The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microservices have become a popular pattern for deploying scale-out application logic and are used at companies like Netflix, IBM, and Google. An advantage of using microservices is their loose coupling, which leads to agile and rapid evolution, and continuous re-deployment. However, developers are tasked with managing this evolution and largely do so manually by continuously collecting and evaluating...
The Wireless Sensor Networks (WSNs) are widely being used for monitoring different environments and are very effective for monitoring those areas where human presence can be critical. Meanwhile, Cloud Computing (CC) has emerged as a very large scale computational and storage service with pay-as-you-go usage model which has taken the WSN to entirely a new paradigm. This integration of WSN with CC provides...
Wireless technologies and the growth of popularity of portable devices such as smartphones and tablets have created a variety of opportunities in the modern world. Wireless communications are changing the world because wireless devices are convenient, easy to use and can provide interconnectivity in virtually any place. Each day's people were obese with simplicity of their activities. So, we created...
Continuous evolution of virtualization-related technologies have benefit greatly flexibility and reliability of software system. However, although virtualization removes binding between application and server underneath, it complicates the regular runtime hierarchy into an intricate structure, where cross-layer monitoring and holistic evaluation becomes challenging. Currently lots of monitoring practices...
Internet of Things (IoT) can be perceived as enabling user-specific interoperable communication services by integration of sensing and actuation technologies with other leading technologies, such as telecommunication, networking, security and cloud computing etc. Application of the ubiquitous IoT technologies to augment healthcare systems inadvertently exposes the latter to unpredictable, disruptive...
Today, Internet of Things (IoT) is an emergent concept in which billions of devices are connected to Internet capable of producing and exchanging data. One of the most used technologies in this area regards to the Radio Frequency Identification (RFID). It can produce large amount of data from many things like objects, persons and assets. Thus, it is needed middlewares which must support processing...
This paper proposes a system to monitor, through the internet, the data of a logistics distribution truck. For this, it was implemented a reliable and flexible wireless sensor network with low energy consumption. The technology used for the radio system was Bluetooth Low Energy (BLE). Each node in the network contains one type of sensor. The sensors information together with GPS and On-Board Diagnostics...
Within the frame of the fourth industrial revolution, also known as Industry 4.0, industrial cyber-physical production systems (ICPS) have experienced a significant progress. To this end, Industry 4.0 has brought upon an improved, flexible, and cost-efficient system architecture that can sustain the development of innovative applications and services. Nonetheless, this technological advancement also...
Much of smart phone time is spent in using apps that connect to the Internet. Android, out of the box, does not provide network filtering or monitoring facilities. Security exploits and privacy leaks makes it necessary that we track network usage that could be happening behind our backs. We have built a “network ombudsman” framework service and an app that continuously monitors and logs the network...
Cloud Computing offers on demand services of infrastructure (servers, storage and network), platform (operating systems and databases) and software (applications) over the Internet on pay-as-you-use model. Security is of pre-eminent interest in this new era of computing as many e-commerce and social networking sites move their operations to the Cloud. One of the approaches to protect the Cloud Environment...
Sometimes parents don't have resources or time to attend to their young ones as they have certain predispositions. This document demonstrates the process of construction of a web-service/module, defines the algorithm, procedure of construction of the algorithm and the analysis/results of the procedures performed. The market for this system is the working class nuclear families or single parents that...
The cloud-driven traffic control and road service metric for searching the optimal route on the road infrastructure between two coordinates, which are identified with the point of departure and arrival, is considered. Possible restrictions are related to road collisions, accidents and road repairs, which is taken into account when choosing the best route. The method is implemented in the online cloud...
The smart cloud traffic light sequencer, focused on optimal control of traffic flows at the crossroads, is proposed within the framework of creating cloud traffic control [1]. A logical architecture of the sequencer free of arithmetic operations, intended for generating control signals, depending on the number of cars on intersecting lines. The ways of increasing the traffic capacity of intersections...
An innovative cyber culture and computing of social governance of citizens is proposed, aimed at the moral metric cloud service of social groups through the leverage of digital monitoring and expert evaluation of social processes and phenomena. Cyber culture is defined as the development level of social, technological, moral and material relations between society, the physical world and cyberspace...
This article selects load balancing system technology to analyze, combines the live migration technology of virtual machine, and studys the frame of virtual machine live migration as well as the mathematical model applied to concrete process of the migration. The article presents that the process of combining the specific strategies of load balance to the frame of live migration, that the simulation...
A notion of creating smart cities with integrated high end ICT technologies, including cloud, edge, IoTs, and so forth, has increased recently in order to provide a reasonably high comfort to city residents with limited human intervention. In fact, one of the major challenges faced by city authorities of developing countries is to control air pollution, which might cause chronic diseases and financial...
IoT is a revolutionary technology that represents the future of computing and communications. Most of the people over all worlds depend on agriculture. Because of this reason smart IT technologies are needed to migrate with traditional agriculture methods. Using modern technologies can control the cost, maintenance and monitoring performance. Satellite and aerial imagery play a vital role in modern...
Traffic light congestion normally occurs in urban areas where the number of vehicles is too many on the road. This problem drives the need for innovation and provide efficient solutions regardless this problem. Smart system that will monitor the congestion level at the traffic light will be a new option to replace the old system which is not practical anymore. Implementing internet of thinking (IoT)...
Monitoring of diesel generators is an important part of the management program of electricity utilities as well as telecommunication companies' in-order to have their cellular towers and base transmitter stations up all the time. A reliable remote monitoring method over the on-site method is always desirable so that managing of time and resources can take place as efficiently as possible. This paper...
The pervasive use of Internet of Things and smart meter technologies in smart cities increases the complexity of managing the data, due to their sizes, diversity, and privacy issues. This requires an innovate solution to process and manage the data effectively. This paper presents an elastic private scientific cloud, SciCloud, to tackle these grand challenges. SciCloud provides on-demand computing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.