A Cloud-Based Environment for Collaborative Resources Management

2014 ◽  
Vol 4 (4) ◽  
pp. 7-31 ◽  
Author(s):  
Anna Goy ◽  
Giovanna Petrone ◽  
Marino Segnan

The interaction between users and digital devices has deeply changed in the last decades. In particular, the so called desktop metaphor relied on assumptions which have been modified by the rise of new paradigms, such as Web 2.0 and Cloud Computing. This paper discusses the limits of the desktop metaphor and proposes a new interaction model, TablePlusPlus (T++), aimed at providing Web and Cloud users with interaction mechanisms fulfilling their needs, i.e., the possibility of handling activity contexts, collaborating with other users, and homogeneously managing heterogeneous objects. T++ tables provide a context-based environment which enables a homogeneous treatment of heterogeneous content items, enhanced by a table-level annotation mechanism supporting an abstract view over resources, which is missing in standard current desktop and collaborative environments. In order to evaluate the effectiveness of the proposed model, this work developed a prototype and tested it in two controlled experiments, whose results are definitely encouraging.

2013 ◽  
Vol 3 (4) ◽  
pp. 51-80 ◽  
Author(s):  
Yehia Helmy ◽  
Mona Nasr ◽  
Shimaa Ouf

Research community has believed that an e-learning ecosystem is the next generation of e-learning but has faced challenges in optimizing resource allocations, dealing with dynamic demands on getting information and knowledge anywhere and anytime, handling rapid storage growth requirements, cost controlling and greater flexibility. So, flourish, growing, scalable, available, up to date and strong infrastructure e-learning ecosystems in a productive and cost effective way will be needed to face challenges and rapidly changing in learning environment. This paper work focused on an e-learning ecosystem (ELES) which supports new technologies is introduced and implemented. An integration between cloud computing and Web 2.0 technologies and services used to support the development of e-learning ecosystems. Cloud computing an adaptable technology for many of the universities with its dynamic scalability and usage of virtualized resources as a service through the Internet and Web 2.0 brings new instruments help building dynamic e-learning ecosystem on the web.


2021 ◽  
Vol 889 (1) ◽  
pp. 012028
Author(s):  
A.P Vaneet Kumar ◽  
Balkrishan Jindal

Abstract Internet of Things (IoT) is a leading concept that envisions everyday objects around us as a part of internet. In order to accomplish this attribution, cloud computing provides a pathway to deliver all the promises with IoT enabled devices. The outbreak of COVID-19 coronavirus, namely SARS-CoV-2, acts as feather to the cap for the growth of Cloud users. With the increasing traffic of applications on cloud computing infrastructure and the explosion in data center sizes, QoS along with energy efficiency to protect environment, reducing CO2 emissions is need of the hour. This strategy is typically achieved using Three Layer upper Threshold (TLTHR) policy to analyze and perform VM consolidation. The proposed model controls number of migrations by placement of virtual machines, based on VMs and their utilization capacity on host. The efficacy of the proposed technique is exhibited by comparing it with other baseline algorithms using computer based simulation. Hence better QoS and energy efficiency has been obtained than other classical models.


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


10.31355/33 ◽  
2018 ◽  
Vol 2 ◽  
pp. 105-120
Author(s):  
Hamed Motaghi ◽  
Saeed Nosratabadi ◽  
Thabit Qasem Atobishi

NOTE: THIS ARTICLE WAS PUBLISHED WITH THE INFORMING SCIENCE INSTITUTE. Aim/Purpose................................................................................................................................................................................................. The main objective of the current study is to develop a business model for service providers of cloud computing which is designed based on circular economy principles and can ensure the sustainable consumption. Background Even though the demand for cloud computing technology is increasing day by day in all over the world, the current the linear economy principles are incapable to ensure society development needs. To consider the benefit of the society and the vendors at the same time, the principles of circular economy can address this issue. Methodology................................................................................................................................................................................................. An extensive literature review on consumption, sustainable consumption, circular economic, business model, and cloud computing were conducted. the proposed model of Osterwalder, Pigneur and Tucci (2005) is admitted designing the circular business model. Contribution................................................................................................................................................................................................. The proposed model of the study is the contribution of this study where provides the guidelines for the cloud computing service providers to achieve both their economic profits and the society’ needs. Findings Finding reveals that if the cloud computing service providers design their business model based on the “access” principle of circular economy, they can meet their economic profits and the society’ needs at a same time. Recommendations for Practitioners.............................................................................................................................................................. It is recommended to the startup and the existing businesses to utilize the proposed model of this study to reach a sustainable development. Recommendation for Researchers................................................................................................................................................................ It proposes a new circular business model and its linkages with community building. Impact on Society............................................................................................................................................................................................ The proposed model of the study provides guidelines to the cloud computing service providers to design a business model which is able not only to meet their economic profit, but also to meet the society’s and customers’ benefits. Future Research............................................................................................................................................................................................... Future researches can build on this research model which proposed in this study to examine the limitations of this model by using empirical researches.


Author(s):  
Junshu Wang ◽  
Guoming Zhang ◽  
Wei Wang ◽  
Ka Zhang ◽  
Yehua Sheng

AbstractWith the rapid development of hospital informatization and Internet medical service in recent years, most hospitals have launched online hospital appointment registration systems to remove patient queues and improve the efficiency of medical services. However, most of the patients lack professional medical knowledge and have no idea of how to choose department when registering. To instruct the patients to seek medical care and register effectively, we proposed CIDRS, an intelligent self-diagnosis and department recommendation framework based on Chinese medical Bidirectional Encoder Representations from Transformers (BERT) in the cloud computing environment. We also established a Chinese BERT model (CHMBERT) trained on a large-scale Chinese medical text corpus. This model was used to optimize self-diagnosis and department recommendation tasks. To solve the limited computing power of terminals, we deployed the proposed framework in a cloud computing environment based on container and micro-service technologies. Real-world medical datasets from hospitals were used in the experiments, and results showed that the proposed model was superior to the traditional deep learning models and other pre-trained language models in terms of performance.


Author(s):  
Fakhreddine Landolsi ◽  
Fathi H. Ghorbel ◽  
James B. Dabney

AFM-based nanomanipulation is very challenging because of the complex mechanics in tip-sample interactions and the limitations in AFM visual sensing capabilities. In the present paper, we investigate the modeling of AFM-based nanomanipulation emphasizing the effects of the relevant interactions at the nanoscale. The major contribution of the present work is the use of a combined DMT-JKR interaction model in order to describe the complete collision process between the AFM tip and the sample. The coupling between the interactions and the friction at the nanoscale is emphasized. The efficacy of the proposed model to reproduce experimental data is demonstrated via numerical simulations.


2017 ◽  
Vol 1 (1) ◽  
pp. 61-73 ◽  
Author(s):  
Yongqiang Sun ◽  
Dina Liu ◽  
Nan Wang

Abstract Although user information disclosure behavior in the context of social network service(SNS) has been well studied in previous literature, there is a lack of understanding about user information withholding behavior. To fill this research gap, the present study assumes that there might be a three-way interaction among information sensitivity, prevention focus, and interdependent self-construal regarding information withholding. The proposed model is empirically tested through an online survey of 479 users in the context of WeChat, one of the most popular SNSs in China. The results of hierarchical regression analysis verify the three-way interaction that prevention focus positively moderates the relationship between information sensitivity and information withholding, and interdependent self-construal strengthens the moderating effect of prevention focus. Findings in light of theoretical and practical implications as well as limitations of the study are discussed.


Internet of things (IoT) is an emerging concept which aims to connect billions of devices with each other anytime regardless of their location. Sadly, these IoT devices do not have enough computing resources to process huge amount of data. Therefore, Cloud computing is relied on to provide these resources. However, cloud computing based architecture fails in applications that demand very low and predictable latency, therefore the need for fog computing which is a new paradigm that is regarded as an extension of cloud computing to provide services between end users and the cloud user. Unfortunately, Fog-IoT is confronted with various security and privacy risks and prone to several cyberattacks which is a serious challenge. The purpose of this work is to present security and privacy threats towards Fog-IoT platform and discuss the security and privacy requirements in fog computing. We then proceed to propose an Intrusion Detection System (IDS) model using Standard Deep Neural Network's Back Propagation algorithm (BPDNN) to mitigate intrusions that attack Fog-IoT platform. The experimental Dataset for the proposed model is obtained from the Canadian Institute for Cybersecurity 2017 Dataset. Each instance of the attack in the dataset is separated into separate files, which are DoS (Denial of Service), DDoS (Distributed Denial of Service), Web Attack, Brute Force FTP, Brute Force SSH, Heartbleed, Infiltration and Botnet (Bot Network) Attack. The proposed model is trained using a 3-layer BP-DNN


2014 ◽  
Vol 513-517 ◽  
pp. 1425-1430
Author(s):  
Xiu Zhen Feng ◽  
Peng Hao

Cloud computing technology created a brand new approach for further information resources management and utilization. Based on exploring characteristics and applications of cloud computing technology, the study in this paper is focused on cloud service with information resources. The aim of this study is to construct a cloud service model, namely Information Resource as a Service (IRaaS). Our model depicts the components of IRaaS and relationships among those components, which builds up a prime foundation for further studying on both information resource management and service.


Sign in / Sign up

Export Citation Format

Share Document