The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By investigating the current situation of university library's digital and informational development, this paper analyzes the opportunities and challenges brought by cloud computing technology to the development of libraries. Two strategies of renting cloud services and building cloud platform are put forward to realize the cloud computing service of Digital Library in big data environment.
Home Automation Systems have been continuously evolving in the past few years: some of the systems are focusing their attention on providing remote access and control of the system, while others are more focused on the interconnectivity of the devices and on integrating them into greater systems, like smart cities. In this paper we propose a hierarchical architecture for Home Automation Systems, which...
In accordance with the resent advancement in Internet of Things (IoT), the needs for IoT experiment platform have been ever increasing. IoT system consists of various technologies such as networking, sensor controller, edge-side computing, server-side big data collections, analysis and their visualizations. An experimental environment that can handle the development and experiments of such an IoT...
Cloud computing and Internet of Things (IoT) are computing technologies that provide services to consumers and businesses, allowing organizations to become more agile and flexible. The potential business values that cloud consumers can achieve depend a lot on the quality of service in the provided cloud services. Therefore, ensuring the quality of service through service-level agreements (SLA) for...
A Vehicular Cloud is defined as a set of vehicles that share their computation resources in a cloud. These resources are scheduled on demand based on cooperation between vehicles and the roadside. The biggest challenge in this type of cloud is to create a structure that will manage the service and resource when the cloud does not depend on the roadside infrastructure. Thus, the vehicles need to collaborate...
Synthetic Aperture Radar(SAR) has been widely used in airborne remote sensing and satellite ocean observation fields to reduce the affect of weather condition and sun illumination. As technology developed, swath and resolution requirements are increased in terrain, which arouse a huge increase in the number of simulated points and simulated pulses and lead to a huge increase in simulated time. With...
The goal of the DiDiER project is to verifiably improve services in the field of dietary counselling. This will be achieved by digitising information to increase counselling intensity and to improve workflows for the service provider. The project will develop an IT-based support system for dietary counselling, covering two use cases, facilitation and support of the work of nutritionists in ambulatory...
Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and anywhere by endowing ubiquitous radio access networks with computing capabilities. Although offloading computations to the cloud can reduce energy consumption at the MDs, it may also incur a larger execution delay. Usually the MDs have to pay cloud...
Nowadays, Edge computing allows to push the application intelligence at the boundaries of a network in order to get high-performance processing closer to both data sources and end-users. In this scenario, the Horizon 2020 BEACON project - enabling federated Cloud-networking - can be used to setup Fog computing environments were applications can be deployed in order to instantiate Edge computing applications...
Data outsourcing has become quite popular in recent years. While the rapid development of cloud storage service, it brings about many new security challenges. One of the biggest concerns with cloud data storage is that of data integrity at untrusted cloud servers. For example, when individual users store important data files in cloud servers, the data files may be damaged or corrupted because of cloud...
Patients' data security and privacy is fundamental in the perspective of moving clinical data over the Cloud. Indeed, this concern has slowed down the adoption of Cloud services in the healthcare context. In fact, clinical operators are reluctant to open Hospital Information Systems (HIS) to external Cloud services. In this paper, we discuss system developed at the IRCCS “Bonino Pulejo” clinical and...
Combining data analytics with homomorphic encryption is an interesting topic, which finds several applications in the healthcare domain because it enables clients with low computational and/or storage capacity to outsource the analysis of potentially large datasets to the cloud while protecting sensitive data from unwanted access. In this work, we propose a framework for evaluating k-means clustering...
This paper contains an original classification of the 5G wholesale services and a novel proposal for the respective pricing schemes for these services. Motivated by the envisioned 5G customer services, this paper introduces the services that need to be offered, orchestrated and traded among infrastructure and service providers, so that end-to-end 5G services can be efficiently orchestrated and provisioned...
Cloud storage is a service provided by cloud service provider (CSP). More and more individuals and organizations accept the scheme and outsource their data to CSP seeking to reduce local storage burden. Since the outsourced files are no longer under the data owners' direct control and CSP is not trustworthy, it is necessary for data owners to check the integrity of their files outsourced to CSP. To...
Recently, the interactive learning environment has received more and more attention. In this paper, we introduce a cloud-terminal integration learning platform, which is developed by our group, and design a blended learning mode, which enables the platform to be used by the blended learning. Finally, we verify the effect of the platform using the course "Digital teaching system development".
Performance evaluation of cloud infrastructures and cloud-based applications is required to evaluate and quantify the cost-benefit of a strategy portfolio and the quality of service (QoS) experienced by end-users. For this purpose, we introduce an analytical framework to percentile-based performance analysis of unreliable Infrastructure-as-a-Service clouds with faulty and retrial tasks. The performance...
Cloud Computing is emerging amongst all the ascending technologies as the most prodigious process in the chronicles of computing. As it still takes some time to settle, a new challenge as felt whilst its implementation across has been a relatively more gratuitously new. Today as Cloud technology is increasingly expanding across the globe for its resulting benefits but still it needs time to offer...
With the rapid development of cloud computing, thousands of servers and various cloud applications are involved in data center. These changes result in more and more complex flows in data center, which motivates the need for faster, lower overhead, more scalable large flow detection technology. This paper firstly shows the shortcomings of the traditional large flow detection technologies. Then it...
When employed in educational settings, cloud computing applications enable users to create, store, organize, and share divergent artefacts with their peers. As an outcome, they have a large number of users worldwide which makes them vulnerable to a variety of security and privacy related threats. With an aim to examine the extent of the perceived security and privacy in the context of cloud computing...
Internet of Things (IoT) can support numerous applications and services in various domains, such as smart cities and smart homes. IoT smart objects interact with other components e.g., proxies, mobile devices, and data collectors, for management, data sharing and other activities in the context of the provided service. Though such components contribute to address various societal challenges and provide...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.