The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a user-authentication scheme that is designed to ensure privacy and security of health-information exchange in cloud computing is proposed. The proposed system will allow health care centers and doctors to securely and efficiently monitor patients' health at their homes using secure integration of medical devices and healthcare systems such as: body sensor networks, wearable devices,...
This paper proposes a novel cloud-based battery condition monitoring platform for large-scale lithium-ion (Li-ion) battery systems. The proposed platform utilizes Internet-of-Things (IoT) devices and cloud components. The IoT components including data acquisition and wireless communication components are implemented in battery modules, which allows a module to communicate with others and cloud. The...
Today, people use the internet extensively to meet their information needs, to socialize, to communicate, to handle formal and informal processes. The web-based information networks established for this purpose are growing day by day and reach a larger audience. Facebook, the world's largest social network, has reached 2 billion users. There are social information networks established for different...
This paper proposes a pseudo-dolly-in video generation method that reproduces motion parallax by applying image reconstruction processing to multi-view videos. Since dolly-in video is taken by moving a camera forward to reproduce motion parallax, we can present a sense of immersion. However, at a sporting event in a large-scale space, moving a camera is difficult. Our research generates dolly-in video...
At the beginning, this paper describes basic overview of Cloud Computing (CC) and its usage among companies. Second part describes how is Cloud Computing being taught on another schools and companies around the world. Next, there is description of our physical and logical topology, used during experiments. In the next part, there are descriptions of experiments we made during semester while teaching...
For a long time, the sensitivity and criticality of data storage, processing, and transmission have hindered the wide utilization of IT and networks in the health care systems. Recently, the high availability, reachability, reliability, efficiency, usability and automation provided by the different cloud computing models paved the way to integrate the e-health systems with these cloud services to...
Some companies are willing to execute their business processes (BP) in the cloud for enjoying its benefits. However, they are also reluctant because of the new security risks that using cloud resources introduces. Security risk includes many dimensions, but this work focus on preserving the privacy of the logic of a BP deployed in a multi-cloud context by preventing a coalition of malicious clouds...
In this paper we present a new, very large, rich, Comprehensive Scholarly Corpus (CompScholarCorp) as a platform and data source for future research. Our corpus contains records of 1,044,454 papers, 472,365 unique authors, and substantial publication meta-data for each record. We have integrated the data we collected from 276 publishers using a uniform and consistent XML data format within the corpus...
The Cloud computing paradigm is built on the concept of virtualization, allowing multiple virtual machines to cohabit on one physical device to enable the scaling up and down of applications through elastic on-demand provisioning. More recently containers e.g. Docker, have been shown to enable a more lightweight mechanism than hypervisors and proved to be a viable alternative for virtualization, based...
Existence of several application specific network technologies like Sensor Networks, Cloud, Personal Area Networks (WPANs), Vehicular Networks (VANETs), Content Delivery Networks and Wifi operating oblivious to each other in the same ISM band creates numerous problems like contention for the same bandwidth leading to excessive collisions and hence lower throughput. This calls for a hybrid mesh framework...
We present sec-cs, a hash-table-like data structure for contents on untrusted storage that is provably secure and storage-efficient. We achieve authenticity and confidentiality with zero storage overhead using deterministic authenticated encryption. State-of-the-art data deduplication approaches prevent redundant storage of shared parts of different contents irrespective of whether relationships between...
The importance of frequent backups is uncontroversial. Their creation is simpler than ever today thanks to widespread availability of cheap cloud storage. Common backup solutions, however, tend to be either insecure, inflexible or inefficient in typical backup scenarios.,,,,In this paper, we present triviback, a lightweight and almost trivial, yet powerful solution for outsourcing backups to untrusted...
Traditionally, enterprise application integration (EAI) processes structured data. Recent trends such as social and multimedia computing led to an increase in unstructured multimedia data like images and video streams that have to be processed by EAI. This poses challenges to EAI with respect to variety, velocity, and volume of the processed data. Furthermore, multimedia data has more semantic qualities...
The fourth industrial revolution is driven by the integration and analysis of a vast amount of diverse data. Thereby, data about production steps, overall manufacturing processes, and also supporting processes is gathered to enable holistic analysis approaches. These approaches promise to provide new insights and knowledge by revealing cost saving possibilities and also automated adjustments of production...
Digitization fosters the development of IT environments with many rather small structures, like Internet of Things (IoT), Microservices, or mobility systems. They are needed to support flexible and agile digitized products and services. The goal is to create service-oriented enterprise architectures (EA) that are self-optimizing and resilient. The present research paper investigates methods for decision-making...
Since its foundation in 2009, the SoEA4EE workshop complements well-established topics of the EDOC conferences such as service-oriented architectures and enterprise service architectures by addressing the coupling of business processes and services and the alignment of business and it. The SoEA4EE workshop also shows relationships to topics of the EDOC such as Business Process Management, Enterprise...
Data sizes that cannot be processed by conventional data storage and analysis systems are named as Big Data. It also refers to new technologies developed to store, process and analyze large amounts of data. Automatic information retrieval about the contents of a large number of documents produced by different sources, identifying research fields and topics, extraction of the document abstracts, or...
Big data processing is progressively becoming essential for everyone to extract the meaningful information from their large volume of data irrespective of types of users and their application areas. Big data processing is a broad term and includes several operations such as the storage, cleaning, organization, modelling, analysis and presentation of data at a scale and efficiency. For ordinary users,...
SysML is a prominent standard serving model-based system design for systems-of-systems (SoS). It facilitates the description of complex system design, as a hierarchy of interacting system components, while at the same time enables the independent description of each component behaviour. However, in order for the system designer to decide whether a SoS architecture is efficient, non-functional properties,...
In order to improve the quality of teaching of Japanese intensive reading courses, improve the quality of higher education, improve the quality of personnel training, and improve the level of scientific research, strengthen the social service ability, optimize the Japanese intensive reading courses in discipline. Put forward the curriculum design of Web network based on the teaching of Japanese intensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.