The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud services are gaining popularity with times. Service level agreement (SLA) serves a basic understanding between the clients and cloud service providers (CSP). Ensuring secured and adequate service is a basic need of the customers. In this work a set of compliance parameters for cloud service level agreement is identified. A generic rule base is designed to empower the process with an automated...
Despite the great benefits of cloud computing on businesses, some organizations have had to withdraw from its service due to incomplete compliance to conditions from standards, bodies, or Service Level Agreements which have led to their being penalized. A structured and efficient model is helpful to aid small and medium scale enterprises (SMSEs) utilize cloud services safely and ascertain their fitting...
Following the Service-Oriented Architecture, a large number of diversified Cloud services are exposed as Web APIs (Application Program Interface), which serve as the contracts between the service providers and service consumers. Due to their massive and broad applications, any flaw in the cloud APIs may lead to serious consequences. API testing is thus necessary to ensure the availability, reliability,...
The advances in virtual engineering brought about the creation of models of physical systems. This has been enhanced by the use of relevant standards and web technologies to develop interfaces for monitoring and controlling industrial systems at the shop floor or remotely over the internet. However, owing to the open nature of the internet as well as vulnerabilities associated with internet-based...
Traffic anomalies can create network congestion, so its prompt and accurate detection would allow network operators to make decisions to guarantee the network performance avoiding services to experience any perturbation. In this paper, we focus on origin-destination (OD) traffic anomalies; to efficiently detect those, we study two different anomaly detection methods based on data analytics and combine...
The cumulative sum (CUSUM) control charts are widely used for measurement control of continuous processes. However, the quality characteristics of interest in many production processes, follows a sequence of discrete counts for non-conformities often modeled using a Poisson distribution. This paper introduces new CUSUM control chart design structure to monitor the location of a Poisson parameter....
A methodology to ascertain the impact of disruption downstream of the point of disruption is proposed. Two parameters were defined to quantify the extent of disruption in any node in the Supply Chain (SC), including the end customer. A complex SC network consisting of two sub-nets is discussed as an illustration of the methodology. Two experiments were then conducted: (i) disruptions at a single,...
HPC systems run applications that can take several hours to executeand have to deal with the occurrence of a potentially large numberof faults. Most of the existing fault-tolerance strategies for thesesystems assume crash faults that are permanent events easily detected. This is not the case in several real systems, in particular in shared clusters, in which even the load variation may cause performance...
In this paper was performed a detailed comparison of the propagation models available in the ICS Telecom software, in order to make a proposal for the configuration of the propagation models to the National Spectrum Agency - ANE, an Colombian government office, for different telecommunications services. ANE has the function of monitor, control, manages and plan the radio spectrum in Colombia and the...
We propose a concept drift detection method utilizing statistical change detection in which a drift detection method and the Page-Hinkley test are employed. Our method enables users to annotate clustering results without constructing a model of drift detection for every input. In our experiments using synthetic data, we evaluated our proposed method on the basis of detection delay and false detection,...
Underwater Sensor Networks (USN) constitute a key technology in the study of oceanic resources. For scientists and researchers it is often difficult and costly to extract information from submarine regions. This is true especially for video (or photography) which usually involves expensive exploration expeditions in which divers or robots are submerged with cameras. Video transmissions in USNs would...
Establishing trust in cloud system is a complex and challenging problem. In cloud computing trust establishment has to be both identity and properties based due to its dynamic nature, complexity of infrastructure, automated services, application interdependencies, and diversity of stakeholders. Trust in cloud depends mainly upon two factors. One is the operational trust which deals with the operations...
CAMEL groups existing domain specific languages for applications deployed in Cloud computing environments. Linking common terms between standards CAMEL has been implemented using the Eclipse Modelling Framework as an EMF model. Initial applications of the standard have been done in the High Performance Computing and Enterprise application domains where DSLs have been integrate into CAMEL to enable...
Emotional expression and recognition are important in social interactions between people. This is particularly evident in communications between a teacher and a pupil when facial expressions signal levels of understanding and enjoyment will change the teacher's explanation to a pupil, and effective e-learning systems must adapt in the same way if they are provide the social interactions that are necessary...
Resource usage in Clouds can be improved by deploying applications with richer defined requirements. Such "richer requirements" involve wider application / user specific context capture expressed in interrelated models. The use of model based requirements is presented using input from test-beds monitoring resource use in terms of Trust, Risk, Eco-Efficiency and Cost (TREC) models. The results...
Analytic Hierarchy Process (AHP), which was originally introduced by Professor T. L. Satty, is an effective method to make a quantitative analysis for the non-quantitative analytical case. In recent years, two evaluation models based on AHP have been proposed for indoor air quality (IAQ) by the environmental experts from home and abroad. One is Indoor Assessment by the Analytical Hierarchy (IAAH),...
Presentation of an educational outcomes measure methodology based on results obtained from traditional evaluations (used to qualify students' performance and learning). A successful use of the described methodology is reported, as part of a quality system that controls an academic program.
Cloud computing is a new computing model, and security is ranked first among its challenges. This paper reviews existing security monitoring mechanisms compared with new challenges which are caused by this new model. We highlight possible weaknesses in existing monitoring mechanisms, and propose approaches to mitigate them.
In order to realize the sharing of medical information, coordination of medical, as well as the efficient and cost-effective health information system through the construction of a distributed and high-integrated platform, the medical and health information system infrastructure based on the cloud computing is proposed. And three kinds of application mode, SaaS, PaaS and IaaS, are applied in this...
Building information modelling (BIM) is only a tool in the procurement of a building, but it is changing the way the whole process is undertaken. Having a single model which is used by all disciplines requires a different management structure and by consequence a restructuring of the resources required to complete a project.These changes are encompassed in Integrated Practice and more recently Integrated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.