The Application of Cloud Computing Technology in Operating System Teaching Assistant System

2014 ◽  
Vol 651-653 ◽  
pp. 2510-2513 ◽  
Author(s):  
Li Ping Yang ◽  
Da Wei Xu ◽  
Wei Wang

Cloud computing is a model about the increase , usage and delivery of related services in Internet, usually provides dynamically scalable and often virtualized resources by the Internet. This paper first introduces the cloud computing technology, then discusses the system structure, system flow and system function, and finally expounds the cloud computing role and the realization of the examination system .

Author(s):  
Xuedong Zhang ◽  
Shuqin Kang ◽  
Miaole Hou ◽  
Xianglei Liu

With the rapid development of network technology, large enterprises have established their own online learning and examination system respectively. However, as those network examination systems are dispersive, closed and disconnected, so various resources are unable to be utilized in a balanced way, which may cause substantial waste of enterprise resources. To solve such a problem, the emerging cloud computing technology with the characteristics of service on demand and dynamic expansion capability, provides a possibility of a shared network examination system with lower cost, named as cloud exam support service. A feasible solution for the application of the cloud computing technology in the network examination, which combines the theoretical analysis, system design and technical implementation, is put forward in this paper. The design, development, and pilot application of the cloud examination system described in this paper show that this study is highly practical, operable, and worthy of application and popularization.


2014 ◽  
Vol 681 ◽  
pp. 152-159
Author(s):  
En Guo Zhu ◽  
Lei Jiao Ge ◽  
Xiao Qiang Zhong ◽  
Li Jun Dong

Electrical safety is a common goal of electricity customers and power companies. In order to meet the needs of different users for electricity safety, ensure the legitimate rights and interests of the State Grid Corporation and users, promote the service level of State Grid Corporation and improve the life quality of the users, an effective measures is the user electricity safety inspections. Firstly, it introduces the development of cloud computing technology and the advantages of the user electricity safety monitoring system based on cloud computing technology. Secondly, from three aspects of the system structure, function and cloud system, the user electrical safety monitoring system based on cloud computing technology has been elaborated. Lastly, it discusses the development of the lateral user electricity safety monitoring, and provides the reference for the application of user electricity safety inspections.


2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Zhenzhong Zhang ◽  
Wei Sun ◽  
Yanliang Yu

With the vigorous development of the Internet of Things, the Internet, cloud computing, and mobile terminals, edge computing has emerged as a new type of Internet of Things technology, which is one of the important components of the Industrial Internet of Things. In the face of large-scale data processing and calculations, traditional cloud computing is facing tremendous pressure, and the demand for new low-latency computing technologies is imminent. As a supplementary expansion of cloud computing technology, mobile edge computing will sink the computing power from the previous cloud to a network edge node. Through the mutual cooperation between computing nodes, the number of nodes that can be calculated is more, the types are more comprehensive, and the computing range is even greater. Broadly, it makes up for the shortcomings of cloud computing technology. Although edge computing technology has many advantages and has certain research and application results, how to allocate a large number of computing tasks and computing resources to computing nodes and how to schedule computing tasks at edge nodes are still challenges for edge computing. In view of the problems encountered by edge computing technology in resource allocation and task scheduling, this paper designs a dynamic task scheduling strategy for edge computing with delay-aware characteristics, which realizes the reasonable utilization of computing resources and is required for edge computing systems. This paper proposes a resource allocation scheme combined with the simulated annealing algorithm, which minimizes the overall performance loss of the system while keeping the system low delay. Finally, it is verified through experiments that the task scheduling and resource allocation methods proposed in this paper can significantly reduce the response delay of the application.


Author(s):  
Anita Lee-Post ◽  
Ram Pakath

Cloud Computing refers to providing computing and communications-related services with the aid of remotely located, network-based resources without a user of such resources having to own these resources. The network in question typically, though not necessarily, is the Internet. The resources provisioned encompass a range of services including data, software, storage, security, and so on. For example, when we use a mail service such as Gmail, watch a movie on YouTube, shop at Amazon.com, or store files using DropBox, we are using cloud-based resources (The Google Chrome Team, 2010). In this chapter, the authors examine the evolution of Cloud Computing from its early roots in mainframe-based computing to the present day and also explain the different services rendered by Cloud Computing in today’s business and personal computing contexts. This chapter provides a comprehensive view of the rapidly flourishing field of Cloud Computing and sets the stage for more in-depth discussions on its security, trust, and regulatory aspects elsewhere in this compendium.


Author(s):  
John P. MaGuirk

Cloud computing was made necessary by the birth of the smartphone. It created scatted data for users. Initially, smartphones used a different operating system than common computers. A letter or note might exist on your smartphone but could not be shared with your personal computer unless manufactured by the same supplier. A workaround for a single user was to email a copy to himself. The internet being device neutral, Dropbox was the first neutral service to permit document sharing between users and devices regardless of format. This chapter explores cloud basics.


2013 ◽  
Vol 347-350 ◽  
pp. 3343-3346
Author(s):  
Le Hui Huang ◽  
Xiang Qing Zhang

The development of the internet of things has been elevated to the height of the national strategy, and especially causes the public attention of IT circles. But the internet of things is inseparable from its technical platform, especially the support from cloud computing. The paper starts from the system structure of the internet of things, and discusses the architecture and implementation strategies of the internet of things platform.


Jurnal Pari ◽  
2021 ◽  
Vol 6 (2) ◽  
pp. 157
Author(s):  
Eva Mustikasari ◽  
Dani Saepulloh

Riset adalah proses mengumpulkan, menganalisis, dan menerjemahkan informasi atau data secara sistematis untuk menambah pemahaman kita terhadap suatu fenomena tertentu yangmenarik perhatian kita. FORMAL RESEARCH yaitu riset yang ditujukan untuk menambah pemahaman kita terhadap suatu fenomena dan untuk dikomunikasikan kepada komunitas (dipublikasikan) melalui media internet (online) dengan menggunakan teknologi cloud Computing.Menggunakan Cloud Computing harus diperhatikan keamanan data agar pengguna memiliki kepercayaan dalam menggunakannya. Pengembangan cloud computing akan mengarah padaberkembangnya suatu teknologi pengiring cloud computing yaitu suatu bentuk teknologi yang dapat menjamin keamanan data. Selain itu, perkembangan cloud computing ini selanjutnya akanmemasuki tahap integrasi antar berbagai provider dengan mengedepankan prinsip interoperabilitas.Research is the process of collecting, analyzing, and systematically translating information or data to increase our understanding of a particular phenomenon that interests us. FORMAL RESEARCH, which is research aimed at increasing our understanding of a phenomenon and to be communicated to the community (published) via the internet (online) using cloud computing technology. Using Cloud Computing data security must be considered so that users have confidencein using it. The development of cloud computing will lead to the development of a technology that accompanies cloud computing, which is a form of technology that can ensure data security. In addition, the development of cloud computing will then enter the integration stage between various providers by prioritizing the principle of interoperability.


10.28945/3705 ◽  
2017 ◽  
Vol 16 ◽  
pp. 107-125
Author(s):  
Andrew E. Fluck ◽  
Olawale Surajudeen Adebayo ◽  
Shafi'i Muhammad Abdulhamid

Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Wensheng Dai

With the development of science and technology and the improvement of industrialization, the development of more and more industries has interacted to form many industrial clusters. For the healthy development and safety of various industries, environmental quality monitoring and management in industrial clusters is of utmost importance. Currently, domestic and foreign enterprises and related departments are vigorously developing smart environment platforms. The purpose of this paper is to design an intelligent environment platform for industrial clusters based on cloud computing technology. This article first uses the methods of literature research and network investigation to collect relevant literature and research results and organizes statistics on the collected information. Then, through case analysis to study the needs and overview of the construction of smart environment platforms in industrial clusters, it uses the wireless smart sensing technology of the Internet of Things and the information interaction technology of the Internet to provide data to cloud computing through mobile terminals, and cloud computing provides various types on demand data service. Then, according to the demand analysis of the intelligent environment platform, the functional modules and operation procedures of the intelligent environment platform are designed. The main monitoring content is water quality testing, air quality testing, garbage disposal and soil quality testing, etc. Finally, this article processes, analyzes, and predicts the detected sampled data through cloud computing. It can also locate and track abnormal data. Through the curve fitting of the data, the environmental conditions in the area can be predicted. Experiments show that the prediction accuracy rate is as high as 93.8%, which plays an important role in monitoring and preventing environmental pollution.


Sign in / Sign up

Export Citation Format

Share Document