An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve up to 125 audience devices with an average delay of 1.74ms per page load. The system utilized CPU and memory resources efficiently, indicating it could potentially serve a much larger audience size.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
nable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Security Requirements and Security Threats In Layers Cloud and Security Issue...Editor IJCATR
Euacalyptus, OpenNebula and Nimbus are three major open-source cloud-computing software platforms. The overall
function of these systems is to manage the provisioning of virtual machines for a cloud providing infrastructure-as-a-service. These
various open-source projects provide an important alternative for those who do not wish to use a commercially provide cloud. This is a
fundamental concept in cloud computing, providing resources to deliver infrastructure as a service cloud customers, making users have
to buy and maintain computing resources and storage. In other hand, cloud service providers to provide better resources and facilities
customers need to know they are using cloud infrastructure services. In this end, we intend to security threats in the cloud layer and
then to analyse the security services in cloud computing infrastructure as a service to pay
Design and implementation of intelligent community system based on thin clien...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present, it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos, supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
nable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Security Requirements and Security Threats In Layers Cloud and Security Issue...Editor IJCATR
Euacalyptus, OpenNebula and Nimbus are three major open-source cloud-computing software platforms. The overall
function of these systems is to manage the provisioning of virtual machines for a cloud providing infrastructure-as-a-service. These
various open-source projects provide an important alternative for those who do not wish to use a commercially provide cloud. This is a
fundamental concept in cloud computing, providing resources to deliver infrastructure as a service cloud customers, making users have
to buy and maintain computing resources and storage. In other hand, cloud service providers to provide better resources and facilities
customers need to know they are using cloud infrastructure services. In this end, we intend to security threats in the cloud layer and
then to analyse the security services in cloud computing infrastructure as a service to pay
Design and implementation of intelligent community system based on thin clien...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
After a decade of research and development, IP multicast has still not been deployed widely in the global Internet due to many open technical issues: lack of admission control, poorly scaled with large number of groups, and requiring substantial infrastructure modifications. To provide the benefits of IP multicast without requiring direct router support or the presence of a physical broadcast medium, various Application Level Multicast (ALM) models have been attempted. However, there are still several problems with ALM: unnecessary coupling between an application and its multicasting supports, bottleneck problem at network access links and considerable processing power required at the end nodes to support ALM mechanisms. This paper proposes an architecture to address these problems by delegating application-multicasting support mechanisms to smart edge devices associated with the application end nodes. The architecture gives rise to an interesting Edge Device Any-casting technology that lies between the IP-multicasting and the Application Layer Multicasting and enjoys the benefits of both. Furthermore, the architecture may provide sufficient cost-benefit for adoption by service providers. The paper presents initial results obtained from the implementation of a video streaming application over the testbed that implements the proposed architecture.
Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present, it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos, supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.
Web Server for Remote Monitoring and Controliosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the March Edition:
•Oracle Expands Hybrid Cloud Portfolio with Roving Edge Infrastructure
•Huawei Unveils New Solutions to Stimulate Growth in the Digital Economy
•Fortinet Delivers Major Updates to FortiOS Operating System
•Cisco Completes Acquisition of IMImobile
•Palo Alto Networks Launches NextWave 3.0
•Cambium Networks Unveils Gigabit Outdoor Point to Point Solution
•Check Point Software Launches Unified Security Solution Harmony
•Citrix Tackles Employee Well-Being
•CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads
•Kaspersky: DDoS Attacks in Q4 2020 Dropped by a Third Compared to Q3
•Nutanix Extends Ransomware Protections to Help Secure Customers’ IT Environments
•New Veeam Backup & Replication v11 Now Available
•VMware Refreshes vRealize Cloud Management
•Veritas Introduces NetBackup 9
•Ivanti Wavelink Expands Velocity Platform
•CyberArk Delivers New Identity Security Offerings to Drive Customer Success
Flexible Technologies for Smart CampusKamal Spring
The article considers an example of the
advertisement network based on the BLE 4.0, and its facilities for
creating the infrastructure for a Smart Campus, where dynamic
information is provided for the target audience. The authors
provide an analysis of the characteristics and experimental
implementation of this system. Moreover, the practical usage of a
popular vendor and the needed back-end to provide dynamic
usages of the network, both in appearance and content is
described. In the paper different wireless technologies are
compared in regards to their main feature and field of
application. In general the characteristics of a Blue Tooth Low
Energy, BLE, are highlighted. This is elaborated upon in the
Smart Campus example. The Smart Campus is an indoor
wireless network to deliver location and user based dynamic
information to the different visitors, teacher or students of a
university campus, both for day-to-day use as for specific events.
To keep the system interesting and to augment ease-of-use for all
kind of users and content providers, a dedicated content
management system is developed within the Smart Campus case.
The complete system consists of a set of beacons, an application
on a smartphone, a database with the related CMS. All is
developed in an international cooperation between different
universities.
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...cscpconf
The recent advances in computer technology and data networking have made videoconferencing
system a popular medium for users to interact with one another from remote locations. This
system offers communication between more than two users, who are able to interact through
their webcams, microphone and other components. The use of this system has been increased
recently due to many reasons, for one thing, progress in Internet access in different networks
like companies, universities and houses, with the increase of available bandwidth whereas the
decrease of delay in sending and receiving packets . On the other hand, the coming of Rich
Internet Applications (RIA) means that a large part of web application started to be
implemented on the web browsers. This paper discusses the conception of multiparty
videoconferencing systems using technologies of Web 2.0. For our conceptual
Videoconferencing Platform, we have developed many feature : live audio video, text
chat, video recording, user and room management and quality control. Videoconferencing
modules have been carried out using open source technologies Flex and J2EE.
The recent advances in computer technology and data networking have made videoconferencing
system a popular medium for users to interact with one another from remote locations. This
system offers communication between more than two users, who are able to interact through
their webcams, microphone and other components. The use of this system has been increased
recently due to many reasons, for one thing, progress in Internet access in different networks
like companies, universities and houses, with the increase of available bandwidth whereas the
decrease of delay in sending and receiving packets . On the other hand, the coming of Rich
Internet Applications (RIA) means that a large part of web application started to be
implemented on the web browsers. This paper discusses the conception of multiparty
videoconferencing systems using technologies of Web 2.0. For our conceptual
Videoconferencing Platform, we have developed many feature : live audio video, text
chat, video recording, user and room management and quality control. Videoconferencing
modules have been carried out using open source technologies Flex and J2EE.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
Similar to An enhanced wireless presentation system for large scale content distribution (20)
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. Fig. 1. An overview of wireless presentation system
The limitation of existing WPS is its inability to serve large number of audiences.
WPS systems found in the market today typically state their capacity of concurrently
connecting 32 or 64 client devices, but do not explicitly mentioned its maximum sup-
ported webview client size. This means it would be a challenge to employ existing
WPS in an auditorium or lecture hall scenario for distributing content to an audience
size of 150 and above.
In this paper, we describe an improved version of WPS, with an emphasis on the
mechanism used to distributing content to larger audience size along with perfor-
mance measurement. Our enhanced WPS (eWPS) runs on top of a Wi-Fi infrastruc-
ture which consists of multiple access points and network switch connected over a
wired gigabit Ethernet backhaul. It utilizes an external web server which receives
periodical screenshots from the eWPS and subsequently makes them accessible by the
audience web devices. As opposed to conducting simulation of large-scale Wi-Fi
based system as in [6], we approach the challenges with prototype implementation
over a testbed as in [7-8] for practical performance studies.
This paper is organized as follows. Related work is discussed in Section II. Section
III describes the experimental setups and the test configurations/flow. Section IV
explains on the performance results. Summary and conclusion are found in Section V.
2 Related works
A diversity of products and solutions can be found in the literature offering basic
features of a WPS. Some of these products even offer content sharing/distribution.
However, the number of supported client devices is below 64. Based on our latest
review, none of these products is designed to support larger scale of audience size.
3. Table 1 summarises the features of some prominent WPS found in the market and
their differences. Basic mirroring refers to the ability of a user device to capture and
stream screen/desktop activity to the connected display. Basic Webviewing means the
system is capable of distributing screenshots captured at the presenter/user device.
Advanced Webviewing goes beyond basic webviewing, by further allowing users to
navigate across all past/presented content. As an example, users who are late to the
session is now able to flip back to previously presented slides/content and later slip
forward to the current/latest screenshot content.
Table 1. Features comparison of WPS products or solutions against the proposed eWPS
Basic Mirroring Basic
Webviewing
Advanced
Webviewing
Wireless Projector [1] Yes No No
Chromecast [2] Yes No No
Barco Clickshare [3] Yes No No
Displaycast [4] Yes No No
wePresent [5] Yes Yes No
eWPS Yes Yes Yes
Wireless projector [1] is the most common and widely used product in the market.
Even though it is a self-contained device, it has many shortcomings. It is not a
straight-forward process for connecting laptops to the wireless projectors as each
brand comes with its own configuration and execution steps. In addition, they support
only basic mirroring and lacking of broadcasting presentation content to audience.
Chromecast [2], Barco Clickshare [3] and Displaycast [4] are standalone hardware
appliance/system which support only basic mirroring without any content sharing
capability. The wePresent system [5] is the few in the market which provides basic
webviewing capability. There is no product which supports advanced webviewing as
proposed in this paper.
The use of IP multicast on multimedia applications such as live lecture broadcasts
are increasingly being adopted in both enterprise and campus networks. It is therefore
a potential mechanism to be explored in the design of eWPS. However, multicast over
Wi-Fi suffers from various well-known problems such as low data rate, high losses
and unfairness against contending unicast transmission [9]. Moreover, not all Wi-Fi
access points support multicasting [9]. For the end client devices, customized applica-
tion will be needed to subscribe and receive these multicast packets. Our design is to
allow any user device which has a browser to work, without the need of any specific
application installation. Hence, in this paper, we utilized unicast instead of multicast
in our design and implementation of the current system.
4. 3 Experimental setup
3.1 Setup of Network Connectivity and Server
The eWPS system is designed with scalability in mind to ensure continuous support
for growing audience size. As shown in Fig. 2, the eWPS system is therefore divided
into two parts, namely the connectivity infrastructure section and the presentation
management section. The connectivity infrastructure section focuses mainly on man-
aging the networking aspect, from providing Wi-Fi accessibility, load balancing
across various Wi-Fi access points (AP) controlled by the Access Controller (AC), to
enabling Internet connectivity. There is no favour of any specific brand in our design,
as long as the chosen Wi-Fi access points are matched to their designated access con-
troller of the same brand/model. The presentation management section manages the
content capturing from the source device, to storing the content at the distribution
server (HTTP server) for accessibility by the end client devices over the connectivity
infrastructure described earlier. All the above devices, which include APs, AC, and
HTTP server are connected via a 1000 Mbps Ethernet switch in a local area network
(LAN) setup.
Fig. 2. Network architecture of eWPS consist of two parts, namely the connectivity infrastruc-
ture and the presentation management section.
Fig. 3 shows the layout of the auditorium measured 54’x40’ where our experiment
has been conducted. Commercially available network equipment from Huawei was
used to set up the connectivity infrastructure. There were a total of six units Huawei
access points (APs), and one unit of Huawei access controller (AC) [4]. Two APs
were located at the front of the auditorium, with the remaining four located at the rear
of the auditorium.
5. Fig. 3. Layout of the auditorium
All six APs have been configured to share a common SSID named
“Smart_Auditorium” on eight non-overlapping channels. These channels are 1, 6, 52,
56, 60, 64, 149, and 157. Six channels are on 5 GHz radio band, leaving only Chan-
nels 1 and 6 sitting on the 2.4 GHz radio band. The reason to allocate 2.4GHz serving
band was to serve older phones which may not support 5 GHz band. The AC is used
to perform load balancing/distribution, by directing different Wi-Fi stations (STAs),
which are the end client devices, to connect to different channels based on the radio
condition.
The distribution server runs on an Intel i5 micro-PC with 4GB Ram and 500GB
SATA hard disk. We have chosen such form factors and configuration for its light-
weight size to ease portability.
3.2 Test Event and Metrics
A test run has been conducted on an actual event, which last about 4 hours from 8:30
a.m.. The event was conducted as a workshop which introduces the use of a new mo-
bile app with general explanation followed by tutorial sessions. The flow of the work-
shop is as follow:
1. 8:30 a.m. – 10:45 a.m.: Welcoming speech
2. 10:45 a.m. – 12:15 p.m.: Slide presentation, app demonstration/hands-on
There were 15 and 52 pages of slides for the above session 1 and 2. Data from vari-
ous monitoring sources were collected for analysis. Both the radio lists and user lists
were obtained from the AC at periodic intervals throughout the session. Radio lists
provide detailed information of the wireless conditions and status of all connected
6. APs, which includes the link type, both uplink and downlink rate, number of
sent/received packets, retransmission rate and packet loss ratio etc. The glances [10]
monitoring tool was installed and ran on the distribution server to access/monitor the
system resource utilisation levels. The HTTP access log of the distribution server was
also used for studying the server performance, total number of accesses and server
resource utilization.
4 Results and Analysis
A total of 125 client devices were connected to the given SSID during the event. The
radio list recorded that 70 devices, which were 56% of the total have been connected
to more than one AP. This could be the effect of AC performing load balancing
among the APs. It could also be caused by certain STAs which left the venue and
rejoined the SSID at a later time.
Fig. 4 shows the distribution of stations by radio band. By referring to the flow of
the workshop in Section 3.2, the actual slide presentation is to start around 10:45 a.m.,
which corresponds to the sudden spike in Fig. 4. It can be observed that post 10:45
a.m., approximately 20+% of the stations were connected to the 2.4 GHz radio band
while the remaining 70+% of the users were connected to the 5 GHz radio band. It fit
in quite nicely to our frequency band allocation as described in Section 3.1 where 2
out of 8 frequency bands (25%) are at 2.4GHz.
Fig. 4. Distribution of STAs by radio band
Fig. 5 shows the distribution of stations by channel. It can be observed that the dis-
tribution for 2.4GHz is of an average difference of about 5 stations. Station distribu-
tion on 5GHz has a much bigger variance with channel 149 utilised by more 25 sta-
tions, while channel 60 was utilized by fewer than 5 stations. This could be due to the
7. seating location of the users, who could be closer to the AP configured to operate at
channel 149.
Fig. 5. Distribution of STAs by both 2.4 and 5GHz frequency channel
Fig. 6 shows the mean downlink negotiation rate of the stations by radio band. The
mean downlink negotiation rate for both 2.4 GHz and 5 GHz was 50 Mbps and 150
Mbps respectively. Again this downlink rate fit nicely to the initial configuration,
where 5GHz was used to handle most of the traffic load.
Fig. 6. Mean downlink negotiation rate by radio band
Fig. 7 shows both the total number of slide accesses and downloads. There was a
sudden rise in the number of webview clients at approximately 10:45 a.m.. This is the
starting time scheduled for the second event. The sudden surge on slide accesses cor-
responded to the sudden network load as seen in Fig. 4 and Fig 5. The sudden surge is
8. mainly caused by the instant connectivity requests from the audience immediately
after the proposed system has been introduced in the session.
The total number of slide accesses for the entire duration was 9273. Dividing this
by 1.5 hours (10:45 a.m. - 12:15 a.m.) results in about 1.71 HTTP requests/sec on
average. Each slide access HTTP request was successful performed, with positive
HTTP response status codes of 200 (OK), 206 (Partial Content), or 304 (Not Modi-
fied). The number of slides that users explicitly downloaded was 563. Again, all these
requests were successfully received and responded by our distribution HTTP server.
Fig. 7. Total number of content access for both direct access and downloads
Fig. 8 shows the number of webview clients. The maximum number of webview
clients recorded was 93. Given the total number of slide accesses for the entire dura-
tion was 9273, there was an average of 99 slide accesses per webview clients. Given
the total pages of slides for the entire session was 67, it shows the eWPS has even
captured and shared the animated details on certain slide pages, which made up of the
remaining 32 slide accesses.
Fig. 8. Total number of Webclients connected for content access
9. Fig. 9 shows both the CPU and memory utilisations of the HTTP server as record-
ed by the glances monitoring tool. We ignored the first peak utilization (at 20%)
which occurred at the start of the session because it was mainly caused by the loading
of the glances software itself. The second peak, which was around 12.5% would be a
correct representation of the actual CPU utilization of serving HTTP requests. This
corresponded to the time of 10:45 a.m. where there was a surge on the number of
webview clients.
As for the memory utilization, it was maintained below 5% throughout the session.
The chart in general shows that both the CPU and memory were very much idle
throughout the session. Based on such utilization, we foresee the system is capable of
serving 6 times more the workload as experienced in this current setup.
Fig. 9. CPU and memory utilization of the HTTP server
The mean access time (delay) for webview client was 1.74 ms for a maximum of
125 stations. This means the setup is capable of serving 1000 stations with an estimat-
ed average access time of 13.96 ms. Such good performance was due to a few rea-
sons. First, the backbone of the setup is on a 1000 Mbps Ethernet. Second is the use
of 6 Wi-Fi APs are overly sufficient for the client size. Further, the workload and
traffic of these 6 APs were centrally managed by AC. Lastly the size of the content
(i.e. size of screenshot images range from 300-500 KB) has been optimized for distri-
bution over network.
5 Conclusion
In this paper, an enhanced wireless presentation system which focuses on large-scale
content distribution has been presented. This system has made use of Wi-Fi APs as
the access infrastructure for end user devices/stations to request and receive presenta-
tion screenshots captured from the live presentation device. Results from our experi-
ments showed that the system was able to handle workload of an actual event with
good performance. Moving forward, we planned to investigate on the optimum num-
ber of APs which are needed to deliver content within an acceptable range of delay
intervals.
10. References
1. Wireless Projector, https://www.epson.com.my/Projectors/Epson-EB-1785W-Wireless-
WXGA-3LCD-Projector/p/V11H793052
2. Chromecast, https://store.google.com/product/chromecast_2015?srp=/product/chromecast
3. Barco Clickshare, https://www.barco.com/en/clickshare
4. Chandra, S., Rowe, L. A.: DisplayCast: A High Performance Screen Sharing System for In-
tranets. In: 20th ACM international conference on Multimedia (2012)
5. wePresent, https://www.barco.com/en/page/wepresent
6. Nekovee, M., Saksena, R. S.: Simulations of large-scale WiFi-based wireless networks: In-
terdisciplinary challenges and applications. In: Future Generation Computer Systems, vol.
26, no. 3, pp. 514-520 (2010)
7. Yiakoumis, Y., Bansal, M., Covington, A., Reijendam, J. V., Katti, S., Mckeown, N.: Be-
Hop: A Testbed for Dense Wifi Networks. In: ACM SIGMOBILE Mobile COmputing and
Communications Review, vol. 18, no. 3, pp. 71-80 (2014)
8. Adjih, C., Baccelli, E., Fleury, E., Harter, G., Mitton, N., Noel, T., Pissard-Gibollet, R.,
Saint-Marcel, F., Schreiner, G., Vandaele, J., Watteyne, T.: FIT IoT-LAB: A large scale
open experimental IoT testbed. In: IEEE 2nd World Forum on Internet of Things (WF-IoT),
Milan (2015)
9. Pace, P., Aloi, G.: WEVCast: Wireless eavesdropping video casting architecture to over-
come standard multicast transmission in Wi-Fi networks. J. of Telecommunication Systems
52(4), 2287--2297 (2013)
10. Glances - An eye on your system, https://github.com/nicolargo/glances