Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "computing cloud" wg kryterium: Temat


Tytuł:
Cloud computing usage determinants in European Union countries
Determinanty użycia chmury obliczeniowej w krajach Unii Europejskiej
Autorzy:
Dziubak, Szymon
Powiązania:
https://bibliotekanauki.pl/articles/32045290.pdf
Data publikacji:
2024
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
chmura obliczeniowa
modelowanie statystyczne
adopcja technologii
cloud computing
statistical modelling
technology adoption
Opis:
Cloud computing is growing technology that can offers many benefits for organizations. The purpose of this article is to explain cloud computing adoption determinants. According to literature review the principal factors influencing cloud usage are digital skills, cloud computing infrastructure, IT development in certain country, regulatory and regulatory quality, trust to innovative technologies, economic development, management styles, fund provision and uncertainly avoidance. According to presented statistical analysis based on data from 2020 and 2021, using cloud computing for personal purposes and regulatory quality are significant variables in linear regression model performed to explain cloud computing usage by organizations in EU member states. Those variables explain 92% of data variance. Governments and public institutions may use cloud computing in public offerings (for example healthcare and education) to introduce cloud computing to society and improve regulatory quality in order to boost cloud computing usage by organizations. This research is important from countries innovation and competitiveness perspective.
Chmura obliczeniowa jest rozwijającą się technologią oferującą wiele korzyści organizacjom. Celem tego artykułu jest wyjaśnienie determinant adopcji chmury obliczeniowej. Bazując na przeglądzie literatury najważniejsze czynniki wpływające na użycie chmury to umiejętności cyfrowe, infrastruktura chmury publicznej, rozwój technologii IT w danym kraju, regulacje i ich jakość, zaufanie do nowych technologii, rozwój gospodarczy, style zarządzania, dostęp do finansowania i niechęć do niepewności. Zgodnie z zaprezentowaną analizą statystyczną opartą na danych z lat 2020 i 2021, użycie chmury obliczeniowej w celach prywatnych i jakość regulacji to dwa istotne statystycznie czynniki w modelu regresji liniowej użytej do wyjaśnienia poziomu użycia chmury obliczeniowej przez organizacje w krajach UE. Zmienne te wyjaśniają 92% zmienności w danych. Rządy i instytucje publiczne mogą używać chmury obliczeniowej w oferowanych przez nie usługach (np. w opiece zdrowotnej i edukacji) i poprawić jakość regulacji w celu zwiększenia poziomu użycia chmury obliczeniowej przez organizacje. To badanie jest ważne z perspektywy innowacyjności i konkurencyjności krajów.
Źródło:
Kwartalnik Nauk o Przedsiębiorstwie; 2024, 71, 1; 57-70
1896-656X
Pojawia się w:
Kwartalnik Nauk o Przedsiębiorstwie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Artificial intelligence algorithms and cloud computing technologies in blockchain-based fintech management
Autorzy:
Lăzăroiu, George
Bogdan, Mădălina
Geamănu, Marinela
Hurloiu, Lăcrămioara
Luminița, Luminița
Ștefănescu, Roxana
Powiązania:
https://bibliotekanauki.pl/articles/19901187.pdf
Data publikacji:
2023
Wydawca:
Instytut Badań Gospodarczych
Tematy:
artificial intelligence algorithms
cloud computing
blockchain
fintech
green and sustainable finance
banking
Opis:
Research background: Fintech development shapes corporate investment efficiency and economic growth with innovative tools, and can decrease financing constraints of enterprises, enabling direct and indirect financing and furthering inter-bank competition. Crowdfunding- and blockchain-based fintech operations harness deep and maching learning algorithms, augmented and virtual reality technologies, and big data analytics in mobile payment transactions. Purpose of the article: We show that fintechs have reconfigured financial service delivery by harnessing AI-based data-driven algorithms and cloud and blockchain technologies. Fintech optimizes financial organization and services, economic structures and growth, data analysis, and digital banking performance.  Machine learning algorithms can streamline payment operation capabilities and process promptness, ensuring smooth operational flows, assessing risks, and detecting frauds and money laundering by historical data and customer behavior analysis across instant payment networks and infrastructures. Methods: Quality tools: AXIS, Eppi-Reviewer, PICO Portal, and SRDR. Search period: July 2023. Search terms: “fintech” + “artificial intelligence algorithms”, “cloud computing technologies”, and “blockchain technologies”. Selected sources: 40 out of 195. Published research inspected: 2023. Data visualization tools: Dimensions and VOSviewer. Reporting quality assessment tool: PRISMA. Findings & value added: Fintech development enables organizational innovation by mitigating information asymmetry and financing limitations while providing financial assistance and tax incentives in relation to products and services. The fintech growth has influenced the dynamic intermediary function of financial institutions in terms of sustainability and economic development. Fintech and natural resources negatively influence, while green innovations and financial development further, environmental sustainability.
Źródło:
Oeconomia Copernicana; 2023, 14, 3; 707-730
2083-1277
Pojawia się w:
Oeconomia Copernicana
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Decentralized device authentication for cloud systems with blockchain using skip graph algorithm
Autorzy:
Sammy, F.
Vigila, S. Maria Celestin
Powiązania:
https://bibliotekanauki.pl/articles/38700867.pdf
Data publikacji:
2023
Wydawca:
Instytut Podstawowych Problemów Techniki PAN
Tematy:
blockchain
cloud computing
edge computing
fog computing
latency
power consumption
ID algorithm
single point failure
skipgraph
łańcuch bloków
chmura obliczeniowa
przetwarzanie brzegowe
mgła obliczeniowa
czas oczekiwania
pobór energii
algorytm ID
awaria jednego punktu
przeskok
Opis:
Cloud computing provides centralized computing services to the user on demand. Despite this sophisticated service, it suffers from single-point failure, which blocks the entire system. Many security operations consider this single-point failure, which demands alternate security solutions to the aforesaid problem. Blockchain technology provides a corrective measure to a single-point failure with the decentralized operation. The devices communicating in the cloud environment range from small IoT devices to large cloud data storage. The nodes should be effectively authenticated in a blockchain environment. Mutual authentication is time-efficient when the network is small. However, as the network scales, authentication is less time-efficient, and dynamic scalability is not possible with smart contract-based authentication. To address this issue, the blockchain node runs the skip graph algorithm to retrieve the registered node. The skip graph algorithm possesses scalability and decentralized nature, and retrieves a node by finding the longest prefix matching. The worst time complexity is O(log n) for maximum n nodes. This method ensures fast nodal retrieval in the mutual authentication process. The proposed search by name id algorithm through skip graph is efficient compared with the state-of-art existing work and the performance is also good compared with the existing work where the latency is reduced by 30–80%, and the power consumption is reduced by 32–50% compared to other considered approaches.
Źródło:
Computer Assisted Methods in Engineering and Science; 2023, 30, 2; 203-221
2299-3649
Pojawia się w:
Computer Assisted Methods in Engineering and Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Extracting Land Surface Albedo from Landsat 9 Data in GEE Platform to Support Climate Change Analysis
Autorzy:
Barletta, Carlo
Capolupo, Alessandra
Tarantino, Eufemia
Powiązania:
https://bibliotekanauki.pl/articles/27314275.pdf
Data publikacji:
2023
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
open satellite data
cloud computing
climate change
Copernicus Urban Atlas
environmental monitoring
sustainable development
urban areas
Opis:
Land surface albedo is a relevant variable in many climatic, environmental, and hydrological studies; its monitoring allows researchers to identify changes on the Earth’s surface. The open satellite data that is provided by the USGS/NASA Landsat mission is quite suitable for estimating this parameter through the remote sensing technique. The purpose of this paper is to evaluate the potentialities of the new Landsat 9 data for retrieving Earth’s albedo by applying da Silva et al.’s algorithm (developed in 2016 for the Landsat 8 data) using the Google Earth Engine cloud platform and R software. Two urban areas in Southern Italy with similar geomorphologic and climatic characteristics were chosen as study sites. After obtaining thematic maps of the albedos here, a statistical analysis and comparison among the Landsat 8 and Landsat 9 results was performed considering the entire study areas and each land use/land cover class that is provided by the Copernicus Urban Atlas 2018. This approach was also applied to the data after being filtered through Tukey’s test (used to detect and remove outliers). The analysis showed a very good correlation between the Landsat 8 and Landsat 9 estimations (ρ > 0.94 for both sites), with some exceptions that were related to some mis-corresponding values. Furthermore, the Landsat 8 and Landsat 9 outliers were generally overlapping. In conclusion, da Silva et al.’s approach appears to also be reasonably applicable to the Landsat 9 data despite some radiometric differences.
Źródło:
Geomatics and Environmental Engineering; 2023, 17, 6; 35--75
1898-1135
Pojawia się w:
Geomatics and Environmental Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hierarchical Access Structure-based Scheme with Outsourcing and Revocation Mechanism for Cloud Environment
Autorzy:
Mujawar, Tabassum N.
Adik, Ramrao
Bhajantri, Lokesh B.
Sutagundar, Ashok V.
Powiązania:
https://bibliotekanauki.pl/articles/27312940.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
attribute revocation
cloud computing
hierarchical access control
outsourced decryption
trust
Opis:
Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing. Though multiple implementations of CPABE exist, there are some issues that need to be addressed, including efficient revocation approach, decryption time, storage cost etc. In this paper, an efficient scheme that incorporates a hierarchical access structure, outsourced decryption, as well as user and attribute revocation is presented. The hierarchical access structure is utilized to encrypt multiple data using one common access structure and makes the encryption process more efficient. The outsourcing server is used to perform partial decryption, so that all heavy computations are performed by this server and less overhead is incurred by the data user. The proposed framework also integrates the evaluation of trustworthiness of data users and service providers to ensure trusted and encrypted access control procedures. The paper also presents an analysis of the time required for performing different operations. Simulation results show that the proposed scheme outperforms the existing approaches.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 4; 83--92
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modeling the Regulatory Quality Impact on Cloud Computing Usage in the European Union Member States
Autorzy:
Dziubak, Szymon
Powiązania:
https://bibliotekanauki.pl/articles/21271384.pdf
Data publikacji:
2023-03-31
Wydawca:
Politechnika Częstochowska
Tematy:
cloud computing
innovations
regulatory quality
Opis:
Recently, the rapid development of innovative technologies based on cloud computing has been observed. Many countries are not keeping up with the relevant legislation, while cloud computing adoption requires transparent and high-quality regulations. This paper is focused on European Union member states. It checks whether the quality of regulation has an impact on cloud computing usage in EU countries. As regulations, quality data from the World Bank’s Worldwide Governance Regulatory Quality 2021 indicator was used. Data on cloud computing usage from Eurostat questionnaires on ICT from 2021 were used. Between these variables, there is a moderate to strong linear correlation and causality. The univariate linear regression model was proposed to explain the impact of regulatory quality on cloud computing usage in a quantitative way. The regulatory quality indicator increased by one resulted in the increase in cloud computing usage by 21.56% by companies ceteris paribus. The model presented explains 40% of the variance for cloud computing usage by regulatory quality indicator. These conclusions can be valuable from the management perspective for governments that aim to increase the innovativeness and competitiveness of economies, for enterprises that consider the implementation of cloud computing services, and for non-governmental organizations that can have an impact on legislation to contribute to economic development.
Źródło:
Zeszyty Naukowe Politechniki Częstochowskiej. Zarządzanie; 2023, 1, 49; 22-36
2083-1560
Pojawia się w:
Zeszyty Naukowe Politechniki Częstochowskiej. Zarządzanie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems
Autorzy:
Zięba, Arkadiusz
Kollar, Martin
Tatarczyk, Krzysztof
Sadowski, Jarosław
Powiązania:
https://bibliotekanauki.pl/articles/27311949.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
IP Scheduled Throughput
distributed system
Edge computing
cloud
Long Term Evolution (LTE)
Evolved Universal Terrestrial Radio Access Network (E-UTRAN)
Carrier aggregation (CA)
UE Throughput
Key Performance Indicator (KPI)
Quality of Experience (QoE)
quality of service (QoS)
Opis:
IP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the implementation challenges. This paper gives an overview of the classical Long Term Evolution (LTE) architecture as opposed to Dual Connectivity (DC) topology and focuses on a novel method of solving the calculation issue with the IP scheduled throughput measurement in edge computing environment. Experimental results show a good agreement with the real end user perception.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 4; 645--654
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Preserving Integrity of Evidence with Blockchain Technology in Cloud Forensics for Immigration Management
Autorzy:
Shinde, Sahadev Maruti
Gurrala, Venkateswara Rao
Powiązania:
https://bibliotekanauki.pl/articles/2200957.pdf
Data publikacji:
2023
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
cloud forensics
FOI-SSA model
improved blowfish
Opis:
As the popularity of cloud computing increases, safety concerns are growing as well. Cloud forensics (CF) is a smart adaptation of the digital forensics model that is used for fighting the related offenses. This paper proposes a new forensic method relying on a blockchain network. Here, the log files are accumulated and preserved in the blockchain using different peers. In order to protect the system against illegitimate users, an improved blowfish method is applied. In this particular instance, the system is made up of five distinct components: hypervisor (VMM), IPFS file storage, log ledger, node controller, and smart contract. The suggested approach includes six phases: creation of the log file, key setup and exchange, evidence setup and control, integrity assurance, agreement validation and confidential file release, as well as blockchain-based communication. To ensure efficient exchange of data exchange between the cloud provider and the client, the methodology comprises IPFS. The SSA (FOI-SSA) model, integrated with forensic operations, is used to select the keys in the best possible way. Finally, an analysis is conducted to prove the effectiveness of the proposed FOI-SSA technique.
Źródło:
Journal of Telecommunications and Information Technology; 2023, 1; 78--87
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Procesowa kontrola danych informatycznych w chmurze obliczeniowej
Autorzy:
Nowikowska, Monika
Powiązania:
https://bibliotekanauki.pl/articles/13948496.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cloud computing
physical imaging
logical imaging
search
securing evidence
Opis:
The article attempts to analyze the process control of correspondence stored in virtual memory, i.e. in the so-called Cloud Computing. The study is an attempt to answer the question of how mobile devices and clouds are examined and what impact the law on privacy has on the implementation of procedural activities. The growing interest in cloud computing results in the emergence of many new legal problems, which translate into, among others, on the practice and operation of law enforcement agencies. First, the concept of „cloud computing” was discussed and the provisions on obtaining electronic evidence were analyzed. The independence of ICT systems from the functioning of a classic work environment based on a single workstation also allowed us to raise the question of the cross-border nature of services provided in the cloud. IT data transmitted via cloud computing can be saved on several devices located in different countries.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 167-183
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A cloud-based urban monitoring system by using a quadcopter and intelligent learning techniques
Autorzy:
Khanmohammadi, Sohrab
Samadi, Mohammad
Powiązania:
https://bibliotekanauki.pl/articles/27314186.pdf
Data publikacji:
2022
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
urban monitoring
cloud computing
quadcopter
deep learning
fuzzy system
image processing
pattern recognition
bayesian network
intelligent techniques
learning systems
Opis:
The application of quadcopter and intelligent learning techniques in urban monitoring systems can improve flexibility and efficiency features. This paper proposes a cloud-based urban monitoring system that uses deep learning, fuzzy system, image processing, pattern recognition, and Bayesian network. The main objectives of this system are to monitor climate status, temperature, humidity, and smoke, as well as to detect fire occurrences based on the above intelligent techniques. The quadcopter transmits sensing data of the temperature, humidity, and smoke sensors, geographical coordinates, image frames, and videos to a control station via RF communications. In the control station side, the monitoring capabilities are designed by graphical tools to show urban areas with RGB colors according to the predetermined data ranges. The evaluation process illustrates simulation results of the deep neural network applied to climate status and effects of the sensors’ data changes on climate status. An illustrative example is used to draw the simulated area using RGB colors. Furthermore, circuit of the quadcopter side is designed using electric devices.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2022, 16, 2; 11--19
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A cryptographic security mechanism for dynamic groups for public cloud environments
Autorzy:
Malviya, Sheenal
Dave, Sourabh
Bandhu, Kailash Chandra
Litoriya, Ratnesh
Powiązania:
https://bibliotekanauki.pl/articles/27314248.pdf
Data publikacji:
2022
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
cloud computing
cloud data security
dynamic groups
homomorphic encryption
chaotic network
throughput
avalanche effect
Opis:
Cloud computing has emerged as a significant technology domain, primarily due to the emergence of big data, machine learning, and quantum computing applications. While earlier, cloud computing services were focused mainly on providing storage and some infrastructures/ platforms for applications, the need to advance computational power analysis of massive datasets. It has made cloud computing almost inevitable from most client-based applications, mobile applications, or web applications. The allied challenge to protect data shared from and to cloud-based platforms has cropped up with the necessity to access public clouds. While conventional cryptographic algorithms have been used for securing and authenticating cloud data, advancements in cryptanalysis and access to faster computation have led to possible threats to the traditional security of cloud mechanisms. This has led to extensive research in homomorphic encryption pertaining to cloud security. In this paper, a security mechanism is designed targeted towards dynamic groups using public clouds. Cloud security mechanisms generally face a significant challenge in terms of overhead, throughput, and execution time to encrypt data from dynamic groups with frequent member addition and removal. A two-stage homomorphic encryption process is proposed for data security in this paper. The performance of the proposed system is evaluated in terms of the salient cryptographic metrics, which are the avalanche effect, throughput, and execution time. A comparative analysis with conventional cryptographic algorithms shows that the proposed system outperforms them regarding the cryptographic performance metrics.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2022, 16, 2; 46--54
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure
Autorzy:
Mujawar, Tabassum N.
Bhajantri, Lokesh B.
Powiązania:
https://bibliotekanauki.pl/articles/2142312.pdf
Data publikacji:
2022
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cloud computing
CPABE
hierarchical access structure
Opis:
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine-grained access control model that grants access based on the data user’s attributes. In this model, the data owner builds the access policy using the attributes of the data users and access to the data is granted only if the requirements of such an access policy are satisfied. Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control. Complex, time consuming and costly paring operations are the major issue with the CPABE method. Hence, another efficient method is needed to reduce the data user’s overhead while decrypting data. This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations left on the data user’s side. The concept of a hierarchical access structure is also integrated with the traditional CPABE technique. The hierarchical approach enables the data owner to encrypt multiple data using a single common hierarchical access structure. This allows the user to decrypt only the relevant part of ciphertext, depending on which fragment of the hierarchical access structure is satisfied. The paper evaluates also the performance of the proposed model in terms of time and storage cost.
Źródło:
Journal of Telecommunications and Information Technology; 2022, 2; 75--81
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyfryzacja i digitalizacja w rachunkowości mikro i małych przedsiębiorstw
Autorzy:
Kotowska, Beata
Powiązania:
https://bibliotekanauki.pl/articles/28408276.pdf
Data publikacji:
2022
Wydawca:
Sopocka Akademia Nauk Stosowanych
Tematy:
cloud computing
cyfryzacja
małe przedsiębiorstwo
mikroprzedsiębiorstwo
rachunkowość
Opis:
Cel: Głównym celem artykułu jest dokonanie przeglądu literaturowego dotyczącego cyfryzacji i digitalizacji w mikro i małych przedsiębiorstwach. Pytanie badawcze: czy mikro i małe podmioty wykorzystują cyfryzację w systemie rachunkowości. Metodologia: Dokonano systematycznego przeglądu literatury oraz aktów prawnych dotyczących procesów cyfryzacji i digitalizacji. Wnioski: Cyfryzacja oraz digitalizacja stała się nieodłącznym elementem rachunkowości. Wpływ na to miało kilka czynników: powszechny dostęp do Internetu i rozwój technologii, regulacje prawne, a także pandemia Covid-19, która uwydatniła braki i jednocześnie przyczyniła się do przyspieszenia stosowania cyfryzacji. Zalety to: ułatwienie przekazywania i pozyskiwanie informacji, umożliwienie szybkiego tworzenia raportów wewnętrznych, generowania dokumentów księgowych, zestawień i sprawozdań finansowych. Wady: konieczność aktualizacji programów księgowych, ryzyko słabego zabezpieczenia danych wrażliwych czy wysokie koszty. Ujawniona luka badawcza: mikro i małe podmioty w niewystarczającym stopniu wykorzystują cyfryzację w rachunkowości. Implikacje: Wyłoniona luka poznawcza jest inspiracją do podjęcia dalszych badań w zakresie implementacji cyfryzacji w rachunkowości. Oryginalność: Wnioski z dokonanego przeglądu i badań stanowią inspirację do podjęcia pogłębionych badań związanych z procesami cyfryzacji w rachunkowości mikro i małych podmiotów.
Źródło:
Przestrzeń, Ekonomia, Społeczeństwo; 2022, 22/II; 85-116
2299-1263
2353-0987
Pojawia się w:
Przestrzeń, Ekonomia, Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Determination of conditions for loss of bearing capacity of underground ammonia pipelines based on the monitoring data and flexible search algorithms
Autorzy:
Mysiuk, R.V.
Yuzevych, V.M.
Yasinskyi, M.F.
Kniaz, S.V.
Duriagina, Z.A.
Kulyk, V.V.
Powiązania:
https://bibliotekanauki.pl/articles/24200550.pdf
Data publikacji:
2022
Wydawca:
Stowarzyszenie Komputerowej Nauki o Materiałach i Inżynierii Powierzchni w Gliwicach
Tematy:
underground ammonia pipeline
pump station
thermal background
corrosion current
data processing
cloud computing
podziemny rurociąg amoniaku
stacja pomp
tło termiczne
prąd korozyjny
przetwarzanie danych
chmura obliczeniowa
Opis:
Purpose: The study aims to diagnose the corrosion current density in the coating defect on the outer surface of the ammonia pipe depending on the distance to the pumping station, taking into account the interaction of media at the soil-steel interface and using modern graphical data visualization technologies and approaches to model such a system. Design/methodology/approach: The use of an automated system for monitoring defects in underground metallic components of structures, in particular in ammonia pipelines, is proposed. The use of the information processing approach opens additional opportunities in solving the problem of defect detection. Temperature and pressure indicators in the pipeline play an important role because these parameters must be taken into account in the ammonia pipeline for safe transportation. The analysis of diagnostic signs on the outer surface of the underground metallic ammonia pipeline is carried out taking into account temperature changes and corrosion currents. The parameters and relations of the mathematical model for the description of the influence of thermal processes and mechanical loading in the vicinity of pumping stations on the corresponding corrosion currents in the metal of the ammonia pipeline are offered. Findings: The paper evaluates the corrosion current density in the coating defect on the metal surface depending on the distance to the pumping station and the relationship between the corrosion current density and the characteristics of the temperature field at a distance L = 0…20 km from the pumping station. The relative density of corrosion current is also compared with the energy characteristics of the surface layers at a distance L = 0…20 km from the pumping station. An information system using cloud technologies for data processing and visualization has been developed, which simplifies the process of data analysis regarding corrosion currents on the metal surface of an ammonia pipeline. Research limitations/implications: The study was conducted for the section from the pumping station to the pipeline directly on a relatively small data set. Practical implications: The use of client-server architecture has become very popular, thanks to which monitoring can be carried out in any corner of the planet, using Internet data transmission protocols. At the same time, cloud technologies allow you to deploy such software on remote physical computers. The use of the Amazon Web Service cloud environment as a common tool for working with data and the ability to use ready-made extensions is proposed. Also, this cloud technology simplifies the procedure of public and secure access to the collected information for further analysis. Originality/value: Use of cloud environments and databases to monitor ammonia pipeline defects for correct resource assessment.
Źródło:
Archives of Materials Science and Engineering; 2022, 115, 1; 13--20
1897-2764
Pojawia się w:
Archives of Materials Science and Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integration of Remote Sensing Data in a Cloud Computing Environment
Autorzy:
Sabri, Yassine
Bahja, Fadoua
Pet, Henk
Powiązania:
https://bibliotekanauki.pl/articles/2055265.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
remote sensing
data integration
cloud computing
big data
Opis:
With the rapid development of remote sensing technology, our ability to obtain remote sensing data has been improved to an unprecedented level. We have entered an era of big data. Remote sensing data clear showing the characteristics of Big Data such as hyper spectral, high spatial resolution, and high time resolution, thus, resulting in a significant increase in the volume, variety, velocity and veracity of data. This paper proposes a feature supporting, salable, and efficient data cube for time-series analysis application, and used the spatial feature data and remote sensing data for comparative study of the water cover and vegetation change. In this system, the feature data cube building and distributed executor engine are critical in supporting large spatiotemporal RS data analysis with spatial features. The feature translation ensures that the geographic object can be combined with satellite data to build a feature data cube for analysis. Constructing a distributed executed engine based on dask ensures the efficient analysis of large-scale RS data. This work could provide a convenient and efficient multidimensional data services for many remote sensing applications.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 1; 167--172
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies