The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Undoubtedly, Cloud computing is the ongoing trend that robbed the widespread concern. In fact, it succeeded in discharging users from computational and storage burden to offer them as services following pay-as-you-go principle. The substantial feature of Cloud is the ability to scale up with the rise of users' demands. However, Cloud performance falls into the duty of scaling up to fulfill the user...
In seeking solutions to the engagement of STEM learners, the research community has offered approaches on both the learning technology and STEM pedagogy fronts. These approaches are predominantly being developed in parallel with negligible empirical studies as to the integration of applied learning theory and delivery technology. To compound this challenge there exists the critical component of developing...
Despite the advancement of cloud storage and the benefits it brings to computer users, it cannot be denied that cloud storage is still subject to misuse by malicious users and cyber criminals. This includes the cases where criminals use cloud storage for storing and exchanging illegal material and for committing botnet attacks. In addition, the increase in the number of cybercrimes against cloud services...
High volumes of a wide variety of valuable data can be easily collected and generated from a broad range of data sources of different veracities at a high velocity. In the current era of big data, many traditional data management and analytic approaches may not be suitable for handling the big data due to their well-known 5V's characteristics. Over the past few years, several systems and applications...
The number of small-and mid-cap companies increases in recent decades due to the change on technologies. A considerable number of information systems are thus built for efficient production and management. As a result, a large number of operations and data are generated. The internal IT unit must have the ability to process the large amount of data, provide different services for each kinds of users,...
At present, the cost of High Performance Computing (HPC) system is very high and recently cloud has been popular for its operation on HPC. In this study, we investigated the price efficiency that will benefit the customer in choosing provider's package. We analyzed relation between prices, times and problem sizes (N) or workloads from High Performance Linpack on Amazon EC2 in Compute Optimize package...
In recent years, web services have become an indispensable part of our life. By use of personal computers, smart phones and wearable smart devices, people can enjoy the convenience brought by these web services and use them to not only enrich our daily life but also solve life issues. Thus, to more appropriately realize the performance of a web service, it is necessary to perform an overall and credible...
A MapReduce system gradually becomes a popular platform for developing cloud applications while MapReduce is the de facto standard programming model of the applications. However, a MapReduce system may suffer intermediate data skew to degrade performances because input data is unpredictable and the Map function of the application may generate different quantities of intermediate data according to...
In modern world, due to enormous demand for the cloud storage there are high chances of data duplication. Hence, redundancy create problem by increasing storage space and so storage cost. Inline Deduplication used to check duplicity before uploading data. Sometimes while restoring data failures or corrupting data can heavily create problem for users. Erasure coding can be used to encoding and storing...
User profiles are important in many areas in which it is essential to obtain knowledge about users of software applications. Knowledge about a user includes his likes, dislikes, even his emotional state can be determined by user profiling. In this paper we examine what information constitutes a user profile; and how the profile information is used to get the emotional state of a user. We also study...
In cloud computing, it is important to have instant access of resources such as CPU, storage and data. Key management techniques are used to protect the access of resources. In recent years, there is an increase use of threshold cryptography in Cloud computing. In threshold cryptography (k,n), k shares out of n can be used to form the key. Key share management is important in threshold cryptography...
Every day we entrust our privacy, safety, and security to police officers sworn to protect and serve. While many critical infrastructure computer systems have been well studied, the computer infrastructure supporting these officers remains to be surveyed in public literature. We remedy this by characterizing a sample police department's systems through a security lens, discussing weak points and areas...
The stochastic nature of the cloud systems makes cloud quality of service (QoS) performance diagnosis and prediction a challenging task. A plethora of factors including virtual machine types, data centre regions, CPU types, time-of-the-day, and day-of-the-week contribute to the variability of the cloud QoS. The state-of-the-art methods for cloud performance diagnosis do not capture and model complex...
Modern cloud computing systems have been using multiple processing units on servers to increase their processing capability. Recently, applications with multiple parallelization options have been witnessed, and serve as a promising model for efficiently utilizing the processing capacity of the system. In this paper, we consider utility-based scheduling for periodic multisegment tasks with multiple...
On a cluster system running behind the Cloud computing, multiple processes are generated from most applications and then executed on multiple computing nodes. Their processes communicate with each other during their execution. The communication performance among multiple processes plays an important role in the total execution performance of an application. The SDN-enhanced JMS, which we have developed...
With virtualization technique, cloud computing is developed rapidly. However, aspects of the collecting of digital proofs for forensics in cloud computing environment, certain guideline is not yet. Therefore, cloud forensic researches in progress for reactivating security incidents in cloud computing. In this paper, we analyze forensic issue, challenges, already proposed forensic model in previous...
Fog computing is a promising paradigm in terms of extending cloud computing to an edge network. In a broad sense, fog computing in Internet-of-Vehicles(IoV) provides low-latency services since fog nodes are closely located with moving cars and are locally distributed. In this paper, we propose a fog computing architecture based on a publish/subscribe model. After that, we describe a traffic congestion...
Saving power becomes one of the main objectives in information technology industry and research. Companies consume a lot of money in the shape of power consuming. Virtual Desktop Infrastructure (VDI) is a new shape of delivering operating systems remotely. Operating systems are executing in a cloud data center. Users desktops and applications can be accessed by using thin client devices. Thin client...
Kiwano is a distributed system that enables an unlimited number of avatars interact in the same virtual space. By separating the management of virtual world components -avatars, moving objects from the static décor- we take a novel approach and introduce a neighborhood relation between avatars. In Kiwano we employ Delaunay triangulations to provide each avatar with a constant number of neighbors independently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.