WorldWideScience

Sample records for internet ware cloud

  1. Internet ware cloud computing :Challenges

    OpenAIRE

    Qamar, S; Lal, Niranjan; Singh, Mrityunjay

    2010-01-01

    After decades of engineering development and infrastructural investment, Internet connections have become commodity product in many countries, and Internet scale “cloud computing” has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internet ware Cloud Computing is termed as the next big thing in the modern corporate world. Apart from the present day software and technologies,...

  2. SeqWare Query Engine: storing and searching sequence data in the cloud

    Directory of Open Access Journals (Sweden)

    Merriman Barry

    2010-12-01

    Full Text Available Abstract Background Since the introduction of next-generation DNA sequencers the rapid increase in sequencer throughput, and associated drop in costs, has resulted in more than a dozen human genomes being resequenced over the last few years. These efforts are merely a prelude for a future in which genome resequencing will be commonplace for both biomedical research and clinical applications. The dramatic increase in sequencer output strains all facets of computational infrastructure, especially databases and query interfaces. The advent of cloud computing, and a variety of powerful tools designed to process petascale datasets, provide a compelling solution to these ever increasing demands. Results In this work, we present the SeqWare Query Engine which has been created using modern cloud computing technologies and designed to support databasing information from thousands of genomes. Our backend implementation was built using the highly scalable, NoSQL HBase database from the Hadoop project. We also created a web-based frontend that provides both a programmatic and interactive query interface and integrates with widely used genome browsers and tools. Using the query engine, users can load and query variants (SNVs, indels, translocations, etc with a rich level of annotations including coverage and functional consequences. As a proof of concept we loaded several whole genome datasets including the U87MG cell line. We also used a glioblastoma multiforme tumor/normal pair to both profile performance and provide an example of using the Hadoop MapReduce framework within the query engine. This software is open source and freely available from the SeqWare project (http://seqware.sourceforge.net. Conclusions The SeqWare Query Engine provided an easy way to make the U87MG genome accessible to programmers and non-programmers alike. This enabled a faster and more open exploration of results, quicker tuning of parameters for heuristic variant calling filters

  3. SeqWare Query Engine: storing and searching sequence data in the cloud

    Science.gov (United States)

    2010-01-01

    Background Since the introduction of next-generation DNA sequencers the rapid increase in sequencer throughput, and associated drop in costs, has resulted in more than a dozen human genomes being resequenced over the last few years. These efforts are merely a prelude for a future in which genome resequencing will be commonplace for both biomedical research and clinical applications. The dramatic increase in sequencer output strains all facets of computational infrastructure, especially databases and query interfaces. The advent of cloud computing, and a variety of powerful tools designed to process petascale datasets, provide a compelling solution to these ever increasing demands. Results In this work, we present the SeqWare Query Engine which has been created using modern cloud computing technologies and designed to support databasing information from thousands of genomes. Our backend implementation was built using the highly scalable, NoSQL HBase database from the Hadoop project. We also created a web-based frontend that provides both a programmatic and interactive query interface and integrates with widely used genome browsers and tools. Using the query engine, users can load and query variants (SNVs, indels, translocations, etc) with a rich level of annotations including coverage and functional consequences. As a proof of concept we loaded several whole genome datasets including the U87MG cell line. We also used a glioblastoma multiforme tumor/normal pair to both profile performance and provide an example of using the Hadoop MapReduce framework within the query engine. This software is open source and freely available from the SeqWare project (http://seqware.sourceforge.net). Conclusions The SeqWare Query Engine provided an easy way to make the U87MG genome accessible to programmers and non-programmers alike. This enabled a faster and more open exploration of results, quicker tuning of parameters for heuristic variant calling filters, and a common data

  4. SeqWare Query Engine: storing and searching sequence data in the cloud.

    Science.gov (United States)

    O'Connor, Brian D; Merriman, Barry; Nelson, Stanley F

    2010-12-21

    Since the introduction of next-generation DNA sequencers the rapid increase in sequencer throughput, and associated drop in costs, has resulted in more than a dozen human genomes being resequenced over the last few years. These efforts are merely a prelude for a future in which genome resequencing will be commonplace for both biomedical research and clinical applications. The dramatic increase in sequencer output strains all facets of computational infrastructure, especially databases and query interfaces. The advent of cloud computing, and a variety of powerful tools designed to process petascale datasets, provide a compelling solution to these ever increasing demands. In this work, we present the SeqWare Query Engine which has been created using modern cloud computing technologies and designed to support databasing information from thousands of genomes. Our backend implementation was built using the highly scalable, NoSQL HBase database from the Hadoop project. We also created a web-based frontend that provides both a programmatic and interactive query interface and integrates with widely used genome browsers and tools. Using the query engine, users can load and query variants (SNVs, indels, translocations, etc) with a rich level of annotations including coverage and functional consequences. As a proof of concept we loaded several whole genome datasets including the U87MG cell line. We also used a glioblastoma multiforme tumor/normal pair to both profile performance and provide an example of using the Hadoop MapReduce framework within the query engine. This software is open source and freely available from the SeqWare project (http://seqware.sourceforge.net). The SeqWare Query Engine provided an easy way to make the U87MG genome accessible to programmers and non-programmers alike. This enabled a faster and more open exploration of results, quicker tuning of parameters for heuristic variant calling filters, and a common data interface to simplify development of

  5. Future internet architecture and cloud ecosystem: A survey

    Science.gov (United States)

    Wan, Man; Yin, Shiqun

    2018-04-01

    The Internet has gradually become a social infrastructure, the existing TCP/IP architecture faces many challenges. So future Internet architecture become hot research. This paper introduces two ways of idea about the future research of Internet structure system, probes into the future Internet architecture and the environment of cloud ecosystem. Finally, we focuses the related research, and discuss basic principles and problems of OpenStack.

  6. CLOUD COMPUTING AND INTERNET OF THINGS FOR SMART CITY DEPLOYMENTS

    Directory of Open Access Journals (Sweden)

    GEORGE SUCIU

    2013-05-01

    Full Text Available Cloud Computing represents the new method of delivering hardware and software resources to the users, Internet of Things (IoT is currently one of the most popular ICT paradigms. Both concepts can have a major impact on how we build smart or/and smarter cities. Cloud computing represents the delivery of hardware and software resources on-demand over the Internet as a Service. At the same time, the IoT concept envisions a new generation of devices (sensors, both virtual and physical that are connected to the Internet and provide different services for value-added applications. In this paper we present our view on how to deploy Cloud computing and IoT for smart or/and smarter cities. We demonstrate that data gathered from heterogeneous and distributed IoT devices can be automatically managed, handled and reused with decentralized cloud services.

  7. Internet of Cloud: Security and Privacy issues

    OpenAIRE

    Cook, Allan; Robinson, Michael; Ferrag, Mohamed Amine; Maglaras, Leandros A.; He, Ying; Jones, Kevin; Janicke, Helge

    2017-01-01

    The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. We thoroughly investigate current security and privacy preservation solutions th...

  8. Twenty security considerations for cloud-supported Internet of Things

    OpenAIRE

    Singh, Jatinder; Pasquier, Thomas; Bacon, Jean Margaret; Ko, Hajoon; Eyers, David

    2015-01-01

    To realise the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and p...

  9. Study on the application of mobile internet cloud computing platform

    Science.gov (United States)

    Gong, Songchun; Fu, Songyin; Chen, Zheng

    2012-04-01

    The innovative development of computer technology promotes the application of the cloud computing platform, which actually is the substitution and exchange of a sort of resource service models and meets the needs of users on the utilization of different resources after changes and adjustments of multiple aspects. "Cloud computing" owns advantages in many aspects which not merely reduce the difficulties to apply the operating system and also make it easy for users to search, acquire and process the resources. In accordance with this point, the author takes the management of digital libraries as the research focus in this paper, and analyzes the key technologies of the mobile internet cloud computing platform in the operation process. The popularization and promotion of computer technology drive people to create the digital library models, and its core idea is to strengthen the optimal management of the library resource information through computers and construct an inquiry and search platform with high performance, allowing the users to access to the necessary information resources at any time. However, the cloud computing is able to promote the computations within the computers to distribute in a large number of distributed computers, and hence implement the connection service of multiple computers. The digital libraries, as a typical representative of the applications of the cloud computing, can be used to carry out an analysis on the key technologies of the cloud computing.

  10. Enhanced Internet Mobility and Privacy Using Public Cloud

    Directory of Open Access Journals (Sweden)

    Ping Zhang

    2017-01-01

    Full Text Available Internet mobile users are concerned more and more about their privacy nowadays as both researches and real world incidents show that leaking of communication and location privacy can lead to serious consequence, and many research works have been done to anonymize individual user from aggregated location data. However, just the communication itself between the mobile users and their peers or website could collect considerable privacy of the mobile users, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users and proposed a scalable system built on top of public cloud services that can hide mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.

  11. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  12. On Study of Building Smart Campus under Conditions of Cloud Computing and Internet of Things

    Science.gov (United States)

    Huang, Chao

    2017-12-01

    two new concepts in the information era are cloud computing and internet of things, although they are defined differently, they share close relationship. It is a new measure to realize leap-forward development of campus by virtue of cloud computing, internet of things and other internet technologies to build smart campus. This paper, centering on the construction of smart campus, analyzes and compares differences between network in traditional campus and that in smart campus, and makes proposals on how to build smart campus finally from the perspectives of cloud computing and internet of things.

  13. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  14. The monitoring and managing application of cloud computing based on Internet of Things.

    Science.gov (United States)

    Luo, Shiliang; Ren, Bin

    2016-07-01

    Cloud computing and the Internet of Things are the two hot points in the Internet application field. The application of the two new technologies is in hot discussion and research, but quite less on the field of medical monitoring and managing application. Thus, in this paper, we study and analyze the application of cloud computing and the Internet of Things on the medical field. And we manage to make a combination of the two techniques in the medical monitoring and managing field. The model architecture for remote monitoring cloud platform of healthcare information (RMCPHI) was established firstly. Then the RMCPHI architecture was analyzed. Finally an efficient PSOSAA algorithm was proposed for the medical monitoring and managing application of cloud computing. Simulation results showed that our proposed scheme can improve the efficiency about 50%. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  15. On Using Home Networks and Cloud Computing for a Future Internet of Things

    Science.gov (United States)

    Niedermayer, Heiko; Holz, Ralph; Pahl, Marc-Oliver; Carle, Georg

    In this position paper we state four requirements for a Future Internet and sketch our initial concept. The requirements: (1) more comfort, (2) integration of home networks, (3) resources like service clouds in the network, and (4) access anywhere on any machine. Future Internet needs future quality and future comfort. There need to be new possiblities for everyone. Our focus is on higher layers and related to the many overlay proposals. We consider them to run on top of a basic Future Internet core. A new user experience means to include all user devices. Home networks and services should be a fundamental part of the Future Internet. Home networks extend access and allow interaction with the environment. Cloud Computing can provide reliable resources beyond local boundaries. For access anywhere, we also need secure storage for data and profiles in the network, in particular for access with non-personal devices (Internet terminal, ticket machine, ...).

  16. 11th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing

    CERN Document Server

    Barolli, Leonard; Amato, Flora

    2017-01-01

    P2P, Grid, Cloud and Internet computing technologies have been very fast established as breakthrough paradigms for solving complex problems by enabling aggregation and sharing of an increasing variety of distributed computational resources at large scale. The aim of this volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to P2P, Grid, Cloud and Internet computing as well as to reveal synergies among such large scale computing paradigms. This proceedings volume presents the results of the 11th International Conference on P2P, Parallel, Grid, Cloud And Internet Computing (3PGCIC-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea.

  17. Convergence of Secure Vehicular Ad-Hoc Network and Cloud in Internet of Things

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Lin, Tao

    2016-01-01

    that VANET could be the basis of many new applications in the field of Internet of Things (IoT). The applications of VANET are not limited to be the driver for safety, traffic management, entertainment, commerce, etc. In the future, VANETs are expected to transport the enormous amount of information. Some......-as-a-Service (STaaS), Platform-as-a-Service (PaaS), etc. over the internet via Cloud vendors....

  18. SmartCityWare

    DEFF Research Database (Denmark)

    Mohamed, Nader; Al-Jaroodi, Jameela; Jawhar, Imad

    2017-01-01

    Smart cities are becoming a reality. Various aspects of modern cities are being automated and integrated with information and communication technologies to achieve higher functionality, optimized resources utilization, and management, and improved quality of life for the residents. Smart cities...... rely heavily on utilizing various software, hardware, and communication technologies to improve the operations in areas, such as healthcare, transportation, energy, education, logistics, and many others, while reducing costs and resources consumption. One of the promising technologies to support...... technology is Fog Computing, which extends the traditional Cloud Computing paradigm to the edge of the network to enable localized and real-time support for operating-enhanced smart city services. However, proper integration and efficient utilization of CoT and Fog Computing is not an easy task. This paper...

  19. Analysis of Laogang energy internet and construction of the cloud platform

    Science.gov (United States)

    Wang, Selan; Nie, Jianwen; Zhang, Daiyue; Li, Xia; Tai, Jun; Yu, Zhaohui; Lu, Yiqi; Xie, Da

    2018-02-01

    Laogang solid waste recycling base deals with about 70% waste domestic garbage of Shanghai every day. By recycling the garbage, great amount of energy including electricity, heat and gas can be produced. Meanwhile, the base itself consumes much energy as well. Therefore, an energy internet has been designed for the base to analyse the output and usage of the energy so that the energy utilization rate can be enhanced. In addition, a cloud platform has been established basing on the three-layer cloud technology: IaaS, PaaS and SaaS. This cloud platform mainly analysing electricity will judge whether the energy has been used suitably form all sides and furthermore, improve the operation of the whole energy internet in the base.

  20. Analysis of the new health management based on health internet of things and cloud computing

    Science.gov (United States)

    Liu, Shaogang

    2018-05-01

    With the development and application of Internet of things and cloud technology in the medical field, it provides a higher level of exploration space for human health management. By analyzing the Internet of things technology and cloud technology, this paper studies a new form of health management system which conforms to the current social and technical level, and explores its system architecture, system characteristics and application. The new health management platform for networking and cloud can achieve the real-time monitoring and prediction of human health through a variety of sensors and wireless networks based on information and can be transmitted to the monitoring system, and then through the software analysis model, and gives the targeted prevention and treatment measures, to achieve real-time, intelligent health management.

  1. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications.

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan; Lee, Hyukjoon

    2017-03-01

    This paper presents a location-based interactive model of Internet of Things (IoT) and cloud integration (IoT-cloud) for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model.

  2. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud for Mobile Cloud Computing Applications

    Directory of Open Access Journals (Sweden)

    Thanh Dinh

    2017-03-01

    Full Text Available This paper presents a location-based interactive model of Internet of Things (IoT and cloud integration (IoT-cloud for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model.

  3. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications †

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan; Lee, Hyukjoon

    2017-01-01

    This paper presents a location-based interactive model of Internet of Things (IoT) and cloud integration (IoT-cloud) for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model. PMID:28257067

  4. Getting Started with the Internet of Things Connecting Sensors and Microcontrollers to the Cloud

    CERN Document Server

    Pfister, Cuno

    2011-01-01

    What is the Internet of Things? It's billions of embedded computers, sensors, and actuators all connected online. If you have basic programming skills, you can use these powerful little devices to create a variety of useful systems-such as a device that waters plants when the soil becomes dry. This hands-on guide shows you how to start building your own fun and fascinating projects. Learn to program embedded devices using the .NET Micro Framework and the Netduino Plus board. Then connect your devices to the Internet with Pachube, a cloud platform for sharing real-time sensor data. All you ne

  5. Switching Brains: Cloud-based Intelligent Resources Management for the Internet of Cognitive Things

    Directory of Open Access Journals (Sweden)

    R. Francisco

    2014-05-01

    Full Text Available Cognitive technologies can bring important benefits to our everyday life, enabling connected devices to do tasks that in the past only humans could do, leading to the Cognitive Internet of Things. Wireless Sensor and Actuator Networks (WSAN are often employed for communication between Internet objects. However, WSAN face some problems, namely sensors’ energy and CPU load consumption, which are common to other networked devices, such as mobile devices or robotic platforms. Additionally, cognitive functionalities often require large processing power, for running machine learning algorithms, computer vision processing, or behavioral and emotional architectures. Cloud massive storage capacity, large processing speeds and elasticity are appropriate to address these problems. This paper proposes a middleware that transfers flows of execution between devices and the cloud for computationally demanding applications (such as those integrating a robotic brain, to efficiently manage devices’ resources.

  6. Convergence Of Cloud Computing Internet Of Things And Machine Learning The Future Of Decision Support Systems

    Directory of Open Access Journals (Sweden)

    Gilberto Crespo-Perez

    2017-07-01

    Full Text Available The objective of this research was to develop a framework for understanding the Convergence of Cloud Computing Machine Learning and Internet of Things as the future of Decision Support Systems. To develop this framework the researchers analyzed and synthesized 35 research articles from 2006 to 2017. The results indicated that when the data is massive it is necessary to use computational algorithms and complex analytical techniques. The Internet of Things in combination with the large accumulation of data and data mining improves the learning of automatic intelligence for business. This is due to the fact that the technology has the intelligence to infer and provide solutions based on past experiences and past events.

  7. A Cloud-Based Internet of Things Platform for Ambient Assisted Living

    Science.gov (United States)

    Cubo, Javier; Nieto, Adrián; Pimentel, Ernesto

    2014-01-01

    A common feature of ambient intelligence is that many objects are inter-connected and act in unison, which is also a challenge in the Internet of Things. There has been a shift in research towards integrating both concepts, considering the Internet of Things as representing the future of computing and communications. However, the efficient combination and management of heterogeneous things or devices in the ambient intelligence domain is still a tedious task, and it presents crucial challenges. Therefore, to appropriately manage the inter-connection of diverse devices in these systems requires: (1) specifying and efficiently implementing the devices (e.g., as services); (2) handling and verifying their heterogeneity and composition; and (3) standardizing and managing their data, so as to tackle large numbers of systems together, avoiding standalone applications on local servers. To overcome these challenges, this paper proposes a platform to manage the integration and behavior-aware orchestration of heterogeneous devices as services, stored and accessed via the cloud, with the following contributions: (i) we describe a lightweight model to specify the behavior of devices, to determine the order of the sequence of exchanged messages during the composition of devices; (ii) we define a common architecture using a service-oriented standard environment, to integrate heterogeneous devices by means of their interfaces, via a gateway, and to orchestrate them according to their behavior; (iii) we design a framework based on cloud computing technology, connecting the gateway in charge of acquiring the data from the devices with a cloud platform, to remotely access and monitor the data at run-time and react to emergency situations; and (iv) we implement and generate a novel cloud-based IoT platform of behavior-aware devices as services for ambient intelligence systems, validating the whole approach in real scenarios related to a specific ambient assisted living application

  8. A cloud-based Internet of Things platform for ambient assisted living.

    Science.gov (United States)

    Cubo, Javier; Nieto, Adrián; Pimentel, Ernesto

    2014-08-04

    A common feature of ambient intelligence is that many objects are inter-connected and act in unison, which is also a challenge in the Internet of Things. There has been a shift in research towards integrating both concepts, considering the Internet of Things as representing the future of computing and communications. However, the efficient combination and management of heterogeneous things or devices in the ambient intelligence domain is still a tedious task, and it presents crucial challenges. Therefore, to appropriately manage the inter-connection of diverse devices in these systems requires: (1) specifying and efficiently implementing the devices (e.g., as services); (2) handling and verifying their heterogeneity and composition; and (3) standardizing and managing their data, so as to tackle large numbers of systems together, avoiding standalone applications on local servers. To overcome these challenges, this paper proposes a platform to manage the integration and behavior-aware orchestration of heterogeneous devices as services, stored and accessed via the cloud, with the following contributions: (i) we describe a lightweight model to specify the behavior of devices, to determine the order of the sequence of exchanged messages during the composition of devices; (ii) we define a common architecture using a service-oriented standard environment, to integrate heterogeneous devices by means of their interfaces, via a gateway, and to orchestrate them according to their behavior; (iii) we design a framework based on cloud computing technology, connecting the gateway in charge of acquiring the data from the devices with a cloud platform, to remotely access and monitor the data at run-time and react to emergency situations; and (iv) we implement and generate a novel cloud-based IoT platform of behavior-aware devices as services for ambient intelligence systems, validating the whole approach in real scenarios related to a specific ambient assisted living application.

  9. CS-DRM: A Cloud-Based SIM DRM Scheme for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Liu Zhang

    2011-01-01

    Full Text Available With the rapid development and growth of the mobile industry, a considerable amount of mobile applications and services are available, which involve Internet scale data collections. Meanwhile, it has a tremendous impact on digital content providers as well as the mobile industry that a large number of digital content have been pirated and illegally distributed. Digital Rights Management (DRM aims at protecting digital contents from being abused through regulating their usage. Unfortunately, to the best of our knowledge, fewer of these DRM schemes are concerned with the cost of the servers in a DRM system when the number of users scales up, and consider benefits of content providers who can be seen as tenants of a content server. In this paper, we propose CS-DRM, a cloud-based SIM DRM scheme, for the mobile Internet. The SIM card is introduced into CS-DRM to both reduce the cost and provide higher security. Also, the characteristics of cloud computing enable CS-DRM to bring benefits for content providers, and well satisfy the performance requirements with low cost when the number of users increases significantly. Furthermore, we have implemented a prototype of our DRM scheme, which demonstrates that CS-DRM is efficient, secure, and practicable.

  10. [The Key Technology Study on Cloud Computing Platform for ECG Monitoring Based on Regional Internet of Things].

    Science.gov (United States)

    Yang, Shu; Qiu, Yuyan; Shi, Bo

    2016-09-01

    This paper explores the methods of building the internet of things of a regional ECG monitoring, focused on the implementation of ECG monitoring center based on cloud computing platform. It analyzes implementation principles of automatic identifi cation in the types of arrhythmia. It also studies the system architecture and key techniques of cloud computing platform, including server load balancing technology, reliable storage of massive smalfi les and the implications of quick search function.

  11. Cooperative Optimization QoS Cloud Routing Protocol Based on Bacterial Opportunistic Foraging and Chemotaxis Perception for Mobile Internet

    Directory of Open Access Journals (Sweden)

    Shujuan Wang

    2015-01-01

    Full Text Available In order to strengthen the mobile Internet mobility management and cloud platform resources utilization, optimizing the cloud routing efficiency is established, based on opportunistic bacterial foraging bionics, and puts forward a chemotaxis perception of collaborative optimization QoS (Quality of Services cloud routing mechanism. The cloud routing mechanism is based on bacterial opportunity to feed and bacterial motility and to establish the data transmission and forwarding of the bacterial population behavior characteristics. This mechanism is based on the characteristics of drug resistance of bacteria and the structure of the field, and through many iterations of the individual behavior and population behavior the bacteria can be spread to the food gathering area with a certain probability. Finally, QoS cloud routing path would be selected and optimized based on bacterial bionic optimization and hedge mapping relationship between mobile Internet node and bacterial population evolution iterations. Experimental results show that, compared with the standard dynamic routing schemes, the proposed scheme has shorter transmission delay, lower packet error ratio, QoS cloud routing loading, and QoS cloud route request overhead.

  12. SECURE INTERNET OF THINGS-BASED CLOUD FRAMEWORK TO CONTROL ZIKA VIRUS OUTBREAK.

    Science.gov (United States)

    Sareen, Sanjay; Sood, Sandeep K; Gupta, Sunil Kumar

    2017-01-01

    Zika virus (ZikaV) is currently one of the most important emerging viruses in the world which has caused outbreaks and epidemics and has also been associated with severe clinical manifestations and congenital malformations. Traditional approaches to combat the ZikaV outbreak are not effective for detection and control. The aim of this study is to propose a cloud-based system to prevent and control the spread of Zika virus disease using integration of mobile phones and Internet of Things (IoT). A Naive Bayesian Network (NBN) is used to diagnose the possibly infected users, and Google Maps Web service is used to provide the geographic positioning system (GPS)-based risk assessment to prevent the outbreak. It is used to represent each ZikaV infected user, mosquito-dense sites, and breeding sites on the Google map that helps the government healthcare authorities to control such risk-prone areas effectively and efficiently. The performance and accuracy of the proposed system are evaluated using dataset for 2 million users. Our system provides high accuracy for initial diagnosis of different users according to their symptoms and appropriate GPS-based risk assessment. The cloud-based proposed system contributed to the accurate NBN-based classification of infected users and accurate identification of risk-prone areas using Google Maps.

  13. Big Data, Internet of Things and Cloud Convergence--An Architecture for Secure E-Health Applications.

    Science.gov (United States)

    Suciu, George; Suciu, Victor; Martian, Alexandru; Craciunescu, Razvan; Vulpe, Alexandru; Marcu, Ioana; Halunga, Simona; Fratu, Octavian

    2015-11-01

    Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.

  14. A cloud-based production system for information and service integration: an internet of things case study on waste electronics

    Science.gov (United States)

    Wang, Xi Vincent; Wang, Lihui

    2017-08-01

    Cloud computing is the new enabling technology that offers centralised computing, flexible data storage and scalable services. In the manufacturing context, it is possible to utilise the Cloud technology to integrate and provide industrial resources and capabilities in terms of Cloud services. In this paper, a function block-based integration mechanism is developed to connect various types of production resources. A Cloud-based architecture is also deployed to offer a service pool which maintains these resources as production services. The proposed system provides a flexible and integrated information environment for the Cloud-based production system. As a specific type of manufacturing, Waste Electrical and Electronic Equipment (WEEE) remanufacturing experiences difficulties in system integration, information exchange and resource management. In this research, WEEE is selected as the example of Internet of Things to demonstrate how the obstacles and bottlenecks are overcome with the help of Cloud-based informatics approach. In the case studies, the WEEE recycle/recovery capabilities are also integrated and deployed as flexible Cloud services. Supporting mechanisms and technologies are presented and evaluated towards the end of the paper.

  15. The cuisine of the Pitted Ware Culture

    DEFF Research Database (Denmark)

    Philippsen, Bente; Persson, Per

    The Pitted Ware Culture is a Middle Neolithic culture in southwestern Scandinavia. It appears about thousand years after the introduction of agriculture to this area. In some regions, it is characterized by an almost fully “Mesolithic” economy with a heavy reliance on seal hunting. In Djursland, ...

  16. Waring's Problem and the Circle Method

    Indian Academy of Sciences (India)

    other interests include classical music and mountaineering. the problems they worked on. Their proof of a slightly. Keywords weaker form of Ramanujan's original formula was pub-. Waring's problem, circle method, ... arc is fairly simple while it is the minor arc estimation that accounts for the 'major' amount of work involved!

  17. Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

    Directory of Open Access Journals (Sweden)

    Qian Meng

    2017-01-01

    Full Text Available User authentication has been widely deployed to prevent unauthorized access in the new era of Internet of Everything (IOE. When user passes the legal authentication, he/she can do series of operations in database. We mainly concern issues of data security and comparable queries over ciphertexts in IOE. In traditional database, a Short Comparable Encryption (SCE scheme has been widely used by authorized users to conduct comparable queries over ciphertexts, but existing SCE schemes still incur high storage and computational overhead as well as economic burden. In this paper, we first propose a basic Short Comparable Encryption scheme based on sliding window method (SCESW, which can significantly reduce computational and storage burden as well as enhance work efficiency. Unfortunately, as the cloud service provider is a semitrusted third party, public auditing mechanism needs to be furnished to protect data integrity. To further protect data integrity and reduce management overhead, we present an enhanced SCESW scheme based on position-aware Merkle tree, namely, PT-SCESW. Security analysis proves that PT-SCESW and SCESW schemes can guarantee completeness and weak indistinguishability in standard model. Performance evaluation indicates that PT-SCESW scheme is efficient and feasible in practical applications, especially for smarter and smaller computing devices in IOE.

  18. Cloud Computing and Internet of Things Concepts Applied on Buildings Data Analysis

    Directory of Open Access Journals (Sweden)

    Hebean Florin-Adrian

    2017-12-01

    Full Text Available Used and developed initially for the IT industry, the Cloud computing and Internet of Things concepts are found at this moment in a lot of sectors of activity, building industry being one of them. These are defined like a global computing, monitoring and analyze network, which is composed of hardware and software resources, with the feature of allocating and dynamically relocating the shared resources, in accordance with user requirements. Data analysis and process optimization techniques based on these new concepts are used increasingly more in the buildings industry area, especially for an optimal operations of the buildings installations and also for increasing occupants comfort. The multitude of building data taken from HVAC sensor, from automation and control systems and from the other systems connected to the network are optimally managed by these new analysis techniques. Through analysis techniques can be identified and manage the issues the arise in operation of building installations like critical alarms, nonfunctional equipment, issues regarding the occupants comfort, for example the upper and lower temperature deviation to the set point and other issues related to equipment maintenance. In this study, a new approach regarding building control is presented and also a generalized methodology for applying data analysis to building services data is described. This methodology is then demonstrated using two case studies.

  19. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  20. OpenCourseWare and Open Educational Resources: The Next Big Thing in Technology-Enhanced Education?

    Science.gov (United States)

    Caudill, Jason G.

    2012-01-01

    OpenCourseWare (OCW) and Open Educational Resources (OER) are two new and closely related educational technologies. Both provide open access to learning materials for students and instructors via the Internet. These are for the moment still very young technologies. While they have grown dramatically in just ten years there is still relatively…

  1. Distributed and cloud computing from parallel processing to the Internet of Things

    CERN Document Server

    Hwang, Kai; Fox, Geoffrey C

    2012-01-01

    Distributed and Cloud Computing, named a 2012 Outstanding Academic Title by the American Library Association's Choice publication, explains how to create high-performance, scalable, reliable systems, exposing the design principles, architecture, and innovative applications of parallel, distributed, and cloud computing systems. Starting with an overview of modern distributed models, the book provides comprehensive coverage of distributed and cloud computing, including: Facilitating management, debugging, migration, and disaster recovery through virtualization Clustered systems for resear

  2. Research on Data Mining of the Internet of Things Based on Cloud Computing Platform

    Science.gov (United States)

    Zhang, Wenqing

    2018-02-01

    Based on the development of society and the progress of information technology, China’s information industry has made great progress and has gradually become an important pillar of national economic development. In this context, the gradual integration of information technology had promoted the construction of the Internet of Things system, so as to promote the human life developed in the direction of modernization intelligently. At present, in the process of forming the development of the Internet of Things the first need to fully tap the data, which thus provide users with better service, for the development of large-scale development of the Internet. This paper analyzes the meaning of Internet of things, and discusses the characteristics of Internet of things and data mining, hoping to promote the improvement on the Internet of Things system in China, and thus promote the realization of higher efficiency.

  3. Examining Effects of Virtual Machine Settings on Voice over Internet Protocol in a Private Cloud Environment

    Science.gov (United States)

    Liao, Yuan

    2011-01-01

    The virtualization of computing resources, as represented by the sustained growth of cloud computing, continues to thrive. Information Technology departments are building their private clouds due to the perception of significant cost savings by managing all physical computing resources from a single point and assigning them to applications or…

  4. Demand Side Management Using the Internet of Energy based on Fog and Cloud Computing

    DEFF Research Database (Denmark)

    Shahryari, Kolsoom; Anvari-Moghaddam, Amjad

    2017-01-01

    The smart grid, as a communication network, allows numerous connected devices such as sensors, relays and actuators to interact and cooperate with each other. An Internet-based solution for electricity that provides bidirectional flow of information and power is internet of energy (IoE) which...

  5. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  6. Mobile Cloud Business Process Management System for the Internet of Things: Review, Challenges and Blueprint

    OpenAIRE

    Chang, Chii; Srirama, Satish Narayana; Buyya, Rajkumar

    2015-01-01

    The Internet of Things (IoT) represents a comprehensive environment that consists of large number of sensors and mediators interconnecting heterogeneous physical objects to the Internet. IoT applications can be found in many areas such as smart city, smart workplace, smart plants, smart agriculture and various ubiquitous computing areas. Meanwhile, Business Process Management Systems (BPMS) has become a successful and efficient solution for coordinated management and optimised utilisation of ...

  7. Switching Brains: Cloud-based Intelligent Resources Management for the Internet of Cognitive Things

    OpenAIRE

    R. Francisco; A.M. Arsenio

    2014-01-01

    Cognitive technologies can bring important benefits to our everyday life, enabling connected devices to do tasks that in the past only humans could do, leading to the Cognitive Internet of Things. Wireless Sensor and Actuator Networks (WSAN) are often employed for communication between Internet objects. However, WSAN face some problems, namely sensors’ energy and CPU load consumption, which are common to other networked devices, such as mobile devices or robotic platforms. Additionally, cogni...

  8. Smart City Services over a Future Internet Platform Based on Internet of Things and Cloud: The Smart Parking Case

    Directory of Open Access Journals (Sweden)

    Jorge Lanza

    2016-09-01

    Full Text Available Enhancing the effectiveness of city services and assisting on a more sustainable development of cities are two of the crucial drivers of the smart city concept. This paper portrays a field trial that leverages an internet of things (IoT platform intended for bringing value to existing and future smart city infrastructures. The paper highlights how IoT creates the basis permitting integration of current vertical city services into an all-encompassing system, which opens new horizons for the progress of the effectiveness and sustainability of our cities. Additionally, the paper describes a field trial on provisioning of real time data about available parking places both indoor and outdoor. The trial has been carried out at Santander’s (Spain downtown area. The trial takes advantage of both available open data sets as well as of a large-scale IoT infrastructure. The trial is a showcase on how added-value services can be created on top of the proposed architecture.

  9. Exploring the BIG Five of e-leadership by developing digital strategies with mobile, cloud, big data, social media, and the Internet of things

    NARCIS (Netherlands)

    Spil, Ton; Pris, Miran; Kijl, Björn

    2017-01-01

    Recent developments in digital technologies -- 1) mobile technology, 2) cloud computing, 3) big data, 4) social media, and 5) the Internet of Things -- show that these so-called BIG Five technologies are increasingly transforming organizations by enabling business innovation. This paper aims to

  10. Bringing optical networks to the Cloud: an architecture for a sustainable future Internet

    NARCIS (Netherlands)

    Vicat-Blanc, P.; Figuerola, S.; Chen, X.; Landi, G.; Escalona, E.; Develder, C.; Tzanakaki, A.; Demchenko, Y.; García Espín, J.A.; Ferrer, J.; López, E.; Soudan, S.; Buysse, J.; Jukan, A.; Ciulli, N.; Brogle, M.; van Laarhoven, L.; Belter, B.; Anhalt, F.; Nejabati, R.; Simeonidou, D.; Ngo, C.; de Laat, C.; Biancani, M.; Roth, M.; Donadio, P.; Jiménez, J.; Antoniak-Lewandowska, M.; Gumaste, A.; Domingue, J.; Galis, A.; Gavras, A.; Zahariadis, T.; Lambert, D.; Cleary, F.; Daras, P.; Krco, S.; Müller, H.; Li, M.-S.; Schaffers, H.; Lotz, V.; Alvarez, F.; Stiller, B.; Karnouskos, S.; Avessta, S.; Nilsson, M.

    2011-01-01

    Over the years, the Internet has become a central tool for society. The extent of its growth and usage raises critical issues associated with its design principles that need to be addressed before it reaches its limits. Many emerging applications have increasing requirements in terms of bandwidth,

  11. 78 FR 60245 - Privacy Act Systems of Records; LabWare Laboratory Information Management System

    Science.gov (United States)

    2013-10-01

    ... of Records; LabWare Laboratory Information Management System AGENCY: Animal and Plant Health... system of records, entitled LabWare Laboratory Information Management System (LabWare LIMS), to maintain... Affairs, OMB. Thomas J. Vilsack, Secretary. SYSTEM NAME: LabWare Laboratory Information Management System...

  12. Economic Analyses of Ware Yam Production in Orlu Agricultural ...

    African Journals Online (AJOL)

    Economic Analyses of Ware Yam Production in Orlu Agricultural Zone of Imo State. ... International Journal of Agriculture and Rural Development ... statistics, gross margin analysis, marginal analysis and multiple regression analysis. Results ...

  13. Archaeological and chemical analysis of Tell el Yahudiyeh ware

    International Nuclear Information System (INIS)

    Kaplan, M.F.; Harbottle, G.; Sayre, E.V.

    1978-01-01

    Typological and geographic analyses indicate that Tell el Yahudiyeh ware (found in Cyprus, Egypt, Nubia, and the Levant during the Middle Bronze period, c. 1750-1550 B.C.) were probably manufactured in two areas, the Nile Valley and the Levant. Activation analysis was carried out and correlated with the archaeological analyses. Results confirm the two ''families'' of the ware, one Egyptian and one Levantine. Speculations are offered on the social interaction of the period. 11 figures, 2 tables

  14. Star Ware: The Amateur Astronomer's Guide to Choosing, Buying, and Using Telescopes and Accessories, 3rd Edition

    Science.gov (United States)

    Harrington, Philip S.

    2002-05-01

    Praise for the Second Edition of Star Ware "Star Ware is still a tour de force that any experienced amateur will find invaluable, and which hardware-minded beginners will thoroughly enjoy." -Robert Burnham, Sky & Telescope magazine "Star Ware condenses between two covers what would normally take a telescope buyer many months to accumulate." -John Shibley, Astronomy magazine Now more than ever, the backyard astronomer has a dazzling array of choices when it comes to telescope shopping-which can make choosing just the right sky-watching equipment a formidable challenge. In this revised and updated edition of Star Ware, the essential guide to buying astronomical equipment, award-winning astronomy writer Philip Harrington does the work for you, analyzing and exploring today's astronomy market and offering point-by-point comparisons of everything you need. Whether you're an experienced amateur astronomer or just getting started, Star Ware, Third Edition will prepare you to explore the farthest reaches of space with: Extensive, expanded reviews of leading models and accessories, including dozens of new products, to help you buy smart A clear, step-by-step guide to all aspects of purchasing everything from telescopes and binoculars to filters, mounts, lenses, cameras, film, star charts, guides and references, and much more Eleven new do-it-yourself projects for making unique astronomical equipment at home Easy tips on maintenance, photography, and star-mapping to help you get the most out of your telescope Lists of where to find everything astronomical, including Internet sites and Web resources; distributors, dealers, and conventions; and corporate listings for products and services

  15. 76 FR 2708 - Porcelain-on-Steel Cooking Ware From Taiwan; Top-of-the-Stove Stainless Steel Cooking Ware From...

    Science.gov (United States)

    2011-01-14

    .... 701- TA-267 and 731-TA-304 (Third Review)] Porcelain-on-Steel Cooking Ware From Taiwan; Top-of-the-Stove Stainless Steel Cooking Ware From Korea AGENCY: United States International Trade Commission...-steel cooking ware from Taiwan and the antidumping and countervailing duty orders on imports of top-of...

  16. Novel technical solutions for wireless ECG transmission & analysis in the age of the internet cloud.

    Science.gov (United States)

    Al-Zaiti, Salah S; Shusterman, Vladimir; Carey, Mary G

    2013-01-01

    Current guidelines recommend early reperfusion therapy for ST-elevation myocardial infarction (STEMI) within 90 min of first medical encounter. Telecardiology entails the use of advanced communication technologies to transmit the prehospital 12-lead electrocardiogram (ECG) to offsite cardiologists for early triage to the cath lab; which has been shown to dramatically reduce door-to-balloon time and total mortality. However, hospitals often find adopting ECG transmission technologies very challenging. The current review identifies seven major technical challenges of prehospital ECG transmission, including: paramedics inconvenience and transport delay; signal noise and interpretation errors; equipment malfunction and transmission failure; reliability of mobile phone networks; lack of compliance with the standards of digital ECG formats; poor integration with electronic medical records; and costly hardware and software pre-requisite installation. Current and potential solutions to address each of these technical challenges are discussed in details and include: automated ECG transmission protocols; annotatable waveform-based ECGs; optimal routing solutions; and the use of cloud computing systems rather than vendor-specific processing stations. Nevertheless, strategies to monitor transmission effectiveness and patient outcomes are essential to sustain initial gains of implementing ECG transmission technologies. © 2013.

  17. Diet and Mobility in the Corded Ware of Central Europe.

    Directory of Open Access Journals (Sweden)

    Karl-Göran Sjögren

    Full Text Available Isotopic investigations of two cemetery populations from the Corded Ware Culture in southern Germany reveal new information on the dating of these graves, human diet during this period, and individual mobility. Corded Ware Culture was present across much of temperate Europe ca. 2800-2200 cal. BC and is represented by distinctive artifacts and burial practices. Corded Ware was strongly influenced by the Yamnaya Culture that arose in the steppes of eastern Europe and western Eurasia after 3000 BC, as indicated by recent aDNA research. However, the development of CW on different chronological and spatial scales has to be evaluated. Examination of the CW burials from southern Germany supports an argument for substantial human mobility in this period. Several burials from gravefields and larger samples from two large cemeteries at Lauda-Königshofen "Wöllerspfad" and at Bergheinfeld "Hühnerberg" contributed the human remains for our study of bone and tooth enamel from the Corded Ware Culture. Our results suggest that Corded Ware groups in this region at least were subsisting on a mix of plant and animal foods and were highly mobile, especially the women. We interpret this as indicating a pattern of female exogamy, involving different groups with differing economic strategies.

  18. Diet and Mobility in the Corded Ware of Central Europe.

    Science.gov (United States)

    Sjögren, Karl-Göran; Price, T Douglas; Kristiansen, Kristian

    2016-01-01

    Isotopic investigations of two cemetery populations from the Corded Ware Culture in southern Germany reveal new information on the dating of these graves, human diet during this period, and individual mobility. Corded Ware Culture was present across much of temperate Europe ca. 2800-2200 cal. BC and is represented by distinctive artifacts and burial practices. Corded Ware was strongly influenced by the Yamnaya Culture that arose in the steppes of eastern Europe and western Eurasia after 3000 BC, as indicated by recent aDNA research. However, the development of CW on different chronological and spatial scales has to be evaluated. Examination of the CW burials from southern Germany supports an argument for substantial human mobility in this period. Several burials from gravefields and larger samples from two large cemeteries at Lauda-Königshofen "Wöllerspfad" and at Bergheinfeld "Hühnerberg" contributed the human remains for our study of bone and tooth enamel from the Corded Ware Culture. Our results suggest that Corded Ware groups in this region at least were subsisting on a mix of plant and animal foods and were highly mobile, especially the women. We interpret this as indicating a pattern of female exogamy, involving different groups with differing economic strategies.

  19. KeyWare: an open wireless distributed computing environment

    Science.gov (United States)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  20. Moving towards Cloud Security

    OpenAIRE

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  1. Towards Internet of Things (IOTS):Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing

    OpenAIRE

    Piyare, Rajeev; Lee, Seong Ro

    2013-01-01

    Cloud computing provides great benefits for applications hosted on the Web that also have special computational and storage requirements. This paper proposes an extensible and flexible architecture for integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an interoperable application layer that can be directly integrated into other application domains for remote monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN)...

  2. Phase and Micro-Structural Characterization of Sanitary-Ware Fired at Different Temperature

    OpenAIRE

    ATHER HASSAN; YASEEN IQBAL; SYED ZAFAR ILYAS

    2017-01-01

    The three main ingredients of sanitary-ware are clay, feldspar and quartz. This ware is being widely used and has therefore, attracted the attention of researchers from time to time. Consequently, it has been extensively investigated. The present study describes the phase and micro-structural analysis of sanitary-ware samples collected from local (Durr Ceramics Peshawar) industry. XRD (X-Ray Diffraction) of samples fired at 1100oC reveals the presence of ? ? ? ? ?-quartz and primary mullite o...

  3. A View from the Clouds

    Science.gov (United States)

    Chudnov, Daniel

    2010-01-01

    Cloud computing is definitely a thing now, but it's not new and it's not even novel. Back when people were first learning about the Internet in the 1990s, every diagram that one saw showing how the Internet worked had a big cloud in the middle. That cloud represented the diverse links, routers, gateways, and protocols that passed traffic around in…

  4. Cloud Computing Quality

    Directory of Open Access Journals (Sweden)

    Anamaria Şiclovan

    2013-02-01

    Full Text Available Cloud computing was and it will be a new way of providing Internet services and computers. This calculation approach is based on many existing services, such as the Internet, grid computing, Web services. Cloud computing as a system aims to provide on demand services more acceptable as price and infrastructure. It is exactly the transition from computer to a service offered to the consumers as a product delivered online. This paper is meant to describe the quality of cloud computing services, analyzing the advantages and characteristics offered by it. It is a theoretical paper.Keywords: Cloud computing, QoS, quality of cloud computing

  5. Cloud computing.

    Science.gov (United States)

    Wink, Diane M

    2012-01-01

    In this bimonthly series, the author examines how nurse educators can use Internet and Web-based technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes how cloud computing can be used in nursing education.

  6. +Cloud: An Agent-Based Cloud Computing Platform

    OpenAIRE

    González, Roberto; Hernández de la Iglesia, Daniel; de la Prieta Pintado, Fernando; Gil González, Ana Belén

    2017-01-01

    Cloud computing is revolutionizing the services provided through the Internet, and is continually adapting itself in order to maintain the quality of its services. This study presents the platform +Cloud, which proposes a cloud environment for storing information and files by following the cloud paradigm. This study also presents Warehouse 3.0, a cloud-based application that has been developed to validate the services provided by +Cloud.

  7. Research on cloud computing solutions

    OpenAIRE

    Liudvikas Kaklauskas; Vaida Zdanytė

    2015-01-01

    Cloud computing can be defined as a new style of computing in which dynamically scala-ble and often virtualized resources are provided as a services over the Internet. Advantages of the cloud computing technology include cost savings, high availability, and easy scalability. Voas and Zhang adapted six phases of computing paradigms, from dummy termi-nals/mainframes, to PCs, networking computing, to grid and cloud computing. There are four types of cloud computing: public cloud, private cloud, ...

  8. Security Architecture of Cloud Computing

    OpenAIRE

    V.KRISHNA REDDY; Dr. L.S.S.REDDY

    2011-01-01

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages o...

  9. Open Course Ware, Distance Education, and 21st Century Geoscience Education

    Science.gov (United States)

    Connors, M. G.

    2010-12-01

    Open Course Ware (OCW) allows the highest quality educational materials (including videos of lectures from the best classroom lecturers) to find a wide audience. This audience may include many who wish to obtain credentials for formal study yet who are unable to be campus-based students. This opens a role for formal, credentialed and accredited distance education (DE) to efficiently integrate OCW into DE courses. OCW materials will in this manner be able to be used for education of credential-seeking students who would not otherwise benefit from them. Modern presentation methods using the Internet and video (including mobile device) technologies may offer pedagogical advantages over even traditional classroom learning. A detailed analysis of the development of Athabasca University’s PHYS 302 Vibrations and Waves course (based mainly on MIT’s OCW), and application of lessons learned to development of PHYS 305 Electromagnetism is presented. These courses are relevant to the study of geophysics, but examples of GEOL (Geology) courses will also be mentioned, along with an broad overview of OCW resources in Geoscience.

  10. Cloud Computing: A study of cloud architecture and its patterns

    OpenAIRE

    Mandeep Handa,; Shriya Sharma

    2015-01-01

    Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Cloud computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Cloud computing can be defined as accessing third party software and services on web and paying as per usage. It facilitates scalability and virtualized resources over Internet as a service providing cost effective and scalable solution to customers. Cloud computing has...

  11. Tell el Yahudiyeh Ware: a re-evaluation

    International Nuclear Information System (INIS)

    Kaplan, M.F.; Harbottle, G.; Sayre, E.V.

    1980-01-01

    The TY (Tell el Yahudiyeh ware) project has implications for understanding the cultural interactions. The Second Intermediate Period (1750-1550 B.C.), one during which centraized government in Egypt collapses and, it is generally assumed, so does her trade network. Foreigners - the Hyksos - are able to enter the country and rule at least part of it. Results of this study (which includes activation analysis), however, indicate the TY is primarily an Egyptian pottery which appeared before the Hyksos entered and may have continued in use after they left. It cannot, therefore, be tightly associated with the Hyksos nor can it be used to judge the extent of their influence. Its wide distribution shows that Egypt continued to trade goods outside her boundaries throughout this period. Finally, not only goods travelled between what were generally considered to have been hostile neighbors, but the trade appears to have included ideas and technology as well

  12. Cloud computing for radiologists

    OpenAIRE

    Amit T Kharat; Amjad Safvi; S S Thind; Amarjit Singh

    2012-01-01

    Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as...

  13. Hybrid cloud for dummies

    CERN Document Server

    Hurwitz, Judith; Halper, Fern; Kirsch, Dan

    2012-01-01

    Understand the cloud and implement a cloud strategy for your business Cloud computing enables companies to save money by leasing storage space and accessing technology services through the Internet instead of buying and maintaining equipment and support services. Because it has its own unique set of challenges, cloud computing requires careful explanation. This easy-to-follow guide shows IT managers and support staff just what cloud computing is, how to deliver and manage cloud computing services, how to choose a service provider, and how to go about implementation. It also covers security and

  14. Cloud Infrastructure & Applications - CloudIA

    Science.gov (United States)

    Sulistio, Anthony; Reich, Christoph; Doelitzscher, Frank

    The idea behind Cloud Computing is to deliver Infrastructure-as-a-Services and Software-as-a-Service over the Internet on an easy pay-per-use business model. To harness the potentials of Cloud Computing for e-Learning and research purposes, and to small- and medium-sized enterprises, the Hochschule Furtwangen University establishes a new project, called Cloud Infrastructure & Applications (CloudIA). The CloudIA project is a market-oriented cloud infrastructure that leverages different virtualization technologies, by supporting Service-Level Agreements for various service offerings. This paper describes the CloudIA project in details and mentions our early experiences in building a private cloud using an existing infrastructure.

  15. Study on ancient Chinese imitated GE ware by INAA and WDXRF

    International Nuclear Information System (INIS)

    Xie Guoxi; Feng Songlin; Feng Xiangqian; Wang Yanqing; Zhu Jihao; Yan Lingtong; Li Yongqiang; Han Hongye

    2007-01-01

    Imitated GE ware was one of the most famous products of Jingdezhen porcelain field in Ming dynasty (AD 1368-1644). The exterior features of its body and glaze are very marvelous. Black foot, purple mouth and crazing glaze are the main features of imitated GE ware. Until now, the key conditions of resulting these features are not clearly identified. In order to find the critical elements for firing these features, instrumental neutron activation analysis (INAA) and wavelength-dispersive X-ray fluorescence (WDXRF) were used to determine the element abundance patterns of imitated GE ware body and glaze. The experimental data was compared with that of imitated Longquan celadon and of Longquan celadon. The analytical results indicated that Fe, Ti and Na were the critical elements. The body of imitated GE ware which contains high Fe and Ti are the basic conditions of firing its black body, black foot and purple mouth. The glaze of imitated GE ware which contains high Na is the main condition of producing its crazing glaze. Na is the critical element which enlarges the difference in expansion coefficients between the glaze and body of imitated GE ware. Furthermore, Zijin soil was added into kaolin to make the body rich in Fe and Ti. And something which was rich in Na was used to produce crazing glaze in the manufacturing process of imitated GE ware

  16. Study on ancient Chinese imitated GE ware by INAA and WDXRF

    Science.gov (United States)

    Xie, Guoxi; Feng, Songlin; Feng, Xiangqian; Wang, Yanqing; Zhu, Jihao; Yan, Lingtong; Li, Yongqiang; Han, Hongye

    2007-11-01

    Imitated GE ware was one of the most famous products of Jingdezhen porcelain field in Ming dynasty (AD 1368-1644). The exterior features of its body and glaze are very marvelous. Black foot, purple mouth and crazing glaze are the main features of imitated GE ware. Until now, the key conditions of resulting these features are not clearly identified. In order to find the critical elements for firing these features, instrumental neutron activation analysis (INAA) and wavelength-dispersive X-ray fluorescence (WDXRF) were used to determine the element abundance patterns of imitated GE ware body and glaze. The experimental data was compared with that of imitated Longquan celadon and of Longquan celadon. The analytical results indicated that Fe, Ti and Na were the critical elements. The body of imitated GE ware which contains high Fe and Ti are the basic conditions of firing its black body, black foot and purple mouth. The glaze of imitated GE ware which contains high Na is the main condition of producing its crazing glaze. Na is the critical element which enlarges the difference in expansion coefficients between the glaze and body of imitated GE ware. Furthermore, Zijin soil was added into kaolin to make the body rich in Fe and Ti. And something which was rich in Na was used to produce crazing glaze in the manufacturing process of imitated GE ware.

  17. Study on ancient Chinese imitated GE ware by INAA and WDXRF

    Energy Technology Data Exchange (ETDEWEB)

    Xie Guoxi [Institute of High Energy Physics, Chinese Academy of Sciences, 19 Yu Quan Lu, Beijing 100049 (China); Graduated University of Chinese Academy of Sciences, Beijing 100049 (China); Feng Songlin [Institute of High Energy Physics, Chinese Academy of Sciences, 19 Yu Quan Lu, Beijing 100049 (China)], E-mail: fengsl@ihep.ac.cn; Feng Xiangqian; Wang Yanqing; Zhu Jihao; Yan Lingtong [Institute of High Energy Physics, Chinese Academy of Sciences, 19 Yu Quan Lu, Beijing 100049 (China); Li Yongqiang; Han Hongye [Beijing Institute of Cultural Relics, Beijing 100009 (China)

    2007-11-15

    Imitated GE ware was one of the most famous products of Jingdezhen porcelain field in Ming dynasty (AD 1368-1644). The exterior features of its body and glaze are very marvelous. Black foot, purple mouth and crazing glaze are the main features of imitated GE ware. Until now, the key conditions of resulting these features are not clearly identified. In order to find the critical elements for firing these features, instrumental neutron activation analysis (INAA) and wavelength-dispersive X-ray fluorescence (WDXRF) were used to determine the element abundance patterns of imitated GE ware body and glaze. The experimental data was compared with that of imitated Longquan celadon and of Longquan celadon. The analytical results indicated that Fe, Ti and Na were the critical elements. The body of imitated GE ware which contains high Fe and Ti are the basic conditions of firing its black body, black foot and purple mouth. The glaze of imitated GE ware which contains high Na is the main condition of producing its crazing glaze. Na is the critical element which enlarges the difference in expansion coefficients between the glaze and body of imitated GE ware. Furthermore, Zijin soil was added into kaolin to make the body rich in Fe and Ti. And something which was rich in Na was used to produce crazing glaze in the manufacturing process of imitated GE ware.

  18. Total dissolved gas prediction and optimization in RiverWare

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, Kevin M. [Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States); Witt, Adam M. [Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States); Hadjerioua, Boualem [Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)

    2015-09-01

    Management and operation of dams within the Columbia River Basin (CRB) provides the region with irrigation, hydropower production, flood control, navigation, and fish passage. These various system-wide demands can require unique dam operations that may result in both voluntary and involuntary spill, thereby increasing tailrace levels of total dissolved gas (TDG) which can be fatal to fish. Appropriately managing TDG levels within the context of the systematic demands requires a predictive framework robust enough to capture the operationally related effects on TDG levels. Development of the TDG predictive methodology herein attempts to capture the different modes of hydro operation, thereby making it a viable tool to be used in conjunction with a real-time scheduling model such as RiverWare. The end result of the effort will allow hydro operators to minimize system-wide TDG while meeting hydropower operational targets and constraints. The physical parameters such as spill and hydropower flow proportions, accompanied by the characteristics of the dam such as plant head levels and tailrace depths, are used to develop the empirically-based prediction model. In the broader study, two different models are developed a simplified and comprehensive model. The latter model incorporates more specific bubble physics parameters for the prediction of tailrace TDG levels. The former model is presented herein and utilizes an empirically based approach to predict downstream TDG levels based on local saturation depth, spillway and powerhouse flow proportions, and entrainment effects. Representative data collected from each of the hydro projects is used to calibrate and validate model performance and the accuracy of predicted TDG uptake. ORNL, in conjunction with IIHR - Hydroscience & Engineering, The University of Iowa, carried out model adjustments to adequately capture TDG levels with respect to each plant while maintaining a generalized model configuration. Validation results

  19. COMPARATIVE STUDY OF CLOUD COMPUTING AND MOBILE CLOUD COMPUTING

    OpenAIRE

    Nidhi Rajak*, Diwakar Shukla

    2018-01-01

    Present era is of Information and Communication Technology (ICT) and there are number of researches are going on Cloud Computing and Mobile Cloud Computing such security issues, data management, load balancing and so on. Cloud computing provides the services to the end user over Internet and the primary objectives of this computing are resource sharing and pooling among the end users. Mobile Cloud Computing is a combination of Cloud Computing and Mobile Computing. Here, data is stored in...

  20. Research and development of intelligent controller for high-grade sanitary ware

    Science.gov (United States)

    Bao, Kongjun; Shen, Qingping

    2013-03-01

    With the social and economic development and people's living standards improve, more and more emphasis on modern society, people improve the quality of family life, the use of intelligent controller applications in high-grade sanitary ware physiotherapy students. Analysis of high-grade sanitary ware physiotherapy common functions pointed out in the production and use of the possible risks, proposed implementation of the system hardware and matching, given the system software implementation process. High-grade sanitary ware physiotherapy intelligent controller not only to achieve elegant and beautiful, simple, physical therapy, water power, deodorant, multi-function, intelligent control, to meet the consumers, the high-end sanitary ware market, strong demand, Accelerate the enterprise product Upgrade and improve the competitiveness of enterprises.

  1. Ceramic ware waste as coarse aggregate for structural concrete production.

    Science.gov (United States)

    García-González, Julia; Rodríguez-Robles, Desirée; Juan-Valdés, Andrés; Morán-Del Pozo, Julia M; Guerra-Romero, M Ignacio

    2015-01-01

    The manufacture of any kind of product inevitably entails the production of waste. The quantity of waste generated by the ceramic industry, a very important sector in Spain, is between 5% and 8% of the final output and it is therefore necessary to find an effective waste recovery method. The aim of the study reported in the present article was to seek a sustainable means of managing waste from the ceramic industry through the incorporation of this type of waste in the total replacement of conventional aggregate (gravel) used in structural concrete. Having verified that the recycled ceramic aggregates met all the technical requirements imposed by current Spanish legislation, established in the Code on Structural Concrete (EHE-08), then it is prepared a control concrete mix and the recycled concrete mix using 100% recycled ceramic aggregate instead of coarse natural aggregate. The concretes obtained were subjected to the appropriate tests in order to conduct a comparison of their mechanical properties. The results show that the concretes made using ceramic sanitary ware aggregate possessed the same mechanical properties as those made with conventional aggregate. It is therefore possible to conclude that the reuse of recycled ceramic aggregate to produce recycled concrete is a feasible alternative for the sustainable management of this waste.

  2. Security and privacy in the clouds: a bird's eye view

    NARCIS (Netherlands)

    Pieters, Wolter; Gutwirth, Serge; Poullet, Yves; De Hert, Paul; Leenes, Ronald

    2011-01-01

    Over the last years, something called "cloud computing" has become a major theme in computer science and information security. Essentially, it concerns delivering information technology as a service, by enabling the renting of soft-ware, computing power and storage. In this contribution, we give a

  3. Provenance studies of Sgraffiato and Late Green Glazed wares from Siraf, Iran

    International Nuclear Information System (INIS)

    Michel, H.V.; Asaro, F.; Frierman, J.D.

    1975-03-01

    Results of neutron activation analyses of 23 elements in ceramic archaeological specimens are given. Various wares are divided into the following categories: early Sgraffiato, late Sgraffiato, late Green A, late Green B, and Samarra ware. Results are given on the following elements: Al, Ca, Dy, Mn, Na, K, U, Sm, La, Ti, Lu, Co, Sc, Fe, Cs, Cr, Ni, Eu, Ce, Hf, Ta, Th, and Yb. (JGB)

  4. Emerging Cloud Computing Security Threats

    OpenAIRE

    Ahmat, Kamal

    2015-01-01

    Cloud computing is one of the latest emerging innovations of the modern internet and technological landscape. With everyone from the White house to major online technological leaders like Amazon and Google using or offering cloud computing services it is truly presents itself as an exciting and innovative method to store and use data on the internet.

  5. Intelligent Middle-Ware Architecture for Mobile Networks

    Science.gov (United States)

    Rayana, Rayene Ben; Bonnin, Jean-Marie

    Recent advances in electronic and automotive industries as well as in wireless telecommunication technologies have drawn a new picture where each vehicle became “fully networked”. Multiple stake-holders (network operators, drivers, car manufacturers, service providers, etc.) will participate in this emerging market, which could grow following various models. To free the market from technical constraints, it is important to return to the basics of the Internet, i.e., providing embarked devices with a fully operational Internet connectivity (IPv6).

  6. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  7. Cloud Computing for radiologists.

    Science.gov (United States)

    Kharat, Amit T; Safvi, Amjad; Thind, Ss; Singh, Amarjit

    2012-07-01

    Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as applications, client, infrastructure, storage, services, and processing power, Cloud computing can help imaging units rapidly scale and descale operations and avoid huge spending on maintenance of costly applications and storage. Cloud computing allows flexibility in imaging. It sets free radiology from the confines of a hospital and creates a virtual mobile office. The downsides to Cloud computing involve security and privacy issues which need to be addressed to ensure the success of Cloud computing in the future.

  8. Cloud Computing for radiologists

    International Nuclear Information System (INIS)

    Kharat, Amit T; Safvi, Amjad; Thind, SS; Singh, Amarjit

    2012-01-01

    Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as applications, client, infrastructure, storage, services, and processing power, Cloud computing can help imaging units rapidly scale and descale operations and avoid huge spending on maintenance of costly applications and storage. Cloud computing allows flexibility in imaging. It sets free radiology from the confines of a hospital and creates a virtual mobile office. The downsides to Cloud computing involve security and privacy issues which need to be addressed to ensure the success of Cloud computing in the future

  9. Cloud computing for radiologists

    Directory of Open Access Journals (Sweden)

    Amit T Kharat

    2012-01-01

    Full Text Available Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as applications, client, infrastructure, storage, services, and processing power, Cloud computing can help imaging units rapidly scale and descale operations and avoid huge spending on maintenance of costly applications and storage. Cloud computing allows flexibility in imaging. It sets free radiology from the confines of a hospital and creates a virtual mobile office. The downsides to Cloud computing involve security and privacy issues which need to be addressed to ensure the success of Cloud computing in the future.

  10. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  11. Research on Influence of Cloud Environment on Traditional Network Security

    Science.gov (United States)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  12. Mobile Agent based Market Basket Analysis on Cloud

    OpenAIRE

    Waghmare, Vijayata; Mukhopadhyay, Debajyoti

    2014-01-01

    This paper describes the design and development of a location-based mobile shopping application for bakery product shops. Whole application is deployed on cloud. The three-tier architecture consists of, front-end, middle-ware and back-end. The front-end level is a location-based mobile shopping application for android mobile devices, for purchasing bakery products of nearby places. Front-end level also displays association among the purchased products. The middle-ware level provides a web ser...

  13. A Revolution in Information Technology - Cloud Computing

    OpenAIRE

    Divya BHATT

    2012-01-01

    What is the Internet? It is collection of “interconnected networks” represented as a Cloud in network diagrams and Cloud Computing is a metaphor for certain parts of the Internet. The IT enterprises and individuals are searching for a way to reduce the cost of computation, storage and communication. Cloud Computing is an Internet-based technology providing “On-Demand” solutions for addressing these scenarios that should be flexible enough for adaptation and responsive to requirements. The hug...

  14. A Survey on Cloud Security Issues and Techniques

    OpenAIRE

    Sharma, Shubhanjali; Gupta, Garima; Laxmi, P. R.

    2014-01-01

    Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. ...

  15. Bioinformatics clouds for big data manipulation

    KAUST Repository

    Dai, Lin; Gao, Xin; Guo, Yan; Xiao, Jingfa; Zhang, Zhang

    2012-01-01

    -supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues

  16. Legal-Ware: Contract and Copyright in the Digital Age

    OpenAIRE

    Madison, Michael

    2017-01-01

    ProCD, Inc. v. Zeidenberg, which enforced a shrinkwrap license for computer software, has encouraged the expansion of the shrinkwrap form beyond computer programs, forward, onto the Internet, and backward, toward such traditional works as books and magazines. Authors and publishers are using that case to advance norms of information use that exclude, practically and conceptually, a robust public domain and a meaningful doctrine of fair use. Contesting such efforts by focusing on the contractu...

  17. Cloud Computing dan Dampaknya Terhadap Bisnis

    OpenAIRE

    James Tandy; Siswono Siswono

    2013-01-01

    The purpose of this paper is to provide an overview of cloud computing and its development as well as the advantages and disadvantages of cloud computing implementation at some companies. Some literature studies from journals, textbooks and internet sources are discussed. Based on these searches it is known that the cloud computing as a technology that utilizes internet services uses a central server to the virtual nature of data and application maintenance purposes. The existence of Cloud Co...

  18. MVC for content management on the cloud

    OpenAIRE

    McGruder, Crystal A.

    2011-01-01

    Approved for public release; distribution is unlimited. Cloud computing portrays a new model for providing IT services over the Internet. In cloud computing, resources are accessed from the Internet through web-based tools. Although cloud computing offers reduced cost, increased storage, high automation, flexibility, mobility, and the ability of IT to shift focus, there are other concerns such as the management, organization and structure of content on the cloud that large organizations sh...

  19. Cloud Computing: An Overview

    Science.gov (United States)

    Qian, Ling; Luo, Zhiguo; Du, Yujian; Guo, Leitao

    In order to support the maximum number of user and elastic service with the minimum resource, the Internet service provider invented the cloud computing. within a few years, emerging cloud computing has became the hottest technology. From the publication of core papers by Google since 2003 to the commercialization of Amazon EC2 in 2006, and to the service offering of AT&T Synaptic Hosting, the cloud computing has been evolved from internal IT system to public service, from cost-saving tools to revenue generator, and from ISP to telecom. This paper introduces the concept, history, pros and cons of cloud computing as well as the value chain and standardization effort.

  20. The Effect of the Flipped Classroom Approach to OpenCourseWare Instruction on Students' Self-Regulation

    Science.gov (United States)

    Sun, Jerry Chih-Yuan; Wu, Yu-Ting; Lee, Wei-I

    2017-01-01

    The purpose of this study was to investigate the effect of the flipped classroom approach to OpenCourseWare instruction on students' self-regulation. OpenCourseWare was integrated into the flipped classroom model (experimental group) and distance learning (control group). Overall, 181 freshmen taking a physics course were allowed to choose their…

  1. 75 FR 49549 - ABC & D Recycling, Inc.-Lease and Operation Exemption-a Line of Railroad in Ware, MA

    Science.gov (United States)

    2010-08-13

    ... DEPARTMENT OF TRANSPORTATION Surface Transportation Board [Docket No. FD 35397] ABC & D Recycling, Inc.--Lease and Operation Exemption--a Line of Railroad in Ware, MA ABC & D Recycling, Inc. (ABC & D..., ABC & D Recycling, Inc.--Lease and Operation Exemption--a Line of Railroad in Ware, Massachusetts (STB...

  2. Providing Availability, Performance, and Scalability By Using Cloud Database

    OpenAIRE

    Prof. Dr. Alaa Hussein Al-Hamami; RafalAdeeb Al-Khashab

    2014-01-01

    With the development of the internet, new technical and concepts have attention to all users of the internet especially in the development of information technology, such as concept is cloud. Cloud computing includes different components, of which cloud database has become an important one. A cloud database is a distributed database that delivers computing as a service or in form of virtual machine image instead of a product via the internet; its advantage is that database can...

  3. Analysis of seed and ware potato production systems and yield constraints in Argentina

    NARCIS (Netherlands)

    Caldiz, D.O.

    2000-01-01

    The aim of this thesis is to analyze the seed and ware potato production systems in Argentina and their possible yield constraints in order to develop specific strategies to increase seed quality and tuber yield.

    This thesis starts with a survey of the actual potato

  4. Soft ware upgrade for Mobile Laboratories in Estonia, Latvia and Lithuania

    DEFF Research Database (Denmark)

    Bargholz, Kim; Andersen, Frank

    1998-01-01

    In July-August 1998 the soft ware for controlling the measurements in the mobile laboratories have been upgraded. The mobile laboratories are sponsored by Danish east aid projects in cooperation with Rotaray Denmark.The equipment used is 4 L NaI(Tl) detectors mounted on the roof of the cars toget...

  5. Business plan Locally produced and branded ware potato, Zambezi Valley, Mozambique

    NARCIS (Netherlands)

    Haverkort, A.J.; Saavedra Gonzalez, Y.R.

    2015-01-01

    This business plan has been prepared for local entrepreneurs who would like to expand their business portfolio or to start an agricultural value chain business in the potato sector in the region of Tete. The four-year business plan intends to create a locally produced and branded ware potato value

  6. 75 FR 62144 - Porcelain-on-Steel Cooking Ware From China and Taiwan; Top-of-the-Stove Stainless Steel Cooking...

    Science.gov (United States)

    2010-10-07

    ...); (Investigation Nos. 701-TA-267 and 731-TA-304 (Third Review))] Porcelain-on-Steel Cooking Ware From China and Taiwan; Top-of- the-Stove Stainless Steel Cooking Ware From Korea AGENCY: United States International... porcelain-on-steel cooking ware from China and Taiwan and the antidumping and countervailing duty orders on...

  7. Modeling Dissolved Solids in the Rincon Valley, New Mexico Using RiverWare

    Science.gov (United States)

    Abudu, S.; Ahn, S. R.; Sheng, Z.

    2017-12-01

    Simulating transport and storage of dissolved solids in surface water and underlying alluvial aquifer is essential to evaluate the impacts of surface water operations, groundwater pumping, and climate variability on the spatial and temporal variability of salinity in the Rio Grande Basin. In this study, we developed a monthly RiverWare water quantity and quality model to simulate the both concentration and loads of dissolved solids for the Rincon Valley, New Mexico from Caballo Reservoir to Leasburg Dam segment of the Rio Grande. The measured flows, concentration and loads of dissolved solids in the main stream and drains were used to develop RiveWare model using 1980-1988 data for calibration, and 1989-1995 data for validation. The transport of salt is tracked using discretized salt and post-process approaches. Flow and salt exchange between the surface water and adjacent groundwater objects is computed using "soil moisture salt with supplemental flow" method in the RiverWare. In the groundwater objects, the "layered salt" method is used to simulate concentration of the dissolved solids in the shallow groundwater storage. In addition, the estimated local inflows under different weather conditions by using a calibrated Soil Water Assessment Tool (SWAT) were fed into the RiverWare to refine the simulation of the flow and dissolved solids. The results show the salt concentration and loads increased at Leasburg Dam, which indicates the river collects salts from the agricultural return flow and the underlying aquifer. The RiverWare model with the local inflow fed by SWAT delivered the better quantification of temporal and spatial salt exchange patterns between the river and the underlying aquifer. The results from the proposed modeling approach can be used to refine the current mass-balance budgets for dissolved-solids transport in the Rio Grande, and provide guidelines for planning and decision-making to control salinity in arid river environment.

  8. MULTI TENANCY SECURITY IN CLOUD COMPUTING

    OpenAIRE

    Manjinder Singh*, Charanjit Singh

    2017-01-01

    The word Cloud is used as a metaphor for the internet, based on standardised use of a cloud like shape to denote a network. Cloud Computing is advanced technology for resource sharing through network with less cost as compare to other technologies. Cloud infrastructure supports various models IAAS, SAAS, PAAS. The term virtualization in cloud computing is very useful today. With the help of virtualization, more than one operating system is supported with all resources on single H/W. We can al...

  9. A Survey Paper on Privacy Issue in Cloud Computing

    OpenAIRE

    Yousra Abdul Alsahib S. Aldeen; Mazleena Salleh; Mohammad Abdur Razzaque

    2015-01-01

    In past few years, cloud computing is one of the popular paradigm to host and deliver services over Internet. It is having popularity by offering multiple computing services as cloud storage, cloud hosting and cloud servers etc., for various types of businesses as well as in academics. Though there are several benefits of cloud computing, it suffers from security and privacy challenges. Privacy of cloud system is a serious concern for the customers. Considering the privacy within the cloud th...

  10. Cloud Computing: Architecture and Services

    OpenAIRE

    Ms. Ravneet Kaur

    2018-01-01

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. It is a method for delivering information technology (IT) services where resources are retrieved from the Internet through web-based tools and applications, as opposed to a direct connection to a server. Rather than keeping files on a proprietary hard drive or local storage device, cloud-based storage makes it possib...

  11. CLOUD COMPUTING OVERVIEW AND CHALLENGES: A REVIEW PAPER

    OpenAIRE

    Satish Kumar*, Vishal Thakur, Payal Thakur, Ashok Kumar Kashyap

    2017-01-01

    Cloud computing era is the most resourceful, elastic, utilized and scalable period for internet technology to use the computing resources over the internet successfully. Cloud computing did not provide only the speed, accuracy, storage capacity and efficiency for computing but it also lead to propagate the green computing and resource utilization. In this research paper, a brief description of cloud computing, cloud services and cloud security challenges is given. Also the literature review o...

  12. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  13. CLOUD COMPUTING TECHNOLOGY TRENDS

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-05-01

    Full Text Available Cloud computing has been a tremendous innovation, through which applications became available online, accessible through an Internet connection and using any computing device (computer, smartphone or tablet. According to one of the most recent studies conducted in 2012 by Everest Group and Cloud Connect, 57% of companies said they already use SaaS application (Software as a Service, and 38% reported using standard tools PaaS (Platform as a Service. However, in the most cases, the users of these solutions highlighted the fact that one of the main obstacles in the development of this technology is the fact that, in cloud, the application is not available without an Internet connection. The new challenge of the cloud system has become now the offline, specifically accessing SaaS applications without being connected to the Internet. This topic is directly related to user productivity within companies as productivity growth is one of the key promises of cloud computing system applications transformation. The aim of this paper is the presentation of some important aspects related to the offline cloud system and regulatory trends in the European Union (EU.

  14. Flying to the Cloud : Governments Seek Gains from Cloud Computing

    OpenAIRE

    Melhem, Samia; Kim, Seunghyun

    2016-01-01

    The transition to cloud computing broadly means shifting programs and data from personal or office hardware to shared hardware that many individuals and organizations access over the Internet. That migration is happening fast. By 2019, according to the information technology company Cisco, 83 percent of all global data center traffic will come from cloud services. And the profitability of ...

  15. Cloud Computing Security Issue: Survey

    Science.gov (United States)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  16. Cloud Computing: Exploring the scope

    OpenAIRE

    Maurya, Brajesh Kumar

    2010-01-01

    Cloud computing refers to a paradigm shift to overall IT solutions while raising the accessibility, scalability and effectiveness through its enabling technologies. However, migrated cloud platforms and services cost benefits as well as performances are neither clear nor summarized. Globalization and the recessionary economic times have not only raised the bar of a better IT delivery models but also have given access to technology enabled services via internet. Cloud computing has va...

  17. Networking for the Cloud: Challenges and Trends

    NARCIS (Netherlands)

    Drago, Idilio; de Oliveira Schmidt, R.; Hofstede, R.J.; Sperotto, Anna; Karimzadeh Motallebi Azar, Morteza; Haverkort, Boudewijn R.H.M.; Pras, Aiko

    2013-01-01

    Cloud services have changed the way computing power is delivered to customers, by offering computing and storage capacity in remote data centers on demand over the Internet. The success of the cloud model, however, has not come without challenges. Cloud providers have repeatedly been related to

  18. The Education Value of Cloud Computing

    Science.gov (United States)

    Katzan, Harry, Jr.

    2010-01-01

    Cloud computing is a technique for supplying computer facilities and providing access to software via the Internet. Cloud computing represents a contextual shift in how computers are provisioned and accessed. One of the defining characteristics of cloud software service is the transfer of control from the client domain to the service provider.…

  19. Cloud Computing. Technology Briefing. Number 1

    Science.gov (United States)

    Alberta Education, 2013

    2013-01-01

    Cloud computing is Internet-based computing in which shared resources, software and information are delivered as a service that computers or mobile devices can access on demand. Cloud computing is already used extensively in education. Free or low-cost cloud-based services are used daily by learners and educators to support learning, social…

  20. Provenience studies of the Ko-Kutani ware by neutron activation analysis

    International Nuclear Information System (INIS)

    Kawashima, Tatsuro.

    1990-01-01

    The instrumental neutron activation analysis has been applied to the multielemental analysis of eight samples of the Ko-Kutani ware including the Aote's that is one of semi-porcelain body. Each sample was compared with concentration of the useful index element, such as Ta, Sc, Ba, Hf, Th and rare earth, to discriminate the Arita group from the Kutani group. Eight samples were judged as products of the Arita, just as in previous paper. (author)

  1. Benchmarking personal cloud storage

    NARCIS (Netherlands)

    Drago, Idilio; Bocchi, Enrico; Mellia, Marco; Slatman, Herman; Pras, Aiko

    2013-01-01

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all -

  2. Data in the Cloud

    Science.gov (United States)

    Bull, Glen; Garofalo, Joe

    2010-01-01

    The ability to move from one representation of data to another is one of the key characteristics of expert mathematicians and scientists. Cloud computing will offer more opportunities to create and display multiple representations of data, making this skill even more important in the future. The advent of the Internet led to widespread…

  3. KnoWare: A System for Citizen-based Environmental Monitoring

    Directory of Open Access Journals (Sweden)

    Joseph T. Chao

    2016-05-01

    Full Text Available Non-expert scientists are frequently involved in research requiring data acquisition over large geographic areas. Despite mutual benefits for such “citizen science”, barriers also exist, including 1 difficulty maintaining user engagement with timely feedback, and 2 the challenge of providing non-experts with the means to generate reliable data. We have developed a system that addresses these barriers. Our technologies, KnoWare and InSpector, allow users to: collect reliable scientific measurements, map geo-tagged data, and intuitively visualize the results in real-time. KnoWare comprises a web portal and an iOS app with two core functions. First, users can generate scientific ‘queries’ that entail a call for information posed to a crowd with customized options for participant responses and viewing data. Second, users can respond to queries with their GPS-enabled mobile device, which results in their geo- and time-stamped responses populating a web-accessible map in real time. KnoWare can also interface with additional applications to diversify the types of data that can be reported. We demonstrate this capability with a second iOS app called InSpector that performs quantitative water quality measurements. When used in combina-tion, these technologies create a workflow to facilitate the collection, sharing and interpretation of scientific data by non-expert scientists.

  4. Mineralogy and microstructure of hydrated phases during the pozzolanic reaction in the sanitary ware waste/Ca(OH)2 system

    OpenAIRE

    Medina, César; Sáez del Bosque, Isabel F.; Asensio, Eloy; Frías, Moisés; Sánchez de Rojas, M Isabel

    2016-01-01

    Despite technological improvements in its production process, the sanitary ware industry inevitably generates a certain volume of discards, products whose quality is not up to standard. The present paper is the first to scientifically explore claybased sanitary ware waste (SW) with a view to its valorization as an addition in the design of new, more environmentally friendly cements. The focus is on characterization of the waste and its pozzolanicity, as well as the struct...

  5. Advantages and disadvantages of using intravenous tissue Plasminogen activator as salvage therapy for inoperable HeartWare thrombosis.

    Science.gov (United States)

    Basken, Robyn; Bazzell, Charles M; Smith, Richard; Janardhanan, Rajesh; Khalpey, Zain

    2017-07-01

    Device thrombosis is a devastating complication of left ventricular assist devices. The definitive treatment has been device exchange or explant. Evidence of increasing morbidity and mortality with device exchange has shifted strategies toward conservative management. In this report, we detail the use of thrombolytics as salvage therapy in a patient with an occlusive HeartWare ventricular assist device (HeartWare Inc., Framingham, MA) thrombus, resulting in long-term survival without further intervention. © 2017 Wiley Periodicals, Inc.

  6. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  7. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  8. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  9. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  10. Towards the internet of services

    CERN Document Server

    Wahlster, Wolfgang; Wess, Stefan; Friedrich, Hermann; Widenka, Thomas

    2014-01-01

    The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on se­mantic technologies and the future Internet of Everything. Semantic technologies now enable mass cus­tomization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial econ­omy, the service economy, and the emerging data economy, leading to

  11. Security Challenges of the Internet of Things

    OpenAIRE

    Goeke, Lisa

    2017-01-01

    The ‘Internet of Things’ is the buzz phrase that describes a new era of computation. Briefly, the Internet of Things can be defined as the interaction of smart objects that are connected to the Internet. These objects can sense, share and process information, upload them in the cloud, and make them available to the user via a large amount of different applications. Despite all of these promising innovations, the Internet of Things, as every other technology, faces multiple security...

  12. Securing the Data in Clouds with Hyperelliptic Curve Cryptography

    OpenAIRE

    Mukhopadhyay, Debajyoti; Shirwadkar, Ashay; Gaikar, Pratik; Agrawal, Tanmay

    2014-01-01

    In todays world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing all the necessary resources. Even modern business architecture depends upon Cloud computing .As it is a internet based utility, which provides various services over a network, it is prone to network based attacks. Hence security in clouds is the most important in case of cloud computing. Cloud Security concerns the customer to fully rely on storing data on clouds. Th...

  13. The Future of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Anamaroa SIclovan

    2011-12-01

    Full Text Available Cloud computing was and it will be a new way of providing Internet services and computers. This calculation approach is based on many existing services, such as the Internet, grid computing, Web services. Cloud computing as a system aims to provide on demand services more acceptable as price and infrastructure. It is exactly the transition from computer to a service offeredto the consumers as a product delivered online. This represents an advantage for the organization both regarding the cost and the opportunity for the new business. This paper presents the future perspectives in cloud computing. The paper presents some issues of the cloud computing paradigm. It is a theoretical paper.Keywords: Cloud Computing, Pay-per-use

  14. Cloud Computing Organizational Benefits : A Managerial concern

    OpenAIRE

    Mandala, Venkata Bhaskar Reddy; Chandra, Marepalli Sharat

    2012-01-01

    Context: Software industry is looking for new methods and opportunities to reduce the project management problems and operational costs. Cloud Computing concept is providing answers to these problems. Cloud Computing is made possible with the availability of high internet bandwidth. Cloud Computing is providing wide range of various services to varied customer base. Cloud Computing has some key elements such as on-demand services, large pool of configurable computing resources and minimal man...

  15. Cloud Computing Security Latest Issues amp Countermeasures

    OpenAIRE

    Shelveen Pandey; Mohammed Farik

    2015-01-01

    Abstract Cloud computing describes effective computing services provided by a third-party organization known as cloud service provider for organizations to perform different tasks over the internet for a fee. Cloud service providers computing resources are dynamically reallocated per demand and their infrastructure platform and software and other resources are shared by multiple corporate and private clients. With the steady increase in the number of cloud computing subscribers of these shar...

  16. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

    OpenAIRE

    Dong, Qingkuan; Tong, Jiaqing; Chen, Yuan

    2015-01-01

    With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Th...

  17. Advanced cloud fault tolerance system

    Science.gov (United States)

    Sumangali, K.; Benny, Niketa

    2017-11-01

    Cloud computing has become a prevalent on-demand service on the internet to store, manage and process data. A pitfall that accompanies cloud computing is the failures that can be encountered in the cloud. To overcome these failures, we require a fault tolerance mechanism to abstract faults from users. We have proposed a fault tolerant architecture, which is a combination of proactive and reactive fault tolerance. This architecture essentially increases the reliability and the availability of the cloud. In the future, we would like to compare evaluations of our proposed architecture with existing architectures and further improve it.

  18. Research on cloud computing solutions

    Directory of Open Access Journals (Sweden)

    Liudvikas Kaklauskas

    2015-07-01

    Full Text Available Cloud computing can be defined as a new style of computing in which dynamically scala-ble and often virtualized resources are provided as a services over the Internet. Advantages of the cloud computing technology include cost savings, high availability, and easy scalability. Voas and Zhang adapted six phases of computing paradigms, from dummy termi-nals/mainframes, to PCs, networking computing, to grid and cloud computing. There are four types of cloud computing: public cloud, private cloud, hybrid cloud and community. The most common and well-known deployment model is Public Cloud. A Private Cloud is suited for sensitive data, where the customer is dependent on a certain degree of security.According to the different types of services offered, cloud computing can be considered to consist of three layers (services models: IaaS (infrastructure as a service, PaaS (platform as a service, SaaS (software as a service. Main cloud computing solutions: web applications, data hosting, virtualization, database clusters and terminal services. The advantage of cloud com-puting is the ability to virtualize and share resources among different applications with the objective for better server utilization and without a clustering solution, a service may fail at the moment the server crashes.DOI: 10.15181/csat.v2i2.914

  19. Monogràfic "VI Congrés Internet, Dret i Política. Cloud Computing: El Dret i la Política Pugen al Núvol"

    Directory of Open Access Journals (Sweden)

    Estudis de Dret i Ciència Política

    2011-01-01

    Full Text Available

    L'any 2010 és l'any cloud computing. Així ho afirmen nombrosos analistes i especialistes que veuen que s'expandeixen aplicacions que, en lloc de ser executades a l'ordinador de sobretaula o al portàtil, són hostatjades en un servidor, i a les quals s'accedeix mitjançant un navegador qualsevol. Aquesta expansió és facilitada per la massiva adopció d'ordinadors ultraportàtils i telèfons mòbils intel·ligents, així com per la creixent realitat del teletreball i la col·laboració en xarxa entre administracions, empreses i ciutadans.

    Tenir les dades, els documents de text, els fulls de càlcul, les aplicacions de gestió de clients o d'estocs, i la coordinació de processos i projectes emmagatzemats en servidors de tercers; fer passar les comunicacions personals i professionals per un navegador, o obrir la nostra participació ciutadana a tothom són possibilitats que ens ofereixen noves oportunitats, però també nous reptes sobre com entenem la feina, les relacions professionals o l'exercici de la democràcia.

    Aquests reptes i oportunitats van constituir el punt de trobada de la sisena edició del Congrés Internacional IDP - Internet, Dret i Política, que es va centrar a analitzar i debatre els diferents problemes jurídics i polítics que planteja o pot plantejar la massiva extensió del cloud computing tant a escala professional com personal i ciutadana.

  20. Hard Ware Implementation of Diamond Search Algorithm for Motion Estimation and Object Tracking

    International Nuclear Information System (INIS)

    Hashimaa, S.M.; Mahmoud, I.I.; Elazm, A.A.

    2009-01-01

    Object tracking is very important task in computer vision. Fast search algorithms emerged as important search technique to achieve real time tracking results. To enhance the performance of these algorithms, we advocate the hardware implementation of such algorithms. Diamond search block matching motion estimation has been proposed recently to reduce the complexity of motion estimation. In this paper we selected the diamond search algorithm (DS) for implementation using FPGA. This is due to its fundamental role in all fast search patterns. The proposed architecture is simulated and synthesized using Xilinix and modelsim soft wares. The results agree with the algorithm implementation in Matlab environment.

  1. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  2. Cloud Computing Law

    CERN Document Server

    Millard, Christopher

    2013-01-01

    This book is about the legal implications of cloud computing. In essence, ‘the cloud’ is a way of delivering computing resources as a utility service via the internet. It is evolving very rapidly with substantial investments being made in infrastructure, platforms and applications, all delivered ‘as a service’. The demand for cloud resources is enormous, driven by such developments as the deployment on a vast scale of mobile apps and the rapid emergence of ‘Big Data’. Part I of this book explains what cloud computing is and how it works. Part II analyses contractual relationships between cloud service providers and their customers, as well as the complex roles of intermediaries. Drawing on primary research conducted by the Cloud Legal Project at Queen Mary University of London, cloud contracts are analysed in detail, including the appropriateness and enforceability of ‘take it or leave it’ terms of service, as well as the scope for negotiating cloud deals. Specific arrangements for public sect...

  3. Community Cloud Computing

    Science.gov (United States)

    Marinos, Alexandros; Briscoe, Gerard

    Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. Our response is an alternative model for the Cloud conceptualisation, providing a paradigm for Clouds in the community, utilising networked personal computers for liberation from the centralised vendor model. Community Cloud Computing (C3) offers an alternative architecture, created by combing the Cloud with paradigms from Grid Computing, principles from Digital Ecosystems, and sustainability from Green Computing, while remaining true to the original vision of the Internet. It is more technically challenging than Cloud Computing, having to deal with distributed computing issues, including heterogeneous nodes, varying quality of service, and additional security constraints. However, these are not insurmountable challenges, and with the need to retain control over our digital lives and the potential environmental consequences, it is a challenge we must pursue.

  4. Re-theorising mobility and the formation of culture and language among the Corded Ware Culture in Europe

    DEFF Research Database (Denmark)

    Kristiansen, Kristian; Allentoft, Morten E.; Frei, Karin M.

    2017-01-01

    North European Neolithic cultures. The original herding economy of the Yamnaya migrants gradually gave way to new practices of crop cultivation, which led to the adoption of new words for those crops. The result of this hybridisation process was the formation of a new material culture, the Corded Ware......Recent genetic, isotopic and linguistic research has dramatically changed our understanding of how the Corded Ware Culture in Europe was formed. Here the authors explain it in terms of local adaptations and interactions between migrant Yamnaya people from the Pontic-Caspian steppe and indigenous...... Culture, and of a new dialect, Proto-Germanic. Despite a degree of hostility between expanding Corded Ware groups and indigenous Neolithic groups, stable isotope data suggest that exogamy provided a mechanism facilitating their integration. This article should be read in conjunction with that by Heyd...

  5. High quality voice synthesis middle ware; Kohinshitsu onsei gosei middle war

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    Toshiba Corp. newly developed a natural voice synthesis system, TOS Drive TTS (TOtally speaker Driven Text-To-Speech) system, in which natural high-quality read-aloud is greatly improved, and also developed as its application a voice synthesis middle ware. In the newly developed system, using as a model a narrator's voice recorded preliminarily, a metrical control dictionary is automatically learned that reproduces the characteristics of metrical patters such as intonation or rhythm of a human voice, as is a voice bases dictionary that reproduces the characteristics of a voice quality, enabling natural voice synthesis to be realized that picks up human voice characteristics. The system is high quality and also very compact, while the voice synthesis middle ware utilizing this technology is adaptable to various platforms such as MPU or OS. The system is very suitable for audio response in the ITS field having car navigation systems as the core; besides, expanded application is expected to an audio response system that used to employ a sound recording and reproducing system. (translated by NEDO)

  6. Provenance analysis of the Pliocene Ware Formation in the Guajira Peninsula, northern Colombia: Paleodrainage implications

    Science.gov (United States)

    Pérez-Consuegra, Nicolás; Parra, Mauricio; Jaramillo, Carlos; Silvestro, Daniele; Echeverri, Sebastián; Montes, Camilo; Jaramillo, José María; Escobar, Jaime

    2018-01-01

    The Cocinetas Basin in the Guajira Peninsula, the northernmost tip of South America, today has a dry climate with low rainfall (ten months) and no year-long rivers or permanent standing bodies of fresh water. In contrast, the fossil and geological record indicate that the Cocinetas Basin was much wetter during the Miocene-Pliocene (∼17-2.8 Ma). Water needed to sustain the paleofauna could either have originated from local sources or been brought by a larger river system (e.g. proto Magdalena/Orinoco river) with headwaters either in Andean ranges or the Guyana shield. We present a provenance study of the Pliocene Ware Formation, using petrographic analysis of conglomerate clasts and heavy minerals, and U-Pb dating of 140 detrital zircons. Clasts and heavy minerals are typical of ensialic metamorphic and igneous sources. The detrital zircon age distribution indicates the Guajira ranges as the most probable sediment source. The overall results indicate that the fluvial system of the Ware Formation drained the surrounding ranges. The water was probably derived by local precipitation onto the Guajira peninsula.

  7. A Study of the Evaluation Dimensions and Criteria for OpenCourseWare Websites

    Directory of Open Access Journals (Sweden)

    Yi-Ju Wang

    2015-04-01

    Full Text Available OpenCourseWare (OCW, a set of free-of-use learning materials established by universities, became quite a success over the years and aroused the users’ willingness to learn online. However, the design of OCW websites, including the structure, organization of learning resources and interfaces is multi-variant and disordered. The system and arrangement are still lacking of an evaluation standard. The goal of this study is to establish and verify the dimensions and the criteria that are suitable for evaluation of OCW websites. To achieve the research goal, the researchers performed document analysis and the Delphi Method. Sixteen experts in a total took part in the Delphi panel. By giving three rounds of questionnaire to those experts in the self-developed e-Delphi system, the researcher gathered their opinions then analyzed them back and forth. The final edition of the Evaluation Dimensions and Criteria for OpenCourseWare Website includes seven dimensions with fifty-seven criteria. Finally, concrete suggestions for OCW website establishment and administration were provided. Implications and recommendations for future research were also addressed.

  8. Extending the Internet to make demand management e-smart

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, M. D. [emWare Inc., Salt Lake City, UT (United States)

    2001-06-01

    A new cost-effective solution to managing peak power demand by utility companies is described. The system was developed by Carrier Corporation, in conjunction with Silicon Energy, AT and T and emWare Inc. The program is known as 'ComfortChoice'. The heart of the system is a new generation of energy management interface (Emi) thermostat which is Internet-enabled. These thermostats allow the utility company to adjust the customer's temperature set point during peak energy time to reduce energy usage, while giving the customer complete freedom to override the utility company's settings and to control the thermostat remotely via a Web browser interface on a PC. The device-networking system runs on the EMIT software package, developed by emWare Inc, which is ideal for electronic devices with 8- or 16-bit micro-controllers, like thermostats and other everyday devices, and enable bringing the Internet into homes in a cost-effective platform. It is particularly well-suited to controlling power and resource management, heating and cooling systems, building and home automation, telemedicine and health services to network-enable new and existing products, making them e-smart. In addition to being enabled to monitor, diagnose, upgrade and control these devices over the Internet, the embedded micro internet-working technology (EMIT) also offers improved service, greater convenience, and increased cost savings. Productivity and safety are also claimed to be enhanced.

  9. Distributed Processing in Cloud Computing

    OpenAIRE

    Mavridis, Ilias; Karatza, Eleni

    2016-01-01

    Proceedings of the First PhD Symposium on Sustainable Ultrascale Computing Systems (NESUS PhD 2016) Timisoara, Romania. February 8-11, 2016. Cloud computing offers a wide range of resources and services through the Internet that can been used for various purposes. The rapid growth of cloud computing has exempted many companies and institutions from the burden of maintaining expensive hardware and software infrastructure. With characteristics like high scalability, availability ...

  10. Towards Media Intercloud Standardization Evaluating Impact of Cloud Storage Heterogeneity

    OpenAIRE

    Aazam, Mohammad; StHilaire, Marc; Huh, EuiNam

    2016-01-01

    Digital media has been increasing very rapidly, resulting in cloud computing's popularity gain. Cloud computing provides ease of management of large amount of data and resources. With a lot of devices communicating over the Internet and with the rapidly increasing user demands, solitary clouds have to communicate to other clouds to fulfill the demands and discover services elsewhere. This scenario is called intercloud computing or cloud federation. Intercloud computing still lacks standard ar...

  11. Framework for Monitoring and Evaluation of Users in Trusted Cloud

    OpenAIRE

    Nazeer T. Mohammed Saeed; Sanjay T. Singh

    2013-01-01

    In the cloud computing, due to users directly use and operate the software and OS, and even basic programming environment and network infrastructure which provided by the cloud services providers(CSP), so the impact and destruction for the software and hardware cloud resources in cloud computing are worse than the current Internet users who use it to share resources. Therefore, that whether user behavior is trusted, how to evaluate user behavior trust is an important research content in cloud...

  12. Towards Practical Privacy-Preserving Internet Services

    Science.gov (United States)

    Wang, Shiyuan

    2012-01-01

    Today's Internet offers people a vast selection of data centric services, such as online query services, the cloud, and location-based services, etc. These internet services bring people a lot of convenience, but at the same time raise privacy concerns, e.g., sensitive information revealed by the queries, sensitive data being stored and…

  13. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  14. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  15. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  16. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  17. Llums i ombres de l’Open Course Ware: envers l’OCW 2.0

    Directory of Open Access Journals (Sweden)

    Rosanna Mestre

    2009-12-01

    Full Text Available El Open Course Ware es una altruista iniciativa orientada a la educación superior que aporta beneficios tanto a estudiantes y profesores, como a las instituciones que la promueven. Pero también tiene ciertas limitaciones que podrían ser paliadas parcialmente si sus gestores miraran al futuro desde una perspectiva más ambiciosa con el fin de garantizar no sólo repositorios abiertos, sino también apoyo pedagógico y reconocimiento de títulos. Exigiría soluciones imaginativas y comprometidas para algunas cuestiones clave pero podría convertirse en una respuesta accesible para la inminente demanda global de formación universitaria. Las bases de esta especie de OCW 2.0 ya están construidas.Open Course Ware is an altruistic initiative for higher education that has benefits for both students and professors, and institutions that promote it. But it also has certain limitations that might be diminished partly if decision makers looked at the future from a more ambitious perspective in order to guarantee not only open repositories, but also teaching assessment and degreegranting. It would require imaginative and engaged solutions to some key issues, but it could be a reasonable answer for the impending worldwide demand for higher education. The bases for this sort of OCW 2.0 are built already.L’Open Course Ware és una altruista iniciativa orientada a l’educació superior que aporta beneficis tant a estudiants i professors, com a les institucions que la promouen. Però també té certes limitacions que podrien ser pal·liades parcialment si els seus gestors miraren al futur des d’una perspectiva més ambiciosa per tal de garantir no sols repositoris oberts, sinó també suport pedagògic i reconeixement de títols. Exigiria solucions imaginatives i compromeses per a algunes qu?estions clau, però podria esdevenir una resposta accessible per a la imminent demanda global de formació universitària. Les bases d’aquesta mena d

  18. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  19. Transition to the Cloud

    DEFF Research Database (Denmark)

    Hedman, Jonas; Xiao, Xiao

    2016-01-01

    The rising of cloud computing has dramatically changed the way software companies provide and distribute their IT product and related services over the last decades. Today, most software is bought offthe-shelf and distributed over the Internet. This transition is greatly influencing how software...... companies operate. In this paper, we present a case study of an ERP vendor for SMB (small and mediumsize business) in making a transition towards a cloud-based business model. Through the theoretical lens of ecosystem, we are able to analyze the evolution of the vendor and its business network as a whole......, and find that the relationship between vendor and Value-added-Reseller (VAR) is greatly affected. We conclude by presenting critical issues and challenges for managing such cloud transition....

  20. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  1. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  2. Cloud ERP and Cloud Accounting Software in Romania

    Directory of Open Access Journals (Sweden)

    Gianina MIHAI

    2015-05-01

    Full Text Available Nowadays, Cloud Computing becomes a more and more fashionable concept in the IT environment. There is no unanimous opinion on the definition of this concept, as it covers several versions of the newly emerged stage in the IT. But in fact, Cloud Computing should not suggest anything else than simplicity. Thus, in short, simple terms, Cloud Computing can be defined as a solution to use external IT resources (servers, storage media, applications and services, via Internet. Cloud computing is nothing more than the promise of an easy accessible technology. If the promise will eventually turn into something certain yet remains to be seen. In our opinion it is too early to make an assertion. In this article, our purpose is to find out what is the Romanian offer of ERP and Accounting software applications in Cloud and / or as services in SaaS version. Thus, we conducted an extensive study whose results we’ll present in the following.

  3. Inside Dropbox: Understanding Personal Cloud Storage Services

    NARCIS (Netherlands)

    Drago, Idilio; Mellia, Marco; Munafò, Maurizio M.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    2012-01-01

    Personal cloud storage services are gaining popularity. With a rush of providers to enter the market and an increasing offer of cheap storage space, it is to be expected that cloud storage will soon generate a high amount of Internet traffic. Very little is known about the architecture and the

  4. Cloud Computing in the EU Policy Sphere

    NARCIS (Netherlands)

    Sluijs, J.P.J.B.; Larouche, P.; Sauter, W.

    2011-01-01

    Cloud computing is a new development that is based on the premise that data and applications are stored centrally and can be accessed through the Internet. Our Article sets up a broad analysis of how the emergence of clouds relates to European law. We single out European competition law, network

  5. Navigating the Challenges of the Cloud

    Science.gov (United States)

    Ovadia, Steven

    2010-01-01

    Cloud computing is increasingly popular in education. Cloud computing is "the delivery of computer services from vast warehouses of shared machines that enables companies and individuals to cut costs by handing over the running of their email, customer databases or accounting software to someone else, and then accessing it over the internet."…

  6. 76 FR 7534 - Porcelain-on-Steel Cooking Ware from the People's Republic of China: Final Results of the...

    Science.gov (United States)

    2011-02-10

    ... Ware from the People's Republic of China: Final Results of the Expedited Sunset Review of the... People's Republic of China (``PRC'') pursuant to section 751(c) of the Tariff Act of 1930, as amended (``Act''). See Initiation of Five-Year (``Sunset'') Review, 75 FR 60731 (October 1, 2010) (``Sunset...

  7. Understanding the Self-Directed Online Learning Preferences, Goals, Achievements, and Challenges of MIT OpenCourseWare Subscribers

    Science.gov (United States)

    Bonk, Curtis J.; Lee, Mimi Miyoung; Kou, Xiaojing; Xu, Shuya; Sheu, Feng-Ru

    2015-01-01

    This research targeted the learning preferences, goals and motivations, achievements, challenges, and possibilities for life change of self-directed online learners who subscribed to the monthly OpenCourseWare (OCW) e-newsletter from MIT. Data collection included a 25-item survey of 1,429 newsletter subscribers; 613 of whom also completed an…

  8. Improving the Performance of Highly Constrained Water Resource Systems using Multiobjective Evolutionary Algorithms and RiverWare

    Science.gov (United States)

    Smith, R.; Kasprzyk, J. R.; Zagona, E. A.

    2015-12-01

    Instead of building new infrastructure to increase their supply reliability, water resource managers are often tasked with better management of current systems. The managers often have existing simulation models that aid their planning, and lack methods for efficiently generating and evaluating planning alternatives. This presentation discusses how multiobjective evolutionary algorithm (MOEA) decision support can be used with the sophisticated water infrastructure model, RiverWare, in highly constrained water planning environments. We first discuss a study that performed a many-objective tradeoff analysis of water supply in the Tarrant Regional Water District (TRWD) in Texas. RiverWare is combined with the Borg MOEA to solve a seven objective problem that includes systemwide performance objectives and individual reservoir storage reliability. Decisions within the formulation balance supply in multiple reservoirs and control pumping between the eastern and western parts of the system. The RiverWare simulation model is forced by two stochastic hydrology scenarios to inform how management changes in wet versus dry conditions. The second part of the presentation suggests how a broader set of RiverWare-MOEA studies can inform tradeoffs in other systems, especially in political situations where multiple actors are in conflict over finite water resources. By incorporating quantitative representations of diverse parties' objectives during the search for solutions, MOEAs may provide support for negotiations and lead to more widely beneficial water management outcomes.

  9. Re-theorising mobility and the formation of culture and language among the Corded Ware Culture in Europe

    DEFF Research Database (Denmark)

    Kristiansen, Kristian; Allentoft, Morten E.; Frei, Karin M.

    2017-01-01

    Recent genetic, isotopic and linguistic research has dramatically changed our understanding of how the Corded Ware Culture in Europe was formed. Here the authors explain it in terms of local adaptations and interactions between migrant Yamnaya people from the Pontic-Caspian steppe and indigenous ...

  10. Pots, plates and provenance: sourcing Indian coarse wares from Mleiha using X-ray fluorescence (XRF) spectrometry analysis

    International Nuclear Information System (INIS)

    Reddy, A; Attaelmanan, A G; Mouton, M

    2012-01-01

    The identification of more than 25% of the pottery sherds from the late PIR.D period (ca. 2nd - mid. 3rd c. AD) assemblage from the recently excavated building H at Mleiha as Indian is based on form and fabric, but using only visual assessment. Petrographic analysis of the fabrics can provide more precise indicators of the geographical origin of the wares. In this study, a total of 21 sherds from various key sites in Western India were compared with 7 different 'Indian' coarse-ware vessels sampled at Mleiha using X-ray fluorescence (XRF) spectrometry. The analyses were conducted on powdered samples collected from the core of each sherd. Each sample was irradiated for 1000 seconds using a 1.2 mm diameter X-ray beam. The resulting spectra were used for quantification of the X-ray intensity and elemental concentration. Levels of correlation in the elemental ratios of the sherds were statistically tested using an F-test as well as a Chi-test. Initial review of the XRF results indicates that the Maharashtra and Gujarat regions of India are probable source areas for at least two of the types of wares. Collection of additional samples from these areas and other regions of India, and further statistical analysis through methods such as Principal Component Analysis will help to isolate groups of wares from India and correlate them with types of vessels imported into the Oman peninsula in antiquity.

  11. 77 FR 60119 - Proposed Consent Agreements: DesignerWare, LLC, Timothy Kelly and Ronald P. Koller, Aspen Way...

    Science.gov (United States)

    2012-10-02

    ... the news release describing it. The FTC Act and other laws that the Commission administers permit the...' private information would not be possible. RTO stores also used Detective Mode to send fake ``software.... DesignerWare created several different fake registration forms that its servers displayed on consumers...

  12. 75 FR 11991 - ABC & D Recycling, Inc.-Lease and Operation Exemption-a Line of Railroad in Ware, MA

    Science.gov (United States)

    2010-03-12

    ... DEPARTMENT OF TRANSPORTATION Surface Transportation Board [STB Finance Docket No. 35356] ABC & D Recycling, Inc.--Lease and Operation Exemption--a Line of Railroad in Ware, MA ABC & D Recycling, Inc. (ABC & D), a noncarrier, has filed a verified notice of exemption under 49 CFR 1150.31 to lease from O...

  13. Surface Coating Technique of Northern Black Polished Ware by the Microscopic Analysis

    Directory of Open Access Journals (Sweden)

    Dilruba Sharmin

    2012-12-01

    Full Text Available An organic substance has been identified in the top layer of Northern Black Polished Ware (NBPW excavated from the Wari-Boteshwar and Mahasthangarh sites in Bangladesh. NBPW is the most distinctive ceramic of Early Historic period and the technique of its surface gloss acquired numerous theories. This particular paper is an analytical study of collected NBPW sherds from these two sites including surface observations using binocular and scanning electron microscopes and Thin Section Analysis of potsherds. Thin section analysis identified two different layers of coating on the surface of the NBPW. One layer is a ‘slip’ (ground coat and the other is a ‘top layer or top coat ’. The slip was made from refined clay and the top layer was derived from organic substance. Microscopic analysis confirmed the solid and non-clayey characteristics of the top coat.

  14. The new inter process communication middle-ware for the ATLAS Trigger and Data Acquisition system

    CERN Document Server

    Kolos, Serguei; The ATLAS collaboration

    2016-01-01

    The ATLAS Trigger & Data Acquisition (TDAQ) project was started almost twenty years ago with the aim of providing scalable distributed data collection system for the experiment. While the software dealing with physics data flow was implemented by directly using the low-level communication protocols, like TCP and UDP, the control and monitoring infrastructure services for the TDAQ system were implemented on top of the CORBA communication middle-ware. CORBA provides a high-level object oriented abstraction for the inter process communication, hiding communication complexity from the developers. This approach speeds up and simplifies development of communication services but incurs some extra cost in terms of performance and resources overhead. Our experience of using CORBA for control and monitoring data exchange in the distributed TDAQ system was very successful, mostly due to the outstanding quality of the CORBA brokers, which have been used in the project: omniORB for C++ and JacORB for Java. However, du...

  15. Analysis on the security of cloud computing

    Science.gov (United States)

    He, Zhonglin; He, Yuhua

    2011-02-01

    Cloud computing is a new technology, which is the fusion of computer technology and Internet development. It will lead the revolution of IT and information field. However, in cloud computing data and application software is stored at large data centers, and the management of data and service is not completely trustable, resulting in safety problems, which is the difficult point to improve the quality of cloud service. This paper briefly introduces the concept of cloud computing. Considering the characteristics of cloud computing, it constructs the security architecture of cloud computing. At the same time, with an eye toward the security threats cloud computing faces, several corresponding strategies are provided from the aspect of cloud computing users and service providers.

  16. THE EXPANSION OF ACCOUNTING TO THE CLOUD

    OpenAIRE

    Otilia DIMITRIU; Marian MATEI

    2014-01-01

    The world today is witnessing an explosion of technologies that are remodelling our entire reality. The traditional way of thinking in the business field has shifted towards a new IT breakthrough: cloud computing. The cloud paradigm has emerged as a natural step in the evolution of the internet and has captivated everyone’s attention. The accounting profession itself has found a mean to optimize its activity through cloud-based applications. By reviewing the latest and most relevant studies a...

  17. Cloud Computing : Research Issues and Implications

    OpenAIRE

    Marupaka Rajenda Prasad; R. Lakshman Naik; V. Bapuji

    2013-01-01

    Cloud computing is a rapidly developing and excellent promising technology. It has aroused the concern of the computer society of whole world. Cloud computing is Internet-based computing, whereby shared information, resources, and software, are provided to terminals and portable devices on-demand, like the energy grid. Cloud computing is the product of the combination of grid computing, distributed computing, parallel computing, and ubiquitous computing. It aims to build and forecast sophisti...

  18. Cloud Computing: The Future of Computing

    OpenAIRE

    Aggarwal, Kanika

    2013-01-01

    Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. The basic principles of cloud computing is to make the computing be assigned in a great number of distributed computers, rather then local computer ...

  19. Cloud Computing Security Issues - Challenges and Opportunities

    OpenAIRE

    Vaikunth, Pai T.; Aithal, P. S.

    2017-01-01

    Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing ...

  20. Investigation of Cloud Computing: Applications and Challenges

    OpenAIRE

    Amid Khatibi Bardsiri; Anis Vosoogh; Fatemeh Ahoojoosh

    2014-01-01

    Cloud computing is a model for saving data or knowledge in distance servers through Internet. It can be save the required memory space and reduce cost of extending memory capacity in users’ own machines and etc., Therefore, Cloud Computing has several benefits for individuals as well as organizations. It provides protection for personal and organizational data. Further, with the help of cloud service, one business owner, organization manager or service provider will be able to make privacy an...

  1. Cloud Computing Cryptography "State-of-the-Art"

    OpenAIRE

    Omer K. Jasim; Safia Abbas; El-Sayed M. El-Horbaty; Abdel-Badeeh M. Salem

    2013-01-01

    Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing e...

  2. Cloud Computing Impelementation Using Model Roadmap for Cloud Computing Adoption (ROCCA on IT Consultant Industry

    Directory of Open Access Journals (Sweden)

    Panji Arief Perdana

    2017-09-01

    increase the performance PT Matrica Consulting Service based on the characteristics of the cloud which is flexible and secure to be accessed as long as it is connected to the Internet and maintained properly.

  3. Military clouds: utilization of cloud computing systems at the battlefield

    Science.gov (United States)

    Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai

    2012-05-01

    Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.

  4. Cloud Governance

    DEFF Research Database (Denmark)

    Berthing, Hans Henrik

    Denne præsentation beskriver fordele og værdier ved anvendelse af Cloud Computing. Endvidere inddrager resultater fra en række internationale analyser fra ISACA om Cloud Computing.......Denne præsentation beskriver fordele og værdier ved anvendelse af Cloud Computing. Endvidere inddrager resultater fra en række internationale analyser fra ISACA om Cloud Computing....

  5. Creating Values out of Internet of Things: An Industrial Perspective

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-01-01

    Full Text Available Internet of Things based cloud is envisaged to extract values other than the specified purpose for which it is to be utilized. It is hereby apprehended that different genre of values, rather business values, could efficiently be assimilated from the Internet of Things cloud platforms. It is also investigated to identify numerous domains of applications that are currently being associated with the similar cloud platforms. A case study on various types of value generation methods has been performed. A novel Internet of Things cloud stack is proposed to disseminate and aggregate the business values. Few research challenges are observed that shall need appropriate indulgence to generate more business values out of Internet of Things based cloud. This paper also seeks few research and industry related problems that need to be resolved. It further recommends several key parameters to the enterprise and government policymakers that should immediately be dealt with for long-term success.

  6. Urology on the internet - introduction and update

    Directory of Open Access Journals (Sweden)

    Inumpudi Anand

    2000-01-01

    Full Text Available The Internet, which has truly united the developed and developing nations, is an extensive network of inter-linked computers storing immense bytes of information, which can be accessed by anyone transcending all geographi-cal barriers and this has become the ultimate frontier to access information. The Urology and Andrology informa-tion on Internet is exponentially growing. The urologist need not know the intricacies of the hardware and soft-ware but can start right away navigating through this web. We reviewed methods available to take advantage of this network to provide a glimpse to busy urologists to accrue the benefits easily and efficiently rather than to be lost in the information-ocean by surfing individually. By getting connected to Internet, an urologist of any part of the world gains enormous information by interacting with other urologists of the rest of the world. This could be of use to gain knowledge and to offer the best and the most modern treatment to the patient. Internet has revolutionised the scientific publication by virtue of its faster and accurate transmission of manuscripts. We can send manuscripts by this channel and also access journals obviating the lag period inherent in snail mail. The on-line journals have virtually brought the library to the desktop.

  7. Problematic Internet use and physical health.

    Science.gov (United States)

    Kelley, Kevin J; Gruber, Elon M

    2013-06-01

    Background and aims A considerable body of literature has emerged over the past two decades assessing the relationship between problematic or addictive use of the Internet and various indices of psychological well-being. Conversely, comparatively little research has assessed the relationship between problematic or addictive use of the Internet and one's physical health. Method The current study assesses this relationship using a sample of college students (N = 133) who responded online to two questionnaires: the Problematic Internet Use Questionnaire (PIUQ; Demetrovics, Szeredi&Rózsa, 2008) and the SF-36v2 Health Survey (Ware et al., 2008). Results The findings indicate that problematic Internet use is associated with poorer physical health. These results are consistent with other data that assessed the relationship between these two variables. Furthermore, this relationship supersedes the influence of the number of hours spent online per day. Conclusions The findings are discussed in terms of the limitations of the study design and conclusions that can be drawn from this preliminary empirical effort.

  8. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  9. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  10. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  11. DIDACTIC POTENTIAL OF CLOUD TECHNOLOGIES FOR MENAGMENT OF EDUCATIONAL INSTITUTION

    Directory of Open Access Journals (Sweden)

    А А Заславский

    2016-12-01

    Full Text Available The article introduces the basic definitions and differences between Services in the cloud, cloud services, cloud applications and cloud storage data. The basic cloud types that can be used on the Internet and the LAN of educational organization (Intranet. Possibilities of use of cloud services to improve of effective management at educational organization of internal and external communications of educational organizations, as well as to ensure joint work of employees of the educational organization.A list of core competencies an employee of an educational organization, which will be developed for use in the activity of cloud services and cloud applications. We describe the positive aspects of the use of cloud services and cloud-based technologies for the management of the educational institution, identifies possible risks of using cloud technologies, presents options for the use of cloud technology over the Internet and the Intranet network. We present a list of software included with every category of cloud services described types: storage and file synchronization, storage of bookmarks and notes, time management, software applications. At the article is introduced the basic definition and classification of cloud services, offered examples of methodical use of cloud services in the management of the educational organization.

  12. DATA SECURITY ISSUES IN CLOUD COMPUTING: REVIEW

    Directory of Open Access Journals (Sweden)

    Hussam Alddin Shihab Ahmed

    2016-02-01

    Full Text Available Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for computing resources like systems, stockpiling, servers, administrations and applications. Securing the Data is considered one of the principle significant challenges and concerns for cloud computing. This persistent problem is getting more affective due to the changes in improving cloud computing technology. From the perspective of the Clients, cloud computing is a security hazard especially when it comes to assurance affirmation issues and data security, remain the most basically which backs off for appropriation of Cloud Computing administrations. This paper audits and breaks down the essential issue of cloud computing and depicts the information security and protection of privacy issues in cloud.

  13. Cloud Computing Security Latest Issues amp Countermeasures

    Directory of Open Access Journals (Sweden)

    Shelveen Pandey

    2015-08-01

    Full Text Available Abstract Cloud computing describes effective computing services provided by a third-party organization known as cloud service provider for organizations to perform different tasks over the internet for a fee. Cloud service providers computing resources are dynamically reallocated per demand and their infrastructure platform and software and other resources are shared by multiple corporate and private clients. With the steady increase in the number of cloud computing subscribers of these shared resources over the years security on the cloud is a growing concern. In this review paper the current cloud security issues and practices are described and a few innovative solutions are proposed that can help improve cloud computing security in the future.

  14. Cloud Computing dan Dampaknya Terhadap Bisnis

    Directory of Open Access Journals (Sweden)

    James Tandy

    2013-12-01

    Full Text Available The purpose of this paper is to provide an overview of cloud computing and its development as well as the advantages and disadvantages of cloud computing implementation at some companies. Some literature studies from journals, textbooks and internet sources are discussed. Based on these searches it is known that the cloud computing as a technology that utilizes internet services uses a central server to the virtual nature of data and application maintenance purposes. The existence of Cloud Computing itself causes a change in the way thetechnology information system works at an company. Security and data storage systems have become important factors for the company.Cloud Computing technology provides a great advantage for most enterprises.

  15. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  16. A Study on Cloud Computing and its Security Issues

    OpenAIRE

    Mr. Venkata Sreedhar Ventrapragada; Daniel Ravuri; G Jyothi

    2013-01-01

    Cloud computing” was coined for what happens whenservices and applications are propelled into the internet“cloud.” Cloud computing refers to the many different types ofservices and applications being delivered in the internet cloud,and the devices used to access these services and applicationsdo not require any special applications. Advances in serviceoriented architecture (SOA) have brought the world close tothe once imaginary vision of establishing and running a virtualbusiness, a business...

  17. Architecture of the SDP in the Cloud Environment

    Science.gov (United States)

    Cho, Jae-Hyoung; Lee, Jae-Oh

    Recently, cloud computing, which is Internet-based computing, is attracting type of business. Besides, network is integrated wire and wireless (including mobile) by the IP Multimedia Subsystem (IMS). Therefore, cloud computing needs to support the IMS and common platform in order to support between the IMS and cloud computing. So, in this paper we consider about deployment of the IMS and suggest Service Delivery Platform (SDP) that is common platform for cloud computing.

  18. Analysis of late mid-Neolithic pottery illuminates the presenceof a Corded Ware Culture on the Baltic Island of Gotland

    Directory of Open Access Journals (Sweden)

    Erik Palmgren

    2015-12-01

    Full Text Available In this paper, we discuss variations seen in the ornamentation and modes of manufacturing pottery from the end of the mid-Neolithic 4600–4300 BP on the Island of Gotland in the Baltic Sea. The Pitted Ware cultural groups have been discussed as a western influence from the Swedish mainland, but the aDNA on skeletal remains point to eastern influences. We analyse and discuss pottery from the well-investigated Ajvide Pitted Ware site and what these variations mean in term of intra- and inter-island relationships, ethnicity and change, and we suggest the development of what could be described as a hybrid culture.

  19. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  20. A Taxonomy and Future Directions for Sustainable Cloud Computing: 360 Degree View

    OpenAIRE

    Gill, Sukhpal Singh; Buyya, Rajkumar

    2017-01-01

    The cloud computing paradigm offers on-demand services over the Internet and supports a wide variety of applications. With the recent growth of Internet of Things (IoT) based applications the usage of cloud services is increasing exponentially. The next generation of cloud computing must be energy-efficient and sustainable to fulfill the end-user requirements which are changing dynamically. Presently, cloud providers are facing challenges to ensure the energy efficiency and sustainability of ...

  1. Settlement duration and materiality: formal chronological models for the development of Barnhouse, a Grooved Ware settlement in Orkney

    OpenAIRE

    Richards, Colin; Jones, Andrew Meirion; MacSween, Ann; Sheridan, Alison; Dunbar, Elaine; Reimer, Paula; Bayliss, Alex; Griffiths, Seren; Whittle, Alasdair

    2016-01-01

    Radiocarbon dating and Bayesian chronological modelling, undertaken as part of the investigation by the Times of Their Lives project into the development of Late Neolithic settlement and pottery in Orkney, has provided precise new dating for the Grooved Ware settlement of Barnhouse, excavated in 1985–91. Previous understandings of the site and its pottery are presented. A Bayesian model based on 70 measurements on 62 samples (of which 50 samples are thought to date accurately the deposits fro...

  2. Retention of Employees in Ceramic Sanitary Ware Factories in India: Role of Work Life Balance, Career Development and Supervisor Support

    OpenAIRE

    S. Umamaheswari; Jayasree Krishnan

    2016-01-01

    The study examines the role of work life balance, career development and supervisor support on organization commitment over employees of unattended, ceramic sanitary ware factories in India. It also verifies the influence of organization commitment on retention and its mediating role. Findings reveal that organization commitment influences retention and all the above factors enhance it. Moreover, organization commitment partially mediates the relationship between proposed factors and retentio...

  3. Migration of formaldehyde from melamine-ware: UK 2008 survey results.

    Science.gov (United States)

    Potter, E L J; Bradley, E L; Davies, C R; Barnes, K A; Castle, L

    2010-06-01

    Fifty melamine-ware articles were tested for the migration of formaldehyde - with hexamethylenetetramine (HMTA) expressed as formaldehyde - to see whether the total specific migration limit (SML(T)) was being observed. The SML(T), given in European Commission Directive 2002/72/EC as amended, is 15 mg kg(-1). Fourier transform-infrared (FT-IR) spectroscopy was carried out on the articles to confirm the plastic type. Articles were exposed to the food simulant 3% (w/v) aqueous acetic acid under conditions representing their worst foreseeable use. Formaldehyde and HMTA in food simulants were determined by a spectrophotometric derivatization procedure. Positive samples were confirmed by a second spectrophotometric procedure using an alternative derivatization agent. As all products purchased were intended for repeat use, three sequential exposures to the simulant were carried out. Formaldehyde was detected in the simulant exposed to 43 samples. Most of the levels found were well below the limits set in law such that 84% of the samples tested were compliant. However, eight samples had formaldehyde levels that were clearly above the legal maximum at six to 65 times the SML(T).

  4. Image simulation for HardWare In the Loop simulation in EO domain

    Science.gov (United States)

    Cathala, Thierry; Latger, Jean

    2015-10-01

    Infrared camera as a weapon sub system for automatic guidance is a key component for military carrier such as missile for example. The associated Image Processing, that controls the navigation, needs to be intensively assessed. Experimentation in the real world is very expensive. This is the main reason why hybrid simulation also called HardWare In the Loop (HWIL) is more and more required nowadays. In that field, IR projectors are able to cast IR fluxes of photons directly onto the IR camera of a given weapon system, typically a missile seeker head. Though in laboratory, the missile is so stimulated exactly like in the real world, provided a realistic simulation tool enables to perform synthetic images to be displayed by the IR projectors. The key technical challenge is to render the synthetic images at the required frequency. This paper focuses on OKTAL-SE experience in this domain through its product SE-FAST-HWIL. It shows the methodology and Return of Experience from OKTAL-SE. Examples are given, in the frame of the SE-Workbench. The presentation focuses on trials on real operational complex 3D cases. In particular, three important topics, that are very sensitive with regards to IG performance, are detailed: first the 3D sea surface representation, then particle systems rendering especially to simulate flares and at last sensor effects modelling. Beyond "projection mode", some information will be given on the SE-FAST-HWIL new capabilities dedicated to "injection mode".

  5. Hydrogeologic data from the US Geological Survey test wells near Waycross, Ware County, Georgia

    Science.gov (United States)

    Matthews, S.E.; Krause, R.E.

    1983-01-01

    Two wells were constructed near Waycross, Ware County, Georgia, from July 1980 to May 1981 to collect stratigraphic, structural, geophysical, hydrologic, hydraulic, and geochemical information for the U.S. Geological Survey Tertiary Limestone Regional Aquifer-System Analysis. Data collection included geologic sampling and coring, borehole geophysical logging, packer testing, water-level measuring, water-quality sampling, and aquifer testing. In the study area, the Tertiary limestone aquifer system is about 1,300 feet thick and is confined and overlain by about 610 feet of clastic sediments. The aquifer system consists of limestone, dolomite, and minor evaporites and has high porosity and permeability. A 4-day continuous discharge aquifer test was conducted, from which a transmissivity of about 1 million feet squared per day and a storage coefficient of 0.0001 were calculated. Water from the upper part of the aquifer is of a calcium bicarbonate type. The deeper highly mineralized zone produces a sodium bicarbonate type water in which concentrations of magnesium, sulfate, chloride, sodium, and some trace metals increase with depth. (USGS)

  6. Experiences in messaging middle-ware for high-level control applications

    International Nuclear Information System (INIS)

    Wanga, N.; Shasharina, S.; Matykiewicz, J.; Rooparani Pundaleeka

    2012-01-01

    Existing high-level applications in accelerator control and modeling systems leverage many different languages, tools and frameworks that do not inter-operate with one another. As a result, the accelerator control community is moving toward the proven Service-Oriented Architecture (SOA) approach to address the inter-operability challenges among heterogeneous high-level application modules. Such SOA approach enables developers to package various control subsystems and activities into 'services' with well-defined 'interfaces' and make leveraging heterogeneous high-level applications via flexible composition possible. Examples of such applications include presentation panel clients based on Control System Studio (CSS) and middle-layer applications such as model/data servers. This paper presents our experiences in developing a demonstrative high-level application environment using emerging messaging middle-ware standards. In particular, we utilize new features in EPICS v4 and other emerging standards such as Data Distribution Service (DDS) and Extensible Type Interface by the Object Management Group. We first briefly review examples we developed previously. We then present our current effort in integrating DDS into such a SOA environment for control systems. Specifically, we illustrate how we are integrating DDS into CSS and develop a Python DDS mapping. (authors)

  7. OpenCourseWare, Global Access and the Right to Education: Real access or marketing ploy?

    Directory of Open Access Journals (Sweden)

    Henk Huijser

    2008-02-01

    Full Text Available This paper explores the potential opportunities that OpenCourseWare (OCW offers in providing wider access to tertiary education, based on the ideal of ‘the right to education’. It first discusses the wider implications of OCW, and its underlying philosophy, before using a case study of a tertiary preparation program (TPP at the University of Southern Queensland (USQ to draw out the issues involved in offering a program that is created in a particular national and social context on a global scale. This paper draws specific attention to the digital divide, its effects in national and global contexts, and the particular obstacles this presents with regards to OCW. This paper argues that OCW provides many opportunities, both in terms of access to education and in terms of student recruitment and marketing for universities. To take full advantage of those opportunities, however, requires a concerted effort on the part of tertiary education institutions, and it requires a vision that is fundamentally informed by, and committed to, the principle of ‘the right to education’.

  8. Docencia y libre acceso: el Open Course Ware de la Universitat de València

    Directory of Open Access Journals (Sweden)

    Beatriz Gallardo Paúls

    2008-12-01

    Full Text Available En este artículo presentamos la Oficina OCW de la Universitat de València atendiendo al contexto general de aparición y sus características específicas. En primer lugar, contextualizamos el Open Course Ware en el ámbito de los movimientos Open y repasamos algunas de sus iniciativas. Después nos centramos en la caracterización de los usuarios/destinatarios prototípicos del OCW como “nativos digitales”, atendiendo a la distinción de dos modelos epistemológicos: la inteligencia colectiva (nativos y el paradigma del experto (inmigrantes digitales, algunas de cuyas premisas básicas se explican solamente por la aparición de las tecnologías digitales. Tras esta contextualización teórica, exponemos las características que definen el proyecto OCW, de la Universitat de València

  9. Impact of OpenCourseWare Publication on Higher Education Participation and Student Recruitment

    Directory of Open Access Journals (Sweden)

    Stephen Carson

    2012-10-01

    Full Text Available The free and open publication of course materials (OpenCourseWare or OCW was initially undertaken by Massachusetts Institute of Technology (MIT and other universities primarily to share educational resources among educators (Abelson, 2007. OCW, however, and more in general open educational resources (OER1, have also provided well-documented opportunities for all learners, including the so-called “informal learners” and “independent learners” (Carson, 2005; Mulder, 2006, p. 35. Universities have also increasingly documented clear benefits for specific target groups such as secondary education students and lifelong learners seeking to enter formal postsecondary education programs.In addition to benefitting learners, OCW publication has benefitted the publishing institutions themselves by providing recruiting advantages. Finally enrollment figures from some institutions indicate that even in the case of the free and open publication of materials from online programs, OCW does not negatively affect enrollment. This paper reviews evaluation conducted at Massachusetts Institute of Technology, Johns Hopkins Bloomberg School of Public Health (JHSPH, and Open Universiteit Nederland (OUNL concerning OCW effects on higher education participation and student recruitment.

  10. Development of a community-ware for social confidence building for HLW disposal

    International Nuclear Information System (INIS)

    Tanaka, Hiroshi; Furuta, Kazuo; Kimura, Hiroshi

    2004-01-01

    Performance assessment (PA), as a tool to support decisions associated with geological disposal of high-level radioactive waste, requires the facilitation of various views of stakeholders. We believe that the key benefit of using the information technologies in the context of PA lies in the possibility of accelerating knowledge interaction among interested individuals and facilitating a wider spectrum of views into PA, and we propose the 'collaborative' approach using the computer network. We have initiated a voluntary PA community to test validity of such an approach in guiding and supporting discussions and decisions concerning geological disposal. To expedite such activities, we have also developed community-ware', which enables members of the PA network community to grasp relative positions of themselves in an 'opinion space' so that they can find possible partners to collaborate with, and allows newcomers to recapture a summary of the previous discussions. In addition, the history of past discussions together with the results of iterative PA calculations will provide useful insight for understanding and modeling the process of consensus building. A PA network community consisting of around 20 members was formed and a pilot application was carried out which resulted in demonstration of potential advantage of a PA network community in expediting knowledge evolution concerning long term safety of geological disposal. On the other hand it highlighted issues for further research and development. (author)

  11. Informal Education of Adults in the Land of WoodenWare

    Directory of Open Access Journals (Sweden)

    Bojan Žnidaršič

    1997-12-01

    Full Text Available The fundamental aim of the project entitled the Land of Wooden Ware is developing a healthy environment and improving the conditions of life and work in rural areas. The project covers topographically varied, scarcely populated and demographically endangered areas in 11 municipalities (around 140,000 hectares. With respect to various standards, the entire expanse is a homogeneous region. Through a holistic approach, including education for permanent progress, direct expert help and other forms of help, the project aims to change the nega tive demographic curve and preserve the environment. The practical method used to achieve the goals set is direct work with people. The introductory phase includes exhibitions, articles in local and national media, etc., and will be followed by an extensive opinion poll among households. The results will serve as the basis for the preparation of lectures and workshops. The educational phase will dose with a study circle which will provide deeper insight into the subject. The entire effort (which includes the inhabitants, the municipality and VITRA is based on the desire to present rural regions as business opportunities for eco­farming, ecotourism, efficient use of renewable sources of energy, etc.

  12. Towards autonomous vehicular clouds

    Directory of Open Access Journals (Sweden)

    Stephan Olariu

    2011-09-01

    Full Text Available The dawn of the 21st century has seen a growing interest in vehicular networking and its myriad potential applications. The initial view of practitioners and researchers was that radio-equipped vehicles could keep the drivers informed about potential safety risks and increase their awareness of road conditions. The view then expanded to include access to the Internet and associated services. This position paper proposes and promotes a novel and more comprehensive vision namely, that advances in vehicular networks, embedded devices and cloud computing will enable the formation of autonomous clouds of vehicular computing, communication, sensing, power and physical resources. Hence, we coin the term, autonomous vehicular clouds (AVCs. A key feature distinguishing AVCs from conventional cloud computing is that mobile AVC resources can be pooled dynamically to serve authorized users and to enable autonomy in real-time service sharing and management on terrestrial, aerial, or aquatic pathways or theaters of operations. In addition to general-purpose AVCs, we also envision the emergence of specialized AVCs such as mobile analytics laboratories. Furthermore, we envision that the integration of AVCs with ubiquitous smart infrastructures including intelligent transportation systems, smart cities and smart electric power grids will have an enormous societal impact enabling ubiquitous utility cyber-physical services at the right place, right time and with right-sized resources.

  13. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  14. Mapping in the cloud

    CERN Document Server

    Peterson, Michael P

    2014-01-01

    This engaging text provides a solid introduction to mapmaking in the era of cloud computing. It takes students through both the concepts and technology of modern cartography, geographic information systems (GIS), and Web-based mapping. Conceptual chapters delve into the meaning of maps and how they are developed, covering such topics as map layers, GIS tools, mobile mapping, and map animation. Methods chapters take a learn-by-doing approach to help students master application programming interfaces and build other technical skills for creating maps and making them available on the Internet. Th

  15. Grids, Clouds and Virtualization

    CERN Document Server

    Cafaro, Massimo

    2011-01-01

    Research into grid computing has been driven by the need to solve large-scale, increasingly complex problems for scientific applications. Yet the applications of grid computing for business and casual users did not begin to emerge until the development of the concept of cloud computing, fueled by advances in virtualization techniques, coupled with the increased availability of ever-greater Internet bandwidth. The appeal of this new paradigm is mainly based on its simplicity, and the affordable price for seamless access to both computational and storage resources. This timely text/reference int

  16. Cloud Computing

    CERN Document Server

    Antonopoulos, Nick

    2010-01-01

    Cloud computing has recently emerged as a subject of substantial industrial and academic interest, though its meaning and scope is hotly debated. For some researchers, clouds are a natural evolution towards the full commercialisation of grid systems, while others dismiss the term as a mere re-branding of existing pay-per-use technologies. From either perspective, 'cloud' is now the label of choice for accountable pay-per-use access to third party applications and computational resources on a massive scale. Clouds support patterns of less predictable resource use for applications and services a

  17. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  18. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  19. Impact of different cloud deployments on real-time video applications for mobile video cloud users

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2015-02-01

    The latest trend to access mobile cloud services through wireless network connectivity has amplified globally among both entrepreneurs and home end users. Although existing public cloud service vendors such as Google, Microsoft Azure etc. are providing on-demand cloud services with affordable cost for mobile users, there are still a number of challenges to achieve high-quality mobile cloud based video applications, especially due to the bandwidth-constrained and errorprone mobile network connectivity, which is the communication bottleneck for end-to-end video delivery. In addition, existing accessible clouds networking architectures are different in term of their implementation, services, resources, storage, pricing, support and so on, and these differences have varied impact on the performance of cloud-based real-time video applications. Nevertheless, these challenges and impacts have not been thoroughly investigated in the literature. In our previous work, we have implemented a mobile cloud network model that integrates localized and decentralized cloudlets (mini-clouds) and wireless mesh networks. In this paper, we deploy a real-time framework consisting of various existing Internet cloud networking architectures (Google Cloud, Microsoft Azure and Eucalyptus Cloud) and a cloudlet based on Ubuntu Enterprise Cloud over wireless mesh networking technology for mobile cloud end users. It is noted that the increasing trend to access real-time video streaming over HTTP/HTTPS is gaining popularity among both research and industrial communities to leverage the existing web services and HTTP infrastructure in the Internet. To study the performance under different deployments using different public and private cloud service providers, we employ real-time video streaming over the HTTP/HTTPS standard, and conduct experimental evaluation and in-depth comparative analysis of the impact of different deployments on the quality of service for mobile video cloud users. Empirical

  20. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  1. Internet Connectivity

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet Connectivity. BSNL, SIFY, HCL in Guwahati; only BSNL elsewhere in NE (local player in Shillong). Service poor; All vendors lease BW from BSNL.

  2. Internet enlightens

    International Nuclear Information System (INIS)

    Figueiredo, S.

    2008-01-01

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  3. Internet enlightens

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  4. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  5. The Internet of Things

    CERN Document Server

    Greengard, Samuel

    2015-01-01

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of personal computers and the Internet...

  6. Effect of preparation variables of plaster molds for slip casting of sanitary ware

    Directory of Open Access Journals (Sweden)

    Rafael E. Ochoa

    2017-11-01

    Full Text Available A full factorial design was used to evaluate the effect of various preparation conditions for making plaster molds for slip casting of sanitary ware. We investigated the relationships between the processing conditions, microstructure, and final properties of the plaster molds. The results showed that the rheological behavior, and hence, the time during which the plaster suspension is pourable for making the plaster molds (before an important increase in viscosity due to the precipitation of gypsum crystals were dependent on the preparation conditions. Variations in the chemical composition, pore size distribution, and microstructure explained the statistically significant effect of preparation variables (including the mixing time, water temperature, and water quality. Preparation conditions that promoted high initial viscosity of the plaster suspension (accelerative effect of the setting time developed less porous structure in the mold that principally increased the compressive strength (16%, deionized water instead of tap water and the casting rate (9%, water at 25 °C instead of 38 °C. According to the results are proposed optimum conditions to make the molds while avoiding unnecessary energy use. Resumen: Mediante un diseño factorial completo se evaluaron diferentes condiciones de preparación de moldes de yeso para colado tradicional de muebles sanitarios. Se investigó la relación entre procesamiento, microestructura y propiedades del molde. Los resultados mostraron que el comportamiento reológico y por lo tanto el tiempo durante el cual la suspensión de yeso se puede verter para conformar los moldes (antes de un incremento importante de viscosidad debido a la formación de cristales de yeso fueron dependientes de las condiciones de preparación. Variaciones en composición química, distribución de tamaño de poro y microestructura explicaron el efecto estadísticamente significativo de las variables de preparación (que incluyeron

  7. Cloud Cover

    Science.gov (United States)

    Schaffhauser, Dian

    2012-01-01

    This article features a major statewide initiative in North Carolina that is showing how a consortium model can minimize risks for districts and help them exploit the advantages of cloud computing. Edgecombe County Public Schools in Tarboro, North Carolina, intends to exploit a major cloud initiative being refined in the state and involving every…

  8. Cloud Control

    Science.gov (United States)

    Ramaswami, Rama; Raths, David; Schaffhauser, Dian; Skelly, Jennifer

    2011-01-01

    For many IT shops, the cloud offers an opportunity not only to improve operations but also to align themselves more closely with their schools' strategic goals. The cloud is not a plug-and-play proposition, however--it is a complex, evolving landscape that demands one's full attention. Security, privacy, contracts, and contingency planning are all…

  9. Characterization of Concrete made with Recycled Aggregate from Ceramic Sanitary Ware

    Directory of Open Access Journals (Sweden)

    Medina, C.

    2011-12-01

    Full Text Available This study examined the possibility of reusing the ceramic wastes of sanitary ware as coarse aggregate, in partial substitution (15, 20 y 25 % of natural coarse aggregates. Firstly, the characterization of recycled coarse ceramic aggregate was carried out subsequently proceeded to establish the parameters of dosage and manufacture of different concretes. Lastly, tests were conducted using these mixes to characterize physical and mechanical, and a study was carried out to identify the crystalline phases. Results showed that as the substitution proportion increased, the mechanical properties of the concrete improved, whilst physical properties remained practically constant. In view of these results, we conclude that it is possible to use this type of ceramic waste as coarse aggregate when mixing concrete destined for structural purposes.

    En este estudio se plantea la posibilidad de reutilizar los residuos cerámicos de sanitarios como árido grueso sustituyendo de forma parcial (15, 20 y 25 % al árido grueso natural. Para ello, se llevó a cabo la caracterización del árido cerámico reciclado y posteriormente se procedió a establecer los parámetros de dosificación y fabricación de los distintos hormigones. Finalmente, se realizó sobre los mismos unos ensayos de caracterización de las propiedades físicas y mecánicas, y un estudio de las fases cristalinas. Los resultados indican que a medida que se aumenta el porcentaje de sustitución se ven mejoradas las propiedades mecánicas de estos, mientras que las propiedades físicas se mantienen prácticamente constantes. A la vista de estos resultados se puede concluir que es posible la utilización de este tipo de residuo cerámico como árido grueso en la elaboración de hormigones con fines estructurales.

  10. Master Middle Ware: A Tool to Integrate Water Resources and Fish Population Dynamics Models

    Science.gov (United States)

    Yi, S.; Sandoval Solis, S.; Thompson, L. C.; Kilduff, D. P.

    2017-12-01

    Linking models that investigate separate components of ecosystem processes has the potential to unify messages regarding management decisions by evaluating potential trade-offs in a cohesive framework. This project aimed to improve the ability of riparian resource managers to forecast future water availability conditions and resultant fish habitat suitability, in order to better inform their management decisions. To accomplish this goal, we developed a middleware tool that is capable of linking and overseeing the operations of two existing models, a water resource planning tool Water Evaluation and Planning (WEAP) model and a habitat-based fish population dynamics model (WEAPhish). First, we designed the Master Middle Ware (MMW) software in Visual Basic for Application® in one Excel® file that provided a familiar framework for both data input and output Second, MMW was used to link and jointly operate WEAP and WEAPhish, using Visual Basic Application (VBA) macros to implement system level calls to run the models. To demonstrate the utility of this approach, hydrological, biological, and middleware model components were developed for the Butte Creek basin. This tributary of the Sacramento River, California is managed for both hydropower and the persistence of a threatened population of spring-run Chinook salmon (Oncorhynchus tschawytscha). While we have demonstrated the use of MMW for a particular watershed and fish population, MMW can be customized for use with different rivers and fish populations, assuming basic data requirements are met. This model integration improves on ad hoc linkages for managing data transfer between software programs by providing a consistent, user-friendly, and familiar interface across different model implementations. Furthermore, the data-viewing capabilities of MMW facilitate the rapid interpretation of model results by hydrologists, fisheries biologists, and resource managers, in order to accelerate learning and management decision

  11. THE INTERNATIONALIZATION PROCESS OF THE SALES OPERATIONS OF THE PRODUCTS OF A SANITARY WARE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Emerson Antonio Maccari

    2010-11-01

    Full Text Available Internationalization consists of extending an organization's operations abroad. It involves decisions based on objective criteria and on an evaluation of strategies for entering the foreign market. The problem addressed in this study concerns a Brazilian firm’s difficulties developing its operations abroad. Thus, the purpose of this study was to identify the internationalization process of an industry in the sanitary ware segment in the development of its operations in another country. The research method employed was the single case study and data was collected by means of a semi-structured research script applied to company executives. The results showed that the internationalization process is characterized by the dynamic learning model (Uppsala Model, according to which an organization develops its activities abroad gradually, as it acquires experience and expertise in the market. The company is attempting to overcome cultural barriers and psychic distance in a slow internationalization process, aligned with the differentiation strategy and focus that it uses in the Brazilian market. This strategy comprises a sequence of planned and deliberate steps, with low investment exposure and risk. It was found that the firm adopts a strategy of exporting through distributors, this being a critical success factor, but that the distributor approval and development process lacks robust and formalized structuring. There are opportunities for improvement in the process of competitive intelligence in order to systematize the search and interpretation of information about the markets in which the company wants to operate.  Key-words: Internationalization of companies. Uppsala Model. Strategy. Competitive intelligence. 

  12. ASTER cloud coverage reassessment using MODIS cloud mask products

    Science.gov (United States)

    Tonooka, Hideyuki; Omagari, Kunjuro; Yamamoto, Hirokazu; Tachikawa, Tetsushi; Fujita, Masaru; Paitaer, Zaoreguli

    2010-10-01

    In the Advanced Spaceborne Thermal Emission and Reflection radiometer (ASTER) Project, two kinds of algorithms are used for cloud assessment in Level-1 processing. The first algorithm based on the LANDSAT-5 TM Automatic Cloud Cover Assessment (ACCA) algorithm is used for a part of daytime scenes observed with only VNIR bands and all nighttime scenes, and the second algorithm based on the LANDSAT-7 ETM+ ACCA algorithm is used for most of daytime scenes observed with all spectral bands. However, the first algorithm does not work well for lack of some spectral bands sensitive to cloud detection, and the two algorithms have been less accurate over snow/ice covered areas since April 2008 when the SWIR subsystem developed troubles. In addition, they perform less well for some combinations of surface type and sun elevation angle. We, therefore, have developed the ASTER cloud coverage reassessment system using MODIS cloud mask (MOD35) products, and have reassessed cloud coverage for all ASTER archived scenes (>1.7 million scenes). All of the new cloud coverage data are included in Image Management System (IMS) databases of the ASTER Ground Data System (GDS) and NASA's Land Process Data Active Archive Center (LP DAAC) and used for ASTER product search by users, and cloud mask images are distributed to users through Internet. Daily upcoming scenes (about 400 scenes per day) are reassessed and inserted into the IMS databases in 5 to 7 days after each scene observation date. Some validation studies for the new cloud coverage data and some mission-related analyses using those data are also demonstrated in the present paper.

  13. On technical security issues in cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg; Gruschka, Nils

    2009-01-01

    , however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection sphere of the data owner. Most of the discussions on this topics are mainly driven by arguments related to organisational......The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality...... means. This paper focusses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations....

  14. Cloud Computing Fundamentals

    Science.gov (United States)

    Furht, Borko

    In the introductory chapter we define the concept of cloud computing and cloud services, and we introduce layers and types of cloud computing. We discuss the differences between cloud computing and cloud services. New technologies that enabled cloud computing are presented next. We also discuss cloud computing features, standards, and security issues. We introduce the key cloud computing platforms, their vendors, and their offerings. We discuss cloud computing challenges and the future of cloud computing.

  15. Enterprise Cloud Adoption: Leveraging on the Business and ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-06-01

    Jun 1, 2013 ... which access these services via the Internet. [9]. In support of .... Denial of Service attack? • What happens .... replicated, distributed file system Cloud providers have ... Usually, the fear of performance degradation and log size.

  16. Cloud Computing

    CERN Document Server

    Baun, Christian; Nimis, Jens; Tai, Stefan

    2011-01-01

    Cloud computing is a buzz-word in today's information technology (IT) that nobody can escape. But what is really behind it? There are many interpretations of this term, but no standardized or even uniform definition. Instead, as a result of the multi-faceted viewpoints and the diverse interests expressed by the various stakeholders, cloud computing is perceived as a rather fuzzy concept. With this book, the authors deliver an overview of cloud computing architecture, services, and applications. Their aim is to bring readers up to date on this technology and thus to provide a common basis for d

  17. The Role of Networks in Cloud Computing

    Science.gov (United States)

    Lin, Geng; Devine, Mac

    The confluence of technology advancements and business developments in Broadband Internet, Web services, computing systems, and application software over the past decade has created a perfect storm for cloud computing. The "cloud model" of delivering and consuming IT functions as services is poised to fundamentally transform the IT industry and rebalance the inter-relationships among end users, enterprise IT, software companies, and the service providers in the IT ecosystem (Armbrust et al., 2009; Lin, Fu, Zhu, & Dasmalchi, 2009).

  18. Evolution of Cloud Computing and Enabling Technologies

    OpenAIRE

    Rabi Prasad Padhy; Manas Ranjan Patra

    2012-01-01

    We present an overview of the history of forecasting software over the past 25 years, concentrating especially on the interaction between computing and technologies from mainframe computing to cloud computing. The cloud computing is latest one. For delivering the vision of  various  of computing models, this paper lightly explains the architecture, characteristics, advantages, applications and issues of various computing models like PC computing, internet computing etc and related technologie...

  19. Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment

    OpenAIRE

    Hicham Toumi; Bouchra Marzak; Amal Talea; Ahmed Eddaoui; Mohamed Talea

    2017-01-01

    Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client...

  20. Minimally Invasive Implantation of HeartWare Assist Device and Simultaneous Tricuspid Valve Reconstruction Through Partial Upper Sternotomy.

    Science.gov (United States)

    Hillebrand, Julia; Hoffmeier, Andreas; Djie Tiong Tjan, Tonny; Sindermann, Juergen R; Schmidt, Christoph; Martens, Sven; Scherer, Mirela

    2017-05-01

    Left ventricular assist device (LVAD) implantation is a well-established therapy to support patients with end-stage heart failure. However, the operative procedure is associated with severe trauma. Third generation LVADs like the HeartWare assist device (HeartWare, Inc., Framingham, MA, USA) are characterized by enhanced technology despite smaller size. These devices offer new minimally invasive surgical options. Tricuspid regurgitation requiring valve repair is frequent in patients with the need for mechanical circulatory support as it is strongly associated with ischemic and nonischemic cardiomyopathy. We report on HeartWare LVAD implantation and simultaneous tricuspid valve reconstruction through minimally invasive access by partial upper sternotomy to the fifth left intercostal space. Four male patients (mean age 51.72 ± 11.95 years) suffering from chronic heart failure due to dilative (three patients) and ischemic (one patient) cardiomyopathy and also exhibiting concomitant tricuspid valve insufficiency due to annular dilation underwent VAD implantation and tricuspid valve annuloplasty. Extracorporeal circulation was established via the ascending aorta, superior vena cava, and right atrium. In all four cases the LVAD implantation and tricuspid valve repair via partial median sternotomy was successful. During the operative procedure, no conversion to full sternotomy was necessary. One patient needed postoperative re-exploration because of pericardial effusion. No postoperative focal neurologic injury was observed. New generation VADs are advantageous because of the possibility of minimally invasive implantation procedure which can therefore minimize surgical trauma. Concomitant tricuspid valve reconstruction can also be performed simultaneously through partial upper sternotomy. Nevertheless, minimally invasive LVAD implantation is a challenging operative technique. © 2016 International Center for Artificial Organs and Transplantation and Wiley Periodicals

  1. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  2. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  3. Internet bullying.

    Science.gov (United States)

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  4. IMPLEMENTING SALES CRM ON CLOUD SERVICES USING SALESOFORCE.COM

    OpenAIRE

    Rohit Parashar*, ER. Kamal Kumar Ranga

    2016-01-01

    Cloud computing provides lot of new ways to build and run applications that are accessed over the Internet as utilities, rather than as pieces of software running on client or server machine. Business applications, like customer relationship management (CRM) are promoted to be delivered via a Web browser in this paper, rather than delivering it as “traditional software”. As with the Internet, applications that run in the cloud have grown ubiquitous that almost every business user interacts wi...

  5. Becoming digital toward a post-internet society

    CERN Document Server

    Mosco, Vincent

    2017-01-01

    This book examines the convergence of Cloud Computing, Big Data, and the Internet of Things to forge the Next Internet. Ubiquitous computing enables universal communication, concentration of power, privacy erosion, environmental degradation, and massive automation and this title explores solving these issues to create a democratic digital world.

  6. An Internet-Based Accounting Information Systems Project

    Science.gov (United States)

    Miller, Louise

    2012-01-01

    This paper describes a student project assignment used in an accounting information systems course. We are now truly immersed in the internet age, and while many required accounting information systems courses and textbooks introduce database design, accounting software development, cloud computing, and internet security, projects involving the…

  7. Arrowheads as indicators of interpersonal violence and group identity among the Neolithic Pitted Ware hunters of southwestern Scandinavia

    DEFF Research Database (Denmark)

    Iversen, Rune

    2016-01-01

    millennium BC. Based on a study of more than 1500 arrowheads from Denmark and western Sweden, this paper explains the stylistic variation of the Pitted Ware arrowheads as functional determined representing two main categories: relatively short and wide hunting arrowheads (type A) and long and slender war...... arrowheads (type C). Type B represents a multifunctional group of arrowheads that mixes features from type A and C. Furthermore, diverging production schemes (schema opératoire) used for the shaping of hunting arrowheads has helped to identify social groupings within the larger southwestern Scandinavian...

  8. Retention of Employees in Ceramic Sanitary Ware Factories in India: Role of Work Life Balance, Career Development and Supervisor Support

    Directory of Open Access Journals (Sweden)

    S. Umamaheswari

    2016-05-01

    Full Text Available The study examines the role of work life balance, career development and supervisor support on organization commitment over employees of unattended, ceramic sanitary ware factories in India. It also verifies the influence of organization commitment on retention and its mediating role. Findings reveal that organization commitment influences retention and all the above factors enhance it. Moreover, organization commitment partially mediates the relationship between proposed factors and retention. It also found that organization’s career development provision alone is not enough and need to be modified according to the employer’s expectation. Managerial implications and suggestions for future research were discussed.

  9. Management issues during HeartWare left ventricular assist device implantation and the role of transesophageal echocardiography

    Directory of Open Access Journals (Sweden)

    Sanjay Orathi Patangi

    2013-01-01

    Full Text Available Left ventricular assist devices (LVAD are increasingly used for mechanical circulatory support of patients with severe heart failure, primarily as a bridge to heart transplantation. Transesophageal echocardiography (TEE plays a major role in the clinical decision making during insertion of the devices and in the post-operative management of these patients. The detection of structural and device-related mechanical abnormalities is critical for optimal functioning of assist device. In this review article, we describe the usefulness of TEE for optimal perioperative management of patients presenting for HeartWare LVAD insertion.

  10. Cloud Computing

    DEFF Research Database (Denmark)

    Krogh, Simon

    2013-01-01

    with technological changes, the paradigmatic pendulum has swung between increased centralization on one side and a focus on distributed computing that pushes IT power out to end users on the other. With the introduction of outsourcing and cloud computing, centralization in large data centers is again dominating...... the IT scene. In line with the views presented by Nicolas Carr in 2003 (Carr, 2003), it is a popular assumption that cloud computing will be the next utility (like water, electricity and gas) (Buyya, Yeo, Venugopal, Broberg, & Brandic, 2009). However, this assumption disregards the fact that most IT production......), for instance, in establishing and maintaining trust between the involved parties (Sabherwal, 1999). So far, research in cloud computing has neglected this perspective and focused entirely on aspects relating to technology, economy, security and legal questions. While the core technologies of cloud computing (e...

  11. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile...... users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for mobile clouds are also discussed, highlighting the key role of network coding. Mobile clouds have the potential to enhance communications...... performance, improve utilization of resources and create flexible platforms to share resources in very novel ways. Energy efficient aspects of mobile clouds are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple...

  12. Optimizing Water Use and Hydropower Production in Operational Reservoir System Scheduling with RiverWare

    Science.gov (United States)

    Magee, T. M.; Zagona, E. A.

    2017-12-01

    Practical operational optimization of multipurpose reservoir systems is challenging for several reasons. Each purpose has its own constraints which may conflict with those of other purposes. While hydropower generation typically provides the bulk of the revenue, it is also among the lowest priority purposes. Each river system has important details that are specific to the location such as hydrology, reservoir storage capacity, physical limitations, bottlenecks, and the continuing evolution of operational policy. In addition, reservoir operations models include discrete, nonlinear, and nonconvex physical processes and if-then operating policies. Typically, the forecast horizon for scheduling needs to be extended far into the future to avoid near term (e.g., a few hours or a day) scheduling decisions that result in undesirable future states; this makes the computational effort much larger than may be expected. Put together, these challenges lead to large and customized mathematical optimization problems which must be solved efficiently to be of practical use. In addition, the solution process must be robust in an operational setting. We discuss a unique modeling approach in RiverWare that meets these challenges in an operational setting. The approach combines a Preemptive Linear Goal Programming optimization model to handle prioritized policies complimented by preprocessing and postprocessing with Rulebased Simulation to improve the solution with regard to nonlinearities, discrete issues, and if-then logic. An interactive policy language with a graphical user interface allows modelers to customize both the optimization and simulation based on the unique aspects of the policy for their system while the routine physical aspect of operations are modeled automatically. The modeler is aided by a set of compiled predefined functions and functions shared by other modelers. We illustrate the success of the approach with examples from daily use at the Tennessee Valley

  13. Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles

    OpenAIRE

    Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V.; Imran, Muhammad; Zhou, Keliang

    2016-01-01

    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and Io...

  14. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    Science.gov (United States)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  15. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  16. Internet Policy

    Science.gov (United States)

    1999-11-17

    equipment, including information technology , includes, but is not limited to, personal computers and related peripheral equipment and software, office...classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically

  17. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  18. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  19. A Platform for Learning Internet of Things

    Science.gov (United States)

    Bogdanovic, Zorica; Simic, Konstantin; Milutinovic, Miloš; Radenkovic, Božidar; Despotovic-Zrakic, Marijana

    2014-01-01

    This paper presents a model for conducting Internet of Things (IoT) classes based on a web-service oriented cloud platform. The goal of the designed model is to provide university students with knowledge about IoT concepts, possibilities, and business models, and allow them to develop basic system prototypes using general-purpose microdevices and…

  20. Spreadsheets in the Cloud { Not Ready Yet

    Directory of Open Access Journals (Sweden)

    Bruce D. McCullogh

    2013-01-01

    Full Text Available Cloud computing is a relatively new technology that facilitates collaborative creation and modification of documents over the internet in real time. Here we provide an introductory assessment of the available statistical functions in three leading cloud spreadsheets namely Google Spreadsheet, Microsoft Excel Web App, and Zoho Sheet. Our results show that the developers of cloud-based spreadsheets are not performing basic quality control, resulting in statistical computations that are misleading and erroneous. Moreover, the developers do not provide sufficient information regarding the software and the hardware, which can change at any time without notice. Indeed, rerunning the tests after several months we obtained different and sometimes worsened results.

  1. Efficacies of sodium hypochlorite and quaternary ammonium sanitizers for reduction of norovirus and selected bacteria during ware-washing operations.

    Directory of Open Access Journals (Sweden)

    Lizanel Feliciano

    Full Text Available Cross-contamination of ready-to-eat (RTE foods with pathogens on contaminated tableware and food preparation utensils is an important factor associated with foodborne illnesses. To prevent this, restaurants and food service establishments are required to achieve a minimum microbial reduction of 5 logs from these surfaces. This study evaluated the sanitization efficacies of ware-washing protocols (manual and mechanical used in restaurants to clean tableware items. Ceramic plates, drinking glasses and stainless steel forks were used as the food contact surfaces. These were contaminated with cream cheese and reduced-fat milk inoculated with murine norovirus (MNV-1, Escherichia coli K-12 and Listeria innocua. The sanitizing solutions tested were sodium hypochlorite (chlorine, quaternary ammonium (QAC and tap water (control. During the study, the survivability and response to the experimental conditions of the bacterial species was compared with that of MNV-1. The results showed that current ware-washing protocols used to remove bacteria from tableware items were not sufficient to achieve a 5 log reduction in MNV-1 titer. After washing, a maximum of 3 log reduction in the virus were obtained. It was concluded that MNV-1 appeared to be more resistant to both the washing process and the sanitizers when compared with E. coli K-12 and L. innocua.

  2. Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter

    Directory of Open Access Journals (Sweden)

    Shyamala Loganathan

    2015-01-01

    Full Text Available Cloud computing is an on-demand computing model, which uses virtualization technology to provide cloud resources to users in the form of virtual machines through internet. Being an adaptable technology, cloud computing is an excellent alternative for organizations for forming their own private cloud. Since the resources are limited in these private clouds maximizing the utilization of resources and giving the guaranteed service for the user are the ultimate goal. For that, efficient scheduling is needed. This research reports on an efficient data structure for resource management and resource scheduling technique in a private cloud environment and discusses a cloud model. The proposed scheduling algorithm considers the types of jobs and the resource availability in its scheduling decision. Finally, we conducted simulations using CloudSim and compared our algorithm with other existing methods, like V-MCT and priority scheduling algorithms.

  3. THE EXPANSION OF ACCOUNTING TO THE CLOUD

    Directory of Open Access Journals (Sweden)

    Otilia DIMITRIU

    2014-06-01

    Full Text Available The world today is witnessing an explosion of technologies that are remodelling our entire reality. The traditional way of thinking in the business field has shifted towards a new IT breakthrough: cloud computing. The cloud paradigm has emerged as a natural step in the evolution of the internet and has captivated everyone’s attention. The accounting profession itself has found a mean to optimize its activity through cloud-based applications. By reviewing the latest and most relevant studies and practitioners’ reports, this paper is focused on the implications of cloud accounting, as the fusion between cloud technologies and accounting. We addressed this innovative topic through a business-oriented approach and we brought forward a new accounting model that might revolutionize the economic landscape.

  4. Cloud Computing and Virtual Desktop Infrastructures in Afloat Environments

    OpenAIRE

    Gillette, Stefan E.

    2012-01-01

    The phenomenon of “cloud computing” has become ubiquitous among users of the Internet and many commercial applications. Yet, the U.S. Navy has conducted limited research in this nascent technology. This thesis explores the application and integration of cloud computing both at the shipboard level and in a multi-ship environment. A virtual desktop infrastructure, mirroring a shipboard environment, was built and analyzed in the Cloud Lab at the Naval Postgraduate School, which offers a potentia...

  5. PARTICAL SWARM OPTIMIZATION OF TASK SCHEDULING IN CLOUD COMPUTING

    OpenAIRE

    Payal Jaglan*, Chander Diwakar

    2016-01-01

    Resource provisioning and pricing modeling in cloud computing makes it an inevitable technology both on developer and consumer end. Easy accessibility of software and freedom of hardware configuration increase its demand in IT industry. It’s ability to provide a user-friendly environment, software independence, quality, pricing index and easy accessibility of infrastructure via internet. Task scheduling plays an important role in cloud computing systems. Task scheduling in cloud computing mea...

  6. Formal Specification and Analysis of Cloud Computing Management

    Science.gov (United States)

    2012-01-24

    te r Cloud Computing in a Nutshell We begin this introduction to Cloud Computing with a famous quote by Larry Ellison: “The interesting thing about...the wording of some of our ads.” — Larry Ellison, Oracle CEO [106] In view of this statement, we summarize the essential aspects of Cloud Computing...1] M. Abadi, M. Burrows , M. Manasse, and T. Wobber. Moderately hard, memory-bound functions. ACM Transactions on Internet Technology, 5(2):299–327

  7. Proposed scheduling algorithm for deployment of fail-safe cloud services

    OpenAIRE

    Kollberg, Simon

    2014-01-01

    The cloud is a fairly new concept in computer science, altough almost everyone has been or is in contact with it on a regular basis. As more and more systems and applications are migrating from the desktop and into the cloud, keeping a high availability in cloud services is becoming increasingly important. Seeing that the cloud users are dependant on the cloud services being online and accessable via the Internet, creating fault tolerant cloud systems is key to keeping the cloud stable and tr...

  8. Internet Alternatifs

    OpenAIRE

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  9. Development and Usage of Software as a Service for a Cloud and Non-Cloud Based Environment- An Empirical Study

    OpenAIRE

    Pratiyush Guleria Guleria; Vikas Sharma; Manish Arora

    2012-01-01

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture and utility computing. The computer applications nowadays are becoming more and more complex; there is an ever increasing demand for computing resources. As this demand has risen, the concepts of cloud computing and grid computing...

  10. Soft Clouding

    DEFF Research Database (Denmark)

    Søndergaard, Morten; Markussen, Thomas; Wetton, Barnabas

    2012-01-01

    Soft Clouding is a blended concept, which describes the aim of a collaborative and transdisciplinary project. The concept is a metaphor implying a blend of cognitive, embodied interaction and semantic web. Furthermore, it is a metaphor describing our attempt of curating a new semantics of sound...... archiving. The Soft Clouding Project is part of LARM - a major infrastructure combining research in and access to sound and radio archives in Denmark. In 2012 the LARM infrastructure will consist of more than 1 million hours of radio, combined with metadata who describes the content. The idea is to analyse...... the concept of ‘infrastructure’ and ‘interface’ on a creative play with the fundamentals of LARM (and any sound archive situation combining many kinds and layers of data and sources). This paper will present and discuss the Soft clouding project from the perspective of the three practices and competencies...

  11. High Performance Networks From Supercomputing to Cloud Computing

    CERN Document Server

    Abts, Dennis

    2011-01-01

    Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by an array of applications ranging from communication intensive climatology, complex material simulations and molecular dynamics to such Internet applications as Web search, language translation, collaborative Internet applications, streaming video and voice-over-IP. For both Supercomputing and Cloud Computing the network enables distributed applicati

  12. Cloud Chamber

    DEFF Research Database (Denmark)

    Gfader, Verina

    Cloud Chamber takes its roots in a performance project, titled The Guests 做东, devised by Verina Gfader for the 11th Shanghai Biennale, ‘Why Not Ask Again: Arguments, Counter-arguments, and Stories’. Departing from the inclusion of the biennale audience to write a future folk tale, Cloud Chamber......: fiction and translation and translation through time; post literacy; world picturing-world typing; and cartographic entanglements and expressions of subjectivity; through the lens a social imaginary of worlding or cosmological quest. Art at its core? Contributions by Nikos Papastergiadis, Rebecca Carson...

  13. Cloud Computing Based E-Learning System

    Science.gov (United States)

    Al-Zoube, Mohammed; El-Seoud, Samir Abou; Wyne, Mudasser F.

    2010-01-01

    Cloud computing technologies although in their early stages, have managed to change the way applications are going to be developed and accessed. These technologies are aimed at running applications as services over the internet on a flexible infrastructure. Microsoft office applications, such as word processing, excel spreadsheet, access database…

  14. Unidata Cyberinfrastructure in the Cloud

    Science.gov (United States)

    Ramamurthy, M. K.; Young, J. W.

    2016-12-01

    Data services, software, and user support are critical components of geosciences cyber-infrastructure to help researchers to advance science. With the maturity of and significant advances in cloud computing, it has recently emerged as an alternative new paradigm for developing and delivering a broad array of services over the Internet. Cloud computing is now mature enough in usability in many areas of science and education, bringing the benefits of virtualized and elastic remote services to infrastructure, software, computation, and data. Cloud environments reduce the amount of time and money spent to procure, install, and maintain new hardware and software, and reduce costs through resource pooling and shared infrastructure. Given the enormous potential of cloud-based services, Unidata has been moving to augment its software, services, data delivery mechanisms to align with the cloud-computing paradigm. To realize the above vision, Unidata has worked toward: * Providing access to many types of data from a cloud (e.g., via the THREDDS Data Server, RAMADDA and EDEX servers); * Deploying data-proximate tools to easily process, analyze, and visualize those data in a cloud environment cloud for consumption by any one, by any device, from anywhere, at any time; * Developing and providing a range of pre-configured and well-integrated tools and services that can be deployed by any university in their own private or public cloud settings. Specifically, Unidata has developed Docker for "containerized applications", making them easy to deploy. Docker helps to create "disposable" installs and eliminates many configuration challenges. Containerized applications include tools for data transport, access, analysis, and visualization: THREDDS Data Server, Integrated Data Viewer, GEMPAK, Local Data Manager, RAMADDA Data Server, and Python tools; * Leveraging Jupyter as a central platform and hub with its powerful set of interlinking tools to connect interactively data servers

  15. Current Trends in Cloud Computing A Survey of Cloud Computing Systems

    OpenAIRE

    Harjit Singh

    2012-01-01

    Cloud computing that has become an increasingly important trend, is a virtualization technology that uses the internet and central remote servers to offer the sharing of resources that include infrastructures, software, applications and business processes to the market environment to fulfill the elastic demand. In today’s competitive environment, the service vitality, elasticity, choices and flexibility offered by this scalable technology are too attractive that makes the cloud computing to i...

  16. Cloud Computing

    Indian Academy of Sciences (India)

    IAS Admin

    2014-03-01

    Mar 1, 2014 ... There are several types of services available on a cloud. We describe .... CPU speed has been doubling every 18 months at constant cost. Besides this ... Plain text (e.g., email) may be read by anyone who is able to access it.

  17. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  18. Recent Progress in Data Engineering and Internet Technology Volume 1

    CERN Document Server

    Gaol, Ford Lumban

    2013-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  19. Recent Progress in Data Engineering and Internet Technology Volume 2

    CERN Document Server

    Gaol, Ford Lumban

    2012-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  20. Internet Telephony

    OpenAIRE

    Perri, Richard.

    1999-01-01

    During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the deployment of Voice over IP (VoIP). One advantage of VoIP technologies is that they leverage existing network resources and dramatically reduce, or major eliminate telephone costs. If there is an existing Wide Area Network (WAN) then VoIP could be employed over the ...

  1. It Is More than Knowledge Seeking: Examining the Effects of OpenCourseWare Lectures on Vocabulary Acquisition in English as a Foreign Language (EFL) Context

    Science.gov (United States)

    Yang, Hui-Chi; Sun, Yu-Chih

    2013-01-01

    OpenCourseWare (OCW) has received increasing attention over the past few years in higher education. These courses provide appealing opportunities to view classes taught in well-established universities worldwide. The current study aims to examine how OCW lectures can serve as authentic learning materials to facilitate vocabulary acquisition for…

  2. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  3. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  4. Cloud Computing - A Unified Approach for Surveillance Issues

    Science.gov (United States)

    Rachana, C. R.; Banu, Reshma, Dr.; Ahammed, G. F. Ali, Dr.; Parameshachari, B. D., Dr.

    2017-08-01

    Cloud computing describes highly scalable resources provided as an external service via the Internet on a basis of pay-per-use. From the economic point of view, the main attractiveness of cloud computing is that users only use what they need, and only pay for what they actually use. Resources are available for access from the cloud at any time, and from any location through networks. Cloud computing is gradually replacing the traditional Information Technology Infrastructure. Securing data is one of the leading concerns and biggest issue for cloud computing. Privacy of information is always a crucial pointespecially when an individual’s personalinformation or sensitive information is beingstored in the organization. It is indeed true that today; cloud authorization systems are notrobust enough. This paper presents a unified approach for analyzing the various security issues and techniques to overcome the challenges in the cloud environment.

  5. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  6. Cloud time

    CERN Document Server

    Lockwood, Dean

    2012-01-01

    The ‘Cloud’, hailed as a new digital commons, a utopia of collaborative expression and constant connection, actually constitutes a strategy of vitalist post-hegemonic power, which moves to dominate immanently and intensively, organizing our affective political involvements, instituting new modes of enclosure, and, crucially, colonizing the future through a new temporality of control. The virtual is often claimed as a realm of invention through which capitalism might be cracked, but it is precisely here that power now thrives. Cloud time, in service of security and profit, assumes all is knowable. We bear witness to the collapse of both past and future virtuals into a present dedicated to the exploitation of the spectres of both.

  7. Cloud Fingerprinting: Using Clock Skews To Determine Co Location Of Virtual Machines

    Science.gov (United States)

    2016-09-01

    expenses. However, because the cloud infrastructure is located off-site from an organization and the cloud is available to anyone who pays for its...Defense DNS Domain Name Service EC2 Elastic Cloud Computing EoR End of Row GCE Google Compute Engine IaaS Infrastructure -as-a-Service ICMP Internet...de facto method for both managing and processing this data [1]. The high demand for cloud services has caused many companies to offer easy solutions at

  8. Usage of Cloud Computing Simulators and Future Systems For Computational Research

    OpenAIRE

    Lakshminarayanan, Ramkumar; Ramalingam, Rajasekar

    2016-01-01

    Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers and devices on demand, like the electricity grid. Currently, IaaS (Infrastructure as a Service), PaaS (Platform as a Service) and SaaS (Software as a Service) are used as a business model for Cloud Computing. Nowadays, the adoption and deployment of Cloud Computing is increasing in various domains, forcing researchers to conduct research in the area of Cloud Computing ...

  9. An overview of cloud services adoption challenges in higher education institutions

    OpenAIRE

    Alharthi, Abdulrahman; Yahya, Fara; Walters, Robert John; Wills, Gary

    2015-01-01

    Information Technology (IT) plays an important role in enabling education services be delivered to users. Most education online services in universities have been run on the cloud to provide services to support students, lecturers, researchers and administration staff. These are enabled with the emergence of cloud computing in the world of IT. Cloud computing offers on demand Internet-based computing services. This paper presents an overview of cloud computing adoption in higher education, ma...

  10. Study on Cloud Computing Resource Scheduling Strategy Based on the Ant Colony Optimization Algorithm

    OpenAIRE

    Lingna He; Qingshui Li; Linan Zhu

    2012-01-01

    In order to replace the traditional Internet software usage patterns and enterprise management mode, this paper proposes a new business calculation mode- cloud computing, resources scheduling strategy is the key technology in cloud computing, Based on the study of cloud computing system structure and the mode of operation, The key research for cloud computing the process of the work scheduling and resource allocation problems based on ant colony algorithm , Detailed analysis and design of the...

  11. ROBUST AND EFFICIENT PRIVACY PRESERVING PUBLIC AUDITING FOR REGENERATING-CODE-BASED CLOUD STORAGE

    OpenAIRE

    Tessy Vincent*, Mrs.Krishnaveni.V.V

    2017-01-01

    Cloud computing is gaining more popularity because of its guaranteed services like online data storage and backup solutions, Web-based e-mail services, virtualized infrastructure etc. User is allowed to access the data stored in a cloud anytime, anywhere using internet connected device with low cost. To provide security to outsourced data in cloud storage against various corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes c...

  12. Poultry Internet

    Science.gov (United States)

    Cheok, Adrian David

    Poultry are one of the most badly treated animals in the modern world. It has been shown that they have high levels of both cognition and feelings, and as a result there has been a recent trend of promoting poultry welfare. There is also a tradition of keeping poultry as pets in some parts of the world. However, in modern cities and societies, it is often difficult to maintain contact with pets, particularly for office workers. We propose and describe a novel cybernetics system to use mobile and Internet technology to improve human-pet interaction. It can also be used for people who are allergic to touching animals and thus cannot stroke them directly. This interaction encompasses both visualization and tactile sensation of real objects.

  13. Internet Astrometry

    Science.gov (United States)

    Caballero, Rafael; Argyle, R. W.

    Amateur astronomers can carry out scientific research in many different ways. Some activities require expensive telescopes, cameras, and often access to dark skies. But those who live in highly polluted areas, or do not have access to very specialized equipment, still have many possibilities; amongst which is using the online resources available from the internet. In this chapter we explore Aladin, Simbad, and VizieR, three resources created and maintained by the Centre de Données astronomiques de Strasbourg (CDS). Although these applications are intended for professional astronomers, they are also freely available for amateurs. They allow us to find and measure old neglected difficult pairs, discover new double stars, and in general have a better understanding of those tiny pairs of points of light that we love to observe, photograph and measure.

  14. Bioinformatics clouds for big data manipulation

    Directory of Open Access Journals (Sweden)

    Dai Lin

    2012-11-01

    Full Text Available Abstract As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS, Software as a Service (SaaS, Platform as a Service (PaaS, and Infrastructure as a Service (IaaS, and present our perspectives on the adoption of cloud computing in bioinformatics. Reviewers This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor.

  15. Bioinformatics clouds for big data manipulation

    KAUST Repository

    Dai, Lin

    2012-11-28

    As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics.This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor. 2012 Dai et al.; licensee BioMed Central Ltd.

  16. Bioinformatics clouds for big data manipulation.

    Science.gov (United States)

    Dai, Lin; Gao, Xin; Guo, Yan; Xiao, Jingfa; Zhang, Zhang

    2012-11-28

    As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics. This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor.

  17. Privacy in the Internet: Myth or reality

    Directory of Open Access Journals (Sweden)

    Mikarić Bratislav

    2016-01-01

    Full Text Available The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? What are the ways to control what personal information we will publicly share with others and is there a safe way to protect privacy on the world's global computer network? The paper gives an overview of the situation in the field, as well as tips for achieving the desired level of data protection.

  18. Essentials of cloud computing

    CERN Document Server

    Chandrasekaran, K

    2014-01-01

    ForewordPrefaceComputing ParadigmsLearning ObjectivesPreambleHigh-Performance ComputingParallel ComputingDistributed ComputingCluster ComputingGrid ComputingCloud ComputingBiocomputingMobile ComputingQuantum ComputingOptical ComputingNanocomputingNetwork ComputingSummaryReview PointsReview QuestionsFurther ReadingCloud Computing FundamentalsLearning ObjectivesPreambleMotivation for Cloud ComputingThe Need for Cloud ComputingDefining Cloud ComputingNIST Definition of Cloud ComputingCloud Computing Is a ServiceCloud Computing Is a Platform5-4-3 Principles of Cloud computingFive Essential Charact

  19. Large Scale Product Recommendation of Supermarket Ware Based on Customer Behaviour Analysis

    Directory of Open Access Journals (Sweden)

    Andreas Kanavos

    2018-05-01

    Full Text Available In this manuscript, we present a prediction model based on the behaviour of each customer using data mining techniques. The proposed model utilizes a supermarket database and an additional database from Amazon, both containing information about customers’ purchases. Subsequently, our model analyzes these data in order to classify customers as well as products, being trained and validated with real data. This model is targeted towards classifying customers according to their consuming behaviour and consequently proposes new products more likely to be purchased by them. The corresponding prediction model is intended to be utilized as a tool for marketers so as to provide an analytically targeted and specified consumer behavior. Our algorithmic framework and the subsequent implementation employ the cloud infrastructure and use the MapReduce Programming Environment, a model for processing large data-sets in a parallel manner with a distributed algorithm on computer clusters, as well as Apache Spark, which is a newer framework built on the same principles as Hadoop. Through a MapReduce model application on each step of the proposed method, text processing speed and scalability are enhanced in reference to other traditional methods. Our results show that the proposed method predicts with high accuracy the purchases of a supermarket.

  20. Cloud Computing, Tieto Cloud Server Model

    OpenAIRE

    Suikkanen, Saara

    2013-01-01

    The purpose of this study is to find out what is cloud computing. To be able to make wise decisions when moving to cloud or considering it, companies need to understand what cloud is consists of. Which model suits best to they company, what should be taken into account before moving to cloud, what is the cloud broker role and also SWOT analysis of cloud? To be able to answer customer requirements and business demands, IT companies should develop and produce new service models. IT house T...

  1. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  2. Internet of Things novel advances and envisioned applications

    CERN Document Server

    Geetha, M

    2017-01-01

    This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society. .

  3. INTERNET & INTRANET

    Institute of Scientific and Technical Information of China (English)

    刘硬

    1999-01-01

    <正> 一、什么是INTERNET,INTRANET 说起INTERNET大家都知道它是我们平时接触最多的国际互联网。而INTRANET是最近两年才发展起来的新事物,被企业界称为企业内部网。 INTERNET是一组全球范围内信息资源的名字。这些资源非常巨大,不是一般人所能想象的。它于20世纪70年代创建。他们从一称为ARPANET的网络开始,是由美国国防部发起的用于军事情报的调查与军队之间的联络。原来的ARPANET早已被扩展与替代了,今天它已成为我们所说的INTERNET的全球主干网。

  4. Blue skies for CLOUD

    CERN Multimedia

    2006-01-01

    Through the recently approved CLOUD experiment, CERN will soon be contributing to climate research. Tests are being performed on the first prototype of CLOUD, an experiment designed to assess cosmic radiation influence on cloud formation.

  5. The Future Internet

    Directory of Open Access Journals (Sweden)

    Andrew Hudson-Smith

    2009-07-01

    Full Text Available In 1995 technology analyst Gartner [1] developed a hype cycle model for the adoption of technology. The cycle comprises five stages from the initial technology trigger through to a final plateau of productivity along a with a peak of inflated expectations, a tough of disillusionment and the slope of enlightenment. The hype cycle is notable technique for plotting and identifying waves of innovation and hype in technology and digital communications. Yet, from where we stand, we can see the waves of innovation becoming increasingly shorter, the troughs less deep and the peaks of expectations higher. The read-write revolution, that is arguably known as Web 2.0, has transformed our experience of using the Internet from a source of information to a means of communication and participation. It has introduced mirror worlds, the cloud, wikitecture, social shaping, connected places, folksonomies and many other terms that I am sure many of us have used in recent grant applications and papers. This is the here and now, all of these technologies are past the technology trigger point and rising up the peak of inflated expectations with a few already heading towards the trough before becoming mainstream and approaching mass adoption. [...

  6. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  7. Cloud-based Architecture Capabilities Summary Report

    Energy Technology Data Exchange (ETDEWEB)

    Vang, Leng [Idaho National Lab. (INL), Idaho Falls, ID (United States); Prescott, Steven R [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Curtis [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2014-09-01

    In collaborating scientific research arena it is important to have an environment where analysts have access to a shared of information documents, software tools and be able to accurately maintain and track historical changes in models. A new cloud-based environment would be accessible remotely from anywhere regardless of computing platforms given that the platform has available of Internet access and proper browser capabilities. Information stored at this environment would be restricted based on user assigned credentials. This report reviews development of a Cloud-based Architecture Capabilities (CAC) as a web portal for PRA tools.

  8. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  9. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  10. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  11. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  12. Cloud-Top Entrainment in Stratocumulus Clouds

    Science.gov (United States)

    Mellado, Juan Pedro

    2017-01-01

    Cloud entrainment, the mixing between cloudy and clear air at the boundary of clouds, constitutes one paradigm for the relevance of small scales in the Earth system: By regulating cloud lifetimes, meter- and submeter-scale processes at cloud boundaries can influence planetary-scale properties. Understanding cloud entrainment is difficult given the complexity and diversity of the associated phenomena, which include turbulence entrainment within a stratified medium, convective instabilities driven by radiative and evaporative cooling, shear instabilities, and cloud microphysics. Obtaining accurate data at the required small scales is also challenging, for both simulations and measurements. During the past few decades, however, high-resolution simulations and measurements have greatly advanced our understanding of the main mechanisms controlling cloud entrainment. This article reviews some of these advances, focusing on stratocumulus clouds, and indicates remaining challenges.

  13. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  14. A Review on Broker Based Cloud Service Model

    Directory of Open Access Journals (Sweden)

    Nagarajan Rajganesh

    2016-09-01

    Full Text Available Cloud computing emerged as a utility oriented computing that facilitates resource sharing under pay-as-you-go model. Nowadays, cloud offerings are not limited to range of services and anything can be shared as a service through the Internet. In this work, a detailed literature survey with respect to cloud service discovery and composition has been accounted. A proposed architecture with the inclusion of cloud broker is presented in our work. It focuses the importance of suitable service selection and its ranking towards fulfilling the customer’s service requirements. The proposed cloud broker advocates techniques such as reasoning and decision making capabilities for the improved cloud service selection and composition.

  15. Evaluation of device-independent internet spatial location

    OpenAIRE

    Komosný, Dan; Pang, Paul; Mehic, Miralem; Vozňák, Miroslav

    2017-01-01

    Device-independent Internet spatial location is needed for many purposes, such as data personalisation and social behaviour analysis. Internet spatial databases provide such locations based the IP address of a device. The free to use databases are natively included into many UNIX and Linux operating systems. These systems are predominantly used for e-shops, social networks, and cloud data storage. Using a constructed ground truth dataset, we comprehensively evaluate these databases for null r...

  16. Silicon Photonics Cloud (SiCloud)

    DEFF Research Database (Denmark)

    DeVore, P. T. S.; Jiang, Y.; Lynch, M.

    2015-01-01

    Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths.......Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths....

  17. Dynamic virtual machine allocation policy in cloud computing complying with service level agreement using CloudSim

    Science.gov (United States)

    Aneri, Parikh; Sumathy, S.

    2017-11-01

    Cloud computing provides services over the internet and provides application resources and data to the users based on their demand. Base of the Cloud Computing is consumer provider model. Cloud provider provides resources which consumer can access using cloud computing model in order to build their application based on their demand. Cloud data center is a bulk of resources on shared pool architecture for cloud user to access. Virtualization is the heart of the Cloud computing model, it provides virtual machine as per application specific configuration and those applications are free to choose their own configuration. On one hand, there is huge number of resources and on other hand it has to serve huge number of requests effectively. Therefore, resource allocation policy and scheduling policy play very important role in allocation and managing resources in this cloud computing model. This paper proposes the load balancing policy using Hungarian algorithm. Hungarian Algorithm provides dynamic load balancing policy with a monitor component. Monitor component helps to increase cloud resource utilization by managing the Hungarian algorithm by monitoring its state and altering its state based on artificial intelligent. CloudSim used in this proposal is an extensible toolkit and it simulates cloud computing environment.

  18. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  19. TINJAUAN KEAMANAN SISTEM PADA TEKNOLOGI CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Yuli Fauziah

    2014-01-01

    Full Text Available Dalam perspektif teknologi informasi, cloud computing atau komputasi awan dapat diartikan sebagai suatu teknologi yang memanfaatkan internet sebagai resource untuk komputasi yang dapat di-request oleh pengguna dan merupakan sebuah layanan dengan pusat server bersifat virtual atau berada dalam cloud (internet itu sendiri. Banyak perusahaan yang ingin memindahkan aplikasi dan storage-nya ke dalam cloudcomputing. Teknologi ini menjadi trend dikalangan peneliti dan praktisi IT untuk menggali potensi yang dapat ditawarkan kepada masyarakat luas. Tetapi masih banyak isu keamanan yang muncul, karena teknologi yang masih baru. Salah satu isu keamanannya adalah Theft of Information, yaitu pencurian terhadap data yang disimpan di dalam Storage aplikasi yang menggunakan teknologi Cloud Computing. Kerugian yang akan diperoleh oleh pengguna teknologi ini sangat besar, karena informasi yang dicuri menyangkut data rahasia milik perusahaan, maupun data-data penting lainnya.Beberapa tindakan untuk mencegah terjadinya pencurian data ini, yaitu dengan  menghindari jenis ancaman keamanan berupa kehilangan atau kebocoran data dan pembajakan account atau service, serta Identity Management dan access control adalah kebutuhan yang utama bagi SaaS Cloud computing perusahaan. Dan salah satu metode yang digunakan dalam keamanan data aspek autentikasi dan otorisasi pada aplikasi atau service cloud computing adalah teknologi Single-sign-on. Teknologi Single-sign-on (SSO adalah teknologi yang mengizinkan pengguna jaringan agar dapat mengakses sumber daya dalam jaringan hanya dengan menggunakan satu akun pengguna saja. Teknologi ini sangat diminati, khususnya dalam jaringan yang sangat besar dan bersifat heterogen, juga pada jaringan cloud computing. Dengan menggunakan SSO, seorang pengguna hanya cukup melakukan proses autentikasi sekali saja untuk mendapatkan izin akses terhadap semua layanan yang terdapat di dalam jaringan. Kata Kunci : Storage, Aplikasi, Software as a

  20. An investigation of pottery production technology for the West Slope wares from Dorylaion (Eski ehir/Turkey)

    Energy Technology Data Exchange (ETDEWEB)

    Issi, A.; Kara, A.

    2013-02-01

    Researches in the field of pottery production technology in ancient times, done in different settlements during the same period, may contribute to know relationships established within the different cultural communities. In ancient times, Anatolia (Asia Minor) was the crossroads of ancient civilizations. There are several ancient settlements and artifacts belonging to Hellenistic culture (330-30 BC). West Slope wares from Dorylaion (Eski ehir/Turkey) excavations are the main Hellenistic culture findings. In this study, different analytical techniques were employed for the characterization of these findings in order to enlighten the pottery production technology. Wavelength dispersive X-ray fluorescence (WDXRF) and X-ray diffraction (XRD) were employed to study the chemical and mineralogical composition of the bodies, respectively. Scanning electron microscopy (SEM) and energy dispersive X-ray spectrometry (EDX) were also performed for the microstructural and microchemical characterization of body and slip layers of the selected potsherds. The raw materials used, firing temperatures and atmosphere and related microstructural characteristics were discussed. (Author) 22 refs.

  1. Docencia y libre acceso: el Open Course Ware de la Universitat de València

    Directory of Open Access Journals (Sweden)

    2008-12-01

    Full Text Available En este artículo presentamos la Oficina OCW de la Universitat de València atendiendo al contexto general de aparición y sus características específicas. En primer lugar, contextualizamos el Open Course Ware en el ámbito de los movimientos Open y repasamos algunas de sus iniciativas. Después nos centramos en la caracterización de los usuarios/destinatarios prototípicos del OCW como “nativos digitales”, atendiendo a la distinción de dos modelos epistemológicos: la inteligencia colectiva (nativos y el paradigma del experto (inmigrantes digitales, algunas de cuyas premisas básicas se explican solamente por la aparición de las tecnologías digitales. Tras esta contextualización teórica, exponemos las características que definen el proyecto OCW, de la Universitat de València

  2. An investigation of pottery production technology for the West Slope wares from Dorylaion (Eski ehir/Turkey)

    International Nuclear Information System (INIS)

    Issi, A.; Kara, A.

    2013-01-01

    Researches in the field of pottery production technology in ancient times, done in different settlements during the same period, may contribute to know relationships established within the different cultural communities. In ancient times, Anatolia (Asia Minor) was the crossroads of ancient civilizations. There are several ancient settlements and artifacts belonging to Hellenistic culture (330-30 BC). West Slope wares from Dorylaion (Eski ehir/Turkey) excavations are the main Hellenistic culture findings. In this study, different analytical techniques were employed for the characterization of these findings in order to enlighten the pottery production technology. Wavelength dispersive X-ray fluorescence (WDXRF) and X-ray diffraction (XRD) were employed to study the chemical and mineralogical composition of the bodies, respectively. Scanning electron microscopy (SEM) and energy dispersive X-ray spectrometry (EDX) were also performed for the microstructural and microchemical characterization of body and slip layers of the selected potsherds. The raw materials used, firing temperatures and atmosphere and related microstructural characteristics were discussed. (Author) 22 refs.

  3. Petrography of the Nimun and Baca pottery (Ware Celestun Roja): Canbalam Ceramic Sphere of the Yucatan Peninsula, Mexico

    International Nuclear Information System (INIS)

    Obando, Luis G.; Jimenez Alvarez, Socorro del Pilar

    2016-01-01

    The ware Celestun Red (of the Nimun and Baca ceramic typologies) is one of the most diagnosis ceramics of the northwestern coast of Mexico's Yucatan Peninsula and subject of ongoing debate regarding its distribution and origin. Although ceramics from coastal Campeche and Yucatan have been the focus of years of investigation, scholars still do not know if Celestun Red was manufactured locally during the Late Classic (A.D. 600-900) or was made and exchanged by the regional elite. The first petrographic description of Celestun Red are provide, and use to contribute to a formal definition of the Cambalan Ceramic Sphere. These petrographic observations show that the detrital components were rhyolite fragments, vitroclastic tuffs, pumice, shards of glass, quartzes, plagioclase, calcite, hematite, magnetite and other minor contributors. The clay matrix is phyllomorphic, with a parallel, rectilinear fabric of fine grains. granulometricaly, the detrital components have been characterized as fine to medium sands. The pastes pastes present evidence of diagenetic processes, most notably porosity in the primary ceramic matrix. These space are in some cases filled by secondary calcite deposits. Evidence of manufacturing was also observed, such as the fracture and bending of the paste that took place to produce the rims of these ceramic objects. (author) [es

  4. A home healthcare system in the cloud-addressing security and privacy challenges

    NARCIS (Netherlands)

    Deng, M.; Petkovic, M.; Nalin, M.; Baroni, I.

    2011-01-01

    Cloud computing is an emerging technology that is expected to support Internet scale critical applications which could be essential to the healthcare sector. Its scalability, resilience, adaptability, connectivity, cost reduction, and high performance features have high potential to lift the

  5. API, Cloud computing, WebGIS and cartography

    Directory of Open Access Journals (Sweden)

    Andrea Favretto

    2013-05-01

    Full Text Available This paper explores some of the digital mapping processes available on the Internet in order to analyse their cartographic congruence. It will focus on WebGIS-based cartography in relation to what is produced using Mash-up site maps. These websites often use Googlebased maps in order to produce their own cartography. Thus, we can identify two main typologies of Internet mapping sites, which are characterized by the ownership or non-ownership of their cartographic bases. This paper will critically assess the cartography employed in the two different instances. A concise introduction to the Cloud Computing Internet propagated phenomenon is also premised in order to provide the reader with an accurate frame of reference. Cloud Computing has encouraged a significant Internet participation via the Application Programming Interface software (API, leading to mash-up cartographic websites.

  6. A survey on User’s security in cloud

    OpenAIRE

    Indal Singh; Rajesh Rai

    2014-01-01

    Cloud computing is a new wave in the field of information technology. Some see it as an emerging field in computer science. It consists of a set of resources and services offered through the Internet. Hence, “cloud computing” is also called “Internet computing.” The word “cloud” is a metaphor for describing the Web as a space where computing has been preinstalled and exists as a service. Operating systems, applications, storage, data, and processing capacity all exist on the W...

  7. Towards Information Security Metrics Framework for Cloud Computing

    OpenAIRE

    Muhammad Imran Tariq

    2012-01-01

    Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet.  Cost and security are influential issues to deploy cloud computing in large enterprise.  Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard...

  8. A Novel Market-Oriented Dynamic Collaborative Cloud Service Platform

    Science.gov (United States)

    Hassan, Mohammad Mehedi; Huh, Eui-Nam

    In today's world the emerging Cloud computing (Weiss, 2007) offer a new computing model where resources such as computing power, storage, online applications and networking infrastructures can be shared as "services" over the internet. Cloud providers (CPs) are incentivized by the profits to be made by charging consumers for accessing these services. Consumers, such as enterprises, are attracted by the opportunity for reducing or eliminating costs associated with "in-house" provision of these services.

  9. Cloud Computing Benefits for Educational Institutions

    OpenAIRE

    Lakshminarayanan, Ramkumar; Kumar, Binod; Raju, M.

    2013-01-01

    Education today is becoming completely associated with the Information Technology on the content delivery, communication and collaboration. The need for servers, storage and software are highly demanding in the universities, colleges and schools. Cloud Computing is an Internet based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Currently, IaaS (Infrastructure as a Service), PaaS (Platform as a Service...

  10. Cloud Computing: Opportunities and Challenges for Businesses

    Directory of Open Access Journals (Sweden)

    İbrahim Halil Seyrek

    2011-12-01

    Full Text Available Cloud computing represents a new approach for supplying and using information technology services. Considering its benefits for firms and the potential of changes that it may lead to, it is envisioned that cloud computing can be the most important innovation in information technology since the development of the internet. In this study, firstly, the development of cloud computing and related technologies are explained and classified by giving current application examples. Then the benefits of this new computing model for businesses are elaborated especially in terms of cost, flexibility and service quality. In spite of its benefits, cloud computing also poses some risks for firms, of which security is one of the most important, and there are some challenges in its implementation. This study points out the risks that companies should be wary about and some legal challenges related to cloud computing. Lastly, approaches that companies may take against cloud computing and different strategies that they may adopt are discussed and some recommendations are made

  11. An Analysis of Cloud Model-Based Security for Computing Secure Cloud Bursting and Aggregation in Real Environment

    OpenAIRE

    Pritesh Jain; Vaishali Chourey; Dheeraj Rane

    2011-01-01

    Cloud Computing has emerged as a major information and communications technology trend and has been proved as a key technology for market development and analysis for the users of several field. The practice of computing across two or more data centers separated by the Internet is growing in popularity due to an explosion in scalable computing demands. However, one of the major challenges that faces the cloud computing is how to secure and protect the data and processes the data of the user. ...

  12. Research on cloud-based remote measurement and analysis system

    Science.gov (United States)

    Gao, Zhiqiang; He, Lingsong; Su, Wei; Wang, Can; Zhang, Changfan

    2015-02-01

    The promising potential of cloud computing and its convergence with technologies such as cloud storage, cloud push, mobile computing allows for creation and delivery of newer type of cloud service. Combined with the thought of cloud computing, this paper presents a cloud-based remote measurement and analysis system. This system mainly consists of three parts: signal acquisition client, web server deployed on the cloud service, and remote client. This system is a special website developed using asp.net and Flex RIA technology, which solves the selective contradiction between two monitoring modes, B/S and C/S. This platform supplies customer condition monitoring and data analysis service by Internet, which was deployed on the cloud server. Signal acquisition device is responsible for data (sensor data, audio, video, etc.) collection and pushes the monitoring data to the cloud storage database regularly. Data acquisition equipment in this system is only conditioned with the function of data collection and network function such as smartphone and smart sensor. This system's scale can adjust dynamically according to the amount of applications and users, so it won't cause waste of resources. As a representative case study, we developed a prototype system based on Ali cloud service using the rotor test rig as the research object. Experimental results demonstrate that the proposed system architecture is feasible.

  13. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  14. The CLOUD experiment

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The Cosmics Leaving Outdoor Droplets (CLOUD) experiment as shown by Jasper Kirkby (spokesperson). Kirkby shows a sketch to illustrate the possible link between galactic cosmic rays and cloud formations. The CLOUD experiment uses beams from the PS accelerator at CERN to simulate the effect of cosmic rays on cloud formations in the Earth's atmosphere. It is thought that cosmic ray intensity is linked to the amount of low cloud cover due to the formation of aerosols, which induce condensation.

  15. BUSINESS INTELLIGENCE IN CLOUD

    OpenAIRE

    Celina M. Olszak

    2014-01-01

    . The paper reviews and critiques current research on Business Intelligence (BI) in cloud. This review highlights that organizations face various challenges using BI cloud. The research objectives for this study are a conceptualization of the BI cloud issue, as well as an investigation of some benefits and risks from BI cloud. The study was based mainly on a critical analysis of literature and some reports on BI cloud using. The results of this research can be used by IT and business leaders ...

  16. Cloud Robotics Platforms

    Directory of Open Access Journals (Sweden)

    Busra Koken

    2015-01-01

    Full Text Available Cloud robotics is a rapidly evolving field that allows robots to offload computation-intensive and storage-intensive jobs into the cloud. Robots are limited in terms of computational capacity, memory and storage. Cloud provides unlimited computation power, memory, storage and especially collaboration opportunity. Cloud-enabled robots are divided into two categories as standalone and networked robots. This article surveys cloud robotic platforms, standalone and networked robotic works such as grasping, simultaneous localization and mapping (SLAM and monitoring.

  17. Planning our smart cities in the internet of things architects, software ...

    African Journals Online (AJOL)

    This paper presents a cloud centric vision for worldwide implementation of Internet of Things that, gives an indication of what to expect of modern day architects and how they are expected to function in the Internet of Thing world to make building of our much taunted smart cities a feasible reality. The key enabling ...

  18. Cloud Processed CCN Suppress Stratus Cloud Drizzle

    Science.gov (United States)

    Hudson, J. G.; Noble, S. R., Jr.

    2017-12-01

    Conversion of sulfur dioxide to sulfate within cloud droplets increases the sizes and decreases the critical supersaturation, Sc, of cloud residual particles that had nucleated the droplets. Since other particles remain at the same sizes and Sc a size and Sc gap is often observed. Hudson et al. (2015) showed higher cloud droplet concentrations (Nc) in stratus clouds associated with bimodal high-resolution CCN spectra from the DRI CCN spectrometer compared to clouds associated with unimodal CCN spectra (not cloud processed). Here we show that CCN spectral shape (bimodal or unimodal) affects all aspects of stratus cloud microphysics and drizzle. Panel A shows mean differential cloud droplet spectra that have been divided according to traditional slopes, k, of the 131 measured CCN spectra in the Marine Stratus/Stratocumulus Experiment (MASE) off the Central California coast. K is generally high within the supersaturation, S, range of stratus clouds (< 0.5%). Because cloud processing decreases Sc of some particles, it reduces k. Panel A shows higher concentrations of small cloud droplets apparently grown on lower k CCN than clouds grown on higher k CCN. At small droplet sizes the concentrations follow the k order of the legend, black, red, green, blue (lowest to highest k). Above 13 µm diameter the lines cross and the hierarchy reverses so that blue (highest k) has the highest concentrations followed by green, red and black (lowest k). This reversed hierarchy continues into the drizzle size range (panel B) where the most drizzle drops, Nd, are in clouds grown on the least cloud-processed CCN (blue), while clouds grown on the most processed CCN (black) have the lowest Nd. Suppression of stratus cloud drizzle by cloud processing is an additional 2nd indirect aerosol effect (IAE) that along with the enhancement of 1st IAE by higher Nc (panel A) are above and beyond original IAE. However, further similar analysis is needed in other cloud regimes to determine if MASE was

  19. Cloud Computing Concepts for Academic Collaboration

    Directory of Open Access Journals (Sweden)

    K.K. Jabbour

    2013-05-01

    Full Text Available The aim of this paper is to explain how cloud computing technologies improve academic collaboration. To accomplish that, we have to explore the current trend of the global computer network field. During the past few years, technology has evolved in many ways; many valuable web applications and services have been introduced to internet users. Social networking, synchronous/asynchronous communication, on-line video conferencing, and wikis are just a few examples of those web technologies that altered the way people interact nowadays. By utilizing some of the latest web tools and services and combining them with the most recent semantic Cloud Computing techniques, a wide and growing array of technology services and applications are provided, which are highly specialized or distinctive to individual or to educational campuses. Therefore, cloud computing can facilitate a new way of world academic collaboration; and introduce students to new and different ways that can help them manage massive workloads.

  20. Cloud Computing v českém prostředí

    OpenAIRE

    Margaris, Nikos

    2011-01-01

    Focus of this diploma thesis is on Cloud Computing -- a new delivery model of IS/ICT services for companies. Cloud Computing services are IT resources available to users via internet on pay-as-you-use basis. The aim of the thesis is define underlying Cloud Computing concepts and evaluate the current state of Cloud Computing adoption in the Czech Republic. We discuss the framework for definition of Cloud Computing concepts in the theoretical part of the thesis drawing on resources available in...

  1. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  2. Looking Like Gold: Chlorite and Talc Transformation in the Golden Slip Ware Production (Swat Valley, North-Western Pakistan

    Directory of Open Access Journals (Sweden)

    Lara Maritan

    2018-05-01

    Full Text Available The archaeometric study of the “golden slip” ware (second century BCE—fourth century CE at the site of Barikot (Swat, north-western Pakistan aimed to define its manufacturing technology and provenance of the raw materials used. For this reason, a multianalytical approach consisting of the microscopic, microstructural and mineralogical analysis of both the golden slip and the ceramic paste was adopted. The slip was found to be composed by platy minerals, microchemically identified as talc and chlorite; their intimate association indicated clearly that they derived from a chlorite-talc schist. This rock is geologically available near the site in the “green stones” lenses within the Mingora ophiolites outcropping in the Swat valley. Due to the use of this stone also for the production of stone tools, it cannot be excluded that the chlorite-talc schist used for the golden slip can be derived from manufacturing residues of the Gandharan sculptures. In order to constrain the firing production technology, laboratory replicas were produced using a locally collected clay and coating them with ground chlorite-talc schist. On the basis of the mineralogical association observed in both the slip and the ceramic paste and the thermodynamic stability of the pristine mineral phases, the golden slip pottery underwent firing under oxidising conditions in the temperature interval between 800 °C and 850 °C. The golden and shining looks of the slip were here interpreted as the result of the combined light reflectance of the platy structure of the talc-based coating and the uniform, bright red colour of the oxidized ceramic background.

  3. Relationship between cloud radiative forcing, cloud fraction and cloud albedo, and new surface-based approach for determining cloud albedo

    OpenAIRE

    Y. Liu; W. Wu; M. P. Jensen; T. Toto

    2011-01-01

    This paper focuses on three interconnected topics: (1) quantitative relationship between surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo; (2) surfaced-based approach for measuring cloud albedo; (3) multiscale (diurnal, annual and inter-annual) variations and covariations of surface shortwave cloud radiative forcing, cloud fraction, and cloud albedo. An analytical expression is first derived to quantify the relationship between cloud radiative forcing, cloud fractio...

  4. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  5. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Seven Internet sites are given relative to European Research and IAEA; Three sites in relation with optimization of radiation protection and environment, Google scolar, medicine, radioecology, finally seventeen Internet sites are detailed in this article. (N.C.)

  6. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  7. Internet of Robotic Things – Converging Sensing/Actuating, Hyperconnectivity, Artificial Intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias Z.; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing new developments in various application domains, such as the Internet of Mobile Things (IoMT), Autonomous Internet of Things (A-IoT), Autonomous System of Things (ASoT), Internet of Autonomous Things (IoAT), Internet of Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc. that are progressing/advancing by using IoT technology. The IoT influence represents new development and deployment challenges in diffe...

  8. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  9. .Planning Our Smart Cities In The Internet Of Things Architects ...

    African Journals Online (AJOL)

    2016-12-01

    Dec 1, 2016 ... ... IoT (Internet of Things) was developed in parallel to Wireless Sensor Networks, and ... interpret and transmit the data coming from all these sensors. The cloud is .... devices or data sources with limited power and unreliable ...

  10. Cloud Interaction and Safety Features of Mobile Devices

    Directory of Open Access Journals (Sweden)

    Mirsat Yeşiltepe

    2018-02-01

    Full Text Available In this paper, two current popular mobile operating system, still in relation to the conceptof cloud began to supplant the internet almost Word today, the differences, the concept of cloudsecurity mechanisms they use for themselves and are dealt with in this environment. One ofcomparing mobile operation system is representing open source and the other for close source one.The other issue discussed in this article is how the mobile environment interacts with the cloud thanthe cloud communication with the computers.

  11. Exploring the Strategies for a Community College Transition into a Cloud-Computing Environment

    Science.gov (United States)

    DeBary, Narges

    2017-01-01

    The use of the Internet has resulted in the birth of an innovative virtualization technology called cloud computing. Virtualization can tremendously improve the instructional and operational systems of a community college. Although the incidental adoption of the cloud solutions in the community colleges of higher education has been increased,…

  12. Evaluating the Acceptance of Cloud-Based Productivity Computer Solutions in Small and Medium Enterprises

    Science.gov (United States)

    Dominguez, Alfredo

    2013-01-01

    Cloud computing has emerged as a new paradigm for on-demand delivery and consumption of shared IT resources over the Internet. Research has predicted that small and medium organizations (SMEs) would be among the earliest adopters of cloud solutions; however, this projection has not materialized. This study set out to investigate if behavior…

  13. Cloud CCN feedback

    International Nuclear Information System (INIS)

    Hudson, J.G.

    1992-01-01

    Cloud microphysics affects cloud albedo precipitation efficiency and the extent of cloud feedback in response to global warming. Compared to other cloud parameters, microphysics is unique in its large range of variability and the fact that much of the variability is anthropogenic. Probably the most important determinant of cloud microphysics is the spectra of cloud condensation nuclei (CCN) which display considerable variability and have a large anthropogenic component. When analyzed in combination three field observation projects display the interrelationship between CCN and cloud microphysics. CCN were measured with the Desert Research Institute (DRI) instantaneous CCN spectrometer. Cloud microphysical measurements were obtained with the National Center for Atmospheric Research Lockheed Electra. Since CCN and cloud microphysics each affect the other a positive feedback mechanism can result

  14. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  15. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  16. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  17. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  18. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  19. Konsep Pemasaran Melalui Internet

    OpenAIRE

    Nurbasari, Anny

    2002-01-01

    Tulisan ini mencoba membuka wawasan kita untuk mengenal dan mendalami paradigma baru dalam manajemen pemasaran, yang berkaitan dengan kemajuan teknologi pemasaran khususnya pemasaran internet (internet marketing).Pemasaran lewat internet sebagai media komunikasi baru makin lazim dilakukan dan makin berpengaruh karena efisiensinya (lengkap, detail, akurat, cepat, mudah, hemat, murah, dan berjangkauan luas). Secara otomatis ini meningkatkan customer intimacy dan customer satisfaction.

  20. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  1. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  2. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  3. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  4. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography

    Science.gov (United States)

    Yan, Liang; Rong, Chunming; Zhao, Gansen

    More and more companies begin to provide different kinds of cloud computing services for Internet users at the same time these services also bring some security problems. Currently the majority of cloud computing systems provide digital identity for users to access their services, this will bring some inconvenience for a hybrid cloud that includes multiple private clouds and/or public clouds. Today most cloud computing system use asymmetric and traditional public key cryptography to provide data security and mutual authentication. Identity-based cryptography has some attraction characteristics that seem to fit well the requirements of cloud computing. In this paper, by adopting federated identity management together with hierarchical identity-based cryptography (HIBC), not only the key distribution but also the mutual authentication can be simplified in the cloud.

  5. Developing cloud-based Business Process Management (BPM): a survey

    Science.gov (United States)

    Mercia; Gunawan, W.; Fajar, A. N.; Alianto, H.; Inayatulloh

    2018-03-01

    In today’s highly competitive business environment, modern enterprises are dealing difficulties to cut unnecessary costs, eliminate wastes and delivery huge benefits for the organization. Companies are increasingly turning to a more flexible IT environment to help them realize this goal. For this reason, the article applies cloud based Business Process Management (BPM) that enables to focus on modeling, monitoring and process management. Cloud based BPM consists of business processes, business information and IT resources, which help build real-time intelligence systems, based on business management and cloud technology. Cloud computing is a paradigm that involves procuring dynamically measurable resources over the internet as an IT resource service. Cloud based BPM service enables to address common problems faced by traditional BPM, especially in promoting flexibility, event-driven business process to exploit opportunities in the marketplace.

  6. The Impact of Cloud Computing Technologies in E-learning

    Directory of Open Access Journals (Sweden)

    Hosam Farouk El-Sofany

    2013-01-01

    Full Text Available Cloud computing is a new computing model which is based on the grid computing, distributed computing, parallel computing and virtualization technologies define the shape of a new technology. It is the core technology of the next generation of network computing platform, especially in the field of education, cloud computing is the basic environment and platform of the future E-learning. It provides secure data storage, convenient internet services and strong computing power. This article mainly focuses on the research of the application of cloud computing in E-learning environment. The research study shows that the cloud platform is valued for both students and instructors to achieve the course objective. The paper presents the nature, benefits and cloud computing services, as a platform for e-learning environment.

  7. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  8. Cloud Computing : Goals, Issues, SOA, Integrated Technologies and Future -scope

    Directory of Open Access Journals (Sweden)

    V. Madhu Viswanatham

    2016-10-01

    Full Text Available The expansion of networking infrastructure has provided a novel way to store and access resources in a reliable, convenient and affordable means of technology called the Cloud. The cloud has become so popular and established its dominance in many recent world innovations and has highly influenced the trend of the Business process Management with the advantage of shared resources. The ability to remain disaster tolerant, on-demand scalability, flexible deployment and cost effectiveness has made the future world technologies like Internet of Things, to determine the cloud as their data and processing center. However, along with the implementation of cloud based technologies, we must also address the issues involved in its realization. This paper is a review on the advancements, scopes and issues involved in realizing a secured cloud powered environments.

  9. An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment

    OpenAIRE

    Er. Parul Indoria; Prof. Abhishek Didel

    2013-01-01

    Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable ...

  10. Provide a model to improve the performance of intrusion detection systems in the cloud

    OpenAIRE

    Foroogh Sedighi

    2016-01-01

    High availability of tools and service providers in cloud computing and the fact that cloud computing services are provided by internet and deal with public, have caused important challenges for new computing model. Cloud computing faces problems and challenges such as user privacy, data security, data ownership, availability of services, and recovery after breaking down, performance, scalability, programmability. So far, many different methods are presented for detection of intrusion in clou...

  11. Wireless-Uplinks-Based Energy-Efficient Scheduling in Mobile Cloud Computing

    OpenAIRE

    Xing Liu; Chaowei Yuan; Zhen Yang; Enda Peng

    2015-01-01

    Mobile cloud computing (MCC) combines cloud computing and mobile internet to improve the computational capabilities of resource-constrained mobile devices (MDs). In MCC, mobile users could not only improve the computational capability of MDs but also save operation consumption by offloading the mobile applications to the cloud. However, MCC faces the problem of energy efficiency because of time-varying channels when the offloading is being executed. In this paper, we address the issue of ener...

  12. A REVIEW ON SECURITY ISSUES AND CHALLENGES IN CLOUD COMPUTING MODEL OF RESOURCE MANAGEMENT

    OpenAIRE

    T. Vaikunth Pai; Dr. P. S. Aithal

    2017-01-01

    Cloud computing services refer to set of IT-enabled services delivered to a customer as services over the Internet on a leased basis and have the capability to extend up or down their service requirements or needs. Usually, cloud computing services are delivered by third party vendors who own the infrastructure. It has several advantages include scalability, elasticity, flexibility, efficiency and outsourcing non-core activities of an organization. Cloud computing offers an innovative busines...

  13. Secure cloud computing

    CERN Document Server

    Jajodia, Sushil; Samarati, Pierangela; Singhal, Anoop; Swarup, Vipin; Wang, Cliff

    2014-01-01

    This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters addres

  14. Clouds of Venus

    Energy Technology Data Exchange (ETDEWEB)

    Knollenberg, R G [Particle Measuring Systems, Inc., 1855 South 57th Court, Boulder, Colorado 80301, U.S.A.; Hansen, J [National Aeronautics and Space Administration, New York (USA). Goddard Inst. for Space Studies; Ragent, B [National Aeronautics and Space Administration, Moffett Field, Calif. (USA). Ames Research Center; Martonchik, J [Jet Propulsion Lab., Pasadena, Calif. (USA); Tomasko, M [Arizona Univ., Tucson (USA)

    1977-05-01

    The current state of knowledge of the Venusian clouds is reviewed. The visible clouds of Venus are shown to be quite similar to low level terrestrial hazes of strong anthropogenic influence. Possible nucleation and particle growth mechanisms are presented. The Pioneer Venus experiments that emphasize cloud measurements are described and their expected findings are discussed in detail. The results of these experiments should define the cloud particle composition, microphysics, thermal and radiative heat budget, rough dynamical features and horizontal and vertical variations in these and other parameters. This information should be sufficient to initialize cloud models which can be used to explain the cloud formation, decay, and particle life cycle.

  15. Generic-distributed framework for cloud services marketplace based on unified ontology

    Directory of Open Access Journals (Sweden)

    Samer Hasan

    2017-11-01

    Full Text Available Cloud computing is a pattern for delivering ubiquitous and on demand computing resources based on pay-as-you-use financial model. Typically, cloud providers advertise cloud service descriptions in various formats on the Internet. On the other hand, cloud consumers use available search engines (Google and Yahoo to explore cloud service descriptions and find the adequate service. Unfortunately, general purpose search engines are not designed to provide a small and complete set of results, which makes the process a big challenge. This paper presents a generic-distrusted framework for cloud services marketplace to automate cloud services discovery and selection process, and remove the barriers between service providers and consumers. Additionally, this work implements two instances of generic framework by adopting two different matching algorithms; namely dominant and recessive attributes algorithm borrowed from gene science and semantic similarity algorithm based on unified cloud service ontology. Finally, this paper presents unified cloud services ontology and models the real-life cloud services according to the proposed ontology. To the best of the authors’ knowledge, this is the first attempt to build a cloud services marketplace where cloud providers and cloud consumers can trend cloud services as utilities. In comparison with existing work, semantic approach reduced the execution time by 20% and maintained the same values for all other parameters. On the other hand, dominant and recessive attributes approach reduced the execution time by 57% but showed lower value for recall.

  16. Generic-distributed framework for cloud services marketplace based on unified ontology.

    Science.gov (United States)

    Hasan, Samer; Valli Kumari, V

    2017-11-01

    Cloud computing is a pattern for delivering ubiquitous and on demand computing resources based on pay-as-you-use financial model. Typically, cloud providers advertise cloud service descriptions in various formats on the Internet. On the other hand, cloud consumers use available search engines (Google and Yahoo) to explore cloud service descriptions and find the adequate service. Unfortunately, general purpose search engines are not designed to provide a small and complete set of results, which makes the process a big challenge. This paper presents a generic-distrusted framework for cloud services marketplace to automate cloud services discovery and selection process, and remove the barriers between service providers and consumers. Additionally, this work implements two instances of generic framework by adopting two different matching algorithms; namely dominant and recessive attributes algorithm borrowed from gene science and semantic similarity algorithm based on unified cloud service ontology. Finally, this paper presents unified cloud services ontology and models the real-life cloud services according to the proposed ontology. To the best of the authors' knowledge, this is the first attempt to build a cloud services marketplace where cloud providers and cloud consumers can trend cloud services as utilities. In comparison with existing work, semantic approach reduced the execution time by 20% and maintained the same values for all other parameters. On the other hand, dominant and recessive attributes approach reduced the execution time by 57% but showed lower value for recall.

  17. CLOUD TECHNOLOGY AS A WAY OF UKRAINIAN EDUCATION DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    T. Zaytseva

    2014-06-01

    Full Text Available This article is devoted to defining the forms and the required components cloud technology usage during studying of subject teachers. In order to improve the learning process it’s necessary to use such powerful technology as ‘cloud computing’. They support traditional forms of education and also are a new step in the development of education. Cloud technologies are-effective, efficient and flexible way to satisfy the needs of students during getting of new knowledge. Nowadays a characteristic feature of our time is rapid growing of using cloud technology. That is why we are spectators of implementation of cloud technologies and services in the system of higher and secondary education, too. A common information space in education using mostly cloud technologies that provide Microsoft and Google is creating now. Google Apps for Education containing free tools that allows teachers and students to communicate, teach and learn more effectively and efficiently. Significant advantage of using cloud services is providing application development and storage of large amounts of data on servers in distributed information processing centers via the Internet. That is why cloud technology is a powerful tool to activate students' self-guidance work. Surely, growing demand for professionals who knows the technology of cloud computing will increase slowly.

  18. Radiative properties of clouds

    International Nuclear Information System (INIS)

    Twomey, S.

    1993-01-01

    The climatic effects of condensation nuclei in the formation of cloud droplets and the subsequent role of the cloud droplets as contributors to the planetary short-wave albedo is emphasized. Microphysical properties of clouds, which can be greatly modified by the degree of mixing with cloud-free air from outside, are discussed. The effect of clouds on visible radiation is assessed through multiple scattering of the radiation. Cloudwater or ice absorbs more with increasing wavelength in the near-infrared region, with water vapor providing the stronger absorption over narrower wavelength bands. Cloud thermal infrared absorption can be solely related to liquid water content at least for shallow clouds and clouds in the early development state. Three-dimensional general circulation models have been used to study the climatic effect of clouds. It was found for such studies (which did not consider variations in cloud albedo) that the cooling effects due to the increase in planetary short-wave albedo from clouds were offset by heating effects due to thermal infrared absorption by the cloud. Two permanent direct effects of increased pollution are discussed in this chapter: (a) an increase of absorption in the visible and near infrared because of increased amounts of elemental carbon, which gives rise to a warming effect climatically, and (b) an increased optical thickness of clouds due to increasing cloud droplet number concentration caused by increasing cloud condensation nuclei number concentration, which gives rise to a cooling effect climatically. An increase in cloud albedo from 0.7 to 0.87 produces an appreciable climatic perturbation of cooling up to 2.5 K at the ground, using a hemispheric general circulation model. Effects of pollution on cloud thermal infrared absorption are negligible

  19. Internet Hospitals in China: Cross-Sectional Survey.

    Science.gov (United States)

    Xie, Xiaoxu; Zhou, Weimin; Lin, Lingyan; Fan, Si; Lin, Fen; Wang, Long; Guo, Tongjun; Ma, Chuyang; Zhang, Jingkun; He, Yuan; Chen, Yixin

    2017-07-04

    The Internet hospital, an innovative approach to providing health care, is rapidly developing in China because it has the potential to provide widely accessible outpatient service delivery via Internet technologies. To date, China's Internet hospitals have not been systematically investigated. The aim of this study was to describe the characteristics of China's Internet hospitals, and to assess their health service capacity. We searched Baidu, the popular Chinese search engine, to identify Internet hospitals, using search terms such as "Internet hospital," "web hospital," or "cloud hospital." All Internet hospitals in mainland China were eligible for inclusion if they were officially registered. Our search was carried out until March 31, 2017. We identified 68 Internet hospitals, of which 43 have been put into use and 25 were under construction. Of the 43 established Internet hospitals, 13 (30%) were in the hospital informatization stage, 24 (56%) were in the Web ward stage, and 6 (14%) were in full Internet hospital stage. Patients accessed outpatient service delivery via website (74%, 32/43), app (42%, 18/43), or offline medical consultation facility (37%, 16/43) from the Internet hospital. Furthermore, 25 (58%) of the Internet hospitals asked doctors to deliver health services at a specific Web clinic, whereas 18 (42%) did not. The consulting methods included video chat (60%, 26/43), telephone (19%, 8/43), and graphic message (28%, 12/43); 13 (30%) Internet hospitals cannot be consulted online any more. Only 6 Internet hospitals were included in the coverage of health insurance. The median number of doctors available online was zero (interquartile range [IQR] 0 to 5; max 16,492). The median consultation fee per time was ¥20 (approximately US $2.90, IQR ¥0 to ¥200). Internet hospitals provide convenient outpatient service delivery. However, many of the Internet hospitals are not yet mature and are faced with various issues such as online doctor scarcity and

  20. Mobile Cloud Computing for Telemedicine Solutions

    Directory of Open Access Journals (Sweden)

    Mihaela GHEORGHE

    2014-01-01

    Full Text Available Mobile Cloud Computing is a significant technology which combines emerging domains such as mobile computing and cloud computing which has conducted to the development of one of the most IT industry challenging and innovative trend. This is still at the early stage of devel-opment but its main characteristics, advantages and range of services which are provided by an internet-based cluster system have a strong impact on the process of developing telemedi-cine solutions for overcoming the wide challenges the medical system is confronting with. Mo-bile Cloud integrates cloud computing into the mobile environment and has the advantage of overcoming obstacles related to performance (e.g. battery life, storage, and bandwidth, envi-ronment (e.g. heterogeneity, scalability, availability and security (e.g. reliability and privacy which are commonly present at mobile computing level. In this paper, I will present a compre-hensive overview on mobile cloud computing including definitions, services and the use of this technology for developing telemedicine application.

  1. Cloud Optimized Image Format and Compression

    Science.gov (United States)

    Becker, P.; Plesea, L.; Maurer, T.

    2015-04-01

    Cloud based image storage and processing requires revaluation of formats and processing methods. For the true value of the massive volumes of earth observation data to be realized, the image data needs to be accessible from the cloud. Traditional file formats such as TIF and NITF were developed in the hay day of the desktop and assumed fast low latency file access. Other formats such as JPEG2000 provide for streaming protocols for pixel data, but still require a server to have file access. These concepts no longer truly hold in cloud based elastic storage and computation environments. This paper will provide details of a newly evolving image storage format (MRF) and compression that is optimized for cloud environments. Although the cost of storage continues to fall for large data volumes, there is still significant value in compression. For imagery data to be used in analysis and exploit the extended dynamic range of the new sensors, lossless or controlled lossy compression is of high value. Compression decreases the data volumes stored and reduces the data transferred, but the reduced data size must be balanced with the CPU required to decompress. The paper also outlines a new compression algorithm (LERC) for imagery and elevation data that optimizes this balance. Advantages of the compression include its simple to implement algorithm that enables it to be efficiently accessed using JavaScript. Combing this new cloud based image storage format and compression will help resolve some of the challenges of big image data on the internet.

  2. Marine cloud brightening

    OpenAIRE

    Latham, John; Bower, Keith; Choularton, Tom; Coe, Hugh; Connolly, Paul; Cooper, Gary; Craft, Tim; Foster, Jack; Gadian, Alan; Galbraith, Lee; Iacovides, Hector; Johnston, David; Launder, Brian; Leslie, Brian; Meyer, John

    2012-01-01

    The idea behind the marine cloud-brightening (MCB) geoengineering technique is that seeding marine stratocumulus clouds with copious quantities of roughly monodisperse sub-micrometre sea water particles might significantly enhance the cloud droplet number concentration, and thereby the cloud albedo and possibly longevity. This would produce a cooling, which general circulation model (GCM) computations suggest could—subject to satisfactory resolution of technical and scientific problems identi...

  3. Cloud computing strategies

    CERN Document Server

    Chorafas, Dimitris N

    2011-01-01

    A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments.

  4. Towards Indonesian Cloud Campus

    OpenAIRE

    Thamrin, Taqwan; Lukman, Iing; Wahyuningsih, Dina Ika

    2013-01-01

    Nowadays, Cloud Computing is most discussed term in business and academic environment.Cloud campus has many benefits such as accessing the file storages, e-mails, databases,educational resources, research applications and tools anywhere for faculty, administrators,staff, students and other users in university, on demand. Furthermore, cloud campus reduces universities’ IT complexity and cost.This paper discuss the implementation of Indonesian cloud campus and various opportunies and benefits...

  5. Cloud Infrastructure Security

    OpenAIRE

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  6. Cloud services in organization

    OpenAIRE

    FUXA, Jan

    2013-01-01

    The work deals with the definition of the word cloud computing, cloud computing models, types, advantages, disadvantages, and comparing SaaS solutions such as: Google Apps and Office 365 in the area of electronic communications. The work deals with the use of cloud computing in the corporate practice, both good and bad practice. The following section describes the methodology for choosing the appropriate cloud service organization. Another part deals with analyzing the possibilities of SaaS i...

  7. Orchestrating Your Cloud Orchestra

    OpenAIRE

    Hindle, Abram

    2015-01-01

    Cloud computing potentially ushers in a new era of computer music performance with exceptionally large computer music instruments consisting of 10s to 100s of virtual machines which we propose to call a `cloud-orchestra'. Cloud computing allows for the rapid provisioning of resources, but to deploy such a complicated and interconnected network of software synthesizers in the cloud requires a lot of manual work, system administration knowledge, and developer/operator skills. This is a barrier ...

  8. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  9. Cloud Robotics Model

    OpenAIRE

    Mester, Gyula

    2015-01-01

    Cloud Robotics was born from the merger of service robotics and cloud technologies. It allows robots to benefit from the powerful computational, storage, and communications resources of modern data centres. Cloud robotics allows robots to take advantage of the rapid increase in data transfer rates to offload tasks without hard real time requirements. Cloud Robotics has rapidly gained momentum with initiatives by companies such as Google, Willow Garage and Gostai as well as more than a dozen a...

  10. Genomics With Cloud Computing

    OpenAIRE

    Sukhamrit Kaur; Sandeep Kaur

    2015-01-01

    Abstract Genomics is study of genome which provides large amount of data for which large storage and computation power is needed. These issues are solved by cloud computing that provides various cloud platforms for genomics. These platforms provides many services to user like easy access to data easy sharing and transfer providing storage in hundreds of terabytes more computational power. Some cloud platforms are Google genomics DNAnexus and Globus genomics. Various features of cloud computin...

  11. The differentiation process of the I-type granitoids in southwest Japan and New South Wares in Australia

    Science.gov (United States)

    Kawakatsu, K.; Iwamoto, Y.; Ebisu, S.; Hasegawa, M.; Hiraiwa, N.; Kawakatsu, T.; Kitano, A.; Masuta, T.; Ootsubo, H.; Wakazono, R.

    2013-12-01

    Cretaceous-Paleogene Granitoids in the inner zone of southwest Japan have been divided into two series: the magnetite series that is distributed mainly in the San-in belt and the ilmenite series that is distributed mainly in San-yo belt. For 8 years, we have been investigating the two series to clear their processes of magmatic differentiation. Recently, we discovered oscillatory zoned structure, exsolution lamellae of amphibole, and relics of pyroxene left in the core of amphibole from Harima granodiorite, Nunobiki granodiorite (San-yo belt) and Daito-Yokota quartz diorite (San-in belt). The amphibole that has microstructure coexists with magnetite, ilmenite and pyrrhotite. We compared the two series for crystallization and re-equilibrium by ion substitution using the microstructure of the amphibole as 'time measure' during the differentitation process of acidic magma. While magnetites and ilmenites coexist with the core of the amphiboles, the oxygen fugacity of the San-yo belt magma was low until the later stage of magmatic differentiation where H2S from the Earth's crust mixed with it. In the subsolidus process, hydrothermal solutions circulated. On the other hand, the oxygen fugacity of the San-in belt magma began to rise in the early stage of magmatic differentiation. In the later stage, mafic magma was contaminated with SO2. The rims of amphiboles coexist with pyrrhotites in both of belts. Furthermore, the re-equilibrium of minerals underwent progressive oxidation and hydrothermal fluid circulated actively in the subsolidus process. Bingie Bingie Point at New South Wares (Eurobodalla National Park) is a peninsula about a meter around. The plutonic rocks were formed in the Devonian period and belong to the magnetite series. They are classified I-type granitoids such as those found in the inner zone of southwest Japan. They have only trace amounts of oxide minerals and pyrrhotite. The amphiboles of the granitoids have oscillatory zoned structures at pale green

  12. An investigation of pottery production technology for the West Slope wares from Dorylaion (Eskişehir/Turkey

    Directory of Open Access Journals (Sweden)

    Kara, A.

    2013-02-01

    Full Text Available Researches in the field of pottery production technology in ancient times, done in different settlements during the same period, may contribute to know relationships established within the different cultural communities. In ancient times, Anatolia (Asia Minor was the crossroads of ancient civilizations. There are several ancient settlements and artifacts belonging to Hellenistic culture (330-30 BC. West Slope wares from Dorylaion (Eskişehir/Turkey excavations are the main Hellenistic culture findings. In this study, different analytical techniques were employed for the characterization of these findings in order to enlighten the pottery production technology. Wavelength dispersive X-ray fluorescence (WDXRF and X-ray diffraction (XRD were employed to study the chemical and mineralogical composition of the bodies, respectively. Scanning electron microscopy (SEM and energy dispersive X-ray spectrometry (EDX were also performed for the microstructural and microchemical characterization of body and slip layers of the selected potsherds. The raw materials used, firing temperatures and atmosphere and related microstructural characteristics were discussed.La investigación de la tecnología utilizada por distintas civilizaciones en la producción de piezas cerámicas encontradas de un mismo asentamiento arqueológico, puede contribuir al conocimiento de relaciones establecidas entre distintas comunidades culturales. Anatolia (Asia Menor es considerada una importante encrucijada de antiguas civilizaciones que abarcan del Periodo de Bronce al imperio Otomano. Las piezas conocidas como West Slope son los principales restos de la cultura helenística (330-30 A.C. encontrados en las excavaciones de Dorylaion (Eskişehir/ Turquía. En este estudio, diferentes técnicas analíticas han sido empleadas en la caracterización de estas piezas, a fin de dilucidar la tecnología utilizada en su produción.. Fluorescencia de rayos X por onda dispersa (WDXRF y

  13. Numerical Analysis of Blood Damage Potential of the HeartMate II and HeartWare HVAD Rotary Blood Pumps.

    Science.gov (United States)

    Thamsen, Bente; Blümel, Bastian; Schaller, Jens; Paschereit, Christian O; Affeld, Klaus; Goubergrits, Leonid; Kertzscher, Ulrich

    2015-08-01

    Implantable left ventricular assist devices (LVADs) became the therapy of choice in treating end-stage heart failure. Although survival improved substantially and is similar in currently clinically implanted LVADs HeartMate II (HM II) and HeartWare HVAD, complications related to blood trauma are frequently observed. The aim of this study was to compare these two pumps regarding their potential blood trauma employing computational fluid dynamics. High-resolution structured grids were generated for the pumps. Newtonian flow was calculated, solving Reynolds-averaged Navier-Stokes equations with a sliding mesh approach and a k-ω shear stress transport turbulence model for the operating point of 4.5 L/min and 80 mm Hg. The pumps were compared in terms of volumes subjected to certain viscous shear stress thresholds, below which no trauma was assumed (von Willebrand factor cleavage: 9 Pa, platelet activation: 50 Pa, and hemolysis: 150 Pa), and associated residence times. Additionally, a hemolysis index was calculated based on a Eulerian transport approach. Twenty-two percent of larger volumes above 9 Pa were observed in the HVAD; above 50 Pa and 150 Pa the differences between the two pumps were marginal. Residence times were higher in the HVAD for all thresholds. The hemolysis index was almost equal for the HM II and HVAD. Besides the gap regions in both pumps, the inlet regions of the rotor and diffuser blades have a high hemolysis production in the HM II, whereas in the HVAD, the volute tongue is an additional site for hemolysis production. Thus, in this study, the comparison of the HM II and the HVAD using numerical methods indicated an overall similar tendency to blood trauma in both pumps. However, influences of turbulent shear stresses were not considered and effects of the pivot bearing in the HM II were not taken into account. Further in vitro investigations are required. Copyright © 2015 International Center for Artificial Organs and Transplantation and

  14. Anne Elizabeth Ware | NREL

    Science.gov (United States)

    Accumulation in Leaves of Sorghum bicolor (L.) Moench: A Source of Natural Food Pigment," J. Agricultural Deoxygenation of Triglycerides to Hydrocarbons Over Supported Nickel Catalysts," Chemical Engineering

  15. Teaching, Learning, and Collaborating in the Cloud: Applications of Cloud Computing for Educators in Post-Secondary Institutions

    Science.gov (United States)

    Aaron, Lynn S.; Roche, Catherine M.

    2012-01-01

    "Cloud computing" refers to the use of computing resources on the Internet instead of on individual personal computers. The field is expanding and has significant potential value for educators. This is discussed with a focus on four main functions: file storage, file synchronization, document creation, and collaboration--each of which has…

  16. Chargeback for cloud services.

    NARCIS (Netherlands)

    Baars, T.; Khadka, R.; Stefanov, H.; Jansen, S.; Batenburg, R.; Heusden, E. van

    2014-01-01

    With pay-per-use pricing models, elastic scaling of resources, and the use of shared virtualized infrastructures, cloud computing offers more efficient use of capital and agility. To leverage the advantages of cloud computing, organizations have to introduce cloud-specific chargeback practices.

  17. On CLOUD nine

    CERN Multimedia

    2009-01-01

    The team from the CLOUD experiment - the world’s first experiment using a high-energy particle accelerator to study the climate - were on cloud nine after the arrival of their new three-metre diameter cloud chamber. This marks the end of three years’ R&D and design, and the start of preparations for data taking later this year.

  18. Cloud Computing Explained

    Science.gov (United States)

    Metz, Rosalyn

    2010-01-01

    While many talk about the cloud, few actually understand it. Three organizations' definitions come to the forefront when defining the cloud: Gartner, Forrester, and the National Institutes of Standards and Technology (NIST). Although both Gartner and Forrester provide definitions of cloud computing, the NIST definition is concise and uses…

  19. Greening the Cloud

    NARCIS (Netherlands)

    van den Hoed, Robert; Hoekstra, Eric; Procaccianti, G.; Lago, P.; Grosso, Paola; Taal, Arie; Grosskop, Kay; van Bergen, Esther

    The cloud has become an essential part of our daily lives. We use it to store our documents (Dropbox), to stream our music and lms (Spotify and Net ix) and without giving it any thought, we use it to work on documents in the cloud (Google Docs). The cloud forms a massive storage and processing

  20. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  1. Volunteered Cloud Computing for Disaster Management

    Science.gov (United States)

    Evans, J. D.; Hao, W.; Chettri, S. R.

    2014-12-01

    Disaster management relies increasingly on interpreting earth observations and running numerical models; which require significant computing capacity - usually on short notice and at irregular intervals. Peak computing demand during event detection, hazard assessment, or incident response may exceed agency budgets; however some of it can be met through volunteered computing, which distributes subtasks to participating computers via the Internet. This approach has enabled large projects in mathematics, basic science, and climate research to harness the slack computing capacity of thousands of desktop computers. This capacity is likely to diminish as desktops give way to battery-powered mobile devices (laptops, smartphones, tablets) in the consumer market; but as cloud computing becomes commonplace, it may offer significant slack capacity -- if its users are given an easy, trustworthy mechanism for participating. Such a "volunteered cloud computing" mechanism would also offer several advantages over traditional volunteered computing: tasks distributed within a cloud have fewer bandwidth limitations; granular billing mechanisms allow small slices of "interstitial" computing at no marginal cost; and virtual storage volumes allow in-depth, reversible machine reconfiguration. Volunteered cloud computing is especially suitable for "embarrassingly parallel" tasks, including ones requiring large data volumes: examples in disaster management include near-real-time image interpretation, pattern / trend detection, or large model ensembles. In the context of a major disaster, we estimate that cloud users (if suitably informed) might volunteer hundreds to thousands of CPU cores across a large provider such as Amazon Web Services. To explore this potential, we are building a volunteered cloud computing platform and targeting it to a disaster management context. Using a lightweight, fault-tolerant network protocol, this platform helps cloud users join parallel computing projects

  2. Cloud manufacturing distributed computing technologies for global and sustainable manufacturing

    CERN Document Server

    Mehnen, Jörn

    2013-01-01

    Global networks, which are the primary pillars of the modern manufacturing industry and supply chains, can only cope with the new challenges, requirements and demands when supported by new computing and Internet-based technologies. Cloud Manufacturing: Distributed Computing Technologies for Global and Sustainable Manufacturing introduces a new paradigm for scalable service-oriented sustainable and globally distributed manufacturing systems.   The eleven chapters in this book provide an updated overview of the latest technological development and applications in relevant research areas.  Following an introduction to the essential features of Cloud Computing, chapters cover a range of methods and applications such as the factors that actually affect adoption of the Cloud Computing technology in manufacturing companies and new geometrical simplification method to stream 3-Dimensional design and manufacturing data via the Internet. This is further supported case studies and real life data for Waste Electrical ...

  3. CLOUD STORAGE SERVICES

    OpenAIRE

    Yan, Cheng

    2017-01-01

    Cloud computing is a hot topic in recent research and applications. Because it is widely used in various fields. Up to now, Google, Microsoft, IBM, Amazon and other famous co partnership have proposed their cloud computing application. Look upon cloud computing as one of the most important strategy in the future. Cloud storage is the lower layer of cloud computing system which supports the service of the other layers above it. At the same time, it is an effective way to store and manage heavy...

  4. Benchmarking Cloud Storage Systems

    OpenAIRE

    Wang, Xing

    2014-01-01

    With the rise of cloud computing, many cloud storage systems like Dropbox, Google Drive and Mega have been built to provide decentralized and reliable file storage. It is thus of prime importance to know their features, performance, and the best way to make use of them. In this context, we introduce BenchCloud, a tool designed as part of this thesis to conveniently and efficiently benchmark any cloud storage system. First, we provide a study of six commonly-used cloud storage systems to ident...

  5. The Magellanic clouds

    International Nuclear Information System (INIS)

    1989-01-01

    As the two galaxies nearest to our own, the Magellanic Clouds hold a special place in studies of the extragalactic distance scale, of stellar evolution and the structure of galaxies. In recent years, results from the South African Astronomical Observatory (SAAO) and elsewhere have shown that it is possible to begin understanding the three dimensional structure of the Clouds. Studies of Magellanic Cloud Cepheids have continued, both to investigate the three-dimensional structure of the Clouds and to learn more about Cepheids and their use as extragalactic distance indicators. Other research undertaken at SAAO includes studies on Nova LMC 1988 no 2 and red variables in the Magellanic Clouds

  6. Cloud Computing Bible

    CERN Document Server

    Sosinsky, Barrie

    2010-01-01

    The complete reference guide to the hot technology of cloud computingIts potential for lowering IT costs makes cloud computing a major force for both IT vendors and users; it is expected to gain momentum rapidly with the launch of Office Web Apps later this year. Because cloud computing involves various technologies, protocols, platforms, and infrastructure elements, this comprehensive reference is just what you need if you'll be using or implementing cloud computing.Cloud computing offers significant cost savings by eliminating upfront expenses for hardware and software; its growing popularit

  7. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  8. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  9. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  10. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  11. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  12. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  13. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  14. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  15. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  16. Internet Addiction in Adolescents

    OpenAIRE

    Rębisz Sławomir; Sikora Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known...

  17. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  18. A survey of IoT cloud platforms

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-12-01

    Full Text Available Internet of Things (IoT envisages overall merging of several “things” while utilizing internet as the backbone of the communication system to establish a smart interaction between people and surrounding objects. Cloud, being the crucial component of IoT, provides valuable application specific services in many application domains. A number of IoT cloud providers are currently emerging into the market to leverage suitable and specific IoT based services. In spite of huge possible involvement of these IoT clouds, no standard cum comparative analytical study has been found across the literature databases. This article surveys popular IoT cloud platforms in light of solving several service domains such as application development, device management, system management, heterogeneity management, data management, tools for analysis, deployment, monitoring, visualization, and research. A comparison is presented for overall dissemination of IoT clouds according to their applicability. Further, few challenges are also described that the researchers should take on in near future. Ultimately, the goal of this article is to provide detailed knowledge about the existing IoT cloud service providers and their pros and cons in concrete form.

  19. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  20. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  1. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  2. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service

    Science.gov (United States)

    Ahmad, Mushtaq

    Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.

  3. Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing

    Science.gov (United States)

    Balasubramaniam, S.; Kavitha, V.

    2015-01-01

    Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud. PMID:25767826

  4. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  5. Geometric Data Perturbation-Based Personal Health Record Transactions in Cloud Computing

    Directory of Open Access Journals (Sweden)

    S. Balasubramaniam

    2015-01-01

    Full Text Available Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.

  6. Geometric data perturbation-based personal health record transactions in cloud computing.

    Science.gov (United States)

    Balasubramaniam, S; Kavitha, V

    2015-01-01

    Cloud computing is a new delivery model for information technology services and it typically involves the provision of dynamically scalable and often virtualized resources over the Internet. However, cloud computing raises concerns on how cloud service providers, user organizations, and governments should handle such information and interactions. Personal health records represent an emerging patient-centric model for health information exchange, and they are outsourced for storage by third parties, such as cloud providers. With these records, it is necessary for each patient to encrypt their own personal health data before uploading them to cloud servers. Current techniques for encryption primarily rely on conventional cryptographic approaches. However, key management issues remain largely unsolved with these cryptographic-based encryption techniques. We propose that personal health record transactions be managed using geometric data perturbation in cloud computing. In our proposed scheme, the personal health record database is perturbed using geometric data perturbation and outsourced to the Amazon EC2 cloud.

  7. An Efficient Virtual Machine Consolidation Scheme for Multimedia Cloud Computing.

    Science.gov (United States)

    Han, Guangjie; Que, Wenhui; Jia, Gangyong; Shu, Lei

    2016-02-18

    Cloud computing has innovated the IT industry in recent years, as it can delivery subscription-based services to users in the pay-as-you-go model. Meanwhile, multimedia cloud computing is emerging based on cloud computing to provide a variety of media services on the Internet. However, with the growing popularity of multimedia cloud computing, its large energy consumption cannot only contribute to greenhouse gas emissions, but also result in the rising of cloud users' costs. Therefore, the multimedia cloud providers should try to minimize its energy consumption as much as possible while satisfying the consumers' resource requirements and guaranteeing quality of service (QoS). In this paper, we have proposed a remaining utilization-aware (RUA) algorithm for virtual machine (VM) placement, and a power-aware algorithm (PA) is proposed to find proper hosts to shut down for energy saving. These two algorithms have been combined and applied to cloud data centers for completing the process of VM consolidation. Simulation results have shown that there exists a trade-off between the cloud data center's energy consumption and service-level agreement (SLA) violations. Besides, the RUA algorithm is able to deal with variable workload to prevent hosts from overloading after VM placement and to reduce the SLA violations dramatically.

  8. A new Information publishing system Based on Internet of things

    Science.gov (United States)

    Zhu, Li; Ma, Guoguang

    2018-03-01

    A new information publishing system based on Internet of things is proposed, which is composed of four level hierarchical structure, including the screen identification layer, the network transport layer, the service management layer and the publishing application layer. In the architecture, the screen identification layer has realized the internet of screens in which geographically dispersed independent screens are connected to the internet by the customized set-top boxes. The service management layer uses MQTT protocol to implement a lightweight broker-based publish/subscribe messaging mechanism in constrained environments such as internet of things to solve the bandwidth bottleneck. Meanwhile the cloud-based storage technique is used to storage and manage the promptly increasing multimedia publishing information. The paper has designed and realized a prototype SzIoScreen, and give some related test results.

  9. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  10. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  11. Searchable Encryption in Cloud Storage

    OpenAIRE

    Ren-Junn Hwang; Chung-Chien Lu; Jain-Shing Wu

    2014-01-01

    Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying ...

  12. Enterprise Cloud Adoption - Cloud Maturity Assessment Model

    OpenAIRE

    Conway, Gerry; Doherty, Eileen; Carcary, Marian; Crowley, Catherine

    2017-01-01

    The introduction and use of cloud computing by an organization has the promise of significant benefits that include reduced costs, improved services, and a pay-per-use model. Organizations that successfully harness these benefits will potentially have a distinct competitive edge, due to their increased agility and flexibility to rapidly respond to an ever changing and complex business environment. However, as cloud technology is a relatively new ph...

  13. Star clouds of Magellan

    International Nuclear Information System (INIS)

    Tucker, W.

    1981-01-01

    The Magellanic Clouds are two irregular galaxies belonging to the local group which the Milky Way belongs to. By studying the Clouds, astronomers hope to gain insight into the origin and composition of the Milky Way. The overall structure and dynamics of the Clouds are clearest when studied in radio region of the spectrum. One benefit of directly observing stellar luminosities in the Clouds has been the discovery of the period-luminosity relation. Also, the Clouds are a splendid laboratory for studying stellar evolution. It is believed that both Clouds may be in the very early stage in the development of a regular, symmetric galaxy. This raises a paradox because some of the stars in the star clusters of the Clouds are as old as the oldest stars in our galaxy. An explanation for this is given. The low velocity of the Clouds with respect to the center of the Milky Way shows they must be bound to it by gravity. Theories are given on how the Magellanic Clouds became associated with the galaxy. According to current ideas the Clouds orbits will decay and they will spiral into the Galaxy

  14. Cloud Computing Governance Lifecycle

    Directory of Open Access Journals (Sweden)

    Soňa Karkošková

    2016-06-01

    Full Text Available Externally provisioned cloud services enable flexible and on-demand sourcing of IT resources. Cloud computing introduces new challenges such as need of business process redefinition, establishment of specialized governance and management, organizational structures and relationships with external providers and managing new types of risk arising from dependency on external providers. There is a general consensus that cloud computing in addition to challenges brings many benefits but it is unclear how to achieve them. Cloud computing governance helps to create business value through obtain benefits from use of cloud computing services while optimizing investment and risk. Challenge, which organizations are facing in relation to governing of cloud services, is how to design and implement cloud computing governance to gain expected benefits. This paper aims to provide guidance on implementation activities of proposed Cloud computing governance lifecycle from cloud consumer perspective. Proposed model is based on SOA Governance Framework and consists of lifecycle for implementation and continuous improvement of cloud computing governance model.

  15. THE CALIFORNIA MOLECULAR CLOUD

    International Nuclear Information System (INIS)

    Lada, Charles J.; Lombardi, Marco; Alves, Joao F.

    2009-01-01

    We present an analysis of wide-field infrared extinction maps of a region in Perseus just north of the Taurus-Auriga dark cloud complex. From this analysis we have identified a massive, nearby, but previously unrecognized, giant molecular cloud (GMC). Both a uniform foreground star density and measurements of the cloud's velocity field from CO observations indicate that this cloud is likely a coherent structure at a single distance. From comparison of foreground star counts with Galactic models, we derive a distance of 450 ± 23 pc to the cloud. At this distance the cloud extends over roughly 80 pc and has a mass of ∼ 10 5 M sun , rivaling the Orion (A) molecular cloud as the largest and most massive GMC in the solar neighborhood. Although surprisingly similar in mass and size to the more famous Orion molecular cloud (OMC) the newly recognized cloud displays significantly less star formation activity with more than an order of magnitude fewer young stellar objects than found in the OMC, suggesting that both the level of star formation and perhaps the star formation rate in this cloud are an order of magnitude or more lower than in the OMC. Analysis of extinction maps of both clouds shows that the new cloud contains only 10% the amount of high extinction (A K > 1.0 mag) material as is found in the OMC. This, in turn, suggests that the level of star formation activity and perhaps the star formation rate in these two clouds may be directly proportional to the total amount of high extinction material and presumably high density gas within them and that there might be a density threshold for star formation on the order of n(H 2 ) ∼ a few x 10 4 cm -3 .

  16. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  17. Architecting Cloud-Enabled Systems: A Systematic Survey of Challenges and Solutions

    DEFF Research Database (Denmark)

    Chauhan, Aufeef; Babar, Muhammad Ali; Benatallah, Boualem

    2016-01-01

    architectures for cloud-based systems. Our key conclusions are that a large number of primary studies focus on middleware services aimed at achieving scalability, performance, response time and efficient resource optimization. Architecting cloud-based systems presents unique challenges as the systems...... to be designed range from pervasive embedded systems and enterprise applications to smart devices with Internet of Things (IoTs). We also conclude that there is a huge potential of research on architecting cloud-based systems in areas related to green computing, energy efficient systems, mobile cloud computing...

  18. Construction of Urban Design Support System using Cloud Computing Type Virtual Reality and Case Study

    OpenAIRE

    Zhenhan, Lei; Shunta, Shimizu; Natuska, Ota; Yuji, Ito; Yuesong, Zhang

    2017-01-01

    This paper contributes a design support system based on cloud-computing type virtual reality (cloud-based VR) for urban planning and urban design. A platform for Cloud-based VR technology, i.e. a VR-Cloud server, is used to open a VR dataset to public collaboration over the Internet. The digital attributes representing the design scheme of design concepts includes the land use zone, building regulations, urban design style, and other design details of architectural design, landscape, and traf...

  19. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  20. Interlinguistics and the Internet.

    Science.gov (United States)

    Fettes, Mark

    1997-01-01

    Argues that the Internet offers new opportunities for the development, use, and study of planned languages. Notes that while most Web pages on "constructed" languages are the work of individual hobbyists, a few projects have small communities of users. The paper concludes that the use of Esperanto on the Internet reflects increased socialization…

  1. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  2. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  3. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  4. Teaching on the Internet.

    Science.gov (United States)

    Kubala, Tom

    1998-01-01

    Discusses Internet graduate teaching experiences at the University of Central Florida and explores the pros and cons of online instruction. Describes Internet courses as asynchronous, allowing students to participate at any time and place. States that faculty must be excellent teachers, able to translate their styles into effective,…

  5. The Internet Debate.

    Science.gov (United States)

    Wampler, Angela Mallicote

    1996-01-01

    Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…

  6. Internet Bad Neighborhoods Aggregation

    NARCIS (Netherlands)

    Moreira Moura, Giovane; Sadre, R.; Sperotto, Anna; Pras, Aiko; Paschoal Gaspary, L.; De Turk, Filip

    Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have also helped to understand how spammers are distributed on the Internet. In our previous works, the size of each bad neighborhood was fixed to a /24 subnetwork. In this paper, however, we investigate if

  7. Ethics and Internet Measurements

    NARCIS (Netherlands)

    van der Ham, Jeroen; van Rijswijk, Roland M.

    2017-01-01

    Over the past decade the Internet has changed from a helpful tool to an important part of our daily lives for most of the world’s population. Where in the past the Internet mostly served to look up and exchange information, it is now used to stay in touch with friends, perform financial transactions

  8. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  9. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  10. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  11. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  12. Measuring internet skills

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,

  13. Banking on the Internet.

    Science.gov (United States)

    Internet Research, 1996

    1996-01-01

    Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…

  14. Security Analysis in the Migration to Cloud Environments

    Directory of Open Access Journals (Sweden)

    Eduardo Fernández-Medina

    2012-05-01

    Full Text Available Cloud computing is a new paradigm that combines several computing concepts and technologies of the Internet creating a platform for more agile and cost-effective business applications and IT infrastructure. The adoption of Cloud computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most consistently raised as consumers look to move their data and applications to the cloud. We justify the importance and motivation of security in the migration of legacy systems and we carry out an analysis of different approaches related to security in migration processes to cloud with the aim of finding the needs, concerns, requirements, aspects, opportunities and benefits of security in the migration process of legacy systems.

  15. Send your data into the cloud and make it… vaporize

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Cloud computing” --- the term is as nebulous as real clouds.   Basically, it means storing data somewhere on the Internet. This certainly has advantages, since this data will be available anytime from anywhere. For example, the Google mailbox is available from everywhere; “Dropbox” provides a central storage for any type of files; “ZAPR” and “TeamViewer”, once installed, allow you to share your local files by just sending around links, or give third parties full remote access to your PC, respectively. In addition, there is a growing number of cloud synchronisation services (e.g. “iCloud”/”MobileMe”, “Firefox Sync”, “Dropbox”) which provide (semi-)automatic back-ups of all local files of a laptop, PC or mobile phone. But hold on. What actually is transferred into the cloud? Personal files like bank statements? Passwords, especially CE...

  16. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  17. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  18. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  19. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  20. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  1. Expansion of magnetic clouds

    International Nuclear Information System (INIS)

    Suess, S.T.

    1987-01-01

    Magnetic clouds are a carefully defined subclass of all interplanetary signatures of coronal mass ejections whose geometry is thought to be that of a cylinder embedded in a plane. It has been found that the total magnetic pressure inside the clouds is higher than the ion pressure outside, and that the clouds are expanding at 1 AU at about half the local Alfven speed. The geometry of the clouds is such that even though the magnetic pressure inside is larger than the total pressure outside, expansion will not occur because the pressure is balanced by magnetic tension - the pinch effect. The evidence for expansion of clouds at 1 AU is nevertheless quite strong so another reason for its existence must be found. It is demonstrated that the observations can be reproduced by taking into account the effects of geometrical distortion of the low plasma beta clouds as they move away from the Sun

  2. Encyclopedia of cloud computing

    CERN Document Server

    Bojanova, Irena

    2016-01-01

    The Encyclopedia of Cloud Computing provides IT professionals, educators, researchers and students with a compendium of cloud computing knowledge. Authored by a spectrum of subject matter experts in industry and academia, this unique publication, in a single volume, covers a wide range of cloud computing topics, including technological trends and developments, research opportunities, best practices, standards, and cloud adoption. Providing multiple perspectives, it also addresses questions that stakeholders might have in the context of development, operation, management, and use of clouds. Furthermore, it examines cloud computing's impact now and in the future. The encyclopedia presents 56 chapters logically organized into 10 sections. Each chapter covers a major topic/area with cross-references to other chapters and contains tables, illustrations, side-bars as appropriate. Furthermore, each chapter presents its summary at the beginning and backend material, references and additional resources for further i...

  3. Proposed Network Intrusion Detection System ‎Based on Fuzzy c Mean Algorithm in Cloud ‎Computing Environment

    Directory of Open Access Journals (Sweden)

    Shawq Malik Mehibs

    2017-12-01

    Full Text Available Nowadays cloud computing had become is an integral part of IT industry, cloud computing provides Working environment allow a user of environmental to share data and resources over the internet. Where cloud computing its virtual grouping of resources offered over the internet, this lead to different matters related to the security and privacy in cloud computing. And therefore, create intrusion detection very important to detect outsider and insider intruders of cloud computing with high detection rate and low false positive alarm in the cloud environment. This work proposed network intrusion detection module using fuzzy c mean algorithm. The kdd99 dataset used for experiments .the proposed system characterized by a high detection rate with low false positive alarm

  4. Considerations for Cloud Security Operations

    OpenAIRE

    Cusick, James

    2016-01-01

    Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.

  5. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  6. Cloud Computing Governance Lifecycle

    OpenAIRE

    Soňa Karkošková; George Feuerlicht

    2016-01-01

    Externally provisioned cloud services enable flexible and on-demand sourcing of IT resources. Cloud computing introduces new challenges such as need of business process redefinition, establishment of specialized governance and management, organizational structures and relationships with external providers and managing new types of risk arising from dependency on external providers. There is a general consensus that cloud computing in addition to challenges brings many benefits but it is uncle...

  7. Smart SOA platforms in cloud computing architectures

    CERN Document Server

    Exposito , Ernesto

    2014-01-01

    This book is intended to introduce the principles of the Event-Driven and Service-Oriented Architecture (SOA 2.0) and its role in the new interconnected world based on the cloud computing architecture paradigm. In this new context, the concept of "service" is widely applied to the hardware and software resources available in the new generation of the Internet. The authors focus on how current and future SOA technologies provide the basis for the smart management of the service model provided by the Platform as a Service (PaaS) layer.

  8. An infrastructure with a unified control plane to integrate IP into optical metro networks to provide flexible and intelligent bandwidth on demand for cloud computing

    Science.gov (United States)

    Yang, Wei; Hall, Trevor

    2012-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users and the nature of the Internet traffic will undertake a fundamental transformation. Consequently, the current Internet will no longer suffice for serving cloud traffic in metro areas. This work proposes an infrastructure with a unified control plane that integrates simple packet aggregation technology with optical express through the interoperation between IP routers and electrical traffic controllers in optical metro networks. The proposed infrastructure provides flexible, intelligent, and eco-friendly bandwidth on demand for cloud computing in metro areas.

  9. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  10. CLOUD TECHNOLOGY IN EDUCATION

    Directory of Open Access Journals (Sweden)

    Alexander N. Dukkardt

    2014-01-01

    Full Text Available This article is devoted to the review of main features of cloud computing that can be used in education. Particular attention is paid to those learning and supportive tasks, that can be greatly improved in the case of the using of cloud services. Several ways to implement this approach are proposed, based on widely accepted models of providing cloud services. Nevertheless, the authors have not ignored currently existing problems of cloud technologies , identifying the most dangerous risks and their impact on the core business processes of the university. 

  11. Genomics With Cloud Computing

    Directory of Open Access Journals (Sweden)

    Sukhamrit Kaur

    2015-04-01

    Full Text Available Abstract Genomics is study of genome which provides large amount of data for which large storage and computation power is needed. These issues are solved by cloud computing that provides various cloud platforms for genomics. These platforms provides many services to user like easy access to data easy sharing and transfer providing storage in hundreds of terabytes more computational power. Some cloud platforms are Google genomics DNAnexus and Globus genomics. Various features of cloud computing to genomics are like easy access and sharing of data security of data less cost to pay for resources but still there are some demerits like large time needed to transfer data less network bandwidth.

  12. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  13. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  14. Review of Cloud Computing and existing Frameworks for Cloud adoption

    OpenAIRE

    Chang, Victor; Walters, Robert John; Wills, Gary

    2014-01-01

    This paper presents a selected review for Cloud Computing and explains the benefits and risks of adopting Cloud Computing in a business environment. Although all the risks identified may be associated with two major Cloud adoption challenges, a framework is required to support organisations as they begin to use Cloud and minimise risks of Cloud adoption. Eleven Cloud Computing frameworks are investigated and a comparison of their strengths and limitations is made; the result of the comparison...

  15. Towards Marxian Internet Studies

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2012-05-01

    Full Text Available This article gives an overview of example approaches of Critical Internet Studies and points out key concepts of this field. Critical Cyberculture Studies and Critical Political Economy/Critical Theory of the Internet are identified as two approaches in Critical Internet Studies. The paper also discusses the role of 11 Marxian concepts for Critical Internet Studies. Marxian concepts that have been reflected in Critical Internet Studies include: dialectics, capitalism, commodification, surplus value/exploitation/alienation/class, globalization, ideology, class struggle, commons, public sphere, communism, and aesthetics. The paper points out the importance of explicitly acknowledging the importance of Karl Marx’s thinking in Critical Internet Studies. Marx’s concepts are today frequently used implicitly, without acknowledging and engaging with their roots. A critique of the approach of “Critical” Cyberculture Studies is advanced. This approach is compared to the approaches of Critical Theory and Critical Political Economy of the Internet. The difference between these two approaches reflects the debate about class exploitation and non-class domination between Cultural Studies and Critical Political Economy in Media and Communication Studies.

  16. SEGMENTASI LAYANAN INTERNET BANKING

    Directory of Open Access Journals (Sweden)

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  17. A scoping review of cloud computing in healthcare.

    Science.gov (United States)

    Griebel, Lena; Prokosch, Hans-Ulrich; Köpcke, Felix; Toddenroth, Dennis; Christoph, Jan; Leb, Ines; Engel, Igor; Sedlmayr, Martin

    2015-03-19

    Cloud computing is a recent and fast growing area of development in healthcare. Ubiquitous, on-demand access to virtually endless resources in combination with a pay-per-use model allow for new ways of developing, delivering and using services. Cloud computing is often used in an "OMICS-context", e.g. for computing in genomics, proteomics and molecular medicine, while other field of application still seem to be underrepresented. Thus, the objective of this scoping review was to identify the current state and hot topics in research on cloud computing in healthcare beyond this traditional domain. MEDLINE was searched in July 2013 and in December 2014 for publications containing the terms "cloud computing" and "cloud-based". Each journal and conference article was categorized and summarized independently by two researchers who consolidated their findings. 102 publications have been analyzed and 6 main topics have been found: telemedicine/teleconsultation, medical imaging, public health and patient self-management, hospital management and information systems, therapy, and secondary use of data. Commonly used features are broad network access for sharing and accessing data and rapid elasticity to dynamically adapt to computing demands. Eight articles favor the pay-for-use characteristics of cloud-based services avoiding upfront investments. Nevertheless, while 22 articles present very general potentials of cloud computing in the medical domain and 66 articles describe conceptual or prototypic projects, only 14 articles report from successful implementations. Further, in many articles cloud computing is seen as an analogy to internet-/web-based data sharing and the characteristics of the particular cloud computing approach are unfortunately not really illustrated. Even though cloud computing in healthcare is of growing interest only few successful implementations yet exist and many papers just use the term "cloud" synonymously for "using virtual machines" or "web

  18. Reviews on Security Issues and Challenges in Cloud Computing

    Science.gov (United States)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  19. Customized products and cloud service information system development research

    Directory of Open Access Journals (Sweden)

    Hung Chien-Wen

    2017-01-01

    Full Text Available This study presents a cloud service customized product information system to enable businesses to provide customized product marketing on the Internet to meet consumer demand for customized products. The cloud service of the information system development strategic framework proposed in this study contains three elements: (1 e-commerce services, (2 promotion type modules, and (3 cloud services customized promotional products. In this study, a mining cloud information system to detect customer behavior is proposed. The association rules from relational database design are utilized to mine consumer behavior to generate cross-selling proposals for customer products and marketing for a retailing mall in Taiwan. The study is composed of several parts, as follows. A market segment and application of association rules in data exploration techniques (Association Rule Mining and sequence-like exploration (Sequential Pattern Mining, efficient analysis of customers, consumer behavior, identification of candidates for promotional products, and using cloud service delivery and evaluation of targets to evaluate candidates for promotional products for production. However, in addition to cloud service customized promotional products, the quantity of promotional products sales varies for different customers. We strive to achieve increased customer loyalty and profits through the use of active cloud service customized promotional products.

  20. Lost in Cloud

    Science.gov (United States)

    Maluf, David A.; Shetye, Sandeep D.; Chilukuri, Sri; Sturken, Ian

    2012-01-01

    Cloud computing can reduce cost significantly because businesses can share computing resources. In recent years Small and Medium Businesses (SMB) have used Cloud effectively for cost saving and for sharing IT expenses. With the success of SMBs, many perceive that the larger enterprises ought to move into Cloud environment as well. Government agency s stove-piped environments are being considered as candidates for potential use of Cloud either as an enterprise entity or pockets of small communities. Cloud Computing is the delivery of computing as a service rather than as a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network. Underneath the offered services, there exists a modern infrastructure cost of which is often spread across its services or its investors. As NASA is considered as an Enterprise class organization, like other enterprises, a shift has been occurring in perceiving its IT services as candidates for Cloud services. This paper discusses market trends in cloud computing from an enterprise angle and then addresses the topic of Cloud Computing for NASA in two possible forms. First, in the form of a public Cloud to support it as an enterprise, as well as to share it with the commercial and public at large. Second, as a private Cloud wherein the infrastructure is operated solely for NASA, whether managed internally or by a third-party and hosted internally or externally. The paper addresses the strengths and weaknesses of both paradigms of public and private Clouds, in both internally and externally operated settings. The content of the paper is from a NASA perspective but is applicable to any large enterprise with thousands of employees and contractors.

  1. Safety in the Internet

    Directory of Open Access Journals (Sweden)

    Semenko T.V.

    2016-11-01

    Full Text Available the modern world is the world of computer technology, and the children living in this world feel comfortable in it, they master the computer, mobile devices, new-fangled gadgets easily and use them skillfully. However, their knowledge of the safety in the Internet lags behind their ability to develop new devices. The number of the Internet users is increased every year, so the problem of children safety in the Internet is very urgent. It is necessary for parents, educators and teachers to conduct explanatory conversations and activities for explanation and consolidation the rules of “The Safe Internet”.

  2. Are internet prices sticky?

    OpenAIRE

    Lünnemann, Patrick; Wintr, Ladislav

    2006-01-01

    This paper studies the behaviour of Internet prices. It compares price rigidities on the Internet and in traditional brick-and-mortar stores and provides a cross-country perspective. The data set covers a broad range of items typically sold over the Internet. It includes more than 5 million daily price quotes downloaded from price comparison web sites in France, Germany, Italy, the UK and the US. The following results emerge from our analysis. First, and contrary to the recent findings for co...

  3. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  4. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  5. INTERNET AND PIRACY

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we can communicate by it;we can entertain by it;we can buy and sell by it.We can do almost everything on the Internet,and almost anywhere anytime. However,at the same time Internet provides services for us,it is inevitably invading our privacy to some degree.The services on most websites require our registering. If we want to enjoy these services,we have to provide much private informa-

  6. Towards the Tactile Internet

    DEFF Research Database (Denmark)

    Szabó, Dávid; Gulyás, András; Fitzek, Frank

    2015-01-01

    5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...

  7. Rumors and Internet

    Directory of Open Access Journals (Sweden)

    RENARD, Jean-Bruno

    2011-12-01

    Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.

  8. Privacidad en internet

    OpenAIRE

    Rodríguez Gómez, José Luis

    2010-01-01

    Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan. Anàlisi de la privacitat a Internet, i, en particular, en les xarxes socials i la blogosfera. Es parteix del concepte jurídic de privacitat i s'analitzen els riscos creixents que l'assetgen. Analysis of Internet privacy, and in particular, social networks and the blogosphere. It begins with legal ...

  9. State of the Art of Network Security Perspectives in Cloud Computing

    Science.gov (United States)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  10. Left thoracotomy HeartWare implantation with outflow graft anastomosis to the descending aorta: a simplified bridge for patients with multiple previous sternotomies.

    Science.gov (United States)

    Umakanthan, Ramanan; Haglund, Nicholas A; Stulak, John M; Joyce, Lyle D; Ahmad, Rashid; Keebler, Mary E; Maltais, Simon

    2013-01-01

    Advances in mechanical circulatory support have been critical in bridging patients awaiting heart transplantation. In addition, improvement in device durability has enabled left ventricular assist device therapy to be applied as destination therapy in those not felt to be transplant candidate. Because of the increasing complexity of patients, there continues to be a need for alternative strategies for device implantation to bridge high-risk patients awaiting heart transplantation, wherein the risks of numerous previous sternotomies may be prohibitive. We present a unique technique for placement of the HeartWare ventricular assist device via left anterior thoracotomy to the descending aorta in a patient awaiting heart transplantation with a history of multiple previous sternotomies.

  11. Identification and Management of Pump Thrombus in the HeartWare Left Ventricular Assist Device System: A Novel Approach Using Log File Analysis.

    Science.gov (United States)

    Jorde, Ulrich P; Aaronson, Keith D; Najjar, Samer S; Pagani, Francis D; Hayward, Christopher; Zimpfer, Daniel; Schlöglhofer, Thomas; Pham, Duc T; Goldstein, Daniel J; Leadley, Katrin; Chow, Ming-Jay; Brown, Michael C; Uriel, Nir

    2015-11-01

    The study sought to characterize patterns in the HeartWare (HeartWare Inc., Framingham, Massachusetts) ventricular assist device (HVAD) log files associated with successful medical treatment of device thrombosis. Device thrombosis is a serious adverse event for mechanical circulatory support devices and is often preceded by increased power consumption. Log files of the pump power are easily accessible on the bedside monitor of HVAD patients and may allow early diagnosis of device thrombosis. Furthermore, analysis of the log files may be able to predict the success rate of thrombolysis or the need for pump exchange. The log files of 15 ADVANCE trial patients (algorithm derivation cohort) with 16 pump thrombus events treated with tissue plasminogen activator (tPA) were assessed for changes in the absolute and rate of increase in power consumption. Successful thrombolysis was defined as a clinical resolution of pump thrombus including normalization of power consumption and improvement in biochemical markers of hemolysis. Significant differences in log file patterns between successful and unsuccessful thrombolysis treatments were verified in 43 patients with 53 pump thrombus events implanted outside of clinical trials (validation cohort). The overall success rate of tPA therapy was 57%. Successful treatments had significantly lower measures of percent of expected power (130.9% vs. 196.1%, p = 0.016) and rate of increase in power (0.61 vs. 2.87, p file parameters can potentially predict the likelihood of successful tPA treatments and if validated prospectively, could substantially alter the approach to thrombus management. Copyright © 2015 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  12. Ambient hemolysis and activation of coagulation is different between HeartMate II and HeartWare left ventricular assist devices.

    Science.gov (United States)

    Birschmann, Ingvild; Dittrich, Marcus; Eller, Thomas; Wiegmann, Bettina; Reininger, Armin J; Budde, Ulrich; Strüber, Martin

    2014-01-01

    Thromboembolic and bleeding events in patients with a left ventricular assist device (LVAD) are still a major cause of complications. Therefore, the balance between anti-coagulant and pro-coagulant factors needs to be tightly controlled. The principle hypothesis of this study is that different pump designs may have an effect on hemolysis and activation of the coagulation system. Referring to this, the HeartMate II (HMII; Thoratec Corp, Pleasanton, CA) and the HeartWare HVAD (HeartWare International Inc, Framingham, MA) were investigated. For 20 patients with LVAD support (n = 10 each), plasma coagulation, full blood count, and clinical chemistry parameters were measured. Platelet function was monitored using platelet aggregometry, platelet function analyzer-100 system ( Siemens, Marburg, Germany), vasodilator-stimulated phosphoprotein phosphorylation assay, immature platelet fraction, platelet-derived microparticles, and von Willebrand diagnostic. Acquired von Willebrand syndrome could be detected in all patients. Signs of hemolysis, as measured by lactate dehydrogenase levels (mean, 470 U/liter HMII, 250 U/liter HVAD; p < 0.001), were more pronounced in the HMII patients. In contrast, D-dimer analysis indicated a significantly higher activation of the coagulation system in HVAD patients (mean, 0.94 mg/liter HMII, 2.01 mg/liter HVAD; p < 0.01). The efficacy of anti-platelet therapy using clopidogrel was not sufficient in more than 50% of the patients. Our results support the finding that all patients with rotary blood pumps suffered from von Willebrand syndrome. In addition, a distinct footprint of effects on hemolysis and the coagulation system can be attributed to different devices. As a consequence, the individual status of the coagulation system needs to be controlled in long-term patients. © 2013 Published by International Society for the Heart and Lung Transplantation on behalf of International Society for Heart and Lung Transplantation.

  13. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  14. Security in hybrid cloud computing

    OpenAIRE

    Koudelka, Ondřej

    2016-01-01

    This bachelor thesis deals with the area of hybrid cloud computing, specifically with its security. The major aim of the thesis is to analyze and compare the chosen hybrid cloud providers. For the minor aim this thesis compares the security challenges of hybrid cloud as opponent to other deployment models. In order to accomplish said aims, this thesis defines the terms cloud computing and hybrid cloud computing in its theoretical part. Furthermore the security challenges for cloud computing a...

  15. Cloud security in vogelvlucht

    NARCIS (Netherlands)

    Pieters, Wolter

    2011-01-01

    Cloud computing is dé hype in IT op het moment, en hoewel veel aspecten niet nieuw zijn, leidt het concept wel tot de noodzaak voor nieuwe vormen van beveiliging. Het idee van cloud computing biedt echter ook juist kansen om hierover na te denken: wat is de rol van informatiebeveiliging in een

  16. CLOUD SERVICES IN EDUCATION

    Directory of Open Access Journals (Sweden)

    Z.S. Seydametova

    2011-05-01

    Full Text Available We present the on-line services based on cloud computing, provided by Google to educational institutions. We describe the own experience of the implementing the Google Apps Education Edition in the educational process. We analyzed and compared the other universities experience of using cloud technologies.

  17. Cloud MicroAtlas

    Indian Academy of Sciences (India)

    We begin by outlining the life cycle of a tall cloud, and thenbriefly discuss cloud systems. We choose one aspect of thislife cycle, namely, the rapid growth of water droplets in ice freeclouds, to then discuss in greater detail. Taking a singlevortex to be a building block of turbulence, we demonstrateone mechanism by which ...

  18. Greening the cloud

    NARCIS (Netherlands)

    van den Hoed, Robert; Hoekstra, Eric; Procaccianti, Giuseppe; Lago, Patricia; Grosso, Paolo; Taal, Arie; Grosskop, Kay; van Bergen, Esther

    The cloud has become an essential part of our daily lives. We use it to store our documents (Dropbox), to stream our music and films (Spotify and Netflix) and without giving it any thought, we use it to work on documents in the cloud (Google Docs).

  19. Learning in the Clouds?

    Science.gov (United States)

    Butin, Dan W.

    2013-01-01

    Engaged learning--the type that happens outside textbooks and beyond the four walls of the classroom--moves beyond right and wrong answers to grappling with the uncertainties and contradictions of a complex world. iPhones back up to the "cloud." GoogleDocs is all about "cloud computing." Facebook is as ubiquitous as the sky.…

  20. Kernel structures for Clouds

    Science.gov (United States)

    Spafford, Eugene H.; Mckendry, Martin S.

    1986-01-01

    An overview of the internal structure of the Clouds kernel was presented. An indication of how these structures will interact in the prototype Clouds implementation is given. Many specific details have yet to be determined and await experimentation with an actual working system.