Academic literature on the topic 'Cloud computing – Popular works'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cloud computing – Popular works.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cloud computing – Popular works"

1

Djamba, Kalema Josue. "Cloud-Based Centralizing system for academic history, plagiarism prevention management in Higher Education Institution IN DRC: Benefit, Challenges." British Journal of Multidisciplinary and Advanced Studies 3, no. 2 (December 16, 2022): 142–52. http://dx.doi.org/10.37745/bjmas.2022.0062.

Full text
Abstract:
Cloud computing is becoming increasingly popular in the twenty-first century, with demand coming from all sectors of industry, including higher education institutions. In this paper, we address the benefits and limitations of cloud computing in the context of higher education institutions in DRC. Adopting modern cloud computing technology is projected to minimize the cost of IT-based solutions and services, as well as ICT infrastructure. The purpose of this work is to establish a system on cloud based that will enable the centralization and exchange of data on students' academic careers, to prevent plagiarism, to avoid fraud and falsification of transcripts, Share the researches and academic works between the universities to avoid plagiarism. Many challenges must be resolved before cloud computing can be successfully deployed in higher education.
APA, Harvard, Vancouver, ISO, and other styles
2

Karthiga, T. "Cloud Based Video on Demand (VoD) Using DCRP Algorithm." Asian Journal of Computer Science and Technology 1, no. 1 (May 5, 2012): 107–10. http://dx.doi.org/10.51983/ajcst-2012.1.1.1662.

Full text
Abstract:
The attempt to display media files through internet was started from mid-20th century. Several research works have been reported to provide Video on Demand model in distributed like RMI, SOA and Grid Computing. Internet-based cloud computing is a new computing paradigm aiming to provide agile and scalable resource access in a utility-like fashion. The fundamental question is how to configure the cloud utility to meet the highly dynamic demands of such applications at a modest cost. In this paper, a queueing network based model is used to characterize the viewing behaviors of users in a multichannel VoD application, and derive the server capacities needed to support smooth playback in the channels for two popular streaming models, client-server and P2P.Disk Scheduling is used to allocate separate disks to users. A dynamic cloud resource provisioning algorithm is used in which the derived capacities and instantaneous network statistics as inputs, can effectively support VoD streaming with low cloud utilization cost. Analysis and algorithm design are verified and extensively evaluated by applying large-scale experiments under dynamic realistic settings on a cloud platform.
APA, Harvard, Vancouver, ISO, and other styles
3

Xiangyang, Zhu, Dai Hua, Yi Xun, Yang Geng, and Li Xiao. "MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data." Security and Communication Networks 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/1923476.

Full text
Abstract:
With the development of cloud computing, services outsourcing in clouds has become a popular business model. However, due to the fact that data storage and computing are completely outsourced to the cloud service provider, sensitive data of data owners is exposed, which could bring serious privacy disclosure. In addition, some unexpected events, such as software bugs and hardware failure, could cause incomplete or incorrect results returned from clouds. In this paper, we propose an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data based on hierarchical agglomerative clustering, which is named MUSE. In order to improve the efficiency of text searching, we proposed a novel index structure, HAC-tree, which is based on a hierarchical agglomerative clustering method and tends to gather the high-relevance documents in clusters. Based on the HAC-tree, a noncandidate pruning depth-first search algorithm is proposed, which can filter the unqualified subtrees and thus accelerate the search process. The secure inner product algorithm is used to encrypted the HAC-tree index and the query vector. Meanwhile, a completeness verification algorithm is given to verify search results. Experiment results demonstrate that the proposed method outperforms the existing works, DMRS and MRSE-HCI, in efficiency and accuracy, respectively.
APA, Harvard, Vancouver, ISO, and other styles
4

Sang, Yongxuan, Junqiang Cheng, Bo Wang, and Ming Chen. "A three-stage heuristic task scheduling for optimizing the service level agreement satisfaction in device-edge-cloud cooperative computing." PeerJ Computer Science 8 (January 18, 2022): e851. http://dx.doi.org/10.7717/peerj-cs.851.

Full text
Abstract:
Device-edge-cloud cooperative computing is increasingly popular as it can effectively address the problem of the resource scarcity of user devices. It is one of the most challenging issues to improve the resource efficiency by task scheduling in such computing environments. Existing works used limited resources of devices and edge servers in preference, which can lead to not full use of the abundance of cloud resources. This article studies the task scheduling problem to optimize the service level agreement satisfaction in terms of the number of tasks whose hard-deadlines are met for device-edge-cloud cooperative computing. This article first formulates the problem into a binary nonlinear programming, and then proposes a heuristic scheduling method with three stages to solve the problem in polynomial time. The first stage is trying to fully exploit the abundant cloud resources, by pre-scheduling user tasks in the resource priority order of clouds, edge servers, and local devices. In the second stage, the proposed heuristic method reschedules some tasks from edges to devices, to provide more available shared edge resources for other tasks cannot be completed locally, and schedules these tasks to edge servers. At the last stage, our method reschedules as many tasks as possible from clouds to edges or devices, to improve the resource cost. Experiment results show that our method has up to 59% better performance in service level agreement satisfaction without decreasing the resource efficiency, compared with eight of classical methods and state-of-the-art methods.
APA, Harvard, Vancouver, ISO, and other styles
5

Yogi, Manas Kumar, K. Ganga, and Devi Bhavani. "Green IOT: Principles, Current Trends, Future Directions." International Journal of Advance Research and Innovation 6, no. 3 (2018): 27–32. http://dx.doi.org/10.51976/ijari.631805.

Full text
Abstract:
The two trending and popular technologies are Cloud Computing (CC) and the Internet of Things (IoT) are current hot discussions in the field of agriculture and healthcare applications. Motivated by achieving a sustainable world, this paper discusses various technologies and issues regarding green cloud computing and green Internet of Things, further improves the discussion with the reduction in energy consumption of the two techniques (CC and IoT) combination in agriculture and healthcare systems. The history and concept of the hot green information and communications technologies (ICT’s) which are enabling green IoT will be discussed. Green computing introduction first and later focuses on the recent works done regarding the emerging technologies. Finally, lists out the advantages, challenges, and future research directions related to green application design. Our research aims to make green area broad and contribution to sustainable application world.
APA, Harvard, Vancouver, ISO, and other styles
6

Luo, Yingyu. "Semantic Characteristics of the Emerging Popular Construction "Cloud X" in Modern Chinese Language." Transactions on Social Science, Education and Humanities Research 7 (May 6, 2024): 134–43. http://dx.doi.org/10.62051/8njcxg38.

Full text
Abstract:
Accompanied by the development of the Internet and big data, "cloud X" has become a popular construction that is more frequently used in the Internet in recent years. Studying and analyzing the generation mechanism and evolution process of "Cloud X" is of great reference significance for understanding the development of popular words in the new period and the word formation process of popular words. Therefore, this paper analyzes the popular word "cloud X" from the semantic perspective, taking the semantic evolution of "Yun (cloud)" as the entry point. In the process of exploring "Yun (cloud)", this paper will focus on the transformation of the semantic features of "Yun (cloud)", observing the original meaning of "Yun (cloud)",Yun (cloud)" in "cloud computing", and the semantic features of "Yun (cloud)" after "cloud X" has become a construction. By examining the similarities and differences of the semantic features, we can explore the process of "Yun (cloud)" gradually changing from a real word to a class of affixes and the reasons for the change.
APA, Harvard, Vancouver, ISO, and other styles
7

Narawade, Dr Navnath. "Campus Automation Using Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 20, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31117.

Full text
Abstract:
The project, we propose is “Campus automation”, which is considered a website for a college, the main aim of this project is to change college website content dynamically online and provide a user interface application. The above aim can be established by creating a layout Structural module and each module may have a sub-module. This will provide information about the college campus in which staff, students, and HOD can access this information and will be familiar with the college campus. When campus automation technology is integrated with popular web services it can be utilized securely by an even larger audience. By leveraging the power of cloud computing, the system offers scalability, reliability, and accessibility. It allows users to access the platform from anywhere, at any time, using a web browser, thereby facilitating seamless collaboration and communication among stakeholders. Overall, the proposed Campus Automation System aims to modernize campus management processes, streamline administrative tasks, improve communication, and enhance the overall efficiency of educational institutions. By harnessing the capabilities of cloud computing and the MERN stack, the system promises to deliver a robust, scalable, and user-friendly solution tailored to the needs of modern educational institutions. Key Words: Campus automation, cloud computing, MERN stack, web services
APA, Harvard, Vancouver, ISO, and other styles
8

Wasim Akram, Sk, Dr P. Rajesh, and SK Shama. "A review report on challenges and opportunities of edge, fog and cloud computing by employing IoT technology." International Journal of Engineering & Technology 7, no. 3.29 (August 24, 2018): 263. http://dx.doi.org/10.14419/ijet.v7i3.29.18808.

Full text
Abstract:
In the future, various information and things will be connected to the network. People can now live more convenient and comfortable life where the things and information coordinated together. A world where things are connected to network is referred as IOT (Internet of Things). A huge amount of incomplete data is generated by IOT need to process and responded to very short time. This pose challenge of dealing with big data from many geometrically distributed data sources which are to be managed and processed. To achieve this objective, cloud computing is a treated as one of the popular choice due to its scalability, storage, computational and other capabilities. However current cloud models are not intended to handle the essentials of IOT– volume, variety, and velocity of data. Moreover, as the physical distance between cloud and user increases, transmission latency increases with it, increasing response time and stressing of the user. In addition to that, the processing speed in this environment is largely dependent on the performance of user device. The viable solution to these problems is identified as Edge Computing. The Edge Computing platform works by allowing some application processing to be performed by a small edge server position between the cloud and user, and crucially in a location physically closed to the user. This paper comprehensively presents various research trends that are available in Edge, Fog computing along with a comparison is made among Cloud. Particularly the architecture, characteristics, key technologies, potential applications, security issues and challenges of Edge, Fog and Cloud Computing are discussed and summarized.
APA, Harvard, Vancouver, ISO, and other styles
9

Antonova, Аlfiia, and Svitlana Bartkova. "An overview of the advantages of cloud computing and online IDE." Automation of technological and business processes 12, no. 3 (November 5, 2020): 47–50. http://dx.doi.org/10.15673/atbp.v12i3.1927.

Full text
Abstract:
The article discusses cloud computing and their impact on the field of software development, and analyzes several issues of developers that can be solved using the online IDE. Usage of cloud computing in the enterprise is not new, and it is not difficult in terms of implementation. That is why it is gaining popularity. First, due to the large number of technologies that allow you to optimize internal processes. Secondly, due to the large number of giant companies and small businesses that use these technologies. Cloud computing is very interesting in financial terms. After all, they allow not spending money on building and supporting the infrastructure. One can also not worry about risks, such as, for example, equipment that affects the system, weather conditions, and so on. It takes on all these moments. Evolving of architectural solutions also increases the impact on cloud technology. A service-oriented approach to software development is becoming increasingly popular. It is less and less possible to see the usual thin client and a single server-monolith. Clients are becoming more complex, attracting part of the business logic, servers are divided into parts, each of which is responsible for a particular part of the subject area, and in some cases may not know about the existence of others. The IDE, which requires developers for programming, also has analogs on the web platform. The online IDE has its advantages for solving some tasks and has become increasingly popular lately. Users of the online IDE can create, run, and customize software that works with a simple browser. The main goal of this study is to determine the main advantages of cloud technologies in the application development process, analyze the segment of online IDE. Based on these data to identify the main situations that determine their use, predict further development, and identify principles and technologies used in this area.
APA, Harvard, Vancouver, ISO, and other styles
10

Carvalho, Juliana, Dario Vieira, Christiano Rodrigues, and Fernando Trinta. "LM2K Model for Hosting an Application Based on Microservices in Multi-Cloud." Sensors 23, no. 9 (May 2, 2023): 4450. http://dx.doi.org/10.3390/s23094450.

Full text
Abstract:
Cloud computing has become a popular delivery model service, offering several advantages. However, there are still challenges that need to be addressed when applying the cloud model to specific scenarios. Two of such challenges involve deploying and executing applications across multiple providers, each comprising several services with similar functionalities and different capabilities. Therefore, dealing with application distributions across various providers can be a complex task for a software architect due to the differing characteristics of the application components. Some works have proposed solutions to address the challenges discussed here, but most of them focus on service providers. To facilitate the decision-making process of software architects, we previously presented PacificClouds, an architecture for managing the deployment and execution of applications based on microservices and distributed in a multi-cloud environment. Therefore, in this work, we focus on the challenges of selecting multiple clouds for PacificClouds and choosing providers that best meet the microservices and software architect requirements. We propose a selection model and three approaches to address various scenarios. We evaluate the performance of the approaches and conduct a comparative analysis of them. The results demonstrate their feasibility regarding performance.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Cloud computing – Popular works"

1

Anderson, Joanna M., and Wendy Doucette. "Instant, Easy, Free Cloud Computing With Google and Microsoft 365." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/388.

Full text
Abstract:
Getting into the cloud is easier than you think, and its advantages are immediate. Would you like a backup of all your files you can access from anywhere? How about keeping all your files in sync and editing and sharing them with a group, from wherever you all are? We will discuss the advantages of the Google and Microsoft cloud suites, and why both are better than Dropbox or other standalone storage services. If you and your patrons are interested in a synchronized mailbox and calendar with free access to documents, spreadsheets, forms, presentation software and more, we’ll show you how to get started, increase your productivity and streamline your life.
APA, Harvard, Vancouver, ISO, and other styles
2

Tolley, Rebecca. "Review of Getting Started with Cloud Computing: A LITA Guide." Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/5620.

Full text
Abstract:
Review of Getting Started with Cloud Computing: A LITA Guide. Eds. Edward M. Corrado and Heather Lea Moulaison. New York: Neal-Schuman Publisher, Inc., 2011. 214p. alk. paper, $65 (ISBN 9781555707491).
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cloud computing – Popular works"

1

Hurwitz, Judith. Hybrid cloud for dummies. Hoboken, New Jersey: John Wiley & Sons, Inc., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

McGrath, Alister E. A cloud of witnesses: Ten great Christian thinkers. Grand Rapids, Mich: Zondervan Pub. House, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McGrath, Alister E. A cloud of witnesses: Ten great Christian thinkers. Leicester, England: Inter-Varsity Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Talking back: Custom-made online computing. Englewood Cliffs, N.J: Micro Text Publications, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

White, Ron. PC/Computing how computers work. Emeryville, Calif: Ziff-Davis Press, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chartier, Timothy P. Math bytes: Google bombs, chocolate-covered pi, and other cool bits in computing. Princeton, NJ, USA: Princeton University Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Watson, Ian. The universal machine: From the dawn of computing to digital consciousness. New York: Copernicus Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Williams, Colin P. Ultimate zero and one: Computing at the quantum frontier. New York: Copernicus, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Parsons, June Jamrich. Computer concepts. 7th ed. Australia: Course Technology Cengage Learning, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dan, Oja, ed. Computer concepts: Illustrated, brief. 6th ed. Boston, Mass: Thomson/Course Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cloud computing – Popular works"

1

García-López, Pedro, Marc Sánchez-Artigas, Simon Shillaker, Peter Pietzuch, David Breitgand, Gil Vernik, Pierre Sutra, Tristan Tarrant, Ana Juan-Ferrer, and Gerard París. "Trade-Offs and Challenges of Serverless Data Analytics." In Technologies and Applications for Big Data Value, 41–61. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78307-5_3.

Full text
Abstract:
AbstractServerless computing has become very popular today since it largely simplifies cloud programming. Developers do no longer need to worry about provisioning or operating servers, and they have to pay only for the compute resources used when their code is run. This new cloud paradigm suits well for many applications, and researchers have already begun investigating the feasibility of serverless computing for data analytics. Unfortunately, today’s serverless computing presents important limitations that make it really difficult to support all sorts of analytics workloads. This chapter first starts by analyzing three fundamental trade-offs of today’s serverless computing model and their relationship with data analytics. It studies how by relaxing disaggregation, isolation, and simple scheduling, it is possible to increase the overall computing performance, but at the expense of essential aspects of the model such as elasticity, security, or sub-second activations, respectively. The consequence of these trade-offs is that analytics applications may well end up embracing hybrid systems composed of serverless and serverful components, which we call ServerMix in this chapter. We will review the existing related work to show that most applications can be actually categorized as ServerMix.
APA, Harvard, Vancouver, ISO, and other styles
2

Venkatesh, K., R. Velvizhi, K. Selva Banu Priya, and N. Sivaranjani. "Deep Dive on Popular Security Models and Strategies of Cloud Computing." In Privacy and Security Challenges in Cloud Computing, 147–70. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Yan. "Mobile Edge Computing." In Simula SpringerBriefs on Computing, 9–21. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83944-4_2.

Full text
Abstract:
AbstractMobile edge computing is a promising paradigm that brings computing resources to mobile users at the network edge, allowing computing-intensive and delay-sensitive applications to be quickly processed by edge servers to satisfy the requirements of mobile users. In this chapter, we first introduce a hierarchical architecture of mobile edge computing that consists of a cloud plane, an edge plane, and a user plane. We then introduce three typical computation offloading decisions. Finally, we review state-of-the-art works on computation offloading and present the use case of joint computation offloading.
APA, Harvard, Vancouver, ISO, and other styles
4

Kannan, M., C. Priya, L. William Mary, S. Madhan, and V. Sri Priya. "Effective Role of Cloud-Based IoT Technology in Smart and Precision Horticulture Works: A Novel." In Intelligent Computing and Innovation on Data Science, 69–79. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3284-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chang, Ruay-Shiung, and Jih-Sheng Chang. "Pervasive Grid and its Applications." In Grid and Cloud Computing, 260–71. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0879-5.ch112.

Full text
Abstract:
With the advancements of computer system and communication technologies, Grid computing can be seen as the popular technology bringing about significant revolution for the next generation distributed computing application. As regards general users, a grid middleware is complex to setup and necessitates a steep learning curve. How to access to the grid system transparently from the point of view of users turns into a critical issue then. Therefore, various challenges may arise from the incomprehensive system design as coordinating existing computing resources for the sake of achieving pervasive grid environment. The authors are going to investigate into the current research works of pervasive grid as well as analyze the most important factors and components for constructing a pervasive grid system here. Finally, in order to facilitate the efficiency in respect of teaching and research within a campus, they would like to introduce their pervasive grid platform.
APA, Harvard, Vancouver, ISO, and other styles
6

Faheem, Muhammad, Mohand-Tahar Kechadi, and Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment." In Mobile Computing and Wireless Networks, 2111–31. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8751-6.ch092.

Full text
Abstract:
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
APA, Harvard, Vancouver, ISO, and other styles
7

Chitra, M. P., R. S. Ponmagal, N. P. G. Bhavani, and V. Srividhya. "An Approach to Cloud Computing for Medical Image Analysis." In AI Innovation in Medical Imaging Diagnostics, 164–93. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3092-4.ch010.

Full text
Abstract:
Cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major problems facing cloud service providers and their customers. Cloud data allocation facilities that allow groups of users to work together to access the shared data are the most standard and effective working styles in the enterprises. So, in spite of having advantages of scalability and flexibility, cloud storage service comes with confidential and security concerns. A direct method to defend the user data is to encrypt the data stored at the cloud. In this research work, a secure cloud model (SCM) that contains user authentication and data scheduling approach is scheduled. An innovative digital signature with chaotic secure hashing (DS-CS) is used for user authentication, followed by an enhanced work scheduling based on improved genetic algorithm to reduce the execution cost.
APA, Harvard, Vancouver, ISO, and other styles
8

Rathore, Maya, and Ugrasen Suman. "A Collaborative Ranking Approach for Discovery and Selection of Cloud Services." In Encyclopedia of Information Science and Technology, Fifth Edition, 190–206. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3479-3.ch015.

Full text
Abstract:
Cloud computing is getting more popular due to its extraordinary features such as on-demand availability of computing resources and software services. A variety of services have been deployed to offer analogous functionalities. However, the difficulty to identify reliable services has fascinated the attention of researchers. Thus, the trust and reputation concept have been introduced to evaluate the trustworthiness of services over cloud. Most of the existing research works fully trust on service user's feedback rating for ranking cloud services, which may often lead to biasness towards positive and negative feedback rating. To avoid aforementioned issues, this chapter proposes a novel approach to evaluate cloud service reputation along with cloud service reputation evaluation model to discover reliable cloud services. Experimental result shows that proposed approach provides effective solution for prediction of cloud service reputation, which can be helpful in performing reliable service discovery and selection over cloud.
APA, Harvard, Vancouver, ISO, and other styles
9

Faheem, Muhammad, Mohand-Tahar Kechadi, and Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment." In Web-Based Services, 2324–44. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9466-8.ch103.

Full text
Abstract:
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
APA, Harvard, Vancouver, ISO, and other styles
10

Mishra, Nilamadhab, Basanta Kumar Padhi, and Banaja Basini Rath. "Mobile Cloud Computing Framework for an Android-Based Metaverse Ecosystem Platform." In Advances in Computational Intelligence and Robotics, 237–54. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8851-5.ch012.

Full text
Abstract:
Mobile cloud computing (MCC), which combines mobile computing and cloud computing, has become one of the industry's most common terms and a major topic of discussion in the IT world. Mobile clients are becoming popular clients for consuming any web resources, particularly web services (WS), as mobile network infrastructures improve. However, there are problems connecting mobile devices to existing WS. This research focuses on three of the following challenges: loss of connection, bandwidth, latency, and limited resources. This research proposes to develop and implement a cross-platform architecture for connecting mobile devices to the web. The architecture includes mobile service clients that work on any platform and a Metaverse ecosystem that makes it easier for mobile clients and WS to talk to each other. Finally, the Metaverse ecosystem can be deployed on the cloud metaverse platform, which may create more immersive and dynamic virtual worlds that are accessible to a wider audience by utilizing the power of the cloud.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cloud computing – Popular works"

1

R. S, Bala Kumar, and Sujitha R. "Efficient Privacy-Preserving Biometric Identification in Cloud Computing." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.

Full text
Abstract:
Benefited from its reliability and convenience, biometric identification has become one of the most popular authentication technologies. Due to the sensitivity of biometric data, various privacy-preserving biometric identification protocols have been proposed. However, the low computational efficiency or the security vulnerabilities of these protocols limit their wide deployment in practice. To further improve the efficiency and enhance the security, in this project, propose two new privacy-preserving biometric identification outsourcing protocols. One mainly utilizes the efficient Householder transformation and permutation technique to realize the high-efficiency intention under the known candidate attack model. The other initializes a novel random split technique and combines it with the invertible linear transformation to achieve a higher security requirement under the known-plaintext attack model. Also, argue the security of our proposed two protocols with a strict theoretical analysis and, by comparing them with the prior existing works, comprehensively evaluate their efficiency.
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Fan, Carson Kai-Sang Leung, and Syed K. Tanbeer. "Finding Popular Friends in Social Networks." In 2012 International Conference on Cloud and Green Computing (CGC). IEEE, 2012. http://dx.doi.org/10.1109/cgc.2012.99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cui, Anqi, Min Zhang, Yiqun Liu, and Shaoping Ma. "Are the URLs really popular in microblog messages?" In 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2011. http://dx.doi.org/10.1109/ccis.2011.6045021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Fan, Carson Kai-Sang Leung, Dacheng Liu, and Aaron M. Peddle. "Discovery of Really Popular Friends from Social Networks." In 2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud). IEEE, 2014. http://dx.doi.org/10.1109/bdcloud.2014.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Devi, Niketa, Dr Deepak Asrani, and Dr Komal Asrani. "A Critical Review on Cloud Brokerage Services." In Computing for Sustainable Innovation: Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.1.

Full text
Abstract:
Cloud Brokerage Service (CBS) budding technology that has become popular with cloud computing. CBS is a middleman providing value added services. This paper provides a systematic literature review on this topic, covering multiple publications during last preceding 10 years. The paper is aiming to provide an overview of CBS research status, and give suggestions on how CBS research should proceed.
APA, Harvard, Vancouver, ISO, and other styles
6

Zinn, Daniel, Quinn Hart, Bertram Ludascher, and Yogesh Simmhan. "Streaming satellite data to cloud workflows for on-demand computing of environmental data products." In 2010 5th Workshop on Workflows in Support of Large-Scale Science (WORKS). IEEE, 2010. http://dx.doi.org/10.1109/works.2010.5671841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, Li, and Xiangtao Qi. "Research on The Construction of Ontology-based Music Works Knowledge Base." In ICCBDC 2023: 2023 7th International Conference on Cloud and Big Data Computing. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3616131.3616143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saab, Salwa Adriana, Ali Chehab, and Ayman Kayssi. "Energy efficiency in Mobile Cloud Computing: Total offloading selectively works. Does selective offloading totally work?" In 2013 Fourth Annual International Conference on Energy Aware Computing Systems and Applications (ICEAC). IEEE, 2013. http://dx.doi.org/10.1109/iceac.2013.6737657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

S, Divya, and Gini R. "Enhancing Data Security in Cloud Computing using Block chain." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/kjqt5979/ngcesi23p26.

Full text
Abstract:
Block chain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome these difficulties, we propose integrating Block chain and SDN in the cloud computing platform. In this research, we introduce the “DistB-SD Cloud” architecture to better secure clouds. Moreover, we leverage a distributed Block chain approach to convey security, confidentiality, privacy, integrity, adaptability, and scalability in the proposed architecture. BC provides a distributed or decentralized and efficient environment for users. Also, we present an SDN approach to improving the reliability, stability, and load balancing capabilities of the cloud infrastructure. Finally, we provide an experimental evaluation of the performance of our SDN and BCbased implementation using different parameters, also monitoring some attacks in the system and proving its efficacy.
APA, Harvard, Vancouver, ISO, and other styles
10

Suciu, George, Muneeb Anwar, and Roxana Mihalcioiu. "VIRTUALIZED VIDEO AND CLOUD COMPUTING FOR EFFICIENT ELEARNING." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-114.

Full text
Abstract:
Multimedia content has become more and more popular in current eLearning platforms. However, there are still many use cases which require virtualized resources from cloud platforms: gamification, video analytics, and surveillance during exams, video conferencing for coaching, and video streaming (live and video-on-demand) services. This paper has the purpose to present how video services can exploit the virtualization techniques to provide ubiquitous video learning experience. Virtualization consists of multiple operating systems on a single physical system. Virtualization shares the underlying hardware resources, providing multiple execution environments for software partitioning and time-sharing. Furthermore, virtualization is the basis for cloud computing, which is adaptable and secure sharing of resources as a service, leading to ease of use for different types of computing platforms. This gives to the teachers the authority to deploy their curricula to new channels and to promote it with efficient video communication solutions. It is expected, from this point of view, that virtualization will contribute in a beneficial way to these use cases. The main concept we present in this paper is how to virtualize the video services and utilizing them combined with other eLearning techniques, whereas the virtualization technique permits virtualization for full server machines along with the whole operating system. The main objective is to demonstrate they can be monitored and easily be maintained, as well being extremely secure and provide uninterrupted services. Furthermore, virtualized video using Cloud would establish and provide quality eLearning relationships regardless of distance and devices or operating systems, being accessible through a web browser.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cloud computing – Popular works"

1

Osadcha, Kateryna P., and Viacheslav V. Osadchyi. The use of cloud computing technology in professional training of future programmers. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4435.

Full text
Abstract:
The article provides a brief analysis of the current state of the study of cloud technologies by future software engineers at foreign and Ukrainian universities. The author experience in the application of cloud technologies in the training of future software engineers in Ukraine is presented. The application of cloud business automation systems, online services to monitor the implementation of the software projects, Google services for collaboration, planning and productivity while studying professional disciplines and carrying out diploma projects is described. Based on the survey conducted at Stackoverflow, the state of application of cloud technologies by software engineers around the world has been analyzed. The cloud technologies that are not studied at the analyzed universities of Ukraine and those that are not popular with software developers in the world, but studied at Ukrainian universities by future software engineers are outlined. Conclusions are made on the modernization of training programs for future software engineers. Topics for the study of cloud technologies by future software engineers in the content of professional disciplines are proposed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography