Search results for: cloud service provider
4146 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment
Authors: Dengpan Wu, Dan Liu
Abstract:
In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.Keywords: cloud security, memory isolation, xen, virtual machine
Procedia PDF Downloads 4094145 Artificial Intelligent-Based Approaches for Task Offloading, Resource Allocation and Service Placement of Internet of Things Applications: State of the Art
Authors: Fatima Z. Cherhabil, Mammar Sedrati, Sonia-Sabrina Bendib
Abstract:
In order to support the continued growth, critical latency of IoT applications, and various obstacles of traditional data centers, mobile edge computing (MEC) has emerged as a promising solution that extends cloud data-processing and decision-making to edge devices. By adopting a MEC structure, IoT applications could be executed locally, on an edge server, different fog nodes, or distant cloud data centers. However, we are often faced with wanting to optimize conflicting criteria such as minimizing energy consumption of limited local capabilities (in terms of CPU, RAM, storage, bandwidth) of mobile edge devices and trying to keep high performance (reducing response time, increasing throughput and service availability) at the same time. Achieving one goal may affect the other, making task offloading (TO), resource allocation (RA), and service placement (SP) complex processes. It is a nontrivial multi-objective optimization problem to study the trade-off between conflicting criteria. The paper provides a survey on different TO, SP, and RA recent multi-objective optimization (MOO) approaches used in edge computing environments, particularly artificial intelligent (AI) ones, to satisfy various objectives, constraints, and dynamic conditions related to IoT applications.Keywords: mobile edge computing, multi-objective optimization, artificial intelligence approaches, task offloading, resource allocation, service placement
Procedia PDF Downloads 1154144 Adoption of Lean Thinking and Service Improvement for Care Home Service
Authors: Chuang-Chun Chiou
Abstract:
Ageing population is a global trend; therefore the need of care service has been increasing dramatically. There are three basic forms of service delivered to the elderly: institution, community, and home. Particularly, the institutional service can be seen as an extension of medical service. The nursing home or so-called care home which is equipped with professional staff and facilities can provide a variety of service including rehabilitation service, short-term care, and long term care. Similar to hospital and other health care service, care home service do need to provide quality and cost-effective service to satisfy the dwellers. The main purpose of this paper is to show how lean thinking and service innovation can be applied to care home operation. The issues and key factors of implementing lean practice are discussed.Keywords: lean, service improvement, SERVQUAL, care home service
Procedia PDF Downloads 6064143 Cloud Design for Storing Large Amount of Data
Authors: M. Strémy, P. Závacký, P. Cuninka, M. Juhás
Abstract:
Main goal of this paper is to introduce our design of private cloud for storing large amount of data, especially pictures, and to provide good technological backend for data analysis based on parallel processing and business intelligence. We have tested hypervisors, cloud management tools, storage for storing all data and Hadoop to provide data analysis on unstructured data. Providing high availability, virtual network management, logical separation of projects and also rapid deployment of physical servers to our environment was also needed.Keywords: cloud, glusterfs, hadoop, juju, kvm, maas, openstack, virtualization
Procedia PDF Downloads 3524142 Measuring the Cavitation Cloud by Electrical Impedance Tomography
Authors: Michal Malik, Jiri Primas, Darina Jasikova, Michal Kotek, Vaclav Kopecky
Abstract:
This paper is a case study dealing with the viability of using Electrical Impedance Tomography for measuring cavitation clouds in a pipe setup. The authors used a simple passive cavitation generator to cause a cavitation cloud, which was then recorded for multiple flow rates using electrodes in two measuring planes. The paper presents the results of the experiment, showing the used industrial grade tomography system ITS p2+ is able to measure the cavitation cloud and may be particularly useful for identifying the inception of cavitation in setups where other measuring tools may not be viable.Keywords: cavitation cloud, conductivity measurement, electrical impedance tomography, mechanically induced cavitation
Procedia PDF Downloads 2474141 Problem of Services Selection in Ubiquitous Systems
Authors: Malika Yaici, Assia Arab, Betitra Yakouben, Samia Zermani
Abstract:
Ubiquitous computing is nowadays a reality through the networking of a growing number of computing devices. It allows providing users with context aware information and services in a heterogeneous environment, anywhere and anytime. Selection of the best context-aware service, between many available services and providers, is a tedious problem. In this paper, a service selection method based on Constraint Satisfaction Problem (CSP) formalism is proposed. The services are considered as variables and domains; and the user context, preferences and providers characteristics are considered as constraints. The Backtrack algorithm is used to solve the problem to find the best service and provider which matches the user requirements. Even though this algorithm has an exponential complexity, but its use guarantees that the service, that best matches the user requirements, will be found. A comparison of the proposed method with the existing solutions finishes the paper.Keywords: ubiquitous computing, services selection, constraint satisfaction problem, backtrack algorithm
Procedia PDF Downloads 2444140 Factors Affecting the Adoption of Cloud Business Intelligence among Healthcare Sector: A Case Study of Saudi Arabia
Authors: Raed Alsufyani, Hissam Tawfik, Victor Chang, Muthu Ramachandran
Abstract:
This study investigates the factors that influence the decision by players in the healthcare sector to embrace Cloud Business Intelligence Technology with a focus on healthcare organizations in Saudi Arabia. To bring this matter into perspective, this study primarily considers the Technology-Organization-Environment (TOE) framework and the Human Organization-Technology (HOT) fit model. A survey was hypothetically designed based on literature review and was carried out online. Quantitative data obtained was processed from descriptive and one-way frequency statistics to inferential and regression analysis. Data were analysed to establish factors that influence the decision to adopt Cloud Business intelligence technology in the healthcare sector. The implication of the identified factors was measured, and all assumptions were tested. 66.70% of participants in healthcare organization backed the intention to adopt cloud business intelligence system. 99.4% of these participants considered security concerns and privacy risk have been the most significant factors in the adoption of cloud Business Intelligence (CBI) system. Through regression analysis hypothesis testing point that usefulness, service quality, relative advantage, IT infrastructure preparedness, organization structure; vendor support, perceived technical competence, government support, and top management support positively and significantly influence the adoption of (CBI) system. The paper presents quantitative phase that is a part of an on-going project. The project will be based on the consequences learned from this study.Keywords: cloud computing, business intelligence, HOT-fit model, TOE, healthcare and innovation adoption
Procedia PDF Downloads 1694139 Risk Tolerance and Individual Worthiness Based on Simultaneous Analysis of the Cognitive Performance and Emotional Response to a Multivariate Situational Risk Assessment
Authors: Frederic Jumelle, Kelvin So, Didan Deng
Abstract:
A method and system for neuropsychological performance test, comprising a mobile terminal, used to interact with a cloud server which stores user information and is logged into by the user through the terminal device; the user information is directly accessed through the terminal device and is processed by artificial neural network, and the user information comprises user facial emotions information, performance test answers information and user chronometrics. This assessment is used to evaluate the cognitive performance and emotional response of the subject to a series of dichotomous questions describing various situations of daily life and challenging the users' knowledge, values, ethics, and principles. In industrial applications, the timing of this assessment will depend on the users' need to obtain a service from a provider, such as opening a bank account, getting a mortgage or an insurance policy, authenticating clearance at work, or securing online payments.Keywords: artificial intelligence, neurofinance, neuropsychology, risk management
Procedia PDF Downloads 1384138 Working in Multidisciplinary Care Teams: Perspectives from Health Care and Social Service Providers
Authors: Lindy Van Vliet, Saloni Phadke, Anthea Nelson, Ann Gallant
Abstract:
Holistic and patient-centred palliative care and support require an integrated system of care that includes health and social service providers working together to ensure that patients and families have access to the care they need. The objective of this study is to further explore and understand the benefits and challenges of mobilizing multidisciplinary care teams for health care professionals and social service providers. Drawing on an interpretivist, exploratory, qualitative design, our multidisciplinary research team (medicine, nursing and social work) conducted interviews with 15 health care and social service providers in the Ottawa region. Interview data was audio-recorded, transcribed, and analyzed using a reflexive thematic analysis approach. The data deepens our understandings of the facilitators and barriers posed by multidisciplinary care teams. Three main findings emerged: First, the data highlighted the benefits of multidisciplinary care teams for both patient outcomes and quality of life and provider mental health; second, the data showed that the lack of a system-wide integrated communication system reduces the quality of patient care and increases provider stress while working in multidisciplinary care teams; finally, the data demonstrated the existence of implicit hierarchies between disciplines, this coupled with different disciplinary perspectives of palliative care provision can lead to friction and challenges within care teams. These findings will have important implications for the future of palliative care as they will help to facilitate and build stronger person-centred/relationship-centred palliative care practices by naming the challenges faced by multidisciplinary palliative care teams and providing examples of best practices.Keywords: public health palliative care, palliative care nursing, care networks, integrated health care, palliative care approach, public health, multidisciplinary work, care teams
Procedia PDF Downloads 824137 A Two Level Load Balancing Approach for Cloud Environment
Authors: Anurag Jain, Rajneesh Kumar
Abstract:
Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling
Procedia PDF Downloads 4314136 Building a Scalable Telemetry Based Multiclass Predictive Maintenance Model in R
Authors: Jaya Mathew
Abstract:
Many organizations are faced with the challenge of how to analyze and build Machine Learning models using their sensitive telemetry data. In this paper, we discuss how users can leverage the power of R without having to move their big data around as well as a cloud based solution for organizations willing to host their data in the cloud. By using ScaleR technology to benefit from parallelization and remote computing or R Services on premise or in the cloud, users can leverage the power of R at scale without having to move their data around.Keywords: predictive maintenance, machine learning, big data, cloud based, on premise solution, R
Procedia PDF Downloads 3784135 Cloud Computing in Data Mining: A Technical Survey
Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham
Abstract:
Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.Keywords: cloud computing, data mining, computing models, cloud services
Procedia PDF Downloads 4794134 IT Workforce Enablement: How Cloud Computing Changes the Competence Mix of the IT Workforce
Authors: Dominik Krimpmann
Abstract:
Cloud computing has provided the impetus for change in the demand, sourcing, and consumption of IT-enabled services. The technology developed from an emerging trend towards a ‘must-have’. Many organizations harnessed on the quick-wins of cloud computing within the last five years but nowadays reach a plateau when it comes to sustainable savings and performance. This study aims to investigate what is needed from an organizational perspective to make cloud computing a sustainable success. The study was carried out in Germany among senior IT professionals, both in management and delivery positions. Our research shows that IT executives must be prepared to realign their IT workforce to sustain the advantage of cloud computing for today and the near future. While new roles will undoubtedly emerge, roles alone cannot ensure the success of cloud deployments. What is needed is a change in the IT workforce’s business behaviour, or put more simply, the ways in which the IT personnel works. It gives clear guidance on which dimensions of an employees’ working behaviour need to be adapted. The practical implications are drawn from a series of semi-structured interviews, resulting in a high-level workforce enablement plan. Lastly, it elaborates on tools and gives clear guidance on which pitfalls might arise along the proposed workforce enablement process.Keywords: cloud computing, organization design, organizational change, workforce enablement
Procedia PDF Downloads 3104133 Advocating for Those with Limited Mobility
Authors: Dorothy I. Riddle
Abstract:
Limited mobility (or an inability to walk more than 15 meters without sitting down to rest) restricts full community participation for 13 percent of Canadian adults or 4.2 million persons), yet Canadian accessibility standards are silent on distance to be walked as an accessibility barrier to be addressed. Instead, they focus on ensuring access for the wheeled mobility devices used regularly by le The Accessible Canada Act mandates that Canada be barrier free by 2040, which will necessitate eliminating distance to be walked as a barrier in federal programs and services. This paper details the results of a multi-year research project funded by Accessibility Standards Canada to document the lived experience of those struggling with limited mobility and make recommendations regarding how to ensure accessibility for those with limited mobility. Over 2,600 Canadians from across Canada participated in an online survey and follow-up focus groups. The results underscored the importance of providing not only mobility supports in public facilities but also the information necessary for planning access to federal programs and services. As numerous participants indicated, if they weren’t sure how far they would have to walk, they simply stayed home and depended on friends and relatives for help with errands or appointments. This included failing to participate in civic activities, such as voting, for fear of having to walk too far and stand unsupported for too long. Types of information that were deemed critical included whether or not mobility aids were available, where seating to rest was located throughout the facility, what alternatives to standing while waiting for service and having to walk to the service provider (rather than the provider coming to the customer) were available, and diagrams of accessible parking and its relationship to elevators and services.Keywords: accessibility standards, distance to be walked, limited mobility, mobility aids, service to customer
Procedia PDF Downloads 814132 Brief Guide to Cloud-Based AI Prototyping: Key Insights from Selected Case Studies Using Google Cloud Platform
Authors: Kamellia Reshadi, Pranav Ragji, Theodoros Soldatos
Abstract:
Recent advancements in cloud computing and storage, along with rapid progress in artificial intelligence (AI), have transformed approaches to developing efficient, scalable applications. However, integrating AI with cloud computing poses challenges as these fields are often disjointed, and many advancements remain difficult to access, obscured in complex documentation or scattered across research reports. For this reason, we share experiences from prototype projects combining these technologies. Specifically, we focus on Google Cloud Platform (GCP) functionalities and describe vision and speech activities applied to labeling, subtitling, and urban traffic flow tasks. We describe challenges, pricing, architecture, and other key features, considering the goal of real-time performance. We hope our demonstrations provide not only essential guidelines for using these functionalities but also enable more similar approaches.Keywords: artificial intelligence, cloud computing, real-time applications, case studies, knowledge management, research and development, text labeling, video annotation, urban traffic analysis, public safety, prototyping, Google Cloud Platform
Procedia PDF Downloads 94131 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments
Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka
Abstract:
Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance
Procedia PDF Downloads 514130 Exploring Health Care Self-Advocacy of Queer Patients
Authors: Tiffany Wicks
Abstract:
Queer patients can face issues with self-advocating due to the factors of implicit provider bias, lack of tools and resources to self-advocate, and lack of comfortability in self-advocating based on prior experiences. In this study, five participants who identify as queer discussed their interactions with their healthcare providers. This exploratory study revealed that there is a need for healthcare provider education to reduce implicit bias and judgments about queer patients. There is also an important need for peer advocates in order to further inform healthcare promotion and decision-making before and during provider visits in an effort for a better outcome. Through this exploration, queer patients voiced their experiences and concerns to inform a need for change in healthcare collaboration between providers and patients in the queer community.Keywords: queer, LGBT, patient, self-advocacy, healthcare
Procedia PDF Downloads 874129 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach
Authors: Jumana Majdi Qutub
Abstract:
Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.Keywords: cloud computing, cyber crime, data protection, privacy
Procedia PDF Downloads 2604128 Factors Affecting the Uptake of Modern Contraception Services in Oyo State, Nigeria
Authors: Folajinmi Oluwasina, Magbagbeola Dairo, Ikeoluwapo Ajayi
Abstract:
Contraception has proven to be an effective way of controlling fertility and spacing births. Studies have shown that contraception can avert the high-risk pregnancies and consequently reduce maternal deaths up to 32%. Uptake of modern contraception is promoted as a mechanism to address the reproductive health needs of men and women, as well as the crucial challenge of rapid population increase. A cross- sectional descriptive study using a two- stage systematic sampling technique was used to select 530 women of reproductive age out of 20,000 households. Respondents were interviewed using a semi-structured questionnaire. Knowledge was assessed on a 5 point score in which a score of ≤ 2 rated poor while perception was scored on 36 points score in which a score of ≤ 18 was rated low. Data were analyzed using descriptive statistics, Chi-square test and logistic regression at p< 0.05. There were 530 respondents. Age of respondents was 30.3 ±7.8 years, and 73.0% were married. About 90% had good knowledge of contraception while 60.8% had used contraceptives. The commonest source of information about contraception was mass media (72.8%). Minority (26.1%) obtained husbands approval before using contraceptive while 20.0% had used modern contraceptives before the first birth. Many (54.5%) of the respondents agreed that contraception helps in improving standard of living and 64.7% had good perception about contraception. Factors that hindered effective uptake of contraception services included poor service provider’s attitude (33.3%) and congestion at the service centers (4.5%). Respondents with nonuse of contraceptive before first birth are less likely to subsequently use contraceptives (OR= 0.324, 95% CI= 0.1-0.5). Husband approval of contraceptives use was the major determinant of women’s contraceptive use (OR = 3.4, 95% CI = 1.3-8.7). Respondents who had family planning centers not more than 5 kilometers walking distance to their residence did not significantly use contraception services (41.5%) more than 21.1% of those who had to take means of transportation to the service venues. This study showed that majority of the respondents were knowledgeable and aware of contraception services, but husband’s agreement on the use of modern contraceptives remains poor. Programmes that enhances husbands approval of modern contraception is thus recommended.Keywords: contraception services, service provider’s attitude, uptake, husbands approval
Procedia PDF Downloads 3644127 The Evaluation of a Mobile Proximity Payment Application through Its Legitimacy and Social Acceptability
Authors: Intissar Abbes, Yousra Hallem, Jean-michel Sahut
Abstract:
The purpose of this research is to explore the legitimacy of a proximity mobile payment (PMP) system by taking into account the social aspects related to its use (social acceptability). We have chosen to focus on the acceptability process of a PMP application (‘Flashplay’) from the first testing to the adoption in a service context. This PMP solution is a pilot program developed as part of a global strategy of disintermediation in various sectors (retail, catering, and entertainment). This case is particularly interesting for two reasons: the context and environment are suitable to the adoption of innovation in payment like other African countries and the possibility to study different stages of the social acceptability process of that PMP system. The neo-institutional theory is mobilized to identify the three pillars of legitimacy: cognitive, normative and regulatory. A longitudinal qualitative study was conducted with 27 customers using the PMP service. Results highlighted the importance of the consumption system and the service provider as institutions. Recommendations are thus proposed to PMP service providers in order to rethink the design and implementation strategies of their PMP system to ensure their adoption and promote the institutionalization of this type of consumption practice.Keywords: legitimacy, payment, acceptability, mobility
Procedia PDF Downloads 1824126 Tele-Monitoring and Logging of Patient Health Parameters Using Zigbee
Authors: Kirubasankar, Sanjeevkumar, Aravindh Nagappan
Abstract:
This paper addresses a system for monitoring patients using biomedical sensors and displaying it in a remote place. The main challenges in present health monitoring devices are lack of remote monitoring and logging for future evaluation. Typical instruments used for health parameter measurement provide basic information regarding health status. This paper identifies a set of design principles to address these challenges. This system includes continuous measurement of health parameters such as Heart rate, electrocardiogram, SpO2 level and Body temperature. The accumulated sensor data is relayed to a processing device using a transceiver and viewed by the implementation of cloud services.Keywords: bio-medical sensors, monitoring, logging, cloud service
Procedia PDF Downloads 5204125 Frequency- and Content-Based Tag Cloud Font Distribution Algorithm
Authors: Ágnes Bogárdi-Mészöly, Takeshi Hashimoto, Shohei Yokoyama, Hiroshi Ishikawa
Abstract:
The spread of Web 2.0 has caused user-generated content explosion. Users can tag resources to describe and organize them. Tag clouds provide rough impression of relative importance of each tag within overall cloud in order to facilitate browsing among numerous tags and resources. The goal of our paper is to enrich visualization of tag clouds. A font distribution algorithm has been proposed to calculate a novel metric based on frequency and content, and to classify among classes from this metric based on power law distribution and percentages. The suggested algorithm has been validated and verified on the tag cloud of a real-world thesis portal.Keywords: tag cloud, font distribution algorithm, frequency-based, content-based, power law
Procedia PDF Downloads 5054124 A Common Automated Programming Platform for Knowledge Based Software Engineering
Authors: Ivan Stanev, Maria Koleva
Abstract:
A common platform for automated programming (CPAP) is defined in details. Two versions of CPAP are described: Cloud-based (including the set of components for classic programming, and the set of components for combined programming) and KBASE based (including the set of components for automated programming, and the set of components for ontology programming). Four KBASE products (module for automated programming of robots, intelligent product manual, intelligent document display, and intelligent form generator) are analyzed and CPAP contributions to automated programming are presented.Keywords: automated programming, cloud computing, knowledge based software engineering, service oriented architecture
Procedia PDF Downloads 3434123 ACO-TS: an ACO-based Algorithm for Optimizing Cloud Task Scheduling
Authors: Fahad Y. Al-dawish
Abstract:
The current trend by a large number of organizations and individuals to use cloud computing. Many consider it a significant shift in the field of computing. Cloud computing are distributed and parallel systems consisting of a collection of interconnected physical and virtual machines. With increasing request and profit of cloud computing infrastructure, diverse computing processes can be executed on cloud environment. Many organizations and individuals around the world depend on the cloud computing environments infrastructure to carry their applications, platform, and infrastructure. One of the major and essential issues in this environment related to allocating incoming tasks to suitable virtual machine (cloud task scheduling). Cloud task scheduling is classified as optimization problem, and there are several meta-heuristic algorithms have been anticipated to solve and optimize this problem. Good task scheduler should execute its scheduling technique on altering environment and the types of incoming task set. In this research project a cloud task scheduling methodology based on ant colony optimization ACO algorithm, we call it ACO-TS Ant Colony Optimization for Task Scheduling has been proposed and compared with different scheduling algorithms (Random, First Come First Serve FCFS, and Fastest Processor to the Largest Task First FPLTF). Ant Colony Optimization (ACO) is random optimization search method that will be used for assigning incoming tasks to available virtual machines VMs. The main role of proposed algorithm is to minimizing the makespan of certain tasks set and maximizing resource utilization by balance the load among virtual machines. The proposed scheduling algorithm was evaluated by using Cloudsim toolkit framework. Finally after analyzing and evaluating the performance of experimental results we find that the proposed algorithm ACO-TS perform better than Random, FCFS, and FPLTF algorithms in each of the makespaan and resource utilization.Keywords: cloud Task scheduling, ant colony optimization (ACO), cloudsim, cloud computing
Procedia PDF Downloads 4204122 Developing a Web-Based Workflow Management System in Cloud Computing Platforms
Authors: Wang Shuen-Tai, Lin Yu-Ching, Chang Hsi-Ya
Abstract:
Cloud computing is the innovative and leading information technology model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. In this paper, we aim at the development of workflow management system for cloud computing platforms based on our previous research on the dynamic allocation of the cloud computing resources and its workflow process. We took advantage of the HTML 5 technology and developed web-based workflow interface. In order to enable the combination of many tasks running on the cloud platform in sequence, we designed a mechanism and developed an execution engine for workflow management on clouds. We also established a prediction model which was integrated with job queuing system to estimate the waiting time and cost of the individual tasks on different computing nodes, therefore helping users achieve maximum performance at lowest payment. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud computing platform. This development also helps boost user productivity by promoting a flexible workflow interface that lets users design and control their tasks' flow from anywhere.Keywords: web-based, workflow, HTML5, Cloud Computing, Queuing System
Procedia PDF Downloads 3094121 A Study on How to Develop the Usage Metering Functions of BIM (Building Information Modeling) Software under Cloud Computing Environment
Authors: Kim Byung-Kon, Kim Young-Jin
Abstract:
As project opportunities for the Architecture, Engineering and Construction (AEC) industry have grown more complex and larger, the utilization of BIM (Building Information Modeling) technologies for 3D design and simulation practices has been increasing significantly; the typical applications of the BIM technologies include clash detection and design alternative based on 3D planning, which have been expanded over to the technology of construction management in the AEC industry for virtual design and construction. As for now, commercial BIM software has been operated under a single-user environment, which is why initial costs for its introduction are very high. Cloud computing, one of the most promising next-generation Internet technologies, enables simple Internet devices to use services and resources provided with BIM software. Recently in Korea, studies to link between BIM and cloud computing technologies have been directed toward saving costs to build BIM-related infrastructure, and providing various BIM services for small- and medium-sized enterprises (SMEs). This study addressed how to develop the usage metering functions of BIM software under cloud computing architecture in order to archive and use BIM data and create an optimal revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources. To this end, the author surveyed relevant cases, and then analyzed needs and requirements from AEC industry. Based on the results & findings of the foregoing survey & analysis, the author proposed herein how to optimally develop the usage metering functions of cloud BIM software.Keywords: construction IT, BIM (Building Information Modeling), cloud computing, BIM-based cloud computing, 3D design, cloud BIM
Procedia PDF Downloads 5064120 Bahrain Experience in Supporting Small and Medium Enterprises by the Utilization of E-Government
Authors: Najla Alhkalaf
Abstract:
The focus of this study is answering the following question: How do e-government services in Bahrain support the productivity of SMEs? This study examines the current E-government function in enhancing SME productivity in Bahrain through analysing the efficiency of e- government by viewing its facilitators and barriers from the perspective of different stakeholders. The study aims to identify and develop best practice guidelines with the end-goal of creating a standardised channel of communication between e-government and SMEs that fulfil the requirement of SME owners, and thus achieve the prime objective of e-government. E-government services for SMEs have been offered in Bahrain since 2005. However, the current services lack the required mechanism for SMEs to fully take advantage of these services because of lagging communication between service provider and end-user. E-government employees believe that a lack of awareness and trust are the main stumbling block, whereas the SME owners believe that there is a lack of sufficiency in the content and efficiency provided through e- services. A questionnaire has been created based on a pilot study that highlighted the main indicators of e-government efficiency and SMEs productivity as well as previous studies conducted on this subject. This allowed for quantitative data to be extracted. Also interviews were conducted with SME owners and government employees from both case studies, which formed the qualitative data for this study. The findings portray that both the service provider and service receiver largely agree on the existence of most of the technical and administrative barriers. However, the data reflects a level of dissatisfaction from the SME side, which contradicts with the perceived level of satisfaction from the government employees. Therefore, the data supports the argument that assures the existence of a communication gap between stakeholders. To this effect, this research would help build channels of communication between stakeholders, and then induces a plan unlocking the potential of e-government application. The conclusions of this study will help devise an optimised E-government strategy for Bahrain.Keywords: e-government, SME, e-services, G2B, government employees' perspective, entrepreneurs' perspective, enterprise
Procedia PDF Downloads 2314119 Provider Perceptions of the Effects of Current U.S. Immigration Enforcement Policies on Service Utilization in a Border Community
Authors: Isabel Latz, Mark Lusk, Josiah Heyman
Abstract:
The rise of restrictive U.S. immigration policies and their strengthened enforcement has reportedly caused concerns among providers about their inadvertent effects on service utilization among Latinx and immigrant communities. This study presents perceptions on this issue from twenty service providers in health care, mental health, nutrition assistance, legal assistance, and immigrant advocacy in El Paso, Texas. All participants were experienced professionals, with fifteen in CEO, COO, executive director, or equivalent positions, and based at organizations that provide services for immigrant and/or low-income populations in a bi-national border community. Quantitative and qualitative data were collected by two primary investigators via semi-structured telephone interviews with an average length of 20 minutes. A survey script with closed and open-ended questions inquired about participants’ demographic information and perceptions of impacts of immigration enforcement policies under the current federal administration on their work and patient or client populations. Quantitative and qualitative data were analyzed to produce descriptive statistics and identify salient themes, respectively. Nearly all respondents stated that their work has been negatively (N=13) or both positively and negatively (N=5) affected by current immigration enforcement policies. Negative effects were most commonly related to immigration enforcement-related fear and uncertainty among patient or client populations. Positive effects most frequently referred to a sense of increased community organizing and greater cooperation among organizations. Similarly, the majority of service providers either reported an increase (N=8) or decrease (N=6) in service utilization due to changes in immigration enforcement policies. Increased service needs were primarily related to a need for public education about immigration enforcement policy changes, information about how new policies impact individuals’ service eligibility, legal status, and civil rights, as well as a need to correct misinformation. Decreased service utilization was primarily related to fear-related service avoidance. While providers observed changes in service utilization among undocumented immigrants and mixed-immigration status families, in particular, participants also noted ‘spillover’ effects on the larger Latinx community, including legal permanent and temporary residents, refugees or asylum seekers, and U.S. citizens. This study reveals preliminary insights into providers’ widespread concerns about the effects of current immigration enforcement policies on health, social, and legal service utilization among Latinx individuals. Further research is necessary to comprehensively assess impacts of immigration enforcement policies on service utilization in Latinx and immigrant communities. This information is critical to address gaps in service utilization and prevent an exacerbation of health disparities among Latinx, immigrant, and border populations. In a global climate of rising nationalism and xenophobia, it is critical for policymakers to be aware of the consequences of immigration enforcement policies on the utilization of essential services to protect the well-being of minority and immigrant communities.Keywords: immigration enforcement, immigration policy, provider perceptions, service utilization
Procedia PDF Downloads 1474118 Protecting the Cloud Computing Data Through the Data Backups
Authors: Abdullah Alsaeed
Abstract:
Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.
Procedia PDF Downloads 874117 Relationship Building Between Peer Support Worker and Person in Recovery in the Community-based One-to-One Peer Support Service of Mental Health Setting
Authors: Yuen Man Yan
Abstract:
Peer support has been a rising prevalent mental health service in the globe. The community-based mental health services employ persons with lived experience of mental illness to be peer support workers (PSWs) to provide peer support service to those who are in the progress of recovery (PIRs). It represents the transformation of mental health service system to a recovery-oriented and person-centered care. Literatures proved the feasibility and effectiveness of the peer support service. Researchers have attempted to explore the unique good qualities of peer support service that benefit the PIRs. Empirical researches found that the strength of the relationship between those who sought for change and the change agents positively related to the outcomes in one-to-one therapies across theoretical orientations. However, there is lack of literature on investigating the relationship building between the PSWs and PIRs in the one-to-one community-based peer support service. This study aims to identify and characterise the relationship in the community-based one-to-one peer support service from the perspectives of PSWs and PIRs; and to conceptualize the components of relationship building between PSWs and PIRs in the community-based one-to-one peer support service. The study adopted the constructivist grounded theory approach. 10 pairs of the PSWs and PIRs participated in the study. Data were collected through multiple qualitative methods, including observation of the interaction and exchange of the PSWs and PIRs in the 1ₛₜ, 3ᵣ𝒹 and 9th sessions of the community-based one-to-one peer support service; and semi-structural interview with the PSWs and PIRs separately after the 3ᵣ𝒹and 9ₜₕ session of the peer support service. This presentation is going to report the preliminary findings of the study. PSWs and PIRs identified their relationship as “life alliance”. Empathy was found to be one of key components of the relationship between the PSWs and the PIRs. Unlike the empathy, as explained by Carl Roger, in which the service provider was able to put themselves into the shoes of the service recipients as if he was the service recipients, the intensity of the empathy was much greater in the relationship between PSWs and PIRs because PSWs had the lived experience of mental illness and recovery. The dimensions of the empathy in the relationship between PSWs and PIRs was found to be multiple, not only related to the mental illness but also related to various aspects in life, like family relationship, employment, interest of life, self-esteem and etc.Keywords: person with lived experience, peer support worker, peer support service, relationship building, therapeutic alliance, community-based mental health setting
Procedia PDF Downloads 72