With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
Â
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
Many of mobile devices suffer from limited computation resources (memory and processors), limited network
connection, bandwidth and limited battery life. For minimizing these problems mobile agents are premising
technology. However, for clients and servers most mobile agent systems are very resources demanding. This
research paper describes an approach to run mobile agents on different devices from mobile phones and
Personal Digital Assistants (PDAs) to powerful PCs. It proposes a simple mobile agent architecture and
middleware that makes it possible for accessing a mobile agent system on different devices. This architecture
and middleware proposes that clients will state their abilities. Depending on these abilities, the client will either
run the full mobile agent on the device or only run a light-weight version of the agent on the device. The mobile
agents are basically same on all clients, but code of the mobile agent is removed for small devices. This means
that only the data of the agent can be changed for mobile devices with minimal resources. The code of this agent
is stored at the server. When the agent returns to the server, the two parts are joined and the agent is ready to be
executed. The joined mobile agent can migrate to other agent servers and clients. A middleware is also proposed
that makes it possible to establish communication between different heterogeneous devices.
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
Â
The development of cloud computing and mobility,mobile cloud computing has emerged and
become a focus of research. By the means of on-demand self-service and extendibility, it can offer the
infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security
and privacy are the key issues for mobile cloud computing applications, and still face some enormous
challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system
model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud
computing. MCC provides a platform where mobile users make use of cloud services on mobile devices. The
use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing
environment. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile
network and cloud, we give the current security and privacy approaches. The users of MCC are still below
expectations because of the associated risks in terms of security and privacy. These risks are playing important
role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in
order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC
environment. This paper presents a comprehensive literature review of MCC and its security issues,challenges
and possible solutions for the security issues.
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyIOSR Journals
Â
Abstract: Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has
become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite
increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such
as resource scarcity, frequent disconnections, and mobility. MCC integrates the cloud computing into the
mobile environment and overcomes obstacles related to the performance (e.g., battery life,storage, and
bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and
privacy) discussed in mobile computing. As MCC is still at the early stage of development, it is necessary to
grasp a thorough understanding of the technology in order to point out the direction of future research. With
the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent
research work, and future research trends.
Keywords: Cloud computing, Distributed Computing, Mobile Cloud Computing
Whilst the web modifications our existence cloud of things may alter our existence Again-This new technology cloud of things Rising
the next engineering that change the idea from love issues and use individuals to enjoy people and use issues, crib tech handle both
humanity issue in health and power, assisting aged and disabled people and retains the guarantee of repairing the centuryaged
individual issues of poverty, illness, assault, and bad management. A genuine achievement comes whenever you assist others achieve
success chief is created by commanders not fans. A genuine achievement is available in event in Japan-America-Europe but
additionally in not just of common ownership of the new technology. Our concept to all-is common ownership of cloud of things.
Technology and Africa to be always a primary stage within this common ownership to repair Africa issues in poverty, illness, assault,
and bad management and we have to alter Africa from ICT customer to ICT maker and head ASDF Africa a forward thinking
Affiliation using the perspective of shifting Africa from being truly a passive customer to some prominent head and person of
electronic systems like cloud of things. With the purpose of linking the electronic space between Africa and also the remaining globe.
http://globecom2015.ieee-globecom.org/content/industry-posters
http://www.google.com.eg/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0ahUKEwipqL-QjafMAhXL2hoKHUcJAD0QFgg0MAU&url=http%3A%2F%2Fworkspace.unpan.org%2Fsites%2Finternet%2FDocuments%2FUNPAN95410.pdf&usg=AFQjCNGEbD5i1bU8Az6766mhvL7n3r6huQ&sig2=d1_ALN8cwE4oZ56E3Vm7Fw
http://www.ipoareview.org/wp-content/uploads/2016/05/Statement-by-Dr.Assem-Abdel-Hamied-Mousa-President-of-the-Association-of-Scientists-Developers-and-FacultiesASDF.pdf
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
Â
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
Many of mobile devices suffer from limited computation resources (memory and processors), limited network
connection, bandwidth and limited battery life. For minimizing these problems mobile agents are premising
technology. However, for clients and servers most mobile agent systems are very resources demanding. This
research paper describes an approach to run mobile agents on different devices from mobile phones and
Personal Digital Assistants (PDAs) to powerful PCs. It proposes a simple mobile agent architecture and
middleware that makes it possible for accessing a mobile agent system on different devices. This architecture
and middleware proposes that clients will state their abilities. Depending on these abilities, the client will either
run the full mobile agent on the device or only run a light-weight version of the agent on the device. The mobile
agents are basically same on all clients, but code of the mobile agent is removed for small devices. This means
that only the data of the agent can be changed for mobile devices with minimal resources. The code of this agent
is stored at the server. When the agent returns to the server, the two parts are joined and the agent is ready to be
executed. The joined mobile agent can migrate to other agent servers and clients. A middleware is also proposed
that makes it possible to establish communication between different heterogeneous devices.
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
Â
The development of cloud computing and mobility,mobile cloud computing has emerged and
become a focus of research. By the means of on-demand self-service and extendibility, it can offer the
infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security
and privacy are the key issues for mobile cloud computing applications, and still face some enormous
challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system
model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud
computing. MCC provides a platform where mobile users make use of cloud services on mobile devices. The
use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing
environment. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile
network and cloud, we give the current security and privacy approaches. The users of MCC are still below
expectations because of the associated risks in terms of security and privacy. These risks are playing important
role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in
order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC
environment. This paper presents a comprehensive literature review of MCC and its security issues,challenges
and possible solutions for the security issues.
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyIOSR Journals
Â
Abstract: Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has
become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite
increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such
as resource scarcity, frequent disconnections, and mobility. MCC integrates the cloud computing into the
mobile environment and overcomes obstacles related to the performance (e.g., battery life,storage, and
bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and
privacy) discussed in mobile computing. As MCC is still at the early stage of development, it is necessary to
grasp a thorough understanding of the technology in order to point out the direction of future research. With
the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent
research work, and future research trends.
Keywords: Cloud computing, Distributed Computing, Mobile Cloud Computing
Whilst the web modifications our existence cloud of things may alter our existence Again-This new technology cloud of things Rising
the next engineering that change the idea from love issues and use individuals to enjoy people and use issues, crib tech handle both
humanity issue in health and power, assisting aged and disabled people and retains the guarantee of repairing the centuryaged
individual issues of poverty, illness, assault, and bad management. A genuine achievement comes whenever you assist others achieve
success chief is created by commanders not fans. A genuine achievement is available in event in Japan-America-Europe but
additionally in not just of common ownership of the new technology. Our concept to all-is common ownership of cloud of things.
Technology and Africa to be always a primary stage within this common ownership to repair Africa issues in poverty, illness, assault,
and bad management and we have to alter Africa from ICT customer to ICT maker and head ASDF Africa a forward thinking
Affiliation using the perspective of shifting Africa from being truly a passive customer to some prominent head and person of
electronic systems like cloud of things. With the purpose of linking the electronic space between Africa and also the remaining globe.
http://globecom2015.ieee-globecom.org/content/industry-posters
http://www.google.com.eg/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0ahUKEwipqL-QjafMAhXL2hoKHUcJAD0QFgg0MAU&url=http%3A%2F%2Fworkspace.unpan.org%2Fsites%2Finternet%2FDocuments%2FUNPAN95410.pdf&usg=AFQjCNGEbD5i1bU8Az6766mhvL7n3r6huQ&sig2=d1_ALN8cwE4oZ56E3Vm7Fw
http://www.ipoareview.org/wp-content/uploads/2016/05/Statement-by-Dr.Assem-Abdel-Hamied-Mousa-President-of-the-Association-of-Scientists-Developers-and-FacultiesASDF.pdf
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Why cloud computing:
Cloud computing can be a cheaper, faster, and greener alternative to an On-premises solution. Without any infrastructure
investments, you can get Powerful software and massive computing resources quicklyâwith lower Up-front costs and fewer
management headaches down the road. Cloud-based solutions when evaluating options for new IT deployments Whenever a
secure, reliable, cost-effective cloud option exists. Shifting your agency into the cloud can be a big decision, with many
Considerations. This guide is the first in a series designed to help you Get started. The most important is the right choice
software as a service as a service, infrastructure as a service, and platform as a service or hybrid cloud. While addressing
administration goals of scalable, interactive citizen Portals. The cloud can also help your agency increase collaboration across
Organizations, deliver volumes of data to citizens in useful ways, and reduce IT costs while helping your agency focus on
mission-critical tasks. Plus, the Cloud can help you maintain operational efficiency during times of crisis.
http://docplayer.net/search/?q=assem+abdel+hamed+mousa
http://www.ipoareview.org/wp-content/uploads/2016/05/Statement-by-Dr.Assem-Abdel-Hamied-Mousa-President-of-the-Association-of-Scientists-Developers-and-FacultiesASDF.pdf
ABSTRACT
In todayâs world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
Choosing the right network management solution: Increase network visibility t...PacketTrap Msp
Â
This whitepaper arms network administrators and managed service providers (MSPs) with insight into the trends that impact network complexity, details about the capabilities required to support visibility, and an overview of technology platforms or specific tools for visibility and actionable monitoring.
Securing mobile cloud using finger print authenticationIJNSA Journal
Â
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet
capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile
devices, these devices can't install and run applications require heavy CPU processing or extensive
memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize
applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe
Photoshop, as they run in a desktop computer.
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
Â
Todayâs fast growing world needs faster communication. Technology is making rapid progress and is making many things easier. The innovative ideaâs that have been emerged from the tender minds of young scientists led to the evolution of many techniques where our present topic -ËMOBILE COMPUTINGâ fits in. âMOBILE COMPUTING-Â and COMMUNICATIONS is a major part of wireless communication technology. Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low orbit satellites. It incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network. Mobile voice communication is widely established throughout the world and had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move mobility. We in this paper describes about the Mobility Services Architecture which supports applications by a middleware stub. Mobile Computing evolved during the last few years as a result of shrinking portables and growing wireless networks. It enlarges the usability of computers, but raises demanding challenges. The paper describes about the methodology, problems in wireless industry, and how J2SE is used in this technology .The paper concludes with the pros and cons of this mobile computing and its future. Akhilesh Bholanath Patel "Wireless and Mobile Computing: Build Secure and Maintain Wireless Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43757.pdf Paper URL: https://www.ijtsrd.com/management/other/43757/wireless-and-mobile-computing-build-secure-and-maintain-wireless-solutions/akhilesh-bholanath-patel
What is Ubiquitous Computing?
Ubiquitous computing (alias: Pervasive Computing) is a paradigm in which the processing of information is linked with each activity or object as encountered. It involves connecting electronic devices, including embedding microprocessors to communicate information. Devices that use ubiquitous computing have constant availability and are completely connected.
Ubiquitous computing focuses on learning by removing the complexity of computing and increases efficiency while using computing for different daily activities.
Ubiquitous computing is also known as pervasive computing, everyware and ambient intelligence.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Â
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Cloud computing has sweeping impact on the human productivity. Today itâs used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
A voronoi diagram based approach for analyzing area coverage of various node ...ijasuc
Â
With recent advances in electronics and wireless communication technologies, the Wireless Sensor
Networks (WSNs) are being used in wide range of applications of military, ecological, health related areas.
Due to their resource constraints such as, sensor nodeâs size, memory, and processing capabilities, the
scale of deployment of WSNs requires careful decisions with respect to various performance measures. In
the last few years, there has been a tremendous interest on development of large-scale wireless sensor
networks as a basic issue to be addressed as it can influence the performance metrics of WSNs such as,
coverage, connectivity, resilience and scalability requirements. Many deployment schemes have been
proposed for wireless sensor networks. In this paper, we survey six deployment models random,
rectangular-grid, square-grid, triangular-grid, hexagonal-grid, and hybrid deployments schemes and
analyze their implications on network area coverage in WSNs. More generally, under some deployment
assumptions on an irregular geographical map for a defense monitoring, we show the analytical and
simulation-based results of a WSN made up of mica2 motes using the deployment knowledge to motivate
the use of these emerging paradigms in order to achieve higher network area coverage. To apply
deployment schemes on irregular geographical target area, we propose to include the concept of voronoi
diagram based approach in WSNs, to provide a way of dividing an irregular geographical area into a
number of regular regions. We have been configured the sensor node parameters such as sensing,
temperature, energy capabilities using mannasim based on NS-2.34.
Analysis of security threats in wireless sensor networkijwmn
Â
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Data Warehouses store integrated and consistent data in a subject-oriented data repository dedicated
especially to support business intelligence processes. However, keeping these repositories updated usually
involves complex and time-consuming processes, commonly denominated as Extract-Transform-Load tasks.
These data intensive tasks normally execute in a limited time window and their computational requirements
tend to grow in time as more data is dealt with. Therefore, we believe that a grid environment could suit
rather well as support for the backbone of the technical infrastructure with the clear financial advantage of
using already acquired desktop computers normally present in the organization. This article proposes a
different approach to deal with the distribution of ETL processes in a grid environment, taking into account
not only the processing performance of its nodes but also the existing bandwidth to estimate the grid
availability in a near future and therefore optimize workflow distribution.
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Why cloud computing:
Cloud computing can be a cheaper, faster, and greener alternative to an On-premises solution. Without any infrastructure
investments, you can get Powerful software and massive computing resources quicklyâwith lower Up-front costs and fewer
management headaches down the road. Cloud-based solutions when evaluating options for new IT deployments Whenever a
secure, reliable, cost-effective cloud option exists. Shifting your agency into the cloud can be a big decision, with many
Considerations. This guide is the first in a series designed to help you Get started. The most important is the right choice
software as a service as a service, infrastructure as a service, and platform as a service or hybrid cloud. While addressing
administration goals of scalable, interactive citizen Portals. The cloud can also help your agency increase collaboration across
Organizations, deliver volumes of data to citizens in useful ways, and reduce IT costs while helping your agency focus on
mission-critical tasks. Plus, the Cloud can help you maintain operational efficiency during times of crisis.
http://docplayer.net/search/?q=assem+abdel+hamed+mousa
http://www.ipoareview.org/wp-content/uploads/2016/05/Statement-by-Dr.Assem-Abdel-Hamied-Mousa-President-of-the-Association-of-Scientists-Developers-and-FacultiesASDF.pdf
ABSTRACT
In todayâs world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
Choosing the right network management solution: Increase network visibility t...PacketTrap Msp
Â
This whitepaper arms network administrators and managed service providers (MSPs) with insight into the trends that impact network complexity, details about the capabilities required to support visibility, and an overview of technology platforms or specific tools for visibility and actionable monitoring.
Securing mobile cloud using finger print authenticationIJNSA Journal
Â
Mobile cloud computing becomes part of mobile users daily life transactions. Mobile devices with Internet
capabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobile
devices, these devices can't install and run applications require heavy CPU processing or extensive
memory. Cloud computing allows mobile users to synchronize their data with remote storage and utilize
applications require heavy CPU processing or extensive memory such as Microsoft Office or Adobe
Photoshop, as they run in a desktop computer.
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
Â
Todayâs fast growing world needs faster communication. Technology is making rapid progress and is making many things easier. The innovative ideaâs that have been emerged from the tender minds of young scientists led to the evolution of many techniques where our present topic -ËMOBILE COMPUTINGâ fits in. âMOBILE COMPUTING-Â and COMMUNICATIONS is a major part of wireless communication technology. Mobile computing in means computing done by intermittently connected users who access network resources. It requires a wireless medium such as cellular radio, radio nets and low orbit satellites. It incorporates wireless adapters using cellular telephone technology to connect portable computers with the cabled network. Mobile voice communication is widely established throughout the world and had a very rapid increase in the number of subscribers to the various cellular networks over the last few years. An extension of this technology is the ability to send and receive data across these cellular networks. This is the principle of mobile computing. Mobile data communication has become a very important and rapidly evolving technology as it allows users to transmit data from remote locations to other remote or fixed locations. This proves to be the solution to the biggest problem of business people on the move mobility. We in this paper describes about the Mobility Services Architecture which supports applications by a middleware stub. Mobile Computing evolved during the last few years as a result of shrinking portables and growing wireless networks. It enlarges the usability of computers, but raises demanding challenges. The paper describes about the methodology, problems in wireless industry, and how J2SE is used in this technology .The paper concludes with the pros and cons of this mobile computing and its future. Akhilesh Bholanath Patel "Wireless and Mobile Computing: Build Secure and Maintain Wireless Solutions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43757.pdf Paper URL: https://www.ijtsrd.com/management/other/43757/wireless-and-mobile-computing-build-secure-and-maintain-wireless-solutions/akhilesh-bholanath-patel
What is Ubiquitous Computing?
Ubiquitous computing (alias: Pervasive Computing) is a paradigm in which the processing of information is linked with each activity or object as encountered. It involves connecting electronic devices, including embedding microprocessors to communicate information. Devices that use ubiquitous computing have constant availability and are completely connected.
Ubiquitous computing focuses on learning by removing the complexity of computing and increases efficiency while using computing for different daily activities.
Ubiquitous computing is also known as pervasive computing, everyware and ambient intelligence.
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Â
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Cloud computing has sweeping impact on the human productivity. Today itâs used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
A voronoi diagram based approach for analyzing area coverage of various node ...ijasuc
Â
With recent advances in electronics and wireless communication technologies, the Wireless Sensor
Networks (WSNs) are being used in wide range of applications of military, ecological, health related areas.
Due to their resource constraints such as, sensor nodeâs size, memory, and processing capabilities, the
scale of deployment of WSNs requires careful decisions with respect to various performance measures. In
the last few years, there has been a tremendous interest on development of large-scale wireless sensor
networks as a basic issue to be addressed as it can influence the performance metrics of WSNs such as,
coverage, connectivity, resilience and scalability requirements. Many deployment schemes have been
proposed for wireless sensor networks. In this paper, we survey six deployment models random,
rectangular-grid, square-grid, triangular-grid, hexagonal-grid, and hybrid deployments schemes and
analyze their implications on network area coverage in WSNs. More generally, under some deployment
assumptions on an irregular geographical map for a defense monitoring, we show the analytical and
simulation-based results of a WSN made up of mica2 motes using the deployment knowledge to motivate
the use of these emerging paradigms in order to achieve higher network area coverage. To apply
deployment schemes on irregular geographical target area, we propose to include the concept of voronoi
diagram based approach in WSNs, to provide a way of dividing an irregular geographical area into a
number of regular regions. We have been configured the sensor node parameters such as sensing,
temperature, energy capabilities using mannasim based on NS-2.34.
Analysis of security threats in wireless sensor networkijwmn
Â
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Data Warehouses store integrated and consistent data in a subject-oriented data repository dedicated
especially to support business intelligence processes. However, keeping these repositories updated usually
involves complex and time-consuming processes, commonly denominated as Extract-Transform-Load tasks.
These data intensive tasks normally execute in a limited time window and their computational requirements
tend to grow in time as more data is dealt with. Therefore, we believe that a grid environment could suit
rather well as support for the backbone of the technical infrastructure with the clear financial advantage of
using already acquired desktop computers normally present in the organization. This article proposes a
different approach to deal with the distribution of ETL processes in a grid environment, taking into account
not only the processing performance of its nodes but also the existing bandwidth to estimate the grid
availability in a near future and therefore optimize workflow distribution.
Delineation of techniques to implement on the enhanced proposed model using d...ijdms
Â
In post genomic era with the advent of new technologies a huge amount of complex molecular data are
generated with high throughput. The management of this biological data is definitely a challenging task
due to complexity and heterogeneity of data for discovering new knowledge. Issues like managing noisy
and incomplete data are needed to be dealt with. Use of data mining in biological domain has made its
inventory success. Discovering new knowledge from the biological data is a major challenge in data
mining technique. The novelty of the proposed model is its combined use of intelligent techniques to classify
the protein sequence faster and efficiently. Use of FFT, fuzzy classifier, String weighted algorithm, gram
encoding method, neural network model and rough set classifier in a single model and in an appropriate
place can enhance the quality of the classification system .Thus the primary challenge is to identify and
classify the large protein sequences in a very fast and easy but intellectual way to decrease the time
complexity and space complexity.
AN E XAMINATION OF T HE E FFECTIVENESS OF T EACHING D ATA M ODELLING C ONCEPTSijdms
Â
The effective teaching of data modelling concepts i
s very important; it constitutes the fundament of d
ata-
base planning methods and the handling of databases
with the help of database management languages,
typically SQL. We examined three courses. The stude
nts of two courses prepared for the exam by solving
tests, while the students of the third course prepa
red by solving tasks from a printed exercise book.
The
number of task for the second course was 2.5 times
more than the number of task for the first course.
The
main purpose of our examination was to determine th
e effectiveness of the teaching of data modelling c
on-
cepts, and to decide if there is a significant diff
erence between the results of the three courses. Ac
cording to
our examination, with increasing the number of test
tasks and with the use of exercise book, the resul
ts
became significantly better
An Email AutoResponder is an event triggered program that responds to an email recipient with a pre-defined message. Even a regular bounce can be considered an AutoResponder. AutoResponders are also often used by employees on vacation to send âOut of Officeâ replies.
Enmat v2.2 presentation september 2014ENMAT Energy
Â
Envantage ENMAT offer a Monitoring and Targeting (M&T) service to enable organisations to save energy and cut costs. The use of this platform means that we can deliver a bespoke solutions to meet your needs.
Aimed at industrial/commercial SMEs and multi-site retailers, the Envantage ENMAT service utilises the latest software technologies to obtain a full picture of customer energy usage across single or multiple sites
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Mobile Cloud Computing MCC which consolidates versatile processing and distributed computing, has turned out to be one of the business trendy expressions and a noteworthy dialog string in the IT world since 2009. As MCC is still at the beginning period of improvement, it is important to get a handle on an exhaustive comprehension of the innovation so as to call attention to the course of future research. With the last point, this paper introduces a survey on the foundation and standard of MCC, attributes, ongoing examination work, and future research patterns. A concise record on the foundation of MCC from portable processing to distributed computing is given and after that pursued an exchange on attributes and ongoing exploration work. It at that point examinations the highlights and framework of versatile distributed computing. The remainder of the paper investigations the difficulties of versatile distributed computing, rundown of some examination ventures identified with this territory, and calls attention to promising future research bearings. Sumit | Ms. Kirti Bhatia | Ms. Shalini Bhadola ""Cloud Computing using Mobile Phone"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23145.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23145/cloud-computing-using-mobile-phone/sumit
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
The common challenges of mobile internet for up coming generationeSAT Publishing House
Â
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The common challenges of mobile internet for up coming generationeSAT Journals
Â
Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols).
Design and implementation of a personal super Computerijcsit
Â
Resources of personal devices, whether mobile or stationary, can be productively leveraged to service their
users. By doing so, personal users will be able to ubiquitously run relatively complex computational jobs,
which cannot be accommodated in their individual personal devices or while they are on the move. To this
end, the paper proposes a Personal Super Computer (PSC) that superimpose grid functionality over
networked personal devices. In this paper, architectural designs of (PSC) were developed and evaluated
thoroughly through a strictly controlled empirical evaluation framework. The results showed that this
system has successfully maintained high speedup over regular personal computers under different running
conditions.
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Â
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Â
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Privacy preserving public auditing for secured cloud storagedbpublications
Â
As the cloud computing technology develops during the last decade, outsourcing data to cloud service for storage becomes an attractive trend, which benefits in sparing efforts on heavy data maintenance and management. Nevertheless, since the outsourced cloud storage is not fully trustworthy, it raises security concerns on how to realize data deduplication in cloud while achieving integrity auditing. In this work, we study the problem of integrity auditing and secure deduplication on cloud data. Specifically, aiming at achieving both data integrity and deduplication in cloud, we propose two secure systems, namely SecCloud and SecCloud+. SecCloud introduces an auditing entity with a maintenance of a MapReduce cloud, which helps clients generate data tags before uploading as well as audit the integrity of data having been stored in cloud. Compared with previous work, the computation by user in SecCloud is greatly reduced during the file uploading and auditing phases. SecCloud+ is designed motivated by the fact that customers always want to encrypt their data before uploading, and enables integrity auditing and secure deduplication on encrypted data.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Â
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
Â
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Â
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Â
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Â
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overviewâ
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. Whatâs changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties â USA
Expansion of bot farms â how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks â Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients donât know what they donât know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsâ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Â
Design and implementation of intelligent community system based on thin client and cloud computing
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
DESIGN AND IMPLEMENTATION OF
INTELLIGENT COMMUNITY SYSTEM BASED ON
THIN CLIENT AND CLOUD COMPUTING
Weitao Xu, Dongfeng Yuan and Liangfei Xue
School of Information Science and Engineering, Shandong University, Jinan, China
ABSTRACT
With the continuous development of science and technology, the intelligent development of community
system becomes a trend. Meanwhile, smart mobile devices and cloud computing technology are
increasingly used in intelligent information systems; however, smart mobile devices such as smartphone
and smart pad, also known as thin clients, limited by either their capacities (CPU, memory or battery) or
their network resources, do not always meet users' satisfaction in using mobile services. Mobile cloud
computing, in which resource-rich virtual machines of smart mobile device are provided to a customer as a
service, can be terrific solution for expanding the limitation of real smart mobile device, but the resources
utilization rate is low and the information cannot be shared easily. To address the problems above, this
paper proposes an information system for intelligent community, which is composed of thin clients, wide
band network and cloud computing servers. On one hand, the thin clients with the characteristics of energy
efficiency, high robustness and high computing capacity can efficiently avoid the problems encountered in
the PC architecture and mobile devices. On the other hand, the cloud computing servers in the proposed
information system solve the problems of resource sharing barriers. Finally, the system is built in real
environments to evaluate the performance. We deploy the proposed system in a community with more than
2000 residents, and it is demonstrated that the proposed system is robust and efficient.
KEYWORDS
Intelligent Community System, Thin client, Cloud Computing, Virtualization, Distributed File System.
1. INTRODUCTION
At the beginning of the computer era, users logged on to one centralized mainframe computer that
had all the processing power, using simple terminals. Over the years there was a shift to a more
decentralized computing model with powerful personal desktops. In the same period the Internet
infrastructure was deployed, resulting in a highly interconnected worldwide network of servers
and multimedia desktops. This evolution gave rise to a host of new problems. Viruses, Trojan
horses and worms pose a daily threat to vulnerable users in their home environment. Regular
software and hardware updates make up a significant part of the IT budget of both professional
and home users.
Thin client computing can offer a solution for these problems. In this paradigm, all applications
are executed on central servers. The client device sends events (keystrokes, mouse movements,
etc.) to the server, which processes the commands, renders the appropriate graphical output and
sends the images back to the client. The client only needs to decode the graphical data. This
results in lighter devices, since all calculation logic can be stripped from the device. Furthermore,
the cost of end-devices will decrease, which is in the interest of both private and professional
users. Especially for the latter, every reduction in hardware costs, even a minor one, is a
DOI : 10.5121/ijasuc.2014.5401 1
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
significant gain. The maintenance cost can also be reduced since managing and securing one
central server farm is much simpler.
Recently, the massive growth of mobile devices has led to a significant change in the users'
computer and internet usage, along with the dramatic development of mobile services, or mobile
computing. Smart mobile devices such as smartphone and smart pad have rapidly pervaded our
everyday life, however these devices are limited by either their capacities (CPU, memory or
battery) or their network resources, meanwhile, because of their relatively high prices and small
display screen, these devices are also inconvenient to be deployed in large areas such as
community, offices and factories. Besides, existing cloud computing technique for this kind of
service is very poor to meet the attractive quality.Therefore, developing a thin client which is
energy efficient and robust is very practical. Also, the developed thin client should adaptively
match with the cloud computing center and provide the services and information fast,
conveniently and accurately. How to get the resource and storage according to the demand is a
critical and realistic problem.
Faced with these problems, this paper proposes an intelligent community information system,
which is based on the architecture of thin clients, wide band network and cloud computing
servers, aiming at the direction of new information technologies represented by cloud computing,
intelligent terminals, embedded system and etc. Furthermore, this paper sets up the model of user
requirements and the model of integrating software and hardware in cloud computing centers.
The main contributions of this work are as follows:
1. We design and implement an information system for intelligent community composed of
2
thin client, wide band network and cloud computing servers.
2. We implement a thin client based on ARM processor and Android System, which shows
much better performance than portable devices like PDA and smartphone, in the
proposed information system.
3. We design and deploy cloud computing severs consisting of virtualization management
system and distributed file storage system.
4. We evaluate our system under real environments, and deploy our system in a community
consisting of more than 2000 residents; it is shown that the proposed information system
can meet the large amount demands of residents and show good performance. Besides,
this system can be applied in other scenarios such as education information system, rural
information system.
The rest of the paper is organized as follows. Section 2 demonstrates the related works. Section 3
outlines the overall architecture and describes the specifications of proposed information system
for intelligent community. The technology points of thin client and cloud computing servers in
the proposed information system will be introduced in Section 4 and Section 5. The system
evaluation is described in Section 6. Then the paper is concluded and future work is discussed in
Section 7.
2. RELATED WORK
Chia-Chen Kuo et al [1] explores the issues and the techniques of enabling multimedia
applications for the thin client computing. Their study on the network applications over thin
clients is devoted to the universal plug-in architecture which supports multimedia applications
over thin clients. It is shown that the proposed architecture not only significantly enhances the
multimedia capability of thin clients but also reduces the memory consumed by the clients for
various applications. Thin client systems and virtualization and the available products in the
market are described in the paper [2]. First of all, it is worth noting that current advances in
computing and the development of pervasive applications intensify the diversity problem, giving
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
rise to many variations in terms of performance, environments, and device characteristics. The
availability of a Middleware provides authors with an integration framework for multiple and
potentially diverse computing platforms. Moreover, the synergistic use of a Middleware
component and Web Services turns out to be a suitable solution to integrate different software
components, to easily extend, for example, the e-learning system with new features, and to
improve interoperability among different systems. In [3], a wide range of well-known and widely
used thin client protocols are tested in both low-motion and high-motion scenarios. It is shown
that additional functionality is required to offer a satisfying multimedia experience. Honda, Y. et
al [4] aim to enable the largest possible number of users to use the service platform in a secure
service usage environment, assuming the provision of services for both the mass market and
business users. In that paper, they demonstrate the effectiveness of applying thin client
technology to the service platform they desire to achieve. In addition, they perform quantitative
and qualitative evaluation to test the technical elements required for the new service platform
using a prototype thin client system to measure the feasibility of the thin client technology. In [5],
authors provide a reference base for the development of methodologies tailored for personal cloud
computing. Besides, they also provide security architecture for personal cloud based on the
security requirement analysis. Smart mobile devices such as smartphone and smart pad have
rapidly pervaded our everyday life. If the limitation of their relatively poor computing resources
such as processor, memory, battery can be expanded, smart mobile devices will become more
powerful tool for human life. To address this problem, Nam-Uk Kim et al [6] propose the remote
control architecture for real-time, close-knit interaction between real smart mobile device and
virtual one. There were a number of related studies in minimizing the limitation of thin client
based on the same idea, yet none have been found efficient. Pham Phuoc Hung et al. present a
new method that bases its architecture on the thin-thick client collaboration. They further
introduce a strategy to optimize the data distribution, especially big data in cloud computing in
[7]. Choonhwa Lee et al [15] have developed a new architecture for dynamic service discovery
and delivery for a full spectrum of client devices, ranging from tiny, resource-poor devices to
powerful workstations.
Similar to our approach, other research efforts have been made to integrate mobile devices and
cloud computing. In [8], X. Luo suggests an idea of using cloud to improve mobile deviceâs
capability. Marinelly [9] innovates Hyrax, which allows mobile devices to use cloud computing
platforms.
Note that there are three main differences between our work and theirs. First of all, they realize
their work on mobile phone, as discussed above, they are not suitable for intelligent community
system, and instead we design and build our thin client based on ARM processor (Cortex-A9) and
Android System which is very fit for intelligent community system after experiments. Besides,
we set up the model of user requirements and the model of integrating software and hardware in
cloud computing centers, and we deploy visualization and distributed system on Cloud Sever to
support better performance. Finally, we deploy the proposed information system in a community
consisting of more than 2000 residents, and it is demonstrated that the proposed system has good
performance.
3. SYSTEM OVERVIEW
This section provides the brief overview of our proposed intelligent community information
system that we design and implement. The new information system, including thin client, wind
band network and cloud computing servers, could offer kinds of services, such as information
services, multimedia broadcasting, online chatting, network storage and etc., enabling the
community users to enjoy the services at home. Figure 1 shows the high level architecture view of
the intelligent community information system.
3
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
As described earlier, the thin client adopts the ARM architecture, carrying the embedded
Android system. The thin client uses the USB mouse and keyboard as the input equipment, and
uses the LCD as the output display. The interactive mode is simple for the users. Simultaneously,
multiple peripheral interfaces are afforded, such as USB, network, camera and audio. The
applications are deployed in the information service platform, which is based on cloud
computing, can avoid the computer virus and redundancy information filtering to realize the
system security. The information service platform can afford the information enquiry services,
multimedia broadcasting, online chatting, network storage and etc. Self-developed virtual
machine management can guarantee the effective usage of resources, the efficient response of
concurrent access using the load balance. Besides, this system can be applied in other scenarios
such as education information system, rural information system.
4
Figure 1.The overview of the intelligent community information system
4. DESIGN OF THIN CLIENT
Thin client systems have advanced recently with new innovative design extensions such as
virtualization and cloud computing. With the development of thin client technology, desktop
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
computers are replaced with âthin clientsâ -devices that have no hard drive but instead rely on a
network connection to a central cloud server where application processing and storage of
information takes places [10]. Using a thin client, the user accesses a rack of blades that sits in the
data center, resulting in a dedicated PC experience. With user data located in the data center, thin
clients can slash break-fix costs at the client device, greatly enhance security, and eliminate the
need for individual software updates and troubleshooting on desktop computers. On the server
side, Virtual Desktop Infrastructure (VDI) and Server-Based Computing virtualization takes
advantage of a concept long used in mainframe computing - partitioning a server so that it acts
and appears as a number of independent computer devices [11, 12].
Basically, thin clients can be explained in three ways [13]. In two of the three, the architecture
harks back to the early days of centralized mainframes and minicomputer. A user's machine was a
terminal that processed only input and output. All data processing was performed in a centralized
server.
a) Shared Services - Input/output
Using shared terminal services software such as Windows Terminal Services and Citrix
XenApp, users share the operating system and applications in the server with all other
users at thin client stations. Although presented with their own desktop, users do not have
the same flexibility as they do with their own PC and are limited to running prescribed
applications and simple tasks such as creating folders and shortcuts [14].
b) Desktop Virtualization - Input/output
Using products such as VMware Desktop Manager (VDM) and Citrix XenDesktop, each
user's desktop (OS and applications) resides in a separate partition in the server called a
"virtual machine. " Users are essentially presented with their own PC, except that it
physically resides in a remote server in the datacenter. They can modify the desktop and
add applications like they could with their own PC (a "Thick client").
c) Browser-Based Applications - HTML Pages
This approach differs from the previous two in that the user's machine does the
processing; however, the applications and data come from the server. The thin client
contains a Web browser, and the programs come in the form of scripts on Web pages
(HTML pages) from a Web server on the Internet or from the company's intranet.
In this paper, we use the third way B/S to realize thin client and applications. There are many
benefits to use this approach; it makes the best use of server resources, ensuring high availability,
and meanwhile, the energy cost can drop significantly. The thin client contains a web browser,
and the programs come in the form of scripts on web pages from a web server on the internet. The
comparison between the thin clients we designed and portable devices like smartphone, iPad will
be discussed in section 7.
We have implemented a thin client based on ARM processor (Cortex-A9) and Android operating
system, and this thin client typically appears to the user as simply a display unit. It is connected to
a remote server for its processing power, keyboard and mouse events are sent to the server, and
users can be unaware that they are using a thin client rather than a desktop PC . Figure 2 shows
the hardware architecture of thin client based on ARM processor and Figure 3 presents the
prototype of thin client.
5
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
6
Figure 2. The hardware model of thin client
Figure 3. The prototype of thin client
5. DESIGN AND DEPLOYMENT OF CLOUD COMPUTING SERVERS
The proliferation of Cloud computing has led to much industrial and academic interest, and
numerous related research projects. Cloud computing services, such as Amazonâs Elastic
Compute Cloud, are widely available today, offering computing resources on demand. Thanks to
such advances and ubiquitous network availability, the thin client computing paradigm is
enjoying increasing popularity. Originally intended for wired LAN environments, this paradigm
is repeating its success in a mobile context. A study from ABI Research forecasts a US$20 billion
turnover surrounding services directly associated with mobile cloud computing by the end of
2014. Clearly, when applications are offloaded, the mobile terminal only needs to present
audiovisual output to users and convey user input to remote servers, considerably reducing the
client deviceâs computational complexity. Consequently, applications can run as-is, without
requiring (many) scaled-down versions for mobile devices.
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
Current DaaS deployments, such as the VMWare Virtual Desktop Infrastructure, are concentrated
mainly in corporate environments. The availability of (virtual) computing resources distributed
over the network lets providers offer desktop services in mobile wide area network (WAN)
environments. Here, we propose virtualization management system and distributed file storage
system that address the challenges providers face in offering cloud based services.
5.1. Virtualization Management System
The traditional virtualization management system needs high configuration of the management
node in terms of the software and hardware. We develop a virtualization management system
based on B/S architecture, including web server, management client, virtual machine cluster and
shared storage. The architecture of the system is shown as Figure 4. Firstly, the traditional
management node is replaced by the web server, which reduces the demand for resources
efficiently. Secondly, the traditional management system occupies a great deal of web
connections. In this new B/S architecture system, we can use the form via HTTP protocols to
submit the compact data to the web server, and the web server transmits the data to the virtual
machine cluster after package, which will decrease the network data transfer quantity effectively.
Thirdly, to monitor the virtual machines and schedule the resources in real time, we adopt the
SNMP protocols to collect the information of physical machines. Finally, we set up a two
dimensional analysis model to pre-manage the free resources in the virtual machine cluster
according to the habits of users.
7
Figure 4.The virtualization management system
Compared with the similar technology products in the world, the virtualization management
system based on B/S architecture can decrease the consuming of the resources and increase the
efficiency effectively. Additionally, the proposed system can improve the lags of resourceâs
scheduling.
5.2. Distributed File Storage System
Applications, such as streaming media and Network-drive, are necessary for the information
system. The streaming media server and network file system cannot be extended dynamically,
and the speed of read and write cannot satisfy the usersâ demand. In the new information system,
the streaming media resources are stored in different nodes as many blocks. At the same time, the
blocks can be backed up synchronously. When the streaming server gets the read command from
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
the web server, the distributed file storage system will read the resources at a high speed. The
streaming media distributed storage system is show in Figure 5.
8
Figure 5. The Read Operation of the Distributed File Storage System
The establish of the network file system using the distributed file system can not only enhance the
reliability of the data but also achieve the object of download the resources to oneâs own network
file system from the internet directly. Compared with other systems, the files can be stored
directly from the internet, which creates a seamless experience for users.
5.3. Focused Search Engine
The information on the Internet is too mass to mining for commonly used search engine. To solve
this problem, we develop the focused search engine using an innovative fast hierarchical topic
detection method. Its first step is to improve traditional topic detection by a new concept of
contribution to suitable for the hierarchy. And second step is to improve traditional layered cluster
algorithm based on the first step. Real result data from experiment prove that the proposed
methods have better hierarchical topic detection performance and low time complexity. The web
data mining model based on cloud computing can solve most users' will and be able to give
reliable information service according to the request. Along with the development of cloud
computing, this solution is the inevitable result in solving Web data mining. The model is shown
in Figure 6.
Figure 6. Web data mining cloud model
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
6. SYSTEM EVALUATION
Since the iPhone's premiere in 2007 and the follow-up booming of Android phones and tablets,
we have witnessed a stunning success of mobile computing, which reflects a significant change in
users' computer and internet usage. This fact leads to the presence of mobile services in almost
every aspect of life, examples of which are commerce, education, health care and so on, however,
these mobile devices are often relatively expensive and inconvenient to be deployed in large areas
such as community, offices. Table 1 describes the comparisons between iPad, smartphone, PDA
and thin client we designed for the proposed intelligent community information system, from
which we can see, the computation capability of thin client is much higher than other mobile
devices, and it is thinner on storage and RAM. Although thin client is not portable, it has larger
display screen and can provide better user experience compared with small screen of iPad,
smartphone and PDA. Most importantly, the energy cost of thin client is the lowest, which means
that itâs energy efficient and suitable for large scale of deployment in information system.
9
Table 1. Comparison between iPad, smartphone (Galaxy S3), PDA (iPAQ) and Thin Client
iPad3 Galaxy S3 HP iPAQ Thin Client
CPU A6 1.3Ghz Quad 1.4Ghz PXA310
624Mhz
Cortex-A9
1.4Ghz dual
core
Storage 16GB 16GB 2GB 2GB
RAM 1GB 1GB 64M 1GB
Screen 4 inches 4.7 inches 3.5 inches 19 inches LCD
Battery 14000 mAh 2,100 mAh 1,700 mAh 1,200 mAh
OS iOS Android Windows
Mobile
Android
This project is supported by Shandong Province government and we deploy the proposed
information system in a community with more than 2000 residents located in Jining City,
Shandong Province of China, each household is given a multimedia terminal with 19 inches LCD
screen, note that the cloud computing servers are located in Jinan City which is 213kilometres
away from Jining City. The comparison between proposed system and traditional system is given
in Table 2, as can be seen form the table, the suggested system has the characteristics of low cost,
low power consuming, high reliability, high resources usage rate, easily maintenance of terminals
and easily usage of the system, which solve the problem of robustness and computing resources
thresholds. With the popularization of Internet and the fast development of information
technology, the new system can lead to many applications in various scenarios such as education
information system, rural information system.
10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
10
Table 2. Comparison between Proposed System and Traditional System
Contrast item
The proposed information
system
PC+ traditional web
access
Tablet PC/mobile
phone+ traditional
web access
Terminal price Low High High
Information Low High High
The security of
data
File and services are saved
and backed up in the
servers, which is guarded by
the professionals
Be prone to be
attacked by virus.
Be prone to be
attacked by virus.
System
maintenance
simple complex complex
B/S, can be managed
remotely
The servers are
scattered and hard to
manage
The servers are
scattered and hard to
manage
Client Power
consumption
<=4W >=200W 0.02W~10W
Cloud Computing Cluster High High
Resource
Usage Rate
Above 80%
<=20%(common
users)
<=50%(common
users)
Virtualization
The resource usage
rate is low
The resource usage
rate is low
Others
Be suitable for work,
recreation and education
The remote service is
unavailable
Need the help of
wireless
7. CONCLUSIONS
In this paper, we have proposed an intelligent community information system which is composed
of thin client, wide band network and cloud computing server. We design and implement thin
client based on ARM processor and Android system which is fit for intelligent community
information system, the designed thin client show better resources utilization than personal
computer and have more powerful computing capability than mobile devices. Moreover, we
design and deploy cloud computing severs consisting of virtualization management system and
distributed file storage system. We apply the proposed information system in a community with
more than 2000 residents located in Jining City and deploy the cloud computing servers
213Kilometers away from this community. Compared with the current PC (personal computer) or
mobile devices systems, the system have a number of advantages and show good performance.
Future research should be devoted to integrating relevant thin client protocol optimizations with
resource allocation strategies to achieve the best user experience.
ACKNOWLEDGEMENTS
This research was supported by Special Funding Project for Independent Innovation
Achievements Transform of Shandong Province under Grant No.2009ZHZX1A0108 and
No.2010ZHZX1A1001.
REFERENCES
[1] Chia-Chen Kuo, Ping Ting, Ming-Syan Chen, Jeng-Chun Chen, âDesign and Implementation of a
Network Application Architecture for Thin Clientsâ, 26th Annual International Computer Software
and Applications Conference, pp.193, 2002.
11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.4, August 2014
[2] bt Mahmud, M., bin Arshad, Y., âConceptual architecture design and configuration of thin client
11
system for schools in Malaysia: A pilot projectâ, pp. 952-955, 2010.
[3] L. Deboosere, J. De Wachter, P. Simoens, F. De Turck, B. Dhoedt and P. Demeester, âThin Client
Computing Solutions in Low- and High-Motion Scenariosâ, Third International Conference on
Networking and Services(ICNS'07),2007.
[4] Honda, Y., Okagawa, T., Uchiyama, K., Kurumatnai, S., âThin Client Technology for Mobile Service
Platformâ, World Telecommunications Congress (WTC), 2012, pp. 1-6, 2012.
[5] Yuan tian, Kyung Hee Univ., Yongin, âTowards the Development of Personal Cloud Computing for
Mobile Thin-Clientsâ, 2011 International Conference on Information Science and Applications
(ICISA), 2011.
[6] Nam-Uk Kim, Suwon, Sung-Min Jung, âA Remote Control Architecture for Thin-Client in Mobile
Cloud Computingâ, 2013 International Conference on Information Science and Applications (ICISA),
2013.
[7] Pham Phuoc Hung , Suwon, Bui Tuan-Anh, âA solution of thin-thick client collaboration for data
distribution and resource allocation in cloud computingâ, 2013 International Conference on
Information Networking (ICOIN), 2013.
[8] Nieh, J., Yang, J., Selsky, M., Tiwari, N., âThe Performance of Remote Display Mechanisms for
Thin-Client Computingâ. Proceedings of the 2002 USENIX Annual Technical Conference, pp.143-
154.
[9] A. M. Lai and J. Nieh, âOn the Performance of Wide-Area Thin-Client Computing,â ACM
Transactions on Computer Systems (TOCS), vol. 24,pp. 175â209, 2006.
[10] Rahman bin Ahlan, A., bt Mahmud, M., bin Arshad, Y. âConceptual architecture design and
configuration of thin client system for schools in Malaysia: A pilot projectâ. Proceedings of 2010
International Symposium in Information Technology (ITSim),pp.952-955.
[11] R. Buyya et al., âCloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for
Delivering Computing as the 5th Utility,â Future Generation Computer Systems, vol. 25, no. 6, 2009,
pp. 599â616.
[12] A. Lai and J. Nieh, âOn the Performance of Wide-Area Thin-Client Computing,â ACM Trans.
Computer Systems, vol. 24, no. 2, 2006, pp. 175â209.
[13] http://www.hp.com/ accessed 15th June 2009.
[14] Casella, G., Costagliola G., Filomena FeTIllcci, Giuseppe Pol ese, âA SCORM Thin Client
Architecture for E-learning Systems Based on Web Servicesâ, International Journal of Distance
Education Technologies, vol. 22, no. 6, 2010, pp. 529â539.
[15] Choonhwa Lee, Sumi Helal and David Nordstedt, âImpromptu Service Discovery and Delivery in
Mobile Environmentsâ, Journal of Information Science and Engineering, vol.24,1733-1751, 2008.
AUTHORS
Weitao Xu received his Bachelorâs degree in Communication Engineering in 2006, and
his Masterâs degree in Information System in 2010, from Shandong University. Now he is
currently a Ph.D. candidate in University of Queensland. His research interests include:
Sensor Networks, Embedded System, Mobile Computing.
Dongfeng Yuan is currently a Professor in School of Information Science and
Engineering, Shandong University, He has published over 300 papers in some technical
journals and some important international conferences held by IEEE organization in his
research field since 2000, his research interests include Channel modelling, Multilevel
Coding (MLC) and Multistage Decoding (MSD), MIMO, Space-time coding, Turbo and
LDPC codes.
Liangfei Xue received his Bachelorâs degree in Communication Engineering in 2006
from Jiangnan University, and his Masterâs degree in Information System in 2010, from
Shandong University. His research interests include: Data Mining, Cloud Computing.