The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the concepts of cloud computing springing up, the researches of data mining clustering algorithm which is based on cloud computing become a research focus for scholars both at home and abroad. This article aiming at the extensive data clustering problem, using cloud computing technology, according to Hadoop platform does a deep research based on cloud computing platforms Hadoop and parallel K-means...
The purpose of this study is to develop an available cloud cooperative learning style scale for understanding students¡¦ style while using cloud cooperative learning. This study applies convenience sampling, and the case class is the class in first grade of a particular two-year Junior College of Institute of Technology (relatively as the university freshman) that includes 6 students as an object...
Cloud computing, the brand new concept has attracted widespread concern of the IT industry, especially the e-commerce enterprises. Currently in the process of applying e-commerce, the enterprises are facing a problem of immense cost of constructing IT environment, while the appearances of the cloud computing may help solve it. This paper, in research into the status quo of Chinese e-commerce, has...
Cloud computing is a hot topic in the field of information technology, and is widely used in every industry. With the introduction of the connotation and the features of cloud computing, combined with the problems in digital library's development, this article discusses the application future of cloud computing in digital libraries, and analyzes the advantages of building the digital libraries on...
Software as a Service (SaaS) has the potential to transform the way information-technology (IT) departments relate to and even think about their role as providers of computing services to the rest of the enterprise. The emergence of SaaS as an effective software-delivery mechanism creates an opportunity for IT departments to change their focus from deploying and supporting applications to managing...
Software testing is an important part of software engineering and it's very important to enhance software quality. In the cloud computing environment, it is an unchangeable trend that the traditional software testing turns to "cloud testing". The article discusses the advantages, processes and procedures of software testing and cloud computing. Based on those procedures discussed, the intersection...
Cloud computing is of particularly population these days, it is changing the way of delivering and consuming IT resources of kinds. Private cloud computing is more appealing and acceptable than public cloud computing at this stage since there is no security issue which is intensively concerned by all serious users. But on the one hand, currently widely used open source virtualized environment managers...
This paper puts forward the design method of network chat system based on Socket and cloud computing technology. Socket interface is an application programming interface of TCP/IP network, this interface definition of a number of functions or routine, programmers can use them to the development of TCP / IP network applications. Java Socket is tailored for the Java language by SUN which is used to...
Cloud computing is a dynamic coordination system composed of multiple services, in such dynamic and uncertain environment, dynamic trust model has become a hot research. The research methods are reviewed on the concept of trust and dynamic trust, and the dynamic trust management model based on ontology. Comment and comparative analysis are conducted on typical PTM and TMV dynamic trust models. Problems...
Ateniese et al proposed an efficient Provable Data Possession scheme which uses only hash and symmetric-key cryptographic functions, but it cannot support block insertion. To achieve full data dynamics, a SN-BN table which maps the logical indices of blocks to their physical ones is introduced. The SN (Serial Number) is used to determine which blocks are included in tags, while the corresponding BN...
Cloud computing brings about not only the improvement of resources utilization efficiency and conveniences, but also great challenges in the field of data security and privacy protection. One major challenge is to verify data integrity at untrusted server under the condition of supporting public audit ability and dynamic data operation. This paper analyzes the efficiency issues and security loophole...
The emerging cloud computing is developing into a new enable technology for service integration, making essential conditions for the appearance of public clouds, which integrate external services and provide services to third-party users. In contrary with traditional application integration, the service integrated in public clouds has to deal with a larger scale user accesses and monitor the execution...
Network management becomes more difficult for the increasing of data transmission speed and the network complexity, the paper presents an intelligence multi-agent for virtual resource model in cloud computing. We illustrate that it's process and discuss the mechanism of each agent. The proposed model is able to analyze social media service resources in real time by user context and system state and...
With the rapid update of internet hardware and software, especially the rise of mobile internet and cloud computing platforms, web-based sites has become the world's largest source of information, and so how to extract the accurate domain-specific knowledge, how to improve the extraction efficiency and how to save the cost during information harvest have become the hot research spot. With the advantage...
In order to extract valuable knowledge from massive intelligent power consumption data to support decision-making, an intelligent power consumption business intelligence system architecture based on cloud computing technology is proposed in the paper. First, the design principle and architecture of the system are introduced. And then the key techniques and algorithms to mine knowledge from massive...
In this paper, a novel P2P network model for cloud computing is proposed to prevent the "calculation capacity" from being controlled by a few tycoons. The common users can become a part of "cloud" by joining as nodes. To solve "free-ride" and "the tragedy of commons" arising from p2p network model, "cloud" is divided into many clusters, and the incentive...
Distance education is a field of education that focuses on teaching methods and technology with the aim of delivering teaching. At present, distance education has been developing rapidly in China, however, there are some common problems in distance education informatization, including sharing difficulty, weak system expansion capacity, lack of real interaction, hard to real time communication, etc...
Cloud computing is a new computing paradigm based on the Internet and its development brings new challenges to computer forensics. Focusing on the features of computer forensics, the sources of electronic evidence, the workflow of computer forensic in this environment, this paper introduces the definition of cloud computing and analyzes the security risks under the cloud computing environment.
With the continuous advance of the smart grid, power enterprises accumulated massive data. In order to avoid the appearance of the data grave, data mining algorithms are used to do mining for massive data. However, if traditional mining algorithms are used to handle massive data, their processing performance encounters a bottleneck. The k-means algorithm based on cloud computing is implemented in...
For the data-intensive scientific workflows, large mount of data need to be stored and often been distributed into several data centers. So the data movements between different data centers become inevitable when the application executed. The more time the data movements, the less efficiency of the data-intensive application. This paper proposed a data placement method based on Bayesian network for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.