Mobile Multimedia Cloud Computing and the Web

Author(s):  
Dejan Koavchev ◽  
Yiwei Cao ◽  
Ralf Klamma
2014 ◽  
pp. 1-20 ◽  
Author(s):  
Jiehan Zhou ◽  
Haibin Zhu ◽  
Mika Ylianttila ◽  
Mika Rautiainen

Author(s):  
Ramandeep Kaur ◽  
Navpreet Kaur

The cloud computing can be essentially expressed as aconveyance of computing condition where distinctive assets are conveyed as a support of the client or different occupants over the web. The task scheduling basically concentrates on improving the productive use of assets and henceforth decrease in task fruition time. Task scheduling is utilized to allot certain tasks to specific assets at a specific time occurrence. A wide range of systems has been exhibited to take care of the issues of scheduling of various tasks. Task scheduling enhances the productive use of asset and yields less reaction time with the goal that the execution of submitted tasks happens inside a conceivable least time. This paper talks about the investigation of need, length and due date based task scheduling calculations utilized as a part of cloud computing.


Author(s):  
M. Ilayaraja ◽  
S. Hemalatha ◽  
P. Manickam ◽  
K. Sathesh Kumar ◽  
K. Shankar

Cloud computing is characterized as the arrangement of assets or administrations accessible through the web to the clients on their request by cloud providers. It communicates everything as administrations over the web in view of the client request, for example operating system, organize equipment, storage, assets, and software. Nowadays, Intrusion Detection System (IDS) plays a powerful system, which deals with the influence of experts to get actions when the system is hacked under some intrusions. Most intrusion detection frameworks are created in light of machine learning strategies. Since the datasets, this utilized as a part of intrusion detection is Knowledge Discovery in Database (KDD). In this paper detect or classify the intruded data utilizing Machine Learning (ML) with the MapReduce model. The primary face considers Hadoop MapReduce model to reduce the extent of database ideal weight decided for reducer model and second stage utilizing Decision Tree (DT) classifier to detect the data. This DT classifier comprises utilizing an appropriate classifier to decide the class labels for the non-homogeneous leaf nodes. The decision tree fragment gives a coarse section profile while the leaf level classifier can give data about the qualities that influence the label inside a portion. From the proposed result accuracy for detection is 96.21% contrasted with existing classifiers, for example, Neural Network (NN), Naive Bayes (NB) and K Nearest Neighbor (KNN).


Author(s):  
Marlon C. Domenech ◽  
Leonardo P. Rauta ◽  
Marcelo Dornbusch Lopes ◽  
Paulo H. Da Silva ◽  
Rodrigo C. Da Silva ◽  
...  

Sensors ◽  
2016 ◽  
Vol 16 (2) ◽  
pp. 246 ◽  
Author(s):  
Guangjie Han ◽  
Wenhui Que ◽  
Gangyong Jia ◽  
Lei Shu

Author(s):  
Satish C. Sharma ◽  
Harshila Bagoria

Cloud computing is a new breed of service offered over the Internet, which has completely changed the way one can use the power of computers irrespective of geographic location. It has brought in new avenues for organizations and businesses to offer services using hardware or software or platform of third party sources, thus saving on cost and maintenance. It can transform the way systems are built and services delivered, providing libraries with an opportunity to extend their impact. Cloud computing has become a major topic of discussion and debate for any business or organization which relies on technology. Anyone connected to the Internet is probably using some type of cloud computing on a regular basis. Whether they are using Google’s Gmail, organizing photos on Flickr, or searching the Web with Bing, they are engaged in cloud computing. In this chapter, an attempt has been made to give an overview of this technology, its connection with libraries, the models in which libraries can deploy this technology for providing services and augment the productivity of library staff and case studies.


Author(s):  
Jayashree K ◽  
Babu R ◽  
Chithambaramani R

The Internet of Things (IoT) architecture has gained an increased amount of attention from academia as well as the industry sector as a significant methodology for the development of innovative applications and systems. Currently, the merging of this architecture with that of Cloud computing has been largely motivated by the need for various applications and infrastructures in IoT. In addition to this, the Cloud ascends as an eminent solution that would help solve various challenges that are faced by the IoT standard when varied physical devices. There are an excessive number of Cloud service providers the web along with many other services. Thus, it becomes critical to choose the provider who can be efficient, consistent, and suitable, and who can deliver the best Quality of Service (QoS). Thus, this chapter discusses QoS for cloud computing and IoT.


Author(s):  
Richard Millham

In this chapter, the author examines the migration process of a legacy system, as a software-as-a-service model, to the Web, and he looks at some of the reasons that drive this legacy system migration. As migration is often a multi-step process, depending on the legacy system being migrated, the author outlines several techniques and transformations for each step of the migration process in order to enable legacy systems, of different types, to be migrated to the cloud. Of particular interest are the different methods to handle data-intensive legacy systems to enable them to function in a cloud computing environment with reduced bandwidth. Unlike the migration of an unstructured legacy system to a locally-distributed desktop system, system migration to a cloud computing environment poses some unique challenges such as restricted bandwidth, scalability, and security. Part of this migration process is adapting the transformed legacy system to be able to function in such an environment. At the end of the chapter, several small case studies of legacy systems, each of a different nature successfully migrated to the cloud, will be given.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 131534-131542 ◽  
Author(s):  
Qi Li ◽  
Youliang Tian ◽  
Yinghui Zhang ◽  
Limin Shen ◽  
Jingjing Guo

Sign in / Sign up

Export Citation Format

Share Document