Journal articles on the topic 'Cloud communication'

To see the other types of publications on this topic, follow the link: Cloud communication.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud communication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Khandare, Nitesh. "Communication in Cloud-of-Clouds Environment for Brokers." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 1 (2015): 268–70. http://dx.doi.org/10.17762/ijritcc2321-8169.150154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

R, Sam Jose. "Cloud Communication Based Avionics." International Journal of Students' Research in Technology & Management 3, no. 7 (October 27, 2015): 422. http://dx.doi.org/10.18510/ijsrtm.2015.374.

Full text
Abstract:
This technology involves introduction of cloud computing technology inside aircraft for multiplexing data and transfer the multiplexed signal to a communication satellite where demultiplexing of data takes place. These data are then sent to various corresponding transmission towers and the response signal reaches the satellite from these transmission towers where multiplexing of various signals is done. Now the multiplexed signal is again sent to cloud inside aircraft thus making communication possible without any vulnerability or distortion.
APA, Harvard, Vancouver, ISO, and other styles
3

Jayalath, Chamikara, Julian Stephen, and Patrick Eugster. "Universal Cross-Cloud Communication." IEEE Transactions on Cloud Computing 2, no. 2 (April 1, 2014): 103–16. http://dx.doi.org/10.1109/tcc.2014.2316813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Chuanchang, and Jingqi Yang. "A Novel Deployment Method for Communication-Intensive Applications in Service Clouds." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/290913.

Full text
Abstract:
The service platforms are migrating to clouds for reasonably solving long construction periods, low resource utilizations, and isolated constructions of service platforms. However, when the migration is conducted in service clouds, there is a little focus of deploying communication-intensive applications in previous deployment methods. To address this problem, this paper proposed the combination of the online deployment and the offline deployment for deploying communication-intensive applications in service clouds. Firstly, the system architecture was designed for implementing the communication-aware deployment method for communication-intensive applications in service clouds. Secondly, in the online-deployment algorithm and the offline-deployment algorithm, service instances were deployed in an optimal cloud node based on the communication overhead which is determined by the communication traffic between services, as well as the communication performance between cloud nodes. Finally, the experimental results demonstrated that the proposed methods deployed communication-intensive applications effectively with lower latency and lower load compared with existing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
5

STELEA, George-Alex, Radu CURPEN, Ștefania ȘURARIU, and Alexandru PAPOI. "PEER-TO-PEER REAL-TIME CLOUD COMMUNICATION SOLUTIONS." Review of the Air Force Academy 14, no. 2 (December 8, 2016): 99–108. http://dx.doi.org/10.19062/1842-9238.2016.14.2.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Hong Ze, and Xiao Huang. "Research on Communication Carriers' Development in Cloud Logistics Age." Advanced Materials Research 753-755 (August 2013): 2825–28. http://dx.doi.org/10.4028/www.scientific.net/amr.753-755.2825.

Full text
Abstract:
With the fantastic spur both in logistics industry and in cloud computing capabilities nowadays, communications operators have noticed that the development of communication industry is closely linked with logistics industry, who also serves as a profit of communication industry. Under the Cloud Logistics era, this paper attempts to study and give suggestions on how to develop logistics industry for communications operators. Whats more, the paper also points out that communication operators should carry out a comprehensive plan to expand its logistics business in order to make a further development.
APA, Harvard, Vancouver, ISO, and other styles
7

Malik, Saadia, Nadia Tabassum, Muhammad Saleem, Tahir Alyas, Muhammad Hamid, and Umer Farooq. "Cloud-IoT Integration: Cloud Service Framework for M2M Communication." Intelligent Automation & Soft Computing 31, no. 1 (2022): 471–80. http://dx.doi.org/10.32604/iasc.2022.019837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Badr, Aymen Mudheher, Yi Zhang, and Hafiz Gulfam Ahmad Umar. "Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing." Electronics 8, no. 2 (February 1, 2019): 171. http://dx.doi.org/10.3390/electronics8020171.

Full text
Abstract:
The increasing use of cloud computing, especially in commercial, government and healthcare institutions, started with the use of computerized clouds. Clouds store important data, which reduces the cost of management and ensures easy access. To protect this data, cryptographic methods are used to ensure confidentiality of the data, as well as to secure access to user data and increase trust in cloud technology. In our paper, we suggest a new scheme to support an attribute-based encryption system (ABE) that involves multiple parties such as data owners, data users, cloud servers and authority. A verified and authenticated decryption process for the cloud environment is the imperative feature of our proposed architecture. The data owner encrypts their data and sends it to the cloud. The cloud server performs partial decryption and the final decrypted data are shared for users as per their privileges. Thus, the data owner reduces complexity of productivity by delegating the decryption process to the cloud server. Analysis of the experimental results confirms that data access in the electronic cloud atmosphere is safer due to a controlled multiple-users-rights scheme. Our performance evaluation results show that the proposed model condensed the communication overhead and made Digital Imaging and Communications in Medicine (DICOM) more secure.
APA, Harvard, Vancouver, ISO, and other styles
9

Aouat, Asmaa, El Abbassia Deba, Abou El Hassan Benyamina, and Djilali Benhamamouch. "Deployment in Cloud Computing." International Journal of Distributed Systems and Technologies 11, no. 1 (January 2020): 27–37. http://dx.doi.org/10.4018/ijdst.2020010103.

Full text
Abstract:
Although clouds have adopted common communication protocols such as HTTP and SOAP, interoperability, integration, and coordination of all clouds remain a concern. Instead, companies are looking for solutions to deploy an infrastructure that spans multiple instances of public and private clouds. Each of the proposed cloud solutions has its own limitations, management APIs, and development cycles that must be monitored and managed to provide a consistent set. The objective of the article is to answer the question: Is there a platform to deploy, run and manage applications in a multi-cloud environment and to ensure their availability, performance, and optimal use of resources?
APA, Harvard, Vancouver, ISO, and other styles
10

Oriekhova, Svetlana, and Nataliia Lynska. "Application of cloud technologies in the system of information and communication activities of libraries." Bulletin of Mariupol State University. Series: Philosophy, culture studies, sociology 9, no. 18 (2019): 71–76. http://dx.doi.org/10.34079/2226-2849-2019-9-18-71-76.

Full text
Abstract:
The use of libraries’modern cloud technologies in information and communication activity is analyzed. It is considered the problems of cloud technologies implementation in libraries documentation and information circulation. of Advantages and disadvantages of cloud service’simplementation are revealed. Authors outlined transition prospects in the future to the cloud network and cloud technologies’use in library activity. Cloud service providers allow us to lease computing power and disk space online. Clouds are physically located in data centers - buildings that house powerful computers that are connected by a single network. Such unified computers also contain the virtual servers that are required for cloud services to work. It has been found that for libraries as social institutions that are unable to acquire and administer their own data warehouses, the use of cloud technologies is a unique opportunity to improve their work. The use of cloud technology in libraries helps to save money on acquiring a fleet of computers and licensed software. Book collections are successfully stored in large amounts on "clouds", which significantly unloads the work of local library networks, an automated library information system and its own server. Cloud services include those that are used to learn how to work with web services and standard documents. In particular, the Microsoft 365 cloud platform provides the opportunity to practice known office applications through a web browser. It includes e-mail and calendars, standard Office applications. Security is achieved through One Drive backup and two-factor authentication with face or fingerprint recognition or PIN to further protect files. Given the complexity of using security tools in cloud repositories, digital literacy plays an important role in effective communication for library users and their employees. It is resoluted that cloud services giveto library staff additional opportunities for organizing management activities. This includes, in particular, multimedia web resource services use (photo services - Picasa, Panoramio; video services – Youtubevideo, geoservices - Google maps; workflow - Slideshare, Google Docs, SkyDrive, etc.), which are free to usefor any user so we can freelystore and use image, audio and video resources. These systems can be used in management practice not only as a source of accumulation of multimedia educational web resources, but also as a system of storing library video, photo and audio archives, as well as improving the processes of information service for readers in libraries.
APA, Harvard, Vancouver, ISO, and other styles
11

Kim, Bu-Yo, Joo Wan Cha, A.-Reum Ko, Woonseon Jung, and Jong-Chul Ha. "Analysis of the Occurrence Frequency of Seedable Clouds on the Korean Peninsula for Precipitation Enhancement Experiments." Remote Sensing 12, no. 9 (May 7, 2020): 1487. http://dx.doi.org/10.3390/rs12091487.

Full text
Abstract:
Our study analyzed the occurrence frequency and distribution of seedable clouds around the Korean Peninsula in order to better secure water resources. Cloud products from the Communication, Ocean, and Meteorological Satellite (COMS), including cloud fraction, cloud top height, cloud top temperature, cloud phase, cloud top pressure, cloud optical thickness, and rainfall intensity, were used. Daytime hourly data between 0900 and 1800 local standard time (LST) observed from December 2016 to November 2019 was used. Seedable clouds occurring within this period were evaluated based on seasonal cloud phases, occurrence frequency, and cloud characteristics according to land, sea, and cloud type. These clouds exhibited varying average occurrence frequencies in different seasons. Sc (stratocumulus) clouds exhibited the highest occurrence frequency for all seasons, with an average of 63%, followed by Cu (cumulus) at 15%, As (altostratus) at 13%, and Ac (altocumulus) at 6%. We determined that low-level clouds primarily occurred around the Korean Peninsula, and the occurrence frequency of stratiform clouds was highest for water phase seedable clouds, while the occurrence frequency of cumuliform clouds was highest for ice phase seedable clouds. We believe that precipitation enhancement experiments could be suitable for western and eastern seas around the Korean Peninsula as well as for mountainous regions on land.
APA, Harvard, Vancouver, ISO, and other styles
12

Yue, Min Min. "Removing Cloud of Grey Remote Sensing Image Based on Network Communication." Applied Mechanics and Materials 513-517 (February 2014): 3165–69. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.3165.

Full text
Abstract:
Remote sensing technology has rapid development in the past half one century, it is widely used in various fields and society. But the clouds have affected the quality of remote sensing data, how to effectively use the modern computer science and technology to remove the cloud is a hot issue in the field. From the theory of cloud formation in the remote sensing image, we analyze the formation mechanism, and based on this we do two layers decomposition and reconstruct the structure according to wavelet transform in network communication, and establish the image degradation model. Combining Fourier transformation, we set up the removing cloud fusion model of remote sensing image. Through the simulation experiment, the effect is significant. To a certain extent, it provides technical support for theory study and practice operation.
APA, Harvard, Vancouver, ISO, and other styles
13

Pečeliūnaitė, Angelė. "Vieningos komunikacijos paradigma „debesų“ technologijose: „Microsoft Lync 2010“ komunikacijos platformos analizė teoriniu ir praktiniu aspektais." Informacijos mokslai 60 (January 1, 2012): 36–52. http://dx.doi.org/10.15388/im.2012.0.1670.

Full text
Abstract:
Per pastaruosius keletą metų „debesų“ technologijos (angl. Cloud Computing) tapo realybe – kompanijos, siūlančios paslaugas internete, pradėjusios nuo bandomųjų paslaugų, jau gali džiaugtis sulaukusios vis didesnio realaus verslininkų susidomėjimo visame pasaulyje. Šalia tradicinių paslaugų atsiranda ir nauja – komunikacija kaip paslauga. Straipsnio tikslas – aptarti vieningos komunuikacijos paradigmą debesyje ir įvertinti naujos kartos komunikacijos (Komunikacija 2.0) požymius. Tam tikslui pasirinkta Lync 2010 komunikavimo platforma (integruota į „Microsoft Office 365“ „debesį“) analizuojama teoriniu ir praktiniu aspektais. Straipsnyje aptariami „Lync 2010“ ekspertų Lietuvoje apklausos rezultatai bei analizuojamos „Lync“ forumo bendruomenės internete aktyvumo tendencijos. Teorinės įžvalgos ir praktiniai „Lync 2010“ komunikacijos vertinimai patvirtina, kad ši komunikavimo platforma yra efektyvi, užtikrina greitą ir paprastą komunikaciją vieningoje interaktyvioje aplinkoje, prie kurios dinamiškai galima prisijungti naudojant įvairius ryšio kanalus. Gauti analizės rezultatai patvirtina, kad „Lync 2010“ komunikavimo platforma turi Komunikacijos 2.0 bruožų, kurie praktikoje iš esmės padidina komunikacijos ir bendradarbiavimo efektyvumą, suteikia patogumą komunikuojantiems. Aptariami ir probleminiai „Lync 2010“ aspektai. Tyrimo rezultatai taip pat rodo, kad versle panaudojamos ne visos vienodai intensyviai „Lync 2010“ siūlomos komunikavimo galimybės (pvz., ekspertinė veikla). Aiškinamos priežastys.Reikšminiai žodžiai: „debesų“ technologijos, vieninga komunikacija, naujos kartos komunikacija, Komunikacija 2.0, Lync 2010 komunikavimo platforma, prisistatymas, ekspertinė veikla.Unified Communications Paradigm in the cloud computing: Analysis of Microsoft Lync 2010 Communications Platform for Theoretical and Practical AspectsAngelė Pečeliūnaitė SummaryOver the past few years, cloud computing has become a reality: the company that offers services on the internet, which started from the pilot services, can now enjoy increasing interest in the real business around the world. In addition to traditional and new services, there is Communication as a service. The aim of the article is to discuss the paradigm of unified communications in the cloud computing and to evaluate the features of the next generation of communications (Communications 2.0). Purposefully, the Lync 2010 communications platform (integrated into the Microsoft Office 365 cloud) was selected, and an analysis of its theoretical and practical aspects was made. This paper discusses the survey of Lync 2010 results in the Lithuania and analyses the activity trends of the Lync forum community.Theoretical observations and practical assessments of Lync 2010 confirm that the Communications platform is efficient, providing fast and simple interactive communications within a single environment which can be accessed dynamically using various communication channels. The obtained results confirm that the Communications 2.0 features of the Lync 2010 communications platform considerably increase the efficiency of communications and cooperations in practice and provide comfort for communicating people. Also, the problematic aspects of Lync 2010 are discussed. The results show that not all Lync 2010 communication tools are used equally intensively (for example, expert activities). The reasons are also discussed.Keywords: Cloud Computing, Unified Communications, Next Generation of Communications, Communication 2.0, Lync 2010, Presence, Skill Search.
APA, Harvard, Vancouver, ISO, and other styles
14

Jiang, XiangYu. "Energy Consumption Optimization of Edge Computing Based on Reinforcement Learning." Journal of Physics: Conference Series 2246, no. 1 (April 1, 2022): 012076. http://dx.doi.org/10.1088/1742-6596/2246/1/012076.

Full text
Abstract:
Abstract Cloud computing faces the problem of over-centralization, where the distance between users and cloud servers is very far. The communication between users and clouds faces long communication latency and high computational energy consumption. Edge computing is a hot research topic in academia now. Edge computing sinks cloud computing nodes to the edge, allowing users to offload tasks directly to edge servers. Compared with cloud computing, edge computing is closer to the user side. The communication between users and edge servers has lower transmission latency and less energy consumption. In order to better exploit the features and promote the development of edge computing, in this paper, we mainly focus on exploring the basic architecture of edge computing. In addition, we propose a scheme that can optimize the energy consumption of edge computing based on reinforcement learning methods. Finally, we verify the effectiveness of our proposed scheme by comparing it with other schemes through simulation experiments.
APA, Harvard, Vancouver, ISO, and other styles
15

Iyer, Sanketh S., Hiren Dand, and Rajendra Patil. "An Algorithm for Encrypted Cloud Communication." International Journal of Computer Sciences and Engineering 5, no. 12 (December 31, 2017): 213–17. http://dx.doi.org/10.26438/ijcse/v5i12.213217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mishra, Amitabh, Raj Jain, and Arjan Durresi. "Cloud computing: networking and communication challenges." IEEE Communications Magazine 50, no. 9 (September 2012): 24–25. http://dx.doi.org/10.1109/mcom.2012.6295707.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Shabeer, H. Abdul, Palaniappan Palani Ramaswamy, Hameed Abdul Zubar, and R. S. D. Wahida Banu. "Editorial: Green Cloud Computing and Communication." Mobile Networks and Applications 25, no. 4 (June 2, 2020): 1287–89. http://dx.doi.org/10.1007/s11036-020-01553-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Alves, João, Marco Lombardi, and Charles Lada. "Insights on molecular cloud structure." Proceedings of the International Astronomical Union 6, S270 (May 2010): 99–102. http://dx.doi.org/10.1017/s1743921311000238.

Full text
Abstract:
AbstractStars form in the densest regions of clouds of cold molecular hydrogen. Measuring structure in these clouds is far from trivial as 99% of the mass of a molecular cloud is inaccessible to direct observation. Over the last decade we have been developing an alternative, more robust density tracer technique based on dust extinction measurements towards background starlight. The new technique does not suffer from the complications plaguing the more conventional molecular line and dust emission techniques, and when used with these can provide unique views on cloud chemistry and dust grain properties in molecular clouds. In this brief communication we summarize the main results achieved so far using this technique.
APA, Harvard, Vancouver, ISO, and other styles
19

Kirthica, S., and Rajeswari Sridhar. "Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud's Elasticity." International Journal of Intelligent Information Technologies 14, no. 2 (April 2018): 43–58. http://dx.doi.org/10.4018/ijiit.2018040103.

Full text
Abstract:
One of the principle features on which cloud environments operate is the scaling up and down of resources based on users' needs, called elasticity. This feature is limited to the cloud's physical resources. This article proposes to enhance the elasticity of a cloud in an intelligent manner by communicating with an optimal external cloud (EC) and borrowing additional resources from it when the cloud runs out of resources. This inter-cloud communication is secured by a model whose structure is similar to the Kerberos protocol. To choose the optimal EC for a particular request of a user, a list of parameters, collectively termed as RePVoCRaD, are enumerated. Once chosen, trust is established with the chosen EC and inter-cloud communication begins. While existing works deal with third parties to establish or secure inter-cloud communication, this work is novel in that there is absence of third parties in the entire process, thereby reducing security threats and additional costs involved. Evaluating this work based on turnaround time and transaction success rate, in a real-time cloud environment, it is seen that the cloud's elasticity is so enhanced that it successfully accommodates its users' additional demands by the fastest means possible.
APA, Harvard, Vancouver, ISO, and other styles
20

Kathole, Atul B., Jayashree Katti, Dharmesh Dhabliya, Vivek Deshpande, Anand Singh Rajawat, S. B. Goyal, Maria Simona Raboaca, Traian Candin Mihaltan, Chaman Verma, and George Suciu. "Energy-Aware UAV Based on Blockchain Model Using IoE Application in 6G Network-Driven Cybertwin." Energies 15, no. 21 (November 7, 2022): 8304. http://dx.doi.org/10.3390/en15218304.

Full text
Abstract:
Several advanced features exist in fifth-generation (5G) correspondence than in fourth-generation (4G) correspondence. Centric cloud-computing architecture achieves resource sharing and effectively handles big data explosion. For data security problems, researchers had developed many methods to protect data against cyber-attacks. Only a few solutions are based on blockchain (BC), but are affected by expensive storage costs, network latency, confidence, and capacity. Things are represented in digital form in the virtual cyberspace which is the major responsibility of the communication model based on cybertwin. A novel cybertwin-based UAV 6G network architecture is proposed with new concepts such as cloud operators and cybertwin in UAV. Here, IoE applications have to be energy aware and provide scalability with less latency. A novel Compute first networking (CFN) framework named secure blockchain-based UAV communication (BC-UAV) is designed which offers network services such as computing, caching, and communication resources. The focus of the blockchain was to improve the security in the cloud using hashing technique. Edge clouds support core clouds to quickly respond to user requests.
APA, Harvard, Vancouver, ISO, and other styles
21

Zhou, Hongzhi, Gan Yu, and Linguo Li. "Cloud Communication based Ship Communication Network Security Risk Assessment Model." Journal of Coastal Research 95, sp1 (May 26, 2020): 991. http://dx.doi.org/10.2112/si95-193.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Sasikala, P. "Cloud Computing Towards Technological Convergence." International Journal of Cloud Applications and Computing 1, no. 4 (October 2011): 44–59. http://dx.doi.org/10.4018/ijcac.2011100104.

Full text
Abstract:
With the popularization and improvement of social and industrial IT development, information appears to explosively increase, and people put much higher expectations on the services of computing, communication and network. Today’s public communication network is developing in the direction that networks are widely interconnected using communication network infrastructure as backbone and Internet protocols; at the same time, cloud computing, a computing paradigm in the ascendant, provides new service modes. Communication technology has the trend of developing towards computing technology and applications, and computing technology and applications have the trend of stepping towards service orientation architecture. Communication technology and information technology truly comes to a convergence. Telecom operators are planning to be providers of comprehensive information services in succession. To adopt cloud computing technology not only facilitates the upgrade of their communication network technology, service platform and supporting systems, but also facilitates the construction of the infrastructure and operating capacity of providing comprehensive information services. In this paper, the development processes of public communication network and computing are reviewed along with some new concepts for cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
23

Papadakis-Vlachopapadopoulos, Konstantinos, Ioannis Dimolitsas, Dimitrios Dechouniotis, Eirini Eleni Tsiropoulou, Ioanna Roussaki, and Symeon Papavassiliou. "On Blockchain-Based Cross-Service Communication and Resource Orchestration on Edge Clouds." Informatics 8, no. 1 (February 26, 2021): 13. http://dx.doi.org/10.3390/informatics8010013.

Full text
Abstract:
With the advent of 5G verticals and the Internet of Things paradigm, Edge Computing has emerged as the most dominant service delivery architecture, placing augmented computing resources in the proximity of end users. The resource orchestration of edge clouds relies on the concept of network slicing, which provides logically isolated computing and network resources. However, though there is significant progress on the automation of the resource orchestration within a single cloud or edge cloud datacenter, the orchestration of multi-domain infrastructure or multi-administrative domain is still an open challenge. Towards exploiting the network service marketplace at its full capacity, while being aligned with ETSI Network Function Virtualization architecture, this article proposes a novel Blockchain-based service orchestrator that leverages the automation capabilities of smart contracts to establish cross-service communication between network slices of different tenants. In particular, we introduce a multi-tier architecture of a Blockchain-based network marketplace, and design the lifecycle of the cross-service orchestration. For the evaluation of the proposed approach, we set up cross-service communication in an edge cloud and we demonstrate that the orchestration overhead is less than other cross-service solutions.
APA, Harvard, Vancouver, ISO, and other styles
24

Tang, Yan. "Distance Learning Classroom Communication System Based on Cloud Computing." Applied Mechanics and Materials 644-650 (September 2014): 1813–16. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.1813.

Full text
Abstract:
The centralized model of B / S structure is adopted in the current distance education learning classroom, there are some drawbacks of this model, like the resource duplication, crowded user access, poor system scalability and so on. Adoption of cloud computing technology can collect all the distance learning classroom resources to build a "cloud" platform, students can easily access the resources they need by using different terminal devices locally. By analyzing the meaning of cloud computing, application mode and characteristics of cloud computing, the building contents and methods of distance classroom "cloud" is proposed.
APA, Harvard, Vancouver, ISO, and other styles
25

Annane, Boubakeur, and Alti Adel. "Proxy-3S." International Journal of Information Security and Privacy 16, no. 1 (January 2022): 1–38. http://dx.doi.org/10.4018/ijisp.2022010116.

Full text
Abstract:
Virtualization plays a key role in the area of Mobile Cloud Computing (MCC). In MCC, the protection of distributed VMs and mobile users’ sensitive data, in terms of security and privacy, is highly required. This paper presents a novel cloud proxy known as Three Policies Secure Cloud Proxy (Proxy-3S) that combines three security policies: VM users’ access control, VMs’ secure allocation and VMs’ secure communication. The proposed approach aims to keep the distributed VMs safe in different servers on the cloud. It enhances the access authorization to permit intensive distributed application tasks on the cloud or mobile devices while processing and communicating private information between VMs. Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. Several experiments were conducted using a real-world healthcare distributed application. The experiments achieved promising results for high-level data protection and good efficiency rating compared to existing works.
APA, Harvard, Vancouver, ISO, and other styles
26

Kurunji, Swathi, Tingjian Ge, Xinwen Fu, Benyuan Liu, and Cindy X. Chen. "Optimizing Communication for Multi-Join Query Processing in Cloud Data Warehouses." International Journal of Grid and High Performance Computing 5, no. 4 (October 2013): 113–30. http://dx.doi.org/10.4018/ijghpc.2013100108.

Full text
Abstract:
In this paper, the authors present storage structures, PK-map and Tuple-index-map, to improve the performance of query execution and inter-node communication in Cloud Data Warehouses. Cloud Data Warehouses require Read-Optimized databases because large amount of historical data are integrated on a regular basis to facilitate analytical applications for report generation, future analysis, and decision-making. This frequent data integration can grow the data size rapidly and hence there is a need to allocate resource dynamically on demand. As resource is scaled-out in the cloud environment, the number of nodes involved in the execution of a query increases. This in turn increases the number of inter-node communications. In queries, join operation between two different tables are most common. To perform the join operation of a query in the cloud environment, data need to be transferred among different nodes. This becomes critical when there is a huge amount of data (in Terabytes or Petabytes) stored across a large number of nodes. With the increase in number of nodes and amount of data, the size of the communication messages also increases, resulting in even increased bandwidth usage and performance degradation. In this paper, the authors show through extensive experiments using PlanetLab Cloud that their proposed storage structures PK-map and Tuple-index-map, and query execution algorithms improve the performance of join queries, decrease inter-node communication and workload in Cloud Data Warehouses.
APA, Harvard, Vancouver, ISO, and other styles
27

Chen, Chi-Yuan, Han-Chieh Chao, Tin-Yu Wu, Chun-I. Fan, Jiann-Liang Chen, Yuh-Shyan Chen, and Jenq-Muh Hsu. "IoT-IMS Communication Platform for Future Internet." International Journal of Adaptive, Resilient and Autonomic Systems 2, no. 4 (October 2011): 74–94. http://dx.doi.org/10.4018/jaras.2011100105.

Full text
Abstract:
In recent years, Internet of Things (IoT) and Cloud Computing are the hottest issues of Future Internet. However, there is a lack of common fabric for integrating IoT and Cloud. In telecommunications, the IMS (IP Multimedia Subsystem), based on the All-IP and Open Services Architecture, has been regarded as the trend for Next Generation Network (NGN). The IMS communication platform is the most suitable fabric for integrating IoT and Cloud. This paper focuses on different aspects including Cloud Service Framework, Data Sensing and Communication Technology, Collaborative Authentication and Privacy Protection Mechanism, Operation, Administration, and Maintenance (OA&M), Mobility and Energy-Saving Management, and Application Services. This paper not only provides the discussion of open challenges, but also proposes a possible solution based on the above-mentioned aspects for Future Internet.
APA, Harvard, Vancouver, ISO, and other styles
28

Garrote, Luís, João Perdiz, Luís A. da Silva Cruz, and Urbano J. Nunes. "Point Cloud Compression: Impact on Object Detection in Outdoor Contexts." Sensors 22, no. 15 (August 2, 2022): 5767. http://dx.doi.org/10.3390/s22155767.

Full text
Abstract:
Increasing demand for more reliable and safe autonomous driving means that data involved in the various aspects of perception, such as object detection, will become more granular as the number and resolution of sensors progress. Using these data for on-the-fly object detection causes problems related to the computational complexity of onboard processing in autonomous vehicles, leading to a desire to offload computation to roadside infrastructure using vehicle-to-infrastructure communication links. The need to transmit sensor data also arises in the context of vehicle fleets exchanging sensor data, over vehicle-to-vehicle communication links. Some types of sensor data modalities, such as Light Detection and Ranging (LiDAR) point clouds, are so voluminous that their transmission is impractical without data compression. With most emerging autonomous driving implementations being anchored on point cloud data, we propose to evaluate the impact of point cloud compression on object detection. To that end, two different object detection architectures are evaluated using point clouds from the KITTI object dataset: raw point clouds and point clouds compressed with a state-of-the-art encoder and three different compression levels. The analysis is extended to the impact of compression on depth maps generated from images projected from the point clouds, with two conversion methods tested. Results show that low-to-medium levels of compression do not have a major impact on object detection performance, especially for larger objects. Results also show that the impact of point cloud compression is lower when detecting objects using depth maps, placing this particular method of point cloud data representation on a competitive footing compared to raw point cloud data.
APA, Harvard, Vancouver, ISO, and other styles
29

Alam, Tanweer, and Mohamed Benaida. "CICS: Cloud–Internet Communication Security Framework for the Internet of Smart Devices." International Journal of Interactive Mobile Technologies (iJIM) 12, no. 6 (October 29, 2018): 74. http://dx.doi.org/10.3991/ijim.v12i6.6776.

Full text
Abstract:
<p class="0abstract">The internet of smart devices is a network of intelligent gadgets with sensors, programs, Wi-Fi and communication network connections. These devices store the data in cloud and process data outside the device using the proposed Cloud-Internet communication framework. These devices can communicate with other devices using the proposed framework. However, there are many challenges for communication security among the internet of smart devices. The Cloud can store the device data with security, reliability, privacy and service availability. The communication Security has been raised as one of the most critical issues of cloud computing where resolving such an issue would result in a constant growth in the use and popularity of cloud computing. Our purpose of this study is to create a framework for providing the communication security among smart devices network for the internet of things using cloud computing. Our main contribution links a new study for providing communication security for the internet of smart devices using the cloud-Internet framework. This study can be helpful for communication security problem in the framework of the Internet of Things. The proposed study generates a new framework for solving the issue of communication security among internet of smart devices.</p>
APA, Harvard, Vancouver, ISO, and other styles
30

J, Senthil, Ishan Sinha, and Nandita Bothra. "A Secure Approach towards Cloud Data Communication." International Journal of Computer Applications 64, no. 19 (February 15, 2013): 5–8. http://dx.doi.org/10.5120/10740-5297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Artegiani, Irene. "Communication and interactions in cloud platform subtitling." Tradumàtica: tecnologies de la traducció, no. 19 (December 31, 2021): 76–92. http://dx.doi.org/10.5565/rev/tradumatica.282.

Full text
Abstract:
This article explores recent developments in freelance subtitling work within the audio-visual translation (AVT) industry. During the 2010s, many LSPs operating globally moved their provision of paid, professional subtitling services to cloud platforms, and I argue that such platforms, while capable of generating collaborative environments, enact information patterns which weaken the communicative and collaborative aspects of production processes, while running the risk of compromising the quality of the subtitlers’ position.
APA, Harvard, Vancouver, ISO, and other styles
32

Schlechtendahl, Jan, Felix Kretschmer, Armin Lechler, and Alexander Verl. "Communication Mechanisms for Cloud based Machine Controls." Procedia CIRP 17 (2014): 830–34. http://dx.doi.org/10.1016/j.procir.2014.01.074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Katalinic, Branko, Ilya Kukushkin, Valentin Pryanichnikov, and Damir Haskovic. "Cloud Communication Concept for Bionic Assembly System." Procedia Engineering 69 (2014): 1562–68. http://dx.doi.org/10.1016/j.proeng.2014.03.156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Saiko, Volodymyr, Teodor Narytnyk, Valeriy Gladkykh, and Natalia Sivkova. "INNOVATIVE SOLUTION FOR LEO-SYSTEM WITH DISTRIBUTED SATELLITE ARCHITECTURE." Information systems and technologies security, no. 1 (2) (2020): 77–83. http://dx.doi.org/10.17721/ists.2020.1.77-83.

Full text
Abstract:
An innovative solution for practical implementation in a LEO system with a "distributed satellite" architecture that can be used to provide low-orbital spacecraft communications with ground stations and users of 5G / IoT satellite services is proposed. The essence of the proposed development in the system of low-orbital satellite communication with FC-architecture is that to reduce the delay in signaling to consumers and the probability of overloading the network into a prospective system of low-orbital satellite communication, which contains artificial Earth satellites, each of which functions in Earth orbit and equipped with onboard repeaters, inter-satellite communications, a network of ground-based communication and control systems for artificial satellites of the Earth, a grouping of low-orbiting space their devices (LEO-system), which includes the grouping of root (leading) satellites and satellites-repeaters (slave), around each root satellite is formed micro-grouping of satellites-repeaters, and functions of the root satellite in the selected orbital phase of the orbital -or micro-satellites that are connected to the annular network by communication lines between satellites, and - functions of satellites-repeaters - kubsat, new is the introduction of a multilevel boundary cloud system, which is a heterogeneity distributed computing cloud structure. At the same time, the boundary clouds of the multilevel system are connected by ultra-high-speed wireless terahertz radio lines and wireless optical communication systems. The technique of estimation of access time in the proposed structure of "fog computing" on the basis of the model of access in "fog computing" with the resolution of collisions of data sources implementing the survey mode is presented.
APA, Harvard, Vancouver, ISO, and other styles
35

Thoutam, Vivek. "A comprehensive review on communication enablers and Communication models of iot." International Journal of Information technology and Computer Engineering, no. 12 (November 26, 2021): 12–18. http://dx.doi.org/10.55529/ijitc.12.12.18.

Full text
Abstract:
From a standard consumer perspective, these communication models aid highlight the ability of online devices to incorporate worth to the end consumer. By allowing the person to obtain far better accessibility to an IoT device as well as its information, the basic truly worth of the tool is magnified. For example, in three of the four interaction designs, the devices essentially link to details rational services in a cloud processing setup. Via generating information interaction pipes to the cloud, consumers, as well as the supplier can quicker hire details events, significant reports analytics, details graphic images, as well as anticipating analytics advancements to acquire more value away from IoT records than may be obtained in typical data-silo functionalities. This paper provides a review on communication enablers and communication models of iot.
APA, Harvard, Vancouver, ISO, and other styles
36

Sangwan, Anjana, Bright Keswani, and Aakriti Sharma. "Optimization of secure communication channel over the volunteer cloud and cloud computing." Journal of Discrete Mathematical Sciences and Cryptography 24, no. 8 (November 17, 2021): 2257–66. http://dx.doi.org/10.1080/09720529.2021.2011106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ahmad, Mohd Riduan, Mona Riza Mohd Esa, Vernon Cooray, and Eryk Dutkiewicz. "Interference from cloud-to-ground and cloud flashes in wireless communication system." Electric Power Systems Research 113 (August 2014): 237–46. http://dx.doi.org/10.1016/j.epsr.2014.03.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Xiang, and Yong Zhang. "A Kind of TD-SCDMA Download System Based on Cloud Computing." Key Engineering Materials 474-476 (April 2011): 903–7. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.903.

Full text
Abstract:
TD-SCDMA communication platform based on concept of cloud computing is the natural trend of mobile communication development. Based on introduction of related concept of cloud and TD-SCDMA communication platform, the paper combined TD-SCDMA wireless communication network platform and cloud computing and designed wireless communication network download system under this concept. The communication manage module of system completes signaling transmission, data transmission control and monitoring. The Flash module block manage memory chip. Data block multi-threaded simultaneous downloads, combining with high-level protocol stack module, and the network data backup as well as wireless download transmission was implemented based on concept of cloud computing. System stability and efficiency has been proved in the platform development process.
APA, Harvard, Vancouver, ISO, and other styles
39

Beasley, Maurine. "A Tribute to Barbara Cloud." American Journalism 26, no. 4 (October 2009): 7–9. http://dx.doi.org/10.1080/08821127.2009.10677742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Hordiienko, M. M. "Cloud-based and mobile learning in the training of specialists in higher education." CTE Workshop Proceedings 3 (March 20, 2015): 200–206. http://dx.doi.org/10.55056/cte.266.

Full text
Abstract:
Research goal: analysis of the possibility of introducing cloud-based and mobile learning in vocational training in high school. Research objectives: maintenance and development of teachers teaching practical skills using modern technologies, which will be the foundation of cloud and mobile technologies. Object of research: cloud-based and mobile learning. Subject of research: cloud-based and mobile learning in the training of specialists in higher education. Research methods used: analysis of publications. Results of the research. The key components of the functionality of cloud technology in teaching is to provide remote access to educational services and materials for independent work of students, the continuity and extension of their education, mobility of educational communication and reduce costs of operation and educational content. Cloud technology can be placed in a cloud environment, traditional university educational content component, providing distributed in time and space educational communication, significantly increases the performance of students and teachers, prolongs the process of self-education. The main conclusions. The cloud as a new organizational form of the use of Internet resources and communications with resource outsourcing can effectively store information, work with it from any fixed or mobile device, share it, blurring the boundaries of time and place educational process.
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Tian, Yucheng Lu, Zhihan Cao, Lei Shu, Xi Zheng, Anfeng Liu, and Mande Xie. "When Sensor-Cloud Meets Mobile Edge Computing." Sensors 19, no. 23 (December 3, 2019): 5324. http://dx.doi.org/10.3390/s19235324.

Full text
Abstract:
Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing. The emergence of sensor-clouds has greatly enhanced the computing power and storage capacity of traditional WSNs via exploiting the advantages of cloud computing in resource utilization. However, there are still many problems to be solved in sensor-clouds, such as the limitations of WSNs in terms of communication and energy, the high latency, and the security and privacy issues due to applying a cloud platform as the data processing and control center. In recent years, mobile edge computing has received increasing attention from industry and academia. The core of mobile edge computing is to migrate some or all of the computing tasks of the original cloud computing center to the vicinity of the data source, which gives mobile edge computing great potential in solving the shortcomings of sensor-clouds. In this paper, the latest research status of sensor-clouds is briefly analyzed and the characteristics of the existing sensor-clouds are summarized. After that we discuss the issues of sensor-clouds and propose some applications, especially a trust evaluation mechanism and trustworthy data collection which use mobile edge computing to solve the problems in sensor-clouds. Finally, we discuss research challenges and future research directions in leveraging mobile edge computing for sensor-clouds.
APA, Harvard, Vancouver, ISO, and other styles
42

Pečeliūnaitė, Angelė. "Debesų kompiuterija: darbas, bendradarbiavimas ir komunikacija. Ar debesis tenkina studentų ir mokslininkų poreikius?" Informacijos mokslai 55 (January 1, 2011): 117–30. http://dx.doi.org/10.15388/im.2011.0.3165.

Full text
Abstract:
Informacinės komunikacinės technologijos sparčiai vystosi ir tobulėja. Debesų kompiuterija (Cloud Computing) yra dar viena naujovė, sparčiai pradėjusi plisti XXI a. pradžioje. Debesų kompiuterija – tai galimybė naudotis kompiuterine ir programine įranga internete ir mokėti tik už tai, kiek teikiama paslauga buvo pasinaudota. Debesų kompiuterijos paslaugos pirmiausia buvo orientuotos į verslą. Šio straipsnio tikslas – apžvelgti debesų technologijas ir jų teikiamas galimybes akademinei bendruomenei – studijoms, mokslui, bendradarbiavimui ir mokslinei komunikacijai. Analizuojamos trijų korporacijų siūlomos paslaugos, kreipiant dėmesį į paslaugų įvairovę, galimybes rengti projektus, konferencijas etc., technologijos saugumą, mobilumą ir paslaugų kainą. Tyrimo išvadose pabrėžiama, kad debesų kompiuterija yra patraukli mokslui ir studijoms. Debesį galima panaudoti studijoms, moksliniam darbui, bendradarbiavimui ir mokslinėje komunikacijoje, tik svarbu pasirinkti poreikius tenkinantį atitinkamą debesį.Pagrindiniai žodžiai: debesų technologijos, debesų kompiuterija, viešas ir privatus debesis, virtualus privatus tinklas, SaaS, PaaS, IaaS, virtualizacijos procesai, duomenų centrai, Microsoft Office 365, Microsoft Web Apps, Zoho debesis, Google Apps studijoms, mokslo komunikacija.Cloud Computing: The job, co-operation and communication Does Cloud Meet the Needs of Students and Scholars?Angelė Pečeliūnaitė SummaryThe information and communication technologies are rapidly evolving and progressing. Cloud computing is one of the innovations that began rapidly spreading from the beginning of the 21st century. The article summarizes the cloud computing paradigm, an introduction to cloud computing platforms, the cloud service offered by the cloud providers, and highlights the attractive features of this technology. The collaboration and communication methods in the cloud are discussed. The cloud computing services were primarily focused on business. The aim of the article is an overview of the cloud technologies and opportunities for the academic community – in studies, research, col-laboration and scientific communication.Delic divides research into three significant periods: empirical, theoretical, and experimental/simulation (Delic et al., 2010, p. 3). This article falls within the third study phase: an experimen-tal study comparing the services of three selected cloud providers. We analyze the cloud services of Zoho Web Apps, Microsoft Web Apps and Google Apps for Education according to the selected five categories (information gathered from web sites and company experts speaking): education in a variety of services offered working with documents and projects, scientific communication and col-laboration, data protection, mobility and price.The results have shown that cloud services are attractive to the educational community. The largest variety of service diversity and performance improvements are offered by the Microsoft and Zoho clouds on the SaaS and PaaS platforms. Zoho is a leader of these cloud services. The most attractive environment for scientific communication and collaboration (including mobility) is the Microsoft cloud. Data protection takes care of all service providers: SLA of 99.9% guarantee. Zoho uses web encryption for 256-bit SSL, and Microsoft 128-bit SSL / TSL. Google Apps for Education is in many ways behind the above-mentioned corporations, while Google's cloud services are offered to meet students' needs; services are provided free of charge.The investigation was conducted in December 1–15, 2010.
APA, Harvard, Vancouver, ISO, and other styles
43

Kaish, Md, Kusum Sharma, and Dr Shikha Pandey. "Large-Scale Multimedia Communication on A Cloud Computing Platform." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 1293–98. http://dx.doi.org/10.22214/ijraset.2022.46405.

Full text
Abstract:
Abstract: This research examines the creation of a multimedia communication platform to expand the size of multimedia communication based on cloud computing (CC). The research focuses on high-quality material, multimedia profit avenues, and copyright awareness. Big data diversion under cloud computing optimizes data grouping and pattern identification. Cloud computing's typical large data shunting technology uses open-source embedded system architecture. The connecting coil ties the shunting system's switch to the cloud computing platform's switch, resulting in data loss and corruption. Using this method, it has been shown that CC cannot reach the ideal resource utilization, SLA violation rate, and energy use. Experiments reveal a divergence from this research. The major goal of media development is now the growth and self-awareness of media. Largescale multimedia communication needs an architecture for cloud computing with dynamic growth, efficient processing, and flexible resource scheduling
APA, Harvard, Vancouver, ISO, and other styles
44

Fu, Xiong, Yeliang Cang, Xinxin Zhu, and Song Deng. "Scheduling Method of Data-Intensive Applications in Cloud Computing Environments." Mathematical Problems in Engineering 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/605439.

Full text
Abstract:
The virtualization of cloud computing improves the utilization of resources and energy. And a cloud user can deploy his/her own applications and related data on a pay-as-you-go basis. The communications between an application and a data storage node, as well as within the application, have a great impact on the execution efficiency of the application. The locations of subtasks of an application and the data that transferred between the subtasks are the main reason why communication delay exists. The communication delay can affect the completion time of the application. In this paper, we take into account the data transmission time and communications between subtasks and propose a heuristic optimal virtual machine (VM) placement algorithm. Related simulations demonstrate that this algorithm can reduce the completion time of user tasks and ensure the feasibility and effectiveness of the overall network performance of applications when running in a cloud computing environment.
APA, Harvard, Vancouver, ISO, and other styles
45

Ishida, Yuki, Yoshitsugu Manabe, and Noriko Yata. "Colored Point Cloud Completion for a Head Using Adversarial Rendered Image Loss." Journal of Imaging 8, no. 5 (April 26, 2022): 125. http://dx.doi.org/10.3390/jimaging8050125.

Full text
Abstract:
Recent advances in depth measurement and its utilization have made point cloud processing more critical. Additionally, the human head is essential for communication, and its three-dimensional data are expected to be utilized in this regard. However, a single RGB-Depth (RGBD) camera is prone to occlusion and depth measurement failure for dark hair colors such as black hair. Recently, point cloud completion, where an entire point cloud is estimated and generated from a partial point cloud, has been studied, but only the shape is learned, rather than the completion of colored point clouds. Thus, this paper proposes a machine learning-based completion method for colored point clouds with XYZ location information and the International Commission on Illumination (CIE) LAB (L*a*b*) color information. The proposed method uses the color difference between point clouds based on the Chamfer Distance (CD) or Earth Mover’s Distance (EMD) of point cloud shape evaluation as a color loss. In addition, an adversarial loss to L*a*b*-Depth images rendered from the output point cloud can improve the visual quality. The experiments examined networks trained using a colored point cloud dataset created by combining two 3D datasets: hairstyles and faces. Experimental results show that using the adversarial loss with the colored point cloud renderer in the proposed method improves the image domain’s evaluation.
APA, Harvard, Vancouver, ISO, and other styles
46

Ishida, Yuki, Yoshitsugu Manabe, and Noriko Yata. "Colored Point Cloud Completion for a Head Using Adversarial Rendered Image Loss." Journal of Imaging 8, no. 5 (April 26, 2022): 125. http://dx.doi.org/10.3390/jimaging8050125.

Full text
Abstract:
Recent advances in depth measurement and its utilization have made point cloud processing more critical. Additionally, the human head is essential for communication, and its three-dimensional data are expected to be utilized in this regard. However, a single RGB-Depth (RGBD) camera is prone to occlusion and depth measurement failure for dark hair colors such as black hair. Recently, point cloud completion, where an entire point cloud is estimated and generated from a partial point cloud, has been studied, but only the shape is learned, rather than the completion of colored point clouds. Thus, this paper proposes a machine learning-based completion method for colored point clouds with XYZ location information and the International Commission on Illumination (CIE) LAB (L*a*b*) color information. The proposed method uses the color difference between point clouds based on the Chamfer Distance (CD) or Earth Mover’s Distance (EMD) of point cloud shape evaluation as a color loss. In addition, an adversarial loss to L*a*b*-Depth images rendered from the output point cloud can improve the visual quality. The experiments examined networks trained using a colored point cloud dataset created by combining two 3D datasets: hairstyles and faces. Experimental results show that using the adversarial loss with the colored point cloud renderer in the proposed method improves the image domain’s evaluation.
APA, Harvard, Vancouver, ISO, and other styles
47

Ilchenko, M. Yu, T. M. Narytnyk, V. I. Prysiazhnyi, S. V. Kapshtyk, and S. A. Matvienko. "Space infrastructure of the Internet of things. State and prospects of development." Kosmìčna nauka ì tehnologìâ 27, no. 6 (2021): 65–84. http://dx.doi.org/10.15407/knit2021.06.065.

Full text
Abstract:
We present an overview of possibilities for existing Satellite Communication Systems utilization to provide Internet of Things Services. It is shown that existing Satellite Communication Systems provide traffic transmission for IoT Systems with Cloud Architecture. The proposals are explicated on the possibility of using Fog and Edge Computing for Satellite Communication Systems. The implementation of Fog and Edge computing in IoT Systems requires the modernization of the Low-Earth Orbit (LEO) and Geostationary Orbit (GEO) Satellite Communication Systems, and we show the ways of their enhancement. To increase the efficiency of IoT data processing and the reliability of IoT Data Storage, we propose to construct an Orbital Cloud Data Storage in GEO, which consists of several GEO Satellites - Cloud Computing Data Centers. Such a structure would require the development of methods of access providing to the Orbital Cloud Data Storage. For these purposes, our propositions include using GEO High-Throughput Satellites and satellites from the structure of LEO Satellite Communication. The issues of interaction between Orbital Cloud Data Storage and ground-based Cloud Data Processing and Storage Infrastructure are briefly considered. The orbital slots in GEO are proposed for the location of GEO Satellites - Cloud Computing Data Centers.
APA, Harvard, Vancouver, ISO, and other styles
48

Benatia, Imene, Mohamed Ridda Laouar, Hakim Bendjenna, and Sean B. Eom. "Implementing a Cloud-Based Decision Support System in a Private Cloud." International Journal of Decision Support System Technology 8, no. 1 (January 2016): 25–42. http://dx.doi.org/10.4018/ijdsst.2016010102.

Full text
Abstract:
This paper introduces the architecture and the deployment of a Cloud based decision support system (DSS). The DSS the authors proposed is deployed on a platform Cloud (CloudBees) and managed by the OpenStack infrastructure. The DSS is built on the Cloud Computing architecture with three layers and includes the multiple criteria decision making (MCDM) method PROMETHEE II as well as the procedure of negotiation Hare in order to help the decision makers to select the best urban project. The Cloud based DSS reduces the deployment and processing time, ameliorates the communication and the cooperation between the decision makers, facilitates the accessibility and decrease the cost. The Cloud based multiple criteria DSS the authors designed and implemented has significant advantages. It reduces the deployment and processing time, ameliorates the communication and the cooperation between the decision makers, facilitates the accessibility, and decrease the cost.
APA, Harvard, Vancouver, ISO, and other styles
49

Symonenko, Svitlana V., Viacheslav V. Osadchyi, Svitlana O. Sysoieva, Kateryna P. Osadcha, and Albert A. Azaryan. "Cloud technologies for enhancing communication of IT-professionals." CTE Workshop Proceedings 7 (March 20, 2020): 225–36. http://dx.doi.org/10.55056/cte.355.

Full text
Abstract:
The paper deals with the urgent problem of enabling better communication of IT-specialists in their business and interpersonal interaction using information and communication technologies, including cloud technologies. It is emphasized, that effective communication is an integral part of the successful professional work of IT-professionals, but in recent years it has undergone significant transformations, which have been expressed in new forms and means of communication, its content changes, its complications and volume increases, the need to improve its accuracy, and the level of understanding for a wide range of people. Certain peculiarities of communication in the IT-environment have been discussed. It is noted that typical forms of communication in the IT-environment are synchronous and asynchronous ones. The authors insist that during their professional career IT-specialists communicate in the professional community from a variety of positions and common types of task formulation can be expressed through verbal or symbolic communication means. Due to the specifics of their professional activities, IT-professionals often need to communicate using synchronous communication (chats, video chats, audio chats, instant messaging) and asynchronous communication (email, forums, comments) tools, hence there is a demand to teach corresponding communication skills at universities. Certain practical examples of teaching communication skills using modern technologies are given. Advantages of cloud technologies for better communication within a company or an educational institution are presented. Microsoft Office 365 services, which can be successfully used to enable better communication and collaboration within a company or an educational institution are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
50

Alhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." International Journal of Cloud Applications and Computing 4, no. 1 (January 2014): 45–49. http://dx.doi.org/10.4018/ijcac.2014010104.

Full text
Abstract:
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDTM) for cloud outsourced data is a set of technologies and solutions to enforce security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these algorithms are computationally sophisticated, some hardware accelerators are needed to support high throughput. In this paper, the authors compare between secure data transmission mechanism for cloud outsourced data with preemption control algorithm and TLS to improve the properties of the S SDTM and the Virtual Private Networks (VPN) built with both protocols.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography