On the Research of Cloud Service and Library in China

2014 ◽  
Vol 530-531 ◽  
pp. 677-681
Author(s):  
Shui Xu ◽  
Bang Fan Liu ◽  
Wei Fan Zhang

Current domestic study on cloud service and library is still relatively weak and it needs all to be promoted whether from the research system to see or to see the depth of research. On the view of current domestic research, it is mainly reflect in the following three points. First, there have fifty published academic theses. Second, the main focus of research are still focused on the cloud platform and cloud service model. Third, the related research and disciplinary platform are still relatively narrow.

2014 ◽  
Vol 687-691 ◽  
pp. 1704-1707
Author(s):  
Jin Yu Lv

Cloud computing is still in the stage of rapid development. So in this article the origin and concept of cloud computing will be summarized in detail, the character, basic structure of the cloud computing and its application and impact in each field will be analyzed strongly. In the cloud computing environment, the construction and service of digital library has changed greatly. The cloud storage based on digital library,the digital library infrastructure integration and construction based on cloud service, and even the library automation based on cloud computing, all of these need to research deeply in library field in the cloud computing. Besides,the changes of digital library service model based on cloud computing are also the one of the important content. In this article three kinds of service model is proposed:personalized cloud platform service model based on the needs of the users, user active push-service model and sharing cloud platform service model. Structure model is designed respectively, the working process and model of service model is explained, and their application scope is analyzed in this article.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


2014 ◽  
Vol 513-517 ◽  
pp. 1425-1430
Author(s):  
Xiu Zhen Feng ◽  
Peng Hao

Cloud computing technology created a brand new approach for further information resources management and utilization. Based on exploring characteristics and applications of cloud computing technology, the study in this paper is focused on cloud service with information resources. The aim of this study is to construct a cloud service model, namely Information Resource as a Service (IRaaS). Our model depicts the components of IRaaS and relationships among those components, which builds up a prime foundation for further studying on both information resource management and service.


2015 ◽  
pp. 2022-2032
Author(s):  
Bina Ramamurthy

In this chapter, the author examines the various approaches taken by the popular cloud providers Amazon Web Services (AWS), Google App Engine (GAE), and Windows Azure (Azure) to secure the cloud. AWS offers Infrastructure as a Service model, GAE is representative of the Software as a Service, and Azure represents the Platform as a Service model. Irrespective of the model, a cloud provider offers a variety of services from a simple large-scale storage service to a complete infrastructure for supporting the operations of a modern business. The author discusses some of the security aspects that a cloud customer must be aware of in selecting a cloud service provider for their needs. This discussion includes the major threats posed by multi-tenancy in the cloud. Another important aspect to consider in the security context is machine virtualization. Securing these services involves a whole range of measures from access-point protection at the client end to securing virtual co-tenants on the same physical machine hosted by a cloud. In this chapter, the author highlights the major offerings of the three cloud service providers mentioned above. She discusses the details of some important security challenges and solutions and illustrates them using screen shots of representative security configurations.


Author(s):  
Philip Moore ◽  
Fatos Xhafa ◽  
Mak Sharma

Demographic changes are resulting in a rapidly growing elderly population with healthcare implications which importantly include dementia, which is a condition that requires long-term support and care to manage the negative behavioural symptoms. In order to optimise the management of healthcare professionals and provide an enhanced quality of life for patients and carers alike, Remote Electronic Health Monitoring forms a crucial role. This requires myriad functions and components to achieve patient monitoring while accommodating the technological, medical, legal, regulatory, ethical, and privacy considerations. The chapter considers the relevant components and functions of the current state-of-the-art to the provision of effective Remote Electronic Health Monitoring. The authors present the background and related research, and then they focus on the technological aspects of Remote Electronic Health Monitoring to which Cloud-Based Systems and the closely related Cloud Service Modules are central. A number of scenarios to illustrate the concepts are discussed in the chapter.


Author(s):  
Junfeng Tian ◽  
He Zhang

The credibility of cloud service is the key to the success of the application of cloud services. The dual servers of master server and backup server are applied to cloud services, which can improve the availability of cloud services. In the past, the failures between master server and backup server could be detected by heartbeat algorithm. Because of lacking cloud user's evaluation, the authors put forward a credible cloud service model based on behavior Graphs and tripartite decision-making mechanism. By the quantitative of cloud users' behaviors evidences, the construction of behavior Graphs and the judgment of behavior, they select the most credible cloud user. They combine the master server, the backup server and the selected credible cloud user to determine the credibility of cloud service by the tripartite decision-making mechanism. Finally, according to the result of credible judgment, the authors could decide whether it will be switched from the master server to the backup server.


2020 ◽  
pp. 51-57
Author(s):  
V. V. Gribova ◽  
◽  
L. A. Fedorischev ◽  

The paper presents a cloud service for the formation of case records, the feature of which is a formal presentation of all entered patient data. A formal presentation of the case record is necessary for further processing of patient data by intelligent decision support services, as well as for obtaining new knowledge about the diagnosis and treatment of patients based on machine learning methods. The service is implemented on the medical portal of the IACPaaS cloud platform. The basic principles of development, architecture and software interface are presented. The technology of using the service is described.


Sign in / Sign up

Export Citation Format

Share Document