computing services
Recently Published Documents


TOTAL DOCUMENTS

979
(FIVE YEARS 507)

H-INDEX

28
(FIVE YEARS 13)

Author(s):  
Irina Alekseevna Vorobeva ◽  
◽  
Alexander Vladimirovich Panov ◽  
Alexander Arkadyevich Safronov ◽  
Alexey Ivanovich Sazonov

The idea of cloud computing is not a new one, it has been developed and discussed for many years. Cloud computing is a model which allows to get access to the network upon request from the set of adjustable computing services, such as infrastructure, applications and storages. Cloud services and data storage products allow their users to store and share any type of document and file from any device connected to Internet. There are several types of cloud services, which can be subdivided into: SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service). Besides, there are several deployment models, such as public, residential, hybrid or community cloud. Cloud computing models are based on modern process paradigm, which offers new alternatives to the companies of various ranges for implementation of innovative business models. With the help of these new business models small companies will be able to use cloud computing platforms and to increase gradually their computation capacities and data storage capacities depending on the requirements in real time mode, which creates a unique opportunity for market competition. Keywords— cloud computing, IaaS, OpenStack, PaaS, SaaS.


2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
Se-Joon Park ◽  
Yong-Joon Lee ◽  
Won-Hyung Park

Recently, due to the many features and advantages of cloud computing, “cloud service” is being introduced to countless industries around the world at an unbelievably rapid pace. However, with the rapid increase in the introduction of cloud computing services, security vulnerabilities are increasing and the risk of technology leakage from cloud computing services is also expected to increase in social network service. Therefore, this study will propose an AWS-based (Amazon Web Services) security architecture configuration method that can be applied for the entire life cycle (planning, establishment, and operation) of cloud services for better security in AWS Cloud Services, which is the most used cloud service in the world. The proposed AWS security guide consists of five different areas, Security Solution Selection Guide, Personal Information Safeguard Guide, Security Architecture Design Guide, Security Configuration Guide, and Operational Security Checklist, for a safe social network. The AWS Security Architecture has been designed with three reference models: Standard Security Architecture, Basic Security Architecture, and Essential Security Architecture. The AWS Security Guide and AWS Security Architecture proposed in this paper are expected to help many businesses and institutions that are hoping to establish and operate a safe and reliable AWS cloud system in the social network environment.


2022 ◽  
Author(s):  
Liping Qian

<div>The integration of Maritime Internet of Things (M-IoT) technology and unmanned aerial/surface vehicles (UAVs/USVs) has been emerging as a promising navigational information technique in intelligent ocean systems. With the unprecedented increase of computation-intensive yet latency sensitive marine mobile Internet services, mobile edge computing (MEC) and non-orthogonal multiple access (NOMA) have been envisioned as promising approaches to providing with the low-latency as well as reliable computing services and ultra-dense connectivity. In this paper, we investigate the energy consumption minimization based energy-efficient MEC via cooperative NOMA for the UAV-assisted M-IoT networks. We consider that USVs offload their computation-workload to the UAV equipped with the edge-computing server subject to the UAV mobility. To improve the energy efficiency of offloading transmission and workload computation, we focus on minimizing the total energy consumption by jointly optimizing the USVs’ offloaded workload, transmit power, computation resource allocation as well as the UAV trajectory subject to the USVs’ latency requirements. Despite the nature of mixed discrete and non-convex programming of the formulated problem, we exploit the vertical decomposition and propose a two-layered algorithm for solving it efficiently. Specifically, the top-layered algorithm is proposed to solve the problem of optimizing the UAV trajectory based on the idea of Deep Reinforcement Learning (DRL), and the underlying algorithm is proposed to optimize the underlying multi-domain resource allocation problem based on the idea of the Lagrangian multiplier method. Numerical results are provided to validate the effectiveness of our proposed algorithms as well as the performance advantage of NOMA-enabled computation offloading in terms of overall energy consumption.</div>


2022 ◽  
Author(s):  
Liping Qian

<div>The integration of Maritime Internet of Things (M-IoT) technology and unmanned aerial/surface vehicles (UAVs/USVs) has been emerging as a promising navigational information technique in intelligent ocean systems. With the unprecedented increase of computation-intensive yet latency sensitive marine mobile Internet services, mobile edge computing (MEC) and non-orthogonal multiple access (NOMA) have been envisioned as promising approaches to providing with the low-latency as well as reliable computing services and ultra-dense connectivity. In this paper, we investigate the energy consumption minimization based energy-efficient MEC via cooperative NOMA for the UAV-assisted M-IoT networks. We consider that USVs offload their computation-workload to the UAV equipped with the edge-computing server subject to the UAV mobility. To improve the energy efficiency of offloading transmission and workload computation, we focus on minimizing the total energy consumption by jointly optimizing the USVs’ offloaded workload, transmit power, computation resource allocation as well as the UAV trajectory subject to the USVs’ latency requirements. Despite the nature of mixed discrete and non-convex programming of the formulated problem, we exploit the vertical decomposition and propose a two-layered algorithm for solving it efficiently. Specifically, the top-layered algorithm is proposed to solve the problem of optimizing the UAV trajectory based on the idea of Deep Reinforcement Learning (DRL), and the underlying algorithm is proposed to optimize the underlying multi-domain resource allocation problem based on the idea of the Lagrangian multiplier method. Numerical results are provided to validate the effectiveness of our proposed algorithms as well as the performance advantage of NOMA-enabled computation offloading in terms of overall energy consumption.</div>


2022 ◽  
pp. 58-79
Author(s):  
Son Nguyen ◽  
Matthew Quinn ◽  
Alan Olinsky ◽  
John Quinn

In recent years, with the development of computational power and the explosion of data available for analysis, deep neural networks, particularly convolutional neural networks, have emerged as one of the default models for image classification, outperforming most of the classical machine learning models in this task. On the other hand, gradient boosting, a classical model, has been widely used for tabular structure data and leading data competitions, such as those from Kaggle. In this study, the authors compare the performance of deep neural networks with gradient boosting models for detecting pneumonia using chest x-rays. The authors implement several popular architectures of deep neural networks, such as Resnet50, InceptionV3, Xception, and MobileNetV3, and variants of a gradient boosting model. The authors then evaluate these two classes of models in terms of prediction accuracy. The computation in this study is done using cloud computing services offered by Google Colab Pro.


2022 ◽  
pp. 59-73
Author(s):  
Kwok Tai Chui ◽  
Patricia Ordóñez de Pablos ◽  
Miltiadis D. Lytras ◽  
Ryan Wen Liu ◽  
Chien-wen Shen

Software has been the essential element to computers in today's digital era. Unfortunately, it has experienced challenges from various types of malware, which are designed for sabotage, criminal money-making, and information theft. To protect the gadgets from malware, numerous malware detection algorithms have been proposed. In the olden days there were shallow learning algorithms, and in recent years there are deep learning algorithms. With the availability of big data for training of model and affordable and high-performance computing services, deep learning has demonstrated its superiority in many smart city applications, in terms of accuracy, error rate, etc. This chapter intends to conduct a systematic review on the latest development of deep learning algorithms for malware detection. Some future research directions are suggested for further exploration.


2022 ◽  
Vol 40 (1/2/3) ◽  
pp. 1
Author(s):  
J. Sunny Deol . G. ◽  
Suneetha Bulla ◽  
Nageswara Rao Jarapala ◽  
Veeraiah Duggineni ◽  
Rajendra Kumar G

Author(s):  
Mohit Mathur ◽  
◽  
Mamta Madan ◽  
Mohit Chandra Saxena ◽  
◽  
...  

Emerging technologies like IoT (Internet of Things) and wearable devices like Smart Glass, Smart watch, Smart Bracelet and Smart Plaster produce delay sensitive traffic. Cloud computing services are emerging as supportive technologies by providing resources. Most services like IoT require minimum delay which is still an area of research. This paper is an effort towards the minimization of delay in delivering cloud traffic, by geographically localizing the cloud traffic through establishment of Cloud mini data centers. The anticipated architecture suggests a software defined network supported mini data centers connected together. The paper also suggests the use of segment routing for stitching the transport paths between data centers through Software defined Network Controllers.


2021 ◽  
Vol 17 (1) ◽  
pp. 47-68
Author(s):  
Adrian-Liviu Scutariu ◽  
Ștefăniță Șuşu ◽  
Cătălin-Emilian Huidumac-Petrescu ◽  
Rodica-Manuela Gogonea

The planning of activities of e-commerce enterprises and their behavior has been influenced by the emergence of the COVID-19 pandemic. The behavior of e-commerce enterprises has been highlighted at the level of EU countries through an analysis elaborated on four variables: the value of e-commerce sales, cloud computing services, enterprises that have provided training to develop/upgrade the ICT skills of their personnel, e-commerce, customer relationship management (CRM) and secure transactions. Using the hierarchical clustering method, analysis was carried out on these variables to identify certain economic and behavioral patterns of e-commerce activity from 2018 and 2020. The study of the relationships involved in the e-commerce activity of these enterprises is reflected in models of the economic behavior of 31 European states in relation to the targeted variables. The results show that the impacts of the COVID-19 pandemic are strongly manifested in the direction of the evolution of each indicator but differ from one country to another. The trends depend on the level of development and the particularities of each country’s economy in adapting to the repercussions reported in relation to the level of impact of the COVID-19 pandemic. This is highlighted by the significant regrouping of countries in 2020 compared with 2018 in relation to the average values of the indicators. The results show that, in 2020, the most significant percentages of the value of e-commerce sales were recorded in Belgium, Ireland and Czechia, as in 2018. In e-commerce, customer relationship management and secure transactions, Denmark and Sweden were superior in 2020 to the countries mentioned above, which were dominant in 2018. For the other two indicators, Finland and Norway were the top countries included in the analysis in both years. The conclusion supports the continuous model of e-commerce enterprise behavior in order to meet the requirements of online customers.


2021 ◽  
Vol 13 (24) ◽  
pp. 14050
Author(s):  
Dariusz R. Augustyn ◽  
Łukasz Wyciślik ◽  
Mateusz Sojka

In this article, the authors, using information-systems modeling techniques, and considering current national legal regulations, present the cloud-enabled architecture of a clinical data repository. The patient’s medical record is an important carrier of information necessary for accurate diagnosis and selection of the correct treatment process. Therefore, it is not surprising that since the beginning of the development of computer technologies, databases have been built to enable the management of a patient’s medical records. These systems were most-often deployed locally at individual healthcare units, which carried certain limitations both in terms of the security and availability of the stored information, and the possibility of exchanging it with other clinics. However, recent developments in the standardization of medical information exchange in Poland, together with the revolution in cloud computing, have opened up completely new perspectives for clinical-data-repository implementations helping to make them far more sustainable. Although, the practical aspects of implementing clinical-documentation repositories are studied both in forums of European countries and also around the world; so far, no similar research was conducted with respect to Poland. This study tries to fill that gap by proposing a flexible multi-variant cloud-enabled architecture of the system providing the services of a clinical-data repository. The goal of the work was to propose such a system architecture that allows having a system that is either cloud-agnostic, that uses specifically selected cloud services, or that is even deployable locally. Thanks to the use of cloud computing services, the implemented system is characterized by high availability, scalability, and the possibility of exchanging data between medical institutions, which enables the improvement in the quality of medical processes for the whole Polish population.


Sign in / Sign up

Export Citation Format

Share Document