented next. We also discuss cloud computing features, standards, and security issues. We introduce the key cloud computing platforms, their vendors, and their offerings. We discuss cloud computing challenges and the future of cloud computing.

  1. Relationships among cloud occurrence frequency, overlap, and effective thickness derived from CALIPSO and CloudSat merged cloud vertical profiles

    Science.gov (United States)

    Kato, Seiji; Sun-Mack, Sunny; Miller, Walter F.; Rose, Fred G.; Chen, Yan; Minnis, Patrick; Wielicki, Bruce A.

    2010-01-01

    A cloud frequency of occurrence matrix is generated using merged cloud vertical profiles derived from the satellite-borne Cloud-Aerosol Lidar with Orthogonal Polarization (CALIOP) and cloud profiling radar. The matrix contains vertical profiles of cloud occurrence frequency as a function of the uppermost cloud top. It is shown that the cloud fraction and uppermost cloud top vertical profiles can be related by a cloud overlap matrix when the correlation length of cloud occurrence, which is interpreted as an effective cloud thickness, is introduced. The underlying assumption in establishing the above relation is that cloud overlap approaches random overlap with increasing distance separating cloud layers and that the probability of deviating from random overlap decreases exponentially with distance. One month of Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observation (CALIPSO) and CloudSat data (July 2006) support these assumptions, although the correlation length sometimes increases with separation distance when the cloud top height is large. The data also show that the correlation length depends on cloud top hight and the maximum occurs when the cloud top height is 8 to 10 km. The cloud correlation length is equivalent to the decorrelation distance introduced by Hogan and Illingworth (2000) when cloud fractions of both layers in a two-cloud layer system are the same. The simple relationships derived in this study can be used to estimate the top-of-atmosphere irradiance difference caused by cloud fraction, uppermost cloud top, and cloud thickness vertical profile differences.

  2. A Matchmaking Strategy Of Mixed Resource On Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Wisam Elshareef

    2015-08-01

    Full Text Available Abstract Today cloud computing has become a key technology for online allotment of computing resources and online storage of user data in a lower cost where computing resources are available all the time over the Internet with pay per use concept. Recently there is a growing need for resource management strategies in a cloud computing environment that encompass both end-users satisfaction and a high job submission throughput with appropriate scheduling. One of the major and essential issues in resource management is related to allocate incoming tasks to suitable virtual machine matchmaking. The main objective of this paper is to propose a matchmaking strategy between the incoming requests and various resources in the cloud environment to satisfy the requirements of users and to load balance the workload on resources. Load Balancing is an important aspect of resource management in a cloud computing environment. So this paper proposes a dynamic weight active monitor DWAM load balance algorithm which allocates on the fly the incoming requests to the all available virtual machines in an efficient manner in order to achieve better performance parameters such as response time processing time and resource utilization. The feasibility of the proposed algorithm is analyzed using Cloudsim simulator which proves the superiority of the proposed DWAM algorithm over its counterparts in literature. Simulation results demonstrate that proposed algorithm dramatically improves response time data processing time and more utilized of resource compared Active monitor and VM-assign algorithms.

  3. Management of Virtual Machine as an Energy Conservation in Private Cloud Computing System

    Directory of Open Access Journals (Sweden)

    Fauzi Akhmad

    2016-01-01

    Full Text Available Cloud computing is a service model that is packaged in a base computing resources that can be accessed through the Internet on demand and placed in the data center. Data center architecture in cloud computing environments are heterogeneous and distributed, composed of a cluster of network servers with different capacity computing resources in different physical servers. The problems on the demand and availability of cloud services can be solved by fluctuating data center cloud through abstraction with virtualization technology. Virtual machine (VM is a representation of the availability of computing resources that can be dynamically allocated and reallocated on demand. In this study the consolidation of VM as energy conservation in Private Cloud Computing Systems with the target of process optimization selection policy and migration of the VM on the procedure consolidation. VM environment cloud data center to consider hosting a type of service a particular application at the instance VM requires a different level of computing resources. The results of the use of computing resources on a VM that is not balanced in physical servers can be reduced by using a live VM migration to achieve workload balancing. A practical approach used in developing OpenStack-based cloud computing environment by integrating Cloud VM and VM Placement selection procedure using OpenStack Neat VM consolidation. Following the value of CPU Time used as a fill to get the average value in MHz CPU utilization within a specific time period. The average value of a VM’s CPU utilization in getting from the current CPU_time reduced by CPU_time from the previous data retrieval multiplied by the maximum frequency of the CPU. The calculation result is divided by the making time CPU_time when it is reduced to the previous taking time CPU_time multiplied by milliseconds.

  4. The new inter process communication middle-ware for the ATLAS Trigger and Data Acquisition system

    CERN Document Server

    Kolos, Serguei; The ATLAS collaboration

    2016-01-01

    The ATLAS Trigger & Data Acquisition (TDAQ) project was started almost twenty years ago with the aim of providing scalable distributed data collection system for the experiment. While the software dealing with physics data flow was implemented by directly using the low-level communication protocols, like TCP and UDP, the control and monitoring infrastructure services for the TDAQ system were implemented on top of the CORBA communication middle-ware. CORBA provides a high-level object oriented abstraction for the inter process communication, hiding communication complexity from the developers. This approach speeds up and simplifies development of communication services but incurs some extra cost in terms of performance and resources overhead. Our experience of using CORBA for control and monitoring data exchange in the distributed TDAQ system was very successful, mostly due to the outstanding quality of the CORBA brokers, which have been used in the project: omniORB for C++ and JacORB for Java. However, du...

  5. CloVR: a virtual machine for automated and portable sequence analysis from the desktop using cloud computing.

    Science.gov (United States)

    Angiuoli, Samuel V; Matalka, Malcolm; Gussman, Aaron; Galens, Kevin; Vangala, Mahesh; Riley, David R; Arze, Cesar; White, James R; White, Owen; Fricke, W Florian

    2011-08-30

    Next-generation sequencing technologies have decentralized sequence acquisition, increasing the demand for new bioinformatics tools that are easy to use, portable across multiple platforms, and scalable for high-throughput applications. Cloud computing platforms provide on-demand access to computing infrastructure over the Internet and can be used in combination with custom built virtual machines to distribute pre-packaged with pre-configured software. We describe the Cloud Virtual Resource, CloVR, a new desktop application for push-button automated sequence analysis that can utilize cloud computing resources. CloVR is implemented as a single portable virtual machine (VM) that provides several automated analysis pipelines for microbial genomics, including 16S, whole genome and metagenome sequence analysis. The CloVR VM runs on a personal computer, utilizes local computer resources and requires minimal installation, addressing key challenges in deploying bioinformatics workflows. In addition CloVR supports use of remote cloud computing resources to improve performance for large-scale sequence processing. In a case study, we demonstrate the use of CloVR to automatically process next-generation sequencing data on multiple cloud computing platforms. The CloVR VM and associated architecture lowers the barrier of entry for utilizing complex analysis protocols on both local single- and multi-core computers and cloud systems for high throughput data processing.

  6. Clustering, randomness, and regularity in cloud fields: 2. Cumulus cloud fields

    Science.gov (United States)

    Zhu, T.; Lee, J.; Weger, R. C.; Welch, R. M.

    1992-12-01

    During the last decade a major controversy has been brewing concerning the proper characterization of cumulus convection. The prevailing view has been that cumulus clouds form in clusters, in which cloud spacing is closer than that found for the overall cloud field and which maintains its identity over many cloud lifetimes. This "mutual protection hypothesis" of Randall and Huffman (1980) has been challenged by the "inhibition hypothesis" of Ramirez et al. (1990) which strongly suggests that the spatial distribution of cumuli must tend toward a regular distribution. A dilemma has resulted because observations have been reported to support both hypotheses. The present work reports a detailed analysis of cumulus cloud field spatial distributions based upon Landsat, Advanced Very High Resolution Radiometer, and Skylab data. Both nearest-neighbor and point-to-cloud cumulative distribution function statistics are investigated. The results show unequivocally that when both large and small clouds are included in the cloud field distribution, the cloud field always has a strong clustering signal. The strength of clustering is largest at cloud diameters of about 200-300 m, diminishing with increasing cloud diameter. In many cases, clusters of small clouds are found which are not closely associated with large clouds. As the small clouds are eliminated from consideration, the cloud field typically tends towards regularity. Thus it would appear that the "inhibition hypothesis" of Ramirez and Bras (1990) has been verified for the large clouds. However, these results are based upon the analysis of point processes. A more exact analysis also is made which takes into account the cloud size distributions. Since distinct clouds are by definition nonoverlapping, cloud size effects place a restriction upon the possible locations of clouds in the cloud field. The net effect of this analysis is that the large clouds appear to be randomly distributed, with only weak tendencies towards

  7. e-Health Cloud: Opportunities and Challenges

    Directory of Open Access Journals (Sweden)

    Jameela Al-Jaroodi

    2012-07-01

    Full Text Available As the costs of healthcare services rise and healthcare professionals are becoming scarce and hard to find, it is imminent that healthcare organizations consider adopting health information technology (HIT systems. HIT allows health organizations to streamline many of their processes and provide services in a more efficient and cost-effective manner. The latest technological trends such as Cloud Computing (CC provide a strong infrastructure and offer a true enabler for HIT services over the Internet. This can be achieved on a pay-as-you-use model of the “e-Health Cloud” to help the healthcare industry cope with current and future demands yet keeping their costs to a minimum. Despite its great potential, HIT as a CC model has not been addressed extensively in the literature. There are no apparent frameworks which clearly encompass all viable schemes and interrelationships between HIT and CC. Therefore, analyzing and comparing the effectiveness of such schemes is important. In this paper we introduce the concept of “e-Health Cloud” highlighting many of its constituents and proposing building an e-health environment and elucidating many of the challenges confronting the success of the e-Health Cloud. We will also discuss different possible solutions to address challenges such as security and privacy.

  8. Ambient hemolysis and activation of coagulation is different between HeartMate II and HeartWare left ventricular assist devices.

    Science.gov (United States)

    Birschmann, Ingvild; Dittrich, Marcus; Eller, Thomas; Wiegmann, Bettina; Reininger, Armin J; Budde, Ulrich; Strüber, Martin

    2014-01-01

    Thromboembolic and bleeding events in patients with a left ventricular assist device (LVAD) are still a major cause of complications. Therefore, the balance between anti-coagulant and pro-coagulant factors needs to be tightly controlled. The principle hypothesis of this study is that different pump designs may have an effect on hemolysis and activation of the coagulation system. Referring to this, the HeartMate II (HMII; Thoratec Corp, Pleasanton, CA) and the HeartWare HVAD (HeartWare International Inc, Framingham, MA) were investigated. For 20 patients with LVAD support (n = 10 each), plasma coagulation, full blood count, and clinical chemistry parameters were measured. Platelet function was monitored using platelet aggregometry, platelet function analyzer-100 system ( Siemens, Marburg, Germany), vasodilator-stimulated phosphoprotein phosphorylation assay, immature platelet fraction, platelet-derived microparticles, and von Willebrand diagnostic. Acquired von Willebrand syndrome could be detected in all patients. Signs of hemolysis, as measured by lactate dehydrogenase levels (mean, 470 U/liter HMII, 250 U/liter HVAD; p < 0.001), were more pronounced in the HMII patients. In contrast, D-dimer analysis indicated a significantly higher activation of the coagulation system in HVAD patients (mean, 0.94 mg/liter HMII, 2.01 mg/liter HVAD; p < 0.01). The efficacy of anti-platelet therapy using clopidogrel was not sufficient in more than 50% of the patients. Our results support the finding that all patients with rotary blood pumps suffered from von Willebrand syndrome. In addition, a distinct footprint of effects on hemolysis and the coagulation system can be attributed to different devices. As a consequence, the individual status of the coagulation system needs to be controlled in long-term patients. © 2013 Published by International Society for the Heart and Lung Transplantation on behalf of International Society for Heart and Lung Transplantation.

  9. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  10. Hydrogeologic data from the US Geological Survey test wells near Waycross, Ware County, Georgia

    Science.gov (United States)

    Matthews, S.E.; Krause, R.E.

    1983-01-01

    Two wells were constructed near Waycross, Ware County, Georgia, from July 1980 to May 1981 to collect stratigraphic, structural, geophysical, hydrologic, hydraulic, and geochemical information for the U.S. Geological Survey Tertiary Limestone Regional Aquifer-System Analysis. Data collection included geologic sampling and coring, borehole geophysical logging, packer testing, water-level measuring, water-quality sampling, and aquifer testing. In the study area, the Tertiary limestone aquifer system is about 1,300 feet thick and is confined and overlain by about 610 feet of clastic sediments. The aquifer system consists of limestone, dolomite, and minor evaporites and has high porosity and permeability. A 4-day continuous discharge aquifer test was conducted, from which a transmissivity of about 1 million feet squared per day and a storage coefficient of 0.0001 were calculated. Water from the upper part of the aquifer is of a calcium bicarbonate type. The deeper highly mineralized zone produces a sodium bicarbonate type water in which concentrations of magnesium, sulfate, chloride, sodium, and some trace metals increase with depth. (USGS)

  11. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    Billions of devices are connected to the Internet nowadays, and the number will continue to grow in the future thanks to the advances in the electronics and telecommunication technology developments. Its application in broad aspects of human’s life brings a lot of benefits by improving productivity...... and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of Io......T have shown that the concern about the security and privacy play a huge role for the mass adoption of the IoT/M2M as cloud services. Among the important topics within the security and privacy, the access control is an important mechanism, which essentially manages how the important assets or resource...

  12. SocialCloudShare: a Facebook Application for a Relationship-based Information Sharing in the Cloud

    Directory of Open Access Journals (Sweden)

    Davide Albertini

    2014-10-01

    Full Text Available In last few years, Online Social Networks (OSNs have become one of the most used platforms for sharing data (e.g., pictures, short texts on the Internet. Nowadays Facebook and Twitter are the most popular OSN providers, though they implement different social models. However, independently from the social model they implement, OSN platforms have become a widespread repository of personal information. All these data (e.g., profile information, shared elements, users’ likes are stored in a centralized repository that can be exploited for data mining and marketing analysis. With this data collection process, lots of sensitive information are gathered by OSN providers that, in time, have become more and more targeted by malicious attackers. To overcome this problem, in this paper we present an architectural framework that, by means of a Social Application registered in Facebook, allows users to move their data (e.g., relationships, resources outside the OSN realm and to store them in the public Cloud. Given that the public Cloud is not a secure and private environment, our proposal provides users security and privacy guarantees over their data by encrypting the resources and by anonymizing their social graphs. The presented framework enforces Relationship-Based Access Control (ReBAC rules over the anonymized social graph, providing OSN users the possibility to selectively share information and resources as they are used to do in Facebook.

  13. Now And Next Generation Sequencing Techniques: Future of Sequence Analysis using Cloud Computing

    Directory of Open Access Journals (Sweden)

    Radhe Shyam Thakur

    2012-12-01

    Full Text Available Advancements in the field of sequencing techniques resulted in the huge sequenced data to be produced at a very faster rate. It is going cumbersome for the datacenter to maintain the databases. Data mining and sequence analysis approaches needs to analyze the databases several times to reach any efficient conclusion. To cope with such overburden on computer resources and to reach efficient and effective conclusions quickly, the virtualization of the resources and computation on pay as you go concept was introduced and termed as cloud computing. The datacenter’s hardware and software is collectively known as cloud which when available publicly is termed as public cloud. The datacenter’s resources are provided in a virtual mode to the clients via a service provider like Amazon, Google and Joyent which charges on pay as you go manner. The workload is shifted to the provider which is maintained by the required hardware and software upgradation. The service provider manages it by upgrading the requirements in the virtual mode. Basically a virtual environment is created according to the need of the user by taking permission from datacenter via internet, the task is performed and the environment is deleted after the task is over. In this discussion, we are focusing on the basics of cloud computing, the prerequisites and overall working of clouds. Furthermore, briefly the applications of cloud computing in biological systems, especially in comparative genomics, genome informatics and SNP detection with reference to traditional workflow are discussed.

  14. Cloud occurrences and cloud radiative effects (CREs) from CERES-CALIPSO-CloudSat-MODIS (CCCM) and CloudSat radar-lidar (RL) products

    Science.gov (United States)

    Ham, Seung-Hee; Kato, Seiji; Rose, Fred G.; Winker, David; L'Ecuyer, Tristan; Mace, Gerald G.; Painemal, David; Sun-Mack, Sunny; Chen, Yan; Miller, Walter F.

    2017-08-01

    Two kinds of cloud products obtained from Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observation (CALIPSO), CloudSat, and Moderate Resolution Imaging Spectroradiometer (MODIS) are compared and analyzed in this study: Clouds and the Earth's Radiant Energy System (CERES)-CALIPSO-CloudSat-MODIS (CCCM) product and CloudSat radar-lidar products such as GEOPROF-LIDAR and FLXHR-LIDAR. Compared to GEOPROF-LIDAR, low-level (40°). The difference occurs when hydrometeors are detected by CALIPSO lidar but are undetected by CloudSat radar. In the comparison of cloud radiative effects (CREs), global mean differences between CCCM and FLXHR-LIDAR are mostly smaller than 5 W m-2, while noticeable regional differences are found. For example, CCCM shortwave (SW) and longwave (LW) CREs are larger than FXLHR-LIDAR along the west coasts of Africa and America because the GEOPROF-LIDAR algorithm misses shallow marine boundary layer clouds. In addition, FLXHR-LIDAR SW CREs are larger than the CCCM counterpart over tropical oceans away from the west coasts of America. Over midlatitude storm-track regions, CCCM SW and LW CREs are larger than the FLXHR-LIDAR counterpart.

  15. The Future Internet: A World of Secret Shares

    Directory of Open Access Journals (Sweden)

    William J. Buchanan

    2015-11-01

    Full Text Available The Public Key Infrastructure (PKI is crumbling, partially due to the lack of a strong understanding of how encryption actually works, but also due to weaknesses in its implementation. This paper outlines an Internet storage technique using secret sharing methods which could be used to overcome the problems inherent with PKI, while supporting new types of architectures incorporating such things as automated failover and break-glass data recovery. The paper outlines a novel architecture: SECRET, which supports a robust cloud-based infrastructure with in-built privacy and failover. In order to understand the performance overhead of SECRET, the paper outlines a range of experiments that investigate the overhead of this and other secret share methods.

  16. Relation of Cloud Occurrence Frequency, Overlap, and Effective Thickness Derived from CALIPSO and CloudSat Merged Cloud Vertical Profiles

    Science.gov (United States)

    Kato, Seiji; Sun-Mack, Sunny; Miller, Walter F.; Rose, Fred G.; Chen, Yan; Minnis, Patrick; Wielicki, Bruce A.

    2009-01-01

    A cloud frequency of occurrence matrix is generated using merged cloud vertical profile derived from Cloud-Aerosol Lidar with Orthogonal Polarization (CALIOP) and Cloud Profiling Radar (CPR). The matrix contains vertical profiles of cloud occurrence frequency as a function of the uppermost cloud top. It is shown that the cloud fraction and uppermost cloud top vertical pro les can be related by a set of equations when the correlation distance of cloud occurrence, which is interpreted as an effective cloud thickness, is introduced. The underlying assumption in establishing the above relation is that cloud overlap approaches the random overlap with increasing distance separating cloud layers and that the probability of deviating from the random overlap decreases exponentially with distance. One month of CALIPSO and CloudSat data support these assumptions. However, the correlation distance sometimes becomes large, which might be an indication of precipitation. The cloud correlation distance is equivalent to the de-correlation distance introduced by Hogan and Illingworth [2000] when cloud fractions of both layers in a two-cloud layer system are the same.

  17. Wearable Internet of Things - from human activity tracking to clinical integration.

    Science.gov (United States)

    Kumari, Poonam; Lopez-Benitez, Miguel; Gyu Myoung Lee; Tae-Seong Kim; Minhas, Atul S

    2017-07-01

    Wearable devices for human activity tracking have been emerging rapidly. Most of them are capable of sending health statistics to smartphones, smartwatches or smart bands. However, they only provide the data for individual analysis and their data is not integrated into clinical practice. Leveraging on the Internet of Things (IoT), edge and cloud computing technologies, we propose an architecture which is capable of providing cloud based clinical services using human activity data. Such services could supplement the shortage of staff in primary healthcare centers thereby reducing the burden on healthcare service providers. The enormous amount of data created from such services could also be utilized for planning future therapies by studying recovery cycles of existing patients. We provide a prototype based on our architecture and discuss its salient features. We also provide use cases of our system in personalized and home based healthcare services. We propose an International Telecommunication Union based standardization (ITU-T) for our design and discuss future directions in wearable IoT.

  18. Contrasting Cloud Composition Between Coupled and Decoupled Marine Boundary Layer Clouds

    Science.gov (United States)

    WANG, Z.; Mora, M.; Dadashazar, H.; MacDonald, A.; Crosbie, E.; Bates, K. H.; Coggon, M. M.; Craven, J. S.; Xian, P.; Campbell, J. R.; AzadiAghdam, M.; Woods, R. K.; Jonsson, H.; Flagan, R. C.; Seinfeld, J.; Sorooshian, A.

    2016-12-01

    Marine stratocumulus clouds often become decoupled from the vertical layer immediately above the ocean surface. This study contrasts cloud chemical composition between coupled and decoupled marine stratocumulus clouds. Cloud water and droplet residual particle composition were measured in clouds off the California coast during three airborne experiments in July-August of separate years (E-PEACE 2011, NiCE 2013, BOAS 2015). Decoupled clouds exhibited significantly lower overall mass concentrations in both cloud water and droplet residual particles, consistent with reduced cloud droplet number concentration and sub-cloud aerosol (Dp > 100 nm) number concentration, owing to detachment from surface sources. Non-refractory sub-micrometer aerosol measurements show that coupled clouds exhibit higher sulfate mass fractions in droplet residual particles, owing to more abundant precursor emissions from the ocean and ships. Consequently, decoupled clouds exhibited higher mass fractions of organics, nitrate, and ammonium in droplet residual particles, owing to effects of long-range transport from more distant sources. Total cloud water mass concentration in coupled clouds was dominated by sodium and chloride, and their mass fractions and concentrations exceeded those in decoupled clouds. Conversely, with the exception of sea salt constituents (e.g., Cl, Na, Mg, K), cloud water mass fractions of all species examined were higher in decoupled clouds relative to coupled clouds. These results suggest that an important variable is the extent to which clouds are coupled to the surface layer when interpreting microphysical data relevant to clouds and aerosol particles.

  19. Internet of Things from hype to reality the road to digitization

    CERN Document Server

    Rayes, Ammar

    2017-01-01

    This book comprehensively describes an end-to-end Internet of Things (IoT) architecture that is comprised of devices, network, compute, storage, platform, and applications along with management and security components. It is organized into five main parts, comprising of a total of 11 chapters. Part I presents a generic IoT reference model to establish a common vocabulary for IoT solutions. This includes a detailed description of the Internet protocol layers and the Things (sensors and actuators) as well as the key business drivers to realize the IoT vision. Part II focuses on the IoT requirements that impact networking protocols and provides a layer-by-layer walkthrough of the protocol stack with emphasis on industry progress and key gaps. Part III introduces the concept of Fog computing and describes the drivers for the technology, its constituent elements, and how it relates and differs from Cloud computing. Part IV discusses the IoT services platform, the cornerstone of the solution followed by the Securit...

  20. Context-aware distributed cloud computing using CloudScheduler

    Science.gov (United States)

    Seuster, R.; Leavett-Brown, CR; Casteels, K.; Driemel, C.; Paterson, M.; Ring, D.; Sobie, RJ; Taylor, RP; Weldon, J.

    2017-10-01

    The distributed cloud using the CloudScheduler VM provisioning service is one of the longest running systems for HEP workloads. It has run millions of jobs for ATLAS and Belle II over the past few years using private and commercial clouds around the world. Our goal is to scale the distributed cloud to the 10,000-core level, with the ability to run any type of application (low I/O, high I/O and high memory) on any cloud. To achieve this goal, we have been implementing changes that utilize context-aware computing designs that are currently employed in the mobile communication industry. Context-awareness makes use of real-time and archived data to respond to user or system requirements. In our distributed cloud, we have many opportunistic clouds with no local HEP services, software or storage repositories. A context-aware design significantly improves the reliability and performance of our system by locating the nearest location of the required services. We describe how we are collecting and managing contextual information from our workload management systems, the clouds, the virtual machines and our services. This information is used not only to monitor the system but also to carry out automated corrective actions. We are incrementally adding new alerting and response services to our distributed cloud. This will enable us to scale the number of clouds and virtual machines. Further, a context-aware design will enable us to run analysis or high I/O application on opportunistic clouds. We envisage an open-source HTTP data federation (for example, the DynaFed system at CERN) as a service that would provide us access to existing storage elements used by the HEP experiments.

  1. AceCloud: Molecular Dynamics Simulations in the Cloud.

    Science.gov (United States)

    Harvey, M J; De Fabritiis, G

    2015-05-26

    We present AceCloud, an on-demand service for molecular dynamics simulations. AceCloud is designed to facilitate the secure execution of large ensembles of simulations on an external cloud computing service (currently Amazon Web Services). The AceCloud client, integrated into the ACEMD molecular dynamics package, provides an easy-to-use interface that abstracts all aspects of interaction with the cloud services. This gives the user the experience that all simulations are running on their local machine, minimizing the learning curve typically associated with the transition to using high performance computing services.

  2. VMware private cloud computing with vCloud director

    CERN Document Server

    Gallagher, Simon

    2013-01-01

    It's All About Delivering Service with vCloud Director Empowered by virtualization, companies are not just moving into the cloud, they're moving into private clouds for greater security, flexibility, and cost savings. However, this move involves more than just infrastructure. It also represents a different business model and a new way to provide services. In this detailed book, VMware vExpert Simon Gallagher makes sense of private cloud computing for IT administrators. From basic cloud theory and strategies for adoption to practical implementation, he covers all the issues. You'll lea

  3. Monogràfic "VI Congrés Internet, Dret i Política. Cloud Computing: El Dret i la Política Pugen al Núvol"

    Directory of Open Access Journals (Sweden)

    Estudis de Dret i Ciència Política

    2011-01-01

    Full Text Available

    L'any 2010 és l'any cloud computing. Així ho afirmen nombrosos analistes i especialistes que veuen que s'expandeixen aplicacions que, en lloc de ser executades a l'ordinador de sobretaula o al portàtil, són hostatjades en un servidor, i a les quals s'accedeix mitjançant un navegador qualsevol. Aquesta expansió és facilitada per la massiva adopció d'ordinadors ultraportàtils i telèfons mòbils intel·ligents, així com per la creixent realitat del teletreball i la col·laboració en xarxa entre administracions, empreses i ciutadans.

    Tenir les dades, els documents de text, els fulls de càlcul, les aplicacions de gestió de clients o d'estocs, i la coordinació de processos i projectes emmagatzemats en servidors de tercers; fer passar les comunicacions personals i professionals per un navegador, o obrir la nostra participació ciutadana a tothom són possibilitats que ens ofereixen noves oportunitats, però també nous reptes sobre com entenem la feina, les relacions professionals o l'exercici de la democràcia.

    Aquests reptes i oportunitats van constituir el punt de trobada de la sisena edició del Congrés Internacional IDP - Internet, Dret i Política, que es va centrar a analitzar i debatre els diferents problemes jurídics i polítics que planteja o pot plantejar la massiva extensió del cloud computing tant a escala professional com personal i ciutadana.

  4. Multicriteria Resource Brokering in Cloud Computing for Streaming Service

    Directory of Open Access Journals (Sweden)

    Chih-Lun Chou

    2015-01-01

    Full Text Available By leveraging cloud computing such as Infrastructure as a Service (IaaS, the outsourcing of computing resources used to support operations, including servers, storage, and networking components, is quite beneficial for various providers of Internet application. With this increasing trend, resource allocation that both assures QoS via Service Level Agreement (SLA and avoids overprovisioning in order to reduce cost becomes a crucial priority and challenge in the design and operation of complex service-based platforms such as streaming service. On the other hand, providers of IaaS also concern their profit performance and energy consumption while offering these virtualized resources. In this paper, considering both service-oriented and infrastructure-oriented criteria, we regard this resource allocation problem as Multicriteria Decision Making problem and propose an effective trade-off approach based on goal programming model. To validate its effectiveness, a cloud architecture for streaming application is addressed and extensive analysis is performed for related criteria. The results of numerical simulations show that the proposed approach strikes a balance between these conflicting criteria commendably and achieves high cost efficiency.

  5. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.

    Science.gov (United States)

    Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan

    2017-12-15

    As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

  6. Effect of preparation variables of plaster molds for slip casting of sanitary ware

    Directory of Open Access Journals (Sweden)

    Rafael E. Ochoa

    2017-11-01

    Full Text Available A full factorial design was used to evaluate the effect of various preparation conditions for making plaster molds for slip casting of sanitary ware. We investigated the relationships between the processing conditions, microstructure, and final properties of the plaster molds. The results showed that the rheological behavior, and hence, the time during which the plaster suspension is pourable for making the plaster molds (before an important increase in viscosity due to the precipitation of gypsum crystals were dependent on the preparation conditions. Variations in the chemical composition, pore size distribution, and microstructure explained the statistically significant effect of preparation variables (including the mixing time, water temperature, and water quality. Preparation conditions that promoted high initial viscosity of the plaster suspension (accelerative effect of the setting time developed less porous structure in the mold that principally increased the compressive strength (16%, deionized water instead of tap water and the casting rate (9%, water at 25 °C instead of 38 °C. According to the results are proposed optimum conditions to make the molds while avoiding unnecessary energy use. Resumen: Mediante un diseño factorial completo se evaluaron diferentes condiciones de preparación de moldes de yeso para colado tradicional de muebles sanitarios. Se investigó la relación entre procesamiento, microestructura y propiedades del molde. Los resultados mostraron que el comportamiento reológico y por lo tanto el tiempo durante el cual la suspensión de yeso se puede verter para conformar los moldes (antes de un incremento importante de viscosidad debido a la formación de cristales de yeso fueron dependientes de las condiciones de preparación. Variaciones en composición química, distribución de tamaño de poro y microestructura explicaron el efecto estadísticamente significativo de las variables de preparación (que incluyeron

  7. Untangling the Relationship between Internet Anxiety and Internet Identification in Students: The Role of Internet Self-Efficacy

    Science.gov (United States)

    Hsiao, Bo; Zhu, Yu-Qian; Chen, Li-Yueh

    2017-01-01

    Introduction: Previous research has identified Internet anxiety and Internet identification as two important factors that predict usage and experience on the Internet. However, little is known about the relationship between them. This research aimed to untangle the relationship between Internet anxiety and Internet identification, and to…

  8. CIMIDx: Prototype for a Cloud-Based System to Support Intelligent Medical Image Diagnosis With Efficiency.

    Science.gov (United States)

    Bhavani, Selvaraj Rani; Senthilkumar, Jagatheesan; Chilambuchelvan, Arul Gnanaprakasam; Manjula, Dhanabalachandran; Krishnamoorthy, Ramasamy; Kannan, Arputharaj

    2015-03-27

    The Internet has greatly enhanced health care, helping patients stay up-to-date on medical issues and general knowledge. Many cancer patients use the Internet for cancer diagnosis and related information. Recently, cloud computing has emerged as a new way of delivering health services but currently, there is no generic and fully automated cloud-based self-management intervention for breast cancer patients, as practical guidelines are lacking. We investigated the prevalence and predictors of cloud use for medical diagnosis among women with breast cancer to gain insight into meaningful usage parameters to evaluate the use of generic, fully automated cloud-based self-intervention, by assessing how breast cancer survivors use a generic self-management model. The goal of this study was implemented and evaluated with a new prototype called "CIMIDx", based on representative association rules that support the diagnosis of medical images (mammograms). The proposed Cloud-Based System Support Intelligent Medical Image Diagnosis (CIMIDx) prototype includes two modules. The first is the design and development of the CIMIDx training and test cloud services. Deployed in the cloud, the prototype can be used for diagnosis and screening mammography by assessing the cancers detected, tumor sizes, histology, and stage of classification accuracy. To analyze the prototype's classification accuracy, we conducted an experiment with data provided by clients. Second, by monitoring cloud server requests, the CIMIDx usage statistics were recorded for the cloud-based self-intervention groups. We conducted an evaluation of the CIMIDx cloud service usage, in which browsing functionalities were evaluated from the end-user's perspective. We performed several experiments to validate the CIMIDx prototype for breast health issues. The first set of experiments evaluated the diagnostic performance of the CIMIDx framework. We collected medical information from 150 breast cancer survivors from hospitals

  9. Creating cloud-free Landsat ETM+ data sets in tropical landscapes: cloud and cloud-shadow removal

    Science.gov (United States)

    Sebastián Martinuzzi; William A. Gould; Olga M. Ramos Gonzalez

    2007-01-01

    Clouds and cloud shadows are common features of visible and infrared remotelysensed images collected from many parts of the world, particularly in humid and tropical regions. We have developed a simple and semiautomated method to mask clouds and shadows in Landsat ETM+ imagery, and have developed a recent cloud-free composite of multitemporal images for Puerto Rico and...

  10. Dynamic resource allocation engine for cloud-based real-time video transcoding in mobile cloud computing environments

    Science.gov (United States)

    Adedayo, Bada; Wang, Qi; Alcaraz Calero, Jose M.; Grecos, Christos

    2015-02-01

    The recent explosion in video-related Internet traffic has been driven by the widespread use of smart mobile devices, particularly smartphones with advanced cameras that are able to record high-quality videos. Although many of these devices offer the facility to record videos at different spatial and temporal resolutions, primarily with local storage considerations in mind, most users only ever use the highest quality settings. The vast majority of these devices are optimised for compressing the acquired video using a single built-in codec and have neither the computational resources nor battery reserves to transcode the video to alternative formats. This paper proposes a new low-complexity dynamic resource allocation engine for cloud-based video transcoding services that are both scalable and capable of being delivered in real-time. Firstly, through extensive experimentation, we establish resource requirement benchmarks for a wide range of transcoding tasks. The set of tasks investigated covers the most widely used input formats (encoder type, resolution, amount of motion and frame rate) associated with mobile devices and the most popular output formats derived from a comprehensive set of use cases, e.g. a mobile news reporter directly transmitting videos to the TV audience of various video format requirements, with minimal usage of resources both at the reporter's end and at the cloud infrastructure end for transcoding services.

  11. Internet gambling is a predictive factor of Internet addictive behavior.

    Science.gov (United States)

    Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis

    2013-12-01

    Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus. Anonymous self-completed questionnaires were used including the Internet Addiction Test and the Strengths and Difficulties Questionnaire. Among the study population (n = 805), approximately one third (n = 28; 34.9%) reported Internet gambling. Internet gamblers were twice as likely to utilize Internet café portals (adjusted odds ratio for gender and age, AOR: 2.13; 95% confidence interval, 95% CI: 1.56-2.91) for interactive game-playing (AOR: 6.84; 95% CI: 4.23-11.07), chat-rooms (AOR: 2.57; 95% CI: 1.31-4.85), and retrieval of sexual information (AOR: 1.99; 95% CI: 1.42-2.81). Among Internet gamblers 26.0% (n = 73) reported borderline addictive Internet use and 4.3% (n = 12) addictive behavior. Internet gamblers more often had comprehensive psychosocial and emotional maladjustment (AOR: 4.00; 95% CI: 1.97-8.13), including Abnormal Conduct Problems (AOR: 3.26; 95% CI: 2.00-5.32), Emotional Symptoms (AOR: 1.78; 95% CI: 1.02-3.11), and Peer Problems (AOR: 2.44; 95% CI: 1.08-5.48) scores. The multivariate regression analyses indicated that the single independent predictor associated with Internet addictive behavior was Internet gambling (AOR: 5.66; 95% CI: 1.45-22.15). Internet gambling is associated with addictive Internet use, as well as emotional maladjustment and behavioral problems, among Cypriot adolescents. Longitudinal studies are needed to elucidate whether Internet gambling constitutes a risk factor for the development of Internet addictive behavior among adolescents.

  12. UWSim, an underwater robotic simulator on the cloud as educational tool

    Directory of Open Access Journals (Sweden)

    Javier Pérez

    2017-12-01

    Full Text Available Due to the introduction of robotic applications in the modern society, such as service robots or self-driving cars, it is possible to use this trend as motivating factor in the learning process of robotics. Several possibilities about how to use this motivation to increase learning rate are analysed, focusing on underwater robotic simulators. Moreover, a cloud learning environment able to evaluate the students with a robotic simulator is proposed as key element of the system. These kinds of tools can be used with just an Internet-capable system through a web browser, reaching a virtually unlimited amount of resources. The implemented features are used in a underwater pipe following application, creating a comparison environment on the cloud that immerse students in a competition to reach the best possible result. Finally, a first experience in a real educational environment using the proposed tool is detailed, demonstrating the viability and suitability of the proposed tool.

  13. Zen of cloud learning cloud computing by examples on Microsoft Azure

    CERN Document Server

    Bai, Haishi

    2014-01-01

    Zen of Cloud: Learning Cloud Computing by Examples on Microsoft Azure provides comprehensive coverage of the essential theories behind cloud computing and the Windows Azure cloud platform. Sharing the author's insights gained while working at Microsoft's headquarters, it presents nearly 70 end-to-end examples with step-by-step guidance on implementing typical cloud-based scenarios.The book is organized into four sections: cloud service fundamentals, cloud solutions, devices and cloud, and system integration and project management. Each chapter contains detailed exercises that provide readers w

  14. An Intelligent Cloud Storage Gateway for Medical Imaging.

    Science.gov (United States)

    Viana-Ferreira, Carlos; Guerra, António; Silva, João F; Matos, Sérgio; Costa, Carlos

    2017-09-01

    Historically, medical imaging repositories have been supported by indoor infrastructures. However, the amount of diagnostic imaging procedures has continuously increased over the last decades, imposing several challenges associated with the storage volume, data redundancy and availability. Cloud platforms are focused on delivering hardware and software services over the Internet, becoming an appealing solution for repository outsourcing. Although this option may bring financial and technological benefits, it also presents new challenges. In medical imaging scenarios, communication latency is a critical issue that still hinders the adoption of this paradigm. This paper proposes an intelligent Cloud storage gateway that optimizes data access times. This is achieved through a new cache architecture that combines static rules and pattern recognition for eviction and prefetching. The evaluation results, obtained from experiments over a real-world dataset, show that cache hit ratios can reach around 80%, leading to reductions of image retrieval times by over 60%. The combined use of eviction and prefetching policies proposed can significantly reduce communication latency, even when using a small cache in comparison to the total size of the repository. Apart from the performance gains, the proposed system is capable of adjusting to specific workflows of different institutions.

  15. TURBULENCE DECAY AND CLOUD CORE RELAXATION IN MOLECULAR CLOUDS

    International Nuclear Information System (INIS)

    Gao, Yang; Law, Chung K.; Xu, Haitao

    2015-01-01

    The turbulent motion within molecular clouds is a key factor controlling star formation. Turbulence supports molecular cloud cores from evolving to gravitational collapse and hence sets a lower bound on the size of molecular cloud cores in which star formation can occur. On the other hand, without a continuous external energy source maintaining the turbulence, such as in molecular clouds, the turbulence decays with an energy dissipation time comparable to the dynamic timescale of clouds, which could change the size limits obtained from Jean's criterion by assuming constant turbulence intensities. Here we adopt scaling relations of physical variables in decaying turbulence to analyze its specific effects on the formation of stars. We find that the decay of turbulence provides an additional approach for Jeans' criterion to be achieved, after which gravitational infall governs the motion of the cloud core. This epoch of turbulence decay is defined as cloud core relaxation. The existence of cloud core relaxation provides a more complete understanding of the effect of the competition between turbulence and gravity on the dynamics of molecular cloud cores and star formation

  16. Analysis of performance measures to handle medical E-commerce shopping cart abandonment in cloud

    Directory of Open Access Journals (Sweden)

    Vedhanayagam Priya

    Full Text Available The E-commerce zone is crowded with many Internet users. Medical E-commerce has had significant growth in part because of a great deal of growth in the Indian E-commerce field. Medical E-commerce sites use cloud computing to guarantee a high quality of service anywhere and anytime in the world. For online access, the customer's expectations are very high. Medical E-commerce retailers are directed towards cloud service providers based on their quality of service. During online shopping, impatient customers may abandon a specific medical E-commerce shopping cart due to slow response. This is quite difficult to endure for a medical E-commerce firm. The research described herein observed the effect of shopping cart abandonment on medical E-commerce websites deployed in cloud computing. The impact of the idle virtual machine on customer impatience during medical E-commerce shopping was also studied. The ultimate aim of this study was to propose a stochastic queueing model and to yield results through probability generating functions. The results of the model may be highly useful for a medical E-commerce firm facing customer impatience, so as to design its service system to offer satisfactory quality of service. Keywords: Cloud computing, Queueing, Virtual machine, E-commerce, Cart abandonment, Quality of Service

  17. Accelerating statistical image reconstruction algorithms for fan-beam x-ray CT using cloud computing

    Science.gov (United States)

    Srivastava, Somesh; Rao, A. Ravishankar; Sheinin, Vadim

    2011-03-01

    Statistical image reconstruction algorithms potentially offer many advantages to x-ray computed tomography (CT), e.g. lower radiation dose. But, their adoption in practical CT scanners requires extra computation power, which is traditionally provided by incorporating additional computing hardware (e.g. CPU-clusters, GPUs, FPGAs etc.) into a scanner. An alternative solution is to access the required computation power over the internet from a cloud computing service, which is orders-of-magnitude more cost-effective. This is because users only pay a small pay-as-you-go fee for the computation resources used (i.e. CPU time, storage etc.), and completely avoid purchase, maintenance and upgrade costs. In this paper, we investigate the benefits and shortcomings of using cloud computing for statistical image reconstruction. We parallelized the most time-consuming parts of our application, the forward and back projectors, using MapReduce, the standard parallelization library on clouds. From preliminary investigations, we found that a large speedup is possible at a very low cost. But, communication overheads inside MapReduce can limit the maximum speedup, and a better MapReduce implementation might become necessary in the future. All the experiments for this paper, including development and testing, were completed on the Amazon Elastic Compute Cloud (EC2) for less than $20.

  18. Review of Cloud Computing and existing Frameworks for Cloud adoption

    OpenAIRE

    Chang, Victor; Walters, Robert John; Wills, Gary

    2014-01-01

    This paper presents a selected review for Cloud Computing and explains the benefits and risks of adopting Cloud Computing in a business environment. Although all the risks identified may be associated with two major Cloud adoption challenges, a framework is required to support organisations as they begin to use Cloud and minimise risks of Cloud adoption. Eleven Cloud Computing frameworks are investigated and a comparison of their strengths and limitations is made; the result of the comparison...

  19. CloVR: A virtual machine for automated and portable sequence analysis from the desktop using cloud computing

    Science.gov (United States)

    2011-01-01

    Background Next-generation sequencing technologies have decentralized sequence acquisition, increasing the demand for new bioinformatics tools that are easy to use, portable across multiple platforms, and scalable for high-throughput applications. Cloud computing platforms provide on-demand access to computing infrastructure over the Internet and can be used in combination with custom built virtual machines to distribute pre-packaged with pre-configured software. Results We describe the Cloud Virtual Resource, CloVR, a new desktop application for push-button automated sequence analysis that can utilize cloud computing resources. CloVR is implemented as a single portable virtual machine (VM) that provides several automated analysis pipelines for microbial genomics, including 16S, whole genome and metagenome sequence analysis. The CloVR VM runs on a personal computer, utilizes local computer resources and requires minimal installation, addressing key challenges in deploying bioinformatics workflows. In addition CloVR supports use of remote cloud computing resources to improve performance for large-scale sequence processing. In a case study, we demonstrate the use of CloVR to automatically process next-generation sequencing data on multiple cloud computing platforms. Conclusion The CloVR VM and associated architecture lowers the barrier of entry for utilizing complex analysis protocols on both local single- and multi-core computers and cloud systems for high throughput data processing. PMID:21878105

  20. Development of a community-ware for social confidence building for HLW disposal

    International Nuclear Information System (INIS)

    Tanaka, Hiroshi; Furuta, Kazuo; Kimura, Hiroshi

    2004-01-01

    Performance assessment (PA), as a tool to support decisions associated with geological disposal of high-level radioactive waste, requires the facilitation of various views of stakeholders. We believe that the key benefit of using the information technologies in the context of PA lies in the possibility of accelerating knowledge interaction among interested individuals and facilitating a wider spectrum of views into PA, and we propose the 'collaborative' approach using the computer network. We have initiated a voluntary PA community to test validity of such an approach in guiding and supporting discussions and decisions concerning geological disposal. To expedite such activities, we have also developed community-ware', which enables members of the PA network community to grasp relative positions of themselves in an 'opinion space' so that they can find possible partners to collaborate with, and allows newcomers to recapture a summary of the previous discussions. In addition, the history of past discussions together with the results of iterative PA calculations will provide useful insight for understanding and modeling the process of consensus building. A PA network community consisting of around 20 members was formed and a pilot application was carried out which resulted in demonstration of potential advantage of a PA network community in expediting knowledge evolution concerning long term safety of geological disposal. On the other hand it highlighted issues for further research and development. (author)