Showing 61 - 80 results of 153 for search '"cloud services"', query time: 0.07s Refine Results
  1. 61

    Using deep learning for detecting BotCloud by Guang KOU, Guang-ming TANG, Shuo WANG, Hai-tao SONG, Yuan BIAN

    Published 2016-11-01
    “…The differences of the basic network flow characteristics between BotCloud and normal cloud services were not obvious, and this led to the inefficiency of the method in BotCloud detection based on network flow characteristics analysis. …”
    Get full text
    Article
  2. 62

    Virtual reality compressing and transmitting system based on mobile edge computing by Bin TAN, Songyuan ZHAO, Jun WU, Wenru ZHANG

    Published 2020-04-01
    “…In order to solve the problem of the high requirements of data transmission rate and sensitivity to transmission delay in virtual reality (VR) based on cloud services,a Cloud VR system with MEC (mobile edge computing) was proposed,mainly including viewpoint-based VR processing and HDA (hybrid digital-analog) transmission optimization.Firstly,a dynamic streaming method based on user viewpoint and pyramid projection was used to implement a complete edge cloud VR system.Then,HDA transmission was introduced to optimize the transmission,and a heuristic algorithm for resource allocation was given.Finally,the base station protocol stack was transformed,and the MEC was integrated into the LTE (long term evolution) system to implement a complete mobile edge cloud VR system.Experimental results demonstrate that the proposed scheme has good robustness and efficient transmission by comparing with the existing schemes.…”
    Get full text
    Article
  3. 63

    PERSONALIZED MOOCS IN BLENDED LEARNING by Vyacheslav A. Starodubtsev

    Published 2016-12-01
    “…With the aim to reduce the egalitarian nature of the MOOCs («one size fits all») the pedagogical design of personalized MOOCs suggests the differentiation contingent on individual «profiles», tiered content composition, tested previously, when creating digital manuals on local media (CD and DVD), updating content with the participation of learners, formative assessment with the participation of reviewers from different groups of the contingent, pedagogical support at the request of a user, and an integration of MOOCs platforms with social media cloud services. The certification of MOOCs as elements of the education programs at the level of universities associations is proposed.…”
    Get full text
    Article
  4. 64

    Research progress of trusted sensor-cloud based on fog computing by Tian WANG, Xuewei SHEN, Hao LUO, Baisheng CHEN, Guojun WANG, Weijia JIA

    Published 2019-03-01
    “…The sensor-cloud is combined with cloud computing and wireless sensor networks,which extends the service ability of WSN by the support of cloud computing.It is one of the hot topics among the current researches.After comparing and surveying the mainstream system adequately,the characteristics and development of sensor-Cloud were summed up.Then,the direct influence of existing trust issues in the system for data protection and application on upper layer were found.The announced reasons explained that existing schemes were difficult to provide trusted sensor-cloud services.This was because that the capabilities of the underlying WSN nodes were too weak,and cloud computing model lacked the direct management of underlying nodes and data and so on.The trusted structures based on fog computing were given,and the key technologies of trusted evaluation,trusted data collection,and trusted storage were designed.Finally,the discussion pointed out new views for the researches in trusted sensor-cloud.…”
    Get full text
    Article
  5. 65

    Services selection based on trust evolution and union for cloud computing by HU Chun-hua1, LIU Ji-bo1, LIU Jian-xun3

    Published 2011-01-01
    “…It was difficult for the service consumers to obtain high-quality composite services because of the existence of false or malicious service nodes in cloud computing environment.A novel cloud service-composition method based on the trust span tree was proposed.The trust relationship could be built after many times credible interaction between ser-vices requester and provider,and the trust union would be formed through the credible relationship evolution.So that the uncertain or malicious service should be excluded from the trust span tree,and the service composition would be carried out in a trust environment.At the same time,the measuring strategy of trust relationship among cloud services based on information entropy was designed,which could resolve the deficiencies of the trust parameter analysed by simply weighted angle in the previous studies.The experimental result shows that the method proposed in this paper is more su-perior in credibility and security,comparing to the traditional services selection methods.…”
    Get full text
    Article
  6. 66

    Research on Wi-Fi indoor positioning technology based on knowledge graph by Jiandong LI, Jingjing YANG, Ming HUANG

    Published 2022-06-01
    “…Among the common Wi-Fi indoor positioning methods, most of the research focuses on the positioning accuracy, a little is on the application system to organize and process the existing indoor data efficiently in order to realize the indoor location service.To deal with these issues, the knowledge graph with the traditional indoor positioning technology was combined, and a practical positioning system was built with a variety of software development technologies.The system integrates the physical space and the information space.The information space includes indoor information acquisition, cloud services, information storage and computing parts.The physical space expresses the structure of the indoor space and data relationships.Finally, the WEBGL technology was used to display intuitive positioning and realize the visualization of indoor signal data and positioning results.The system has a complete data storage and use mechanism.After integrating the existing data information of the indoor internet of things equipment, it can provide users with room-level location services.The step-by-step positioning function of the system helps to reduce the time consumption of the system.…”
    Get full text
    Article
  7. 67

    Continuous User Verification in Cloud Storage Services using Deep Learning by burhan albayati

    Published 2025-01-01
    “…A credible accuracy has been achieved when applying the method in a variety of applications such as telecommunication, credit card, and cloud services to detect and monitor misuse. To increase the accuracy of making a reliable decision, this paper proposes to combine two private datasets which are real-life user interactions with the desktop computer and Dropbox Cloud storage. …”
    Get full text
    Article
  8. 68

    QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm by Weihang Shi

    Published 2015-01-01
    “…It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE) seriously. …”
    Get full text
    Article
  9. 69

    A Service Recommendation Method Based on Requirements for the Cloud Environment by Liangmin Guo, Kaixuan Luan, Xiaoyao Zheng, Jing Qian

    Published 2021-01-01
    “…In the cloud computing environment, there are huge amounts of functionally similar cloud services. Additionally, user requirements can change. …”
    Get full text
    Article
  10. 70

    Survey on data security and privacy-preserving for the research of edge computing by Jiale ZHANG, Yanchao ZHAO, Bing CHEN, Feng HU, Kun ZHU

    Published 2018-03-01
    “…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
    Get full text
    Article
  11. 71

    Intent-driven cloud-network convergence on-demand orchestration by Lulu ZHANG, Chungang YANG, Dong WANG, Ying OUYANG, Tong LI, Junjie GUO, Ru DONG

    Published 2022-10-01
    “…With the rapid development of cloud computing and Internet technology, user service demands show a diversified development trend, and cloud-network convergence has become an important choice for the development of the current information and communication industry.At present, cloud-network convergence only achieves simple cloud-network interconnection, which can not overcome the heavy problems of diversified service demands and massive heterogeneous resource supply.Therefore, promoting cloud-network convergence still requires strengthening the on-demand delivery capability of cloud services.Intent-driven network, as a new networking paradigm, becomes a viable option to solve this dilemma.The research status of cloud-network convergence was sorted out, and the research necessity of intention-driven cloud-network convergence business on-demand orchestration was summarized.Furthermore, the intent-driven cloud-network convergence architecture and its key technologies were proposed and analyzed, and on this basis, an on-demand orchestration model of cloud business was proposed.Finally, in the hybrid cloud interconnection and industrial Internet scenarios, the intent-driven on-demand orchestration model of cloud business was analyzed, and the future prospects were introduced.…”
    Get full text
    Article
  12. 72

    A Method of Extracting Ontology Module Using Concept Relations for Sharing Knowledge in Mobile Cloud Computing Environment by Keonsoo Lee, Seungmin Rho, Seok-Won Lee

    Published 2014-01-01
    “…In mobile cloud computing environment, the cooperation of distributed computing objects is one of the most important requirements for providing successful cloud services. To satisfy this requirement, all the members, who are employed in the cooperation group, need to share the knowledge for mutual understanding. …”
    Get full text
    Article
  13. 73

    Leveraging OpenSimMPLS: A simulation platform for GoS/MPLS networks in research and education by Manuel Domínguez-Dorado, Javier Carmona-Murillo, David Cortés-Polo, Francisco J. Rodríguez-Pérez, Jesús Galeano-Brajones, Jesús Calle-Cancho

    Published 2025-02-01
    “…Despite new technologies, MPLS remains vital for traffic engineering, ensuring Quality of Service (QoS) for high-demand applications like video streaming and cloud services. It also supports Software Defined Networks (SDN) and Network Functions Virtualization (NFV) by managing data paths and resources in virtualized environments. …”
    Get full text
    Article
  14. 74

    The Approach to the Library Institution in 2015-2018 Information Society Strategy and Action Plan of Turkey by Şenol Karadeniz, Bülent Yılmaz

    Published 2016-03-01
    “…Apart from these, however, it is understood that issues such as the dissemination of cloud services; the infrastructure measures to reduce the digital division; the training of qualified human resources needed in the ICT sector and the penetration of information technology in society are also in relation with the libraries. …”
    Get full text
    Article
  15. 75

    Characterizing the role of vehicular cloud computing in road traffic management by Iftikhar Ahmad, Rafidah Md Noor, Ihsan Ali, Muhammad Imran, Athanasios Vasilakos

    Published 2017-05-01
    “…A taxonomy of vehicular cloud services is also provided to explore the object types involved and their positions within the vehicular cloud. …”
    Get full text
    Article
  16. 76

    A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment by Sanchika Gupta, Padam Kumar, Ajith Abraham

    Published 2013-03-01
    “…Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include software as a service, platform as a service, and infrastructure as a service. …”
    Get full text
    Article
  17. 77

    Efficiency of Semantic Web Implementation on Cloud Computing: A Review by Kazheen Ismael Taher, Rezgar Hasan Saeed, Rowaida Kh. Ibrahim, Zryan Najat Rashid, Lailan M. Haji, Naaman Omar, Hivi Ismat Dino

    Published 2021-06-01
    “…As a result, issues with portability, interoperability, security, selection, negotiation, discovery, and definition of cloud services and resources may arise. Semantic Technologies, which has enormous potential for cloud computing, is a vital way of re-examining these issues. …”
    Get full text
    Article
  18. 78

    IoT-based home control system using NodeMCU and Firebase by Paul Oluwatobiloba Ayeni, Olayiwola Charles Adesoba

    Published 2024-11-01
    “…This IoT-based home control system shows the potential of integrating microcontrollers with cloud services to create a smart, responsive and user-friendly home control platform. …”
    Get full text
    Article
  19. 79

    Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms by Ali Alhchaimi

    Published 2024-06-01
    “…Implication: The study provides a guide for financial and cloud services to implement sophisticated fraud detection systems. …”
    Get full text
    Article
  20. 80

    Digital maturity of business: Technological gap and limitations of digital transformation by I. S. Prokhorova, P. M. Gureev

    Published 2023-06-01
    “…As a result of the study, it was found that the main reasons for the unsystematic processes of digitalization of Russian business are the low quality of business digitalization with high digital activity and low technological capabilities for implementing Industry 4.0 technologies due to the limited use of the Internet mobile network in business, business cybersecurity tools, Internet communications and cloud services. The increment of knowledge consists in determining the technological principle of digital business transformation at the global level – this is a mobile device operating on the principles of machine-to-machine interaction M2M with big data IoT (Internet of things) based on 5G speeds and Wi-Fi 6 communication standards, as well as identifying a system of indicators for monitoring the technological basis for managing the “digital maturity” of a business.…”
    Get full text
    Article