The Study of iPark Cloud Platform Construction and Application Modes

2014 ◽  
Vol 989-994 ◽  
pp. 4966-4969 ◽  
Author(s):  
Tian Xu ◽  
Zhi Gang Zhang ◽  
Yi Wu ◽  
Qun Pan ◽  
Shu Hai Fan

Based on the background of Wuxi Software Park, building cloud platform system was proposed. The concept of cloud computing and cloud platform functionality was outlined. This paper studied the cloud platform application framework. Discoursing Park Intelligent Property Services cloud platform subsystem, park integrated services cloud platform subsystem and Park enterprise IT services cloud platform subsystem. The system can take advantage of cloud platform mobile terminal to provide application modes for companies, employees, park agencies, Software Park, operators and so on.

2011 ◽  
Vol 109 ◽  
pp. 631-635
Author(s):  
Pu Yu Yuan

The cloud computing technology has been widely discussed and defined in a number of ways. It’s the new and changing business models enabled by the emergence of the different technologies associated with cloud computing that really count. The effective integration of cloud computing idea and telecom operators' advantage on network and operation can bring large market effect. It has been a core focus in current telecom industry. Based on the analysis of cloud computing concept and technology development, this paper proposes the cloud computing application framework for telecom operator, and explain clearly the operator cloud computing development idea and trend with innovative idea, great ability and unified cloud platform. Finally, some typical cloud computing products are given, which may provide a significant reference for rational planning of operator cloud computing application.


2019 ◽  
pp. 1-4
Author(s):  
C. T. Kantharaja

Cloud computing technology has signicant role in academic libraries. Most of the library services are available on cloud platform and library software vendors developed their Library Management Software on cloud platform. It is the right time for library professionals to upgrade their technical skills to provide good services to the library stakeholders. This study shows the library services and facilities available on cloud. It is the right time to migrate to cloud


2015 ◽  
Vol 8 (1) ◽  
pp. 206-210 ◽  
Author(s):  
Yu Junyang ◽  
Hu Zhigang ◽  
Han Yuanyuan

Current consumption of cloud computing has attracted more and more attention of scholars. The research on Hadoop as a cloud platform and its energy consumption has also received considerable attention from scholars. This paper presents a method to measure the energy consumption of jobs that run on Hadoop, and this method is used to measure the effectiveness of the implementation of periodic tasks on the platform of Hadoop. Combining with the current mainstream of energy estimate formula to conduct further analysis, this paper has reached a conclusion as how to reduce energy consumption of Hadoop by adjusting the split size or using appropriate size of workers (servers). Finally, experiments show the effectiveness of these methods as being energy-saving strategies and verify the feasibility of the methods for the measurement of periodic tasks at the same time.


2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


2014 ◽  
Vol 1014 ◽  
pp. 525-529 ◽  
Author(s):  
Jun Zhang ◽  
Yuan Sheng Liu ◽  
Lin Xue

A remote lab room monitoring system based on measuring instrument cloud is presented in this paper. The system consists of cloud computing center, embedded front-end acquisition hardware, mobile terminal device, and network equipment. Measuring service software system located in cloud computing center sends control commands to front-end acquisition hardware and collects acquisition data. Then processing, analysis and integration of signals are completed in the cloud computing framework. Finally, all the information can be interacted with mobile terminals by Web service. The system can monitor environmental parameters of lab rooms located in different campuses, such as temperature, humidity, light, smoke, and flooding. When environmental parameters exceed the preset thresholds, light and audio alarms will be immediately switched on and the administrator will be noticed on Web management page.


The distributed computing is the buzz in recent past, cloud computing stands first in this category. This is since, the users can adapt anything related to data storage, magnificent computing facilities on a system with less infrastructure from anywhere at any time. On other dimension such public and private cloud computing strategies would also attracts the foul players to perform intrusion practices. This is since, the comfortability that the cloud platform providing to end users intends them to adapt these services in regard to save or compute the sensitive data. The scope of vulnerability to breach the data or services over cloud computing is more frequent and easier, which is since, these services relies on internet protocol. In this regard, the research in intrusion detection defense mechanisms is having prominent scope. This manuscript, projecting a novel intrusion detection mechanism called "calibration factors-based intrusion detection (CFID)" for cloud computing networks. The experimental study portrayed the significant scope of the proposal CFID to detect the intrusion activities listed as remoteto-Local, Port Scanning, and Virtual-Machine-Trapping.


2014 ◽  
Vol 651-653 ◽  
pp. 2063-2066
Author(s):  
Chung C. Chang ◽  
Shu Hui Tsai

This study combines an expert system with cloud computing, establishing the expert system on a cloud platform to provide users with assistance and recommendations about diabetes and diabetic retinopathy diagnosis. This study mainly adopts an empirical approach. The first step is to define the research topic, and then propose questions and the research purpose based on the research background and motivation. Research results are related to three areas, specifically diabetes and diabetic retinopathy, expert systems, and cloud computing. After analyzing and organizing the literature, the research method and scope of research are established with a system design based on the three areas. This study then develops a prototype system to validate, evaluate, and test the expert system. Finally, study gives the conclusion and recommendations.


Author(s):  
Mousa Abdoh ◽  
Nael Salman

Healthcare service costs are rising all over the world. That is mainly due to the lack of healthcare professionals and IT services.  Cloud computing is an emerging trend that provides a robust infrastructure that enables delivering low-cost services over the internet. In this paper, we conducted an analytical study on the e-health services in Palestine to investigate the current state-of-art and examine all challenges and opportunities to benefit from this technology. Collected data has been analyzed and the results revealed that there is a clear gap between the IT service models provided by Palestinian healthcare service provider, and the potential models based on latest IT trends; mainly, cloud computing. 


Author(s):  
Burak Kantarci ◽  
Hussein T. Mouftah

Cloud computing aims to migrate IT services to distant data centers in order to reduce the dependency of the services on the limited local resources. Cloud computing provides access to distant computing resources via Web services while the end user is not aware of how the IT infrastructure is managed. Besides the novelties and advantages of cloud computing, deployment of a large number of servers and data centers introduces the challenge of high energy consumption. Additionally, transportation of IT services over the Internet backbone accumulates the energy consumption problem of the backbone infrastructure. In this chapter, the authors cover energy-efficient cloud computing studies in the data center involving various aspects such as: reduction of processing, storage, and data center network-related power consumption. They first provide a brief overview of the existing approaches on cool data centers that can be mainly grouped as studies on virtualization techniques, energy-efficient data center network design schemes, and studies that monitor the data center thermal activity by Wireless Sensor Networks (WSNs). The authors also present solutions that aim to reduce energy consumption in data centers by considering the communications aspects over the backbone of large-scale cloud systems.


Sign in / Sign up

Export Citation Format

Share Document