Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "computing cloud" wg kryterium: Temat


Tytuł:
A brief survey on hybrid cloud storage and its applications
Autorzy:
Venkatesakumar, V.
Yasotha, R.
Subashini, A.
Powiązania:
https://bibliotekanauki.pl/articles/1192695.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Cloud Computing
Communication
Hybrid cloud
IT infrastructure
Security
Opis:
As the cloud computing is spreading round the world, want of inter cloud communication is turning into a growing in the organizations. It’s inflicting the researchers to specialize in first, creating it potential to communicate between two or additional clouds and second security of communication is to considered up to utmost level. Hybrid cloud storage may be a storage technique that uses internal and external cloud applications, infrastructure and storage systems to create integrated storage design. Hybrid cloud may be a classification in cloud computing atmosphere that utilizes a collaboration of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. By permitting workloads to transfer between private and public clouds, the computing requirements and prices modification, hybrid cloud offers businesses larger flexibility and additional information deployment choices. Hybrid cloud is especially valuable for dynamic or extremely changeable workloads. This paper describes the needs, deployment, storage, applications and issues of hybrid cloud.
Źródło:
World Scientific News; 2016, 46; 219-232
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Cloud Platform for the Internet of Things
Autorzy:
Swarnalatha, K.
Alankar, Supriya N.
Bhagyalakshmi, Y.
Powiązania:
https://bibliotekanauki.pl/articles/1193538.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Cloud of Computing
CoT
Internet Things (IoT)
big data
Opis:
Cloud computing is a major pattern for large data storage and analytics. The combination of cloud computing and IoT can enable the resource sharing more efficiently than individually handling them. In distributed systems, the resources are termed as cloud services and handled in a centralized way. However, new challenges arise when integrating cloud for IoT. This paper presents the architecture for integrating of cloud computing for Internet of Things and its issues. Cloud computing has long been recognized as a paradigm for big data storage and analytics. The combination of cloud computing and IoT can enable ubiquitous sensing services and powerful processing of sensing data streams beyond the capability of individual “things”, thus stimulating innovations in both fields. With the trend going on in ubiquitous computing, everything is going to be connected to the Internet and its data will be used for various progressive purposes, creating not only information from it, but also, knowledge and even wisdom. Internet of Things (IoT) becoming so pervasive that it is becoming important to integrate it with cloud computing because of the amount of data IoT's could generate and their requirement to have the privilege of virtual resources utilization and storage capacity, but also, to make it possible to create more usefulness from the data generated by IoT's and develop smart applications for the users. For example, cloud platforms allow the sensing data to be stored and used intelligently for smart monitoring and actuation with the smart devices. Novel data fusion algorithms, machine learning methods, and artificial intelligence techniques can be implemented and run centralized or distributed on the cloud to achieve automated decision making. These will boost the development of new applications such as smart cities, grids, and transportation systems.
Źródło:
World Scientific News; 2016, 41; 9-21
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Cloud-aided Group RSA Scheme in Java 8 Environment and OpenStack Software
Autorzy:
Jakóbik, A.
Powiązania:
https://bibliotekanauki.pl/articles/308237.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
confidentiality
RSA cryptosystem
Opis:
In this paper a RSA based security system enabling the group of users to upload the single masked message to the cloud environment is proposed. Data stored are encrypted using RSA algorithm. The data receiver is able to encrypt the message retrieved from the cloud environment using private key. Two different separate RSA systems are used. The presented approach is divided into three parts. First, an RSA key is generated for each sender. Then masking the message by newly chosen mask proposed individually by every member, additionally encrypted by individual RSA private key of each member is proceed. Next, encrypting the gathered message inside the cloud environment, using the public key of the receiver is executed. In the third step, the message is decrypted by the receiver using his private RSA key. The scheme reduces the computational load on users side and transfers calculations and storage effort to the cloud environment. The proposed algorithm was developed for storing and sending the data that originally are produced by a group of users, but the receiver of the data is single. It was implemented using Java 8 and OpenStack software. Numerical test of different key length for RSA are presented.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 2; 53-59
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A cloud-based urban monitoring system by using a quadcopter and intelligent learning techniques
Autorzy:
Khanmohammadi, Sohrab
Samadi, Mohammad
Powiązania:
https://bibliotekanauki.pl/articles/27314186.pdf
Data publikacji:
2022
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
urban monitoring
cloud computing
quadcopter
deep learning
fuzzy system
image processing
pattern recognition
bayesian network
intelligent techniques
learning systems
Opis:
The application of quadcopter and intelligent learning techniques in urban monitoring systems can improve flexibility and efficiency features. This paper proposes a cloud-based urban monitoring system that uses deep learning, fuzzy system, image processing, pattern recognition, and Bayesian network. The main objectives of this system are to monitor climate status, temperature, humidity, and smoke, as well as to detect fire occurrences based on the above intelligent techniques. The quadcopter transmits sensing data of the temperature, humidity, and smoke sensors, geographical coordinates, image frames, and videos to a control station via RF communications. In the control station side, the monitoring capabilities are designed by graphical tools to show urban areas with RGB colors according to the predetermined data ranges. The evaluation process illustrates simulation results of the deep neural network applied to climate status and effects of the sensors’ data changes on climate status. An illustrative example is used to draw the simulated area using RGB colors. Furthermore, circuit of the quadcopter side is designed using electric devices.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2022, 16, 2; 11--19
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A cryptographic security mechanism for dynamic groups for public cloud environments
Autorzy:
Malviya, Sheenal
Dave, Sourabh
Bandhu, Kailash Chandra
Litoriya, Ratnesh
Powiązania:
https://bibliotekanauki.pl/articles/27314248.pdf
Data publikacji:
2022
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
cloud computing
cloud data security
dynamic groups
homomorphic encryption
chaotic network
throughput
avalanche effect
Opis:
Cloud computing has emerged as a significant technology domain, primarily due to the emergence of big data, machine learning, and quantum computing applications. While earlier, cloud computing services were focused mainly on providing storage and some infrastructures/ platforms for applications, the need to advance computational power analysis of massive datasets. It has made cloud computing almost inevitable from most client-based applications, mobile applications, or web applications. The allied challenge to protect data shared from and to cloud-based platforms has cropped up with the necessity to access public clouds. While conventional cryptographic algorithms have been used for securing and authenticating cloud data, advancements in cryptanalysis and access to faster computation have led to possible threats to the traditional security of cloud mechanisms. This has led to extensive research in homomorphic encryption pertaining to cloud security. In this paper, a security mechanism is designed targeted towards dynamic groups using public clouds. Cloud security mechanisms generally face a significant challenge in terms of overhead, throughput, and execution time to encrypt data from dynamic groups with frequent member addition and removal. A two-stage homomorphic encryption process is proposed for data security in this paper. The performance of the proposed system is evaluated in terms of the salient cryptographic metrics, which are the avalanche effect, throughput, and execution time. A comparative analysis with conventional cryptographic algorithms shows that the proposed system outperforms them regarding the cryptographic performance metrics.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2022, 16, 2; 46--54
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A note on the complexity of scheduling of communication-aware directed acyclic graph
Autorzy:
Musial, J.
Guzek, M.
Bouvry, P.
Blazewicz, J.
Powiązania:
https://bibliotekanauki.pl/articles/202127.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
computational complexity
cloud computing
communication-aware cloud computing
directed acyclic graph
NP-hardness in cloud computing
złożoność obliczeniowa
chmura obliczeniowa
skierowany graf acykliczny
Opis:
The most recent incarnation of distributed paradigm is cloud computing. It can be seen as the first widely accepted business model of mass consumption of the distributed computing resources. Despite the differences in business models and technical details regarding cloud platforms, the distributed computing underlies cloud. Communications in cloud systems include transmissions of the results of cloud applications, users interactions, and exchange of data between different services that compose applications. The latter becomes more critical as applications become richer as well as more complex, and may consist of services operated by various providers. The effective communication between components of cloud systems is thus critical to the end user satisfaction and to the success of cloud services. We will discuss different cloud computing models (communication aware and unaware). Main focus will be placed on communication-aware directed acyclic graph (CA-DAG), which extends the classical DAG model by explicitly modeling communication tasks. Moreover, we will analyze and consult computational complexity of this innovative distributed computation model inspired by the characteristics of cloud computing. Providing a proof of strong NP-hardness of the problem allows for a future implementation and evolution of the communication-aware DAG models.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2018, 66, 2; 187-191
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Software Architecture Assisting Workflow Executions on Cloud Resources
Autorzy:
Borowik, G.
Woźniak, M.
Fornaia, A.
Giunta, R.
Napoli, C.
Pappalardo, G.
Tramontana, E.
Powiązania:
https://bibliotekanauki.pl/articles/226324.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
software architecture
dependability
workflows
cloud computing
monitoring
Opis:
An enterprise providing services handled by means of workflows needs to monitor and control their execution, gather usage data, determine priorities, and properly use computing cloud-related resources. This paper proposes a software architecture that connects unaware services to components handling workflow monitoring and management concerns. Moreover, the provided components enhance dependability of services while letting developers focus only on the business logic.
Źródło:
International Journal of Electronics and Telecommunications; 2015, 61, 1; 17-22
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Survey on Resource Provisioning Heuristics
Autorzy:
Gowthami, M.
Suganya, V.
Powiązania:
https://bibliotekanauki.pl/articles/1193545.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
cloud computing
information technology
resource allocation
Opis:
Cloud Computing allow the users to dynamically provide computing resource to meet their information technology needs. Cloud providers are able to rent resources from cloud for many computational purposes using any one of the provisioning model static/dynamic the company can pay bills as per the model. One of the major drawbacks in cloud computing is linked to step up the dataflow model with better resources. Resource allocation is performed with the aim of minimizing the costs and to get high throughput. The added challenges in resource allocation is satisfying the customer demands and application necessities. In this paper, we have presented an extensive survey on various resource allocation strategies for various dataflow model and their challenges are discussed in detail.
Źródło:
World Scientific News; 2016, 41; 55-61
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A technique for DoS attack detection in e-commerce transactions based on ECC and Optimized Support Vector Neural Network
Autorzy:
Shaikh, J. R.
Iliev, G.
Powiązania:
https://bibliotekanauki.pl/articles/1839123.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
cloud computing
e-commerce transactions
DoS attack detection
SVNN
GSO
Opis:
Cloud computing has become a significant area forbusiness due to the high demand from people engaging in commerce and hence, protecting the entities from attacks, like Denial-of-Service (DoS) attacks is essential. Therefore, an effective DoS attack detection technique is required in the e-commerce transactions to provide security in this space. Accordingly, in this paper, a technique is developed for DoS attack detection for the e commerce transactions by proposing Glowworm Swarm Optimization-based Support Vector Neural Network (GSO-SVNN) based authorization. The user and the server, who are registered for accessing the e-commerce web, are first registered and then, authenticated based on Elliptic Curve Cryptography (ECC) encryption with four verification levels follows. The proposed GSO-SVNN classifier, which is developed by incorporating the GSO algorithm in the training procedure of SVNN, determines the class of the user. The performance of the proposed technique is evaluated using four metrics, namely accuracy, precision, recall, and False Positive Rate (FPR), and the experimental results show that the maximum accuracy attained by the proposed DoS attack detection technique is 95.1%. This proves that the proposed technique is effective in detecting DoS attacks in e commerce applications using the proposed GSO-SVNN based authorization.
Źródło:
Control and Cybernetics; 2018, 47, 4; 439-463
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Abstraction layer for development and deployment of cloud services
Autorzy:
Nguyen Minh, B.
Tran, V.
Hluchy, L.
Powiązania:
https://bibliotekanauki.pl/articles/305457.pdf
Data publikacji:
2012
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
cloud computing
abstraction
service development
service deployment
interoperability
Opis:
In this paper, we will present an abstraction layer for cloud computing, which intends to simplify the manipulation with virtual machines in clouds for easy and controlled development and deployment of cloud services. It also ensures interoperability between different cloud infrastructures and allows developers to create cloud appliances easily via inheritance mechanisms.
Źródło:
Computer Science; 2012, 13 (3); 79-88
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An agent-based hierarchical approach for executing bag-of-tasks in clouds
Autorzy:
Funika, W.
Mazurek, K.
Kruczkowski, W.
Powiązania:
https://bibliotekanauki.pl/articles/305709.pdf
Data publikacji:
2014
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
cloud computing
bag-of-tasks
load balancing
master-slave paradigm
scalability
Opis:
Unlike message-passing applications, “bag-of-tasks” applications (BoTs), whose tasks are unrelated and independent (no inter-task communication), can be highly parallelized and executed in any acceptable order. A common practice when executing bag-of-tasks applications (BoT) is to exploit the master-slave topology. Cloud environments offer some features that facilitate the execution of BoT applications. One of the approaches to control-cloud resources is to use agents that are flexible actors in a dynamic environment. Given these assumptions, we have designed a combination of approaches which can be classified as distributed, hierarchical solutions to the issue of scalable execution of bag-of-tasks. The concept of our system relates to a project that is focused on processing huge quantities of incoming data from a network of sensors through the Internet. Our aim is to create a mechanism for processing such data as a system that executes jobs while exploiting load balancing for cloud resources which use applications such as Eucalyptus. The idea is to create a hybrid architecture which takes advantage of some centralized parts of the system and full distributedness in other parts. On the other hand, we balance dependencies between system components using a hierarchical master-slave structure.
Źródło:
Computer Science; 2014, 15 (1); 35-60
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure
Autorzy:
Mujawar, Tabassum N.
Bhajantri, Lokesh B.
Powiązania:
https://bibliotekanauki.pl/articles/2142312.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
CPABE
hierarchical access structure
Opis:
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine-grained access control model that grants access based on the data user’s attributes. In this model, the data owner builds the access policy using the attributes of the data users and access to the data is granted only if the requirements of such an access policy are satisfied. Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control. Complex, time consuming and costly paring operations are the major issue with the CPABE method. Hence, another efficient method is needed to reduce the data user’s overhead while decrypting data. This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations left on the data user’s side. The concept of a hierarchical access structure is also integrated with the traditional CPABE technique. The hierarchical approach enables the data owner to encrypt multiple data using a single common hierarchical access structure. This allows the user to decrypt only the relevant part of ciphertext, depending on which fragment of the hierarchical access structure is satisfied. The paper evaluates also the performance of the proposed model in terms of time and storage cost.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 2; 75--81
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An e-ordering and e-invoicing cloud solution
Autorzy:
Gusev, Marjan
Kiroski, Kiril
Ristov, Sasko
Powiązania:
https://bibliotekanauki.pl/articles/432101.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
cloud architecture
cloud computing
e-Invoicing
e-Ordering
Opis:
This paper addresses a new cloud solution for e-Ordering and e-Invoicing solution. We faced several challenges in the process of the migration of the existing web application on the cloud, such as the reorganization of the proposed non-cloud model and the definition of the software modules that can communicate in a dynamic environment. In the design process we classified two kinds of software modules: static and dynamic. The classification is based on the level of required elasticity and scalability, as well as the activity that is associated with the corresponding module (tool). To finalize the implementation of this idea, we have developed indicators to determine the required conditions for the activation of additional cloud resources or the deactivation of the involved resources. The result of this design process is a new cost-effective solution with increased availability and performance compared to the non-cloud model. We also recognized the advantages and disadvantages of such a cloud solution, and discussed the characteristics that make our approach unique.
Źródło:
Informatyka Ekonomiczna; 2013, 3(29); 51-75
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
AN EXPERIMENTAL STUDY OF SUBTITLED ONLINE VIDEO SUPPORTING THAI STUDENTS LEARNING ENGLISH IT CONTENT
Autorzy:
Angkananon, Kewalin
Wald, Mike
Powiązania:
https://bibliotekanauki.pl/articles/569509.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej w Lublinie. IATEFL Poland Computer Special Interest Group
Tematy:
English skills
cloud computing
online learning
online video
Opis:
This research study investigated whether the innovation of online video media spoken in both Thai and English with appropriate subtitles improved English skills for new students in Business Computing at Suratthani Rajabhat University. Ninety two students were split equally between an experimental group using video online media for learning and a control group learning the same content face-to-face in the classroom. Evaluation was conducted through achievement and satisfaction tests. Trials of the instructional media by 33 students with a range of English skills helped to improve it. At the end of the learning period all students using the video online media passed the achievement test standard but only 54% of the control group passed. There was no significant difference between the pre-test scores of the two groups. The post-test scores showed that the experimental group had a significantly higher average score (23.39) than the control group (14.89) at the p level of 0.05. The achievement test results of the experimental group (listening = 3.98, reading =3.89, writing = 3.93, speaking = 3.91, discussion =3.91, presenting = 3.87) were significantly higher than the control group (listening = 2.94, reading =3.07, writing = 2.72, speaking = 1.93, discussion =2.20, presenting = 2.20) at the p level of 0.01 in every English skill. The students’ satisfaction for the innovation rated out of 5 was at a high level overall (4.54), the students were satisfied with the innovation (4.67), the innovation was interesting (4.63), and the innovation was easy to understand (4.28).
Źródło:
Teaching English with Technology; 2018, 18, 4; 48-70
1642-1027
Pojawia się w:
Teaching English with Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza możliwości wykorzystania chmury obliczeniowej w permanentnej edukacji
An analysis of possible use of the cloud computing in permanent education
Autorzy:
Iskierka, Sławomir
Krzemiński, Janusz
Weżgowiec, Zbigniew
Powiązania:
https://bibliotekanauki.pl/articles/446128.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Rzeszowski
Tematy:
technologia informacyjna
edukacja
chmura obliczeniowa
information technology
education
cloud computing
Opis:
W pracy przeanalizowano możliwości wykorzystania różnych modeli chmury obliczeniowej do permanentnej edukacji. Omówiono czynniki, jakie winny być spełnione, aby można ją było wykorzystać w procesie dydaktycznym. Zwrócono uwagę na aspekty ekonomiczne wprowadzania chmury obliczeniowej do edukacji, a zwłaszcza edukacji permanentnej.
In this work possible use of different models of the computing cloud in permanent education is analysed. Selected criteria are discussed that are needed for their effective use in the educational process. A special attention is drawn to economical aspects of the introduction of the computing cloud to education, especially to the permanent education.
Źródło:
Dydaktyka informatyki; 2013, 8; 83-92
2083-3156
Pojawia się w:
Dydaktyka informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies