Search results for: aesthetic computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1332

Search results for: aesthetic computing

1332 A Survey on Internet of Things and Fog Computing as a Platform for Internet of Things

Authors: Samira Kalantary, Sara Taghipour, Mansoure Ghias Abadi

Abstract:

The Internet of Things (IOT) is a technological revolution that represents the future of computing and communications. IOT is the convergence of Internet with RFID, NFC, Sensor, and smart objects. Fog Computing is the natural platform for IOT. At present, the IOT as a new network communication technology has rapidly shifted from concept to application under fog computing virtual storage computing platform. In this paper, we describe everything about IOT and difference between cloud computing and fog computing.

Keywords: cloud computing, fog computing, Internet of Things (IoT), IOT application

Procedia PDF Downloads 540
1331 The Criteria of the Aesthetic Quality of Art: Contemporary Photography

Authors: Artem Surkov

Abstract:

This work is devoted to a problem of aesthetic quality determinism in the context of contemporary art. The object of study is photography regarding as a kind of art which demands specific system of quality marking. Objective: To define aesthetic criteria in photography art. For current searching different kind of texts by such powerful authors like Clement Greenberg and Rosalind Krauss, Theodor Adorno and Herbert Marcuse, Charlott Cotton and Boris Groys, Viktor Miziano and Ekaterina Degot' were analyzed. Before all, there are two different kinds of photography: the classic art photography (by Ansel Adams) and the photography as kind of art (by Andreas Gursky). In this text we are talking about the photography as kind of art. The main principle of current searching is synthesis of two different approaches: modernism and postmodernism. This method helps us to define uniform criteria of aesthetic quality in photography as kind of art. The criteria mentioned in conclusion paragraph are: aesthetic rationality, aesthetic economy, awareness (using photographic technics or references), and intention to go beyond form, practice and method.

Keywords: aesthetic, art, criteria of quality, photography, visually

Procedia PDF Downloads 376
1330 Visual Overloaded on User-Generated Content by the Net Generation: Participatory Cultural Viewpoint

Authors: Hasanah Md. Amin

Abstract:

The existence of cyberspace and its growing contents is real and overwhelming. Visual as one of the properties of cyber contents is increasingly becoming more significant and popular among creator and user. The visual and aesthetic of the content is consistent with many similarities. Aesthetic, although universal, has slight differences across the world. Aesthetic power could impress, influence, and cause bias among the users. The content creator who knows how to manipulate this visuals and aesthetic expression can dominate the scenario and the user who is ‘expressive literate’ will gain much from the scenes. User who understands aesthetic will be rewarded with competence, confidence, and certainly, a personality enhanced experience in carrying out a task when participating in this chaotic but promising cyberworld. The aim of this article is to gain knowledge from related literature and research regarding User-Generated Content (UGC), which focuses on aesthetic expression by the Net generation. The objective of this preliminary study is to analyze the aesthetic expression linked to visual from the participatory cultural viewpoint looking for meaning, value, patterns, and characteristics.

Keywords: visual overloaded, user-generated content, net generation, visual arts

Procedia PDF Downloads 401
1329 Fog Computing- Network Based Computing

Authors: Navaneeth Krishnan, Chandan N. Bhagwat, Aparajit P. Utpat

Abstract:

Cloud Computing provides us a means to upload data and use applications over the internet. As the number of devices connecting to the cloud grows, there is undue pressure on the cloud infrastructure. Fog computing or Network Based Computing or Edge Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. Therefore the nodes connected to the cloud have a better response time. This paper proposes a method of moving the computation from the cloud to the network by introducing an android like appstore on the networking devices.

Keywords: cloud computing, fog computing, network devices, appstore

Procedia PDF Downloads 341
1328 Effect of Cloud Computing on Enterprises

Authors: Amir Rashid

Abstract:

Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.

Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS

Procedia PDF Downloads 301
1327 Load Balancing Algorithms for SIP Server Clusters in Cloud Computing

Authors: Tanmay Raj, Vedika Gupta

Abstract:

For its groundbreaking and substantial power, cloud computing is today’s most popular breakthrough. It is a sort of Internet-based computing that allows users to request and receive numerous services in a cost-effective manner. Virtualization, grid computing, and utility computing are the most widely employed emerging technologies in cloud computing, making it the most powerful. However, cloud computing still has a number of key challenges, such as security, load balancing, and non-critical failure adaption, to name a few. The massive growth of cloud computing will put an undue strain on servers. As a result, network performance will deteriorate. A good load balancing adjustment can make cloud computing more productive and in- crease client fulfillment execution. Load balancing is an important part of cloud computing because it prevents certain nodes from being overwhelmed while others are idle or have little work to perform. Response time, cost, throughput, performance, and resource usage are all parameters that may be improved using load balancing.

Keywords: cloud computing, load balancing, computing, SIP server clusters

Procedia PDF Downloads 77
1326 Cultural Works Interacting with the Generational Aesthetic Gap between Gen X and Gen Z in China: A Qualitative Study

Authors: Qianyu Zhang

Abstract:

The spread of digital technology in China has worsened the generation gap and intergenerational competition for cultural and aesthetic discourse. Meanwhile, the increased accessibility of cultural works has encouraged the sharing and inheritance of collective cultural memories between generations. However, not each cultural work can engage positively with efforts to bridge intergenerational aesthetic differences. This study argues that in contemporary China, where new media and the Internet are widely available, featured cultural works have more potential to help enhance the cultural aesthetic consensus among different generations, thus becoming an effective countermeasure to narrow the intergenerational aesthetic rift and cultural discontinuity. Specifically, the generational aesthetic gap is expected to be bridged or improved through the shared appreciation or consumption of cultural works that meet certain conditions by several generations. In-depth interviews of Gen X and Gen Z (N=15, respectively) in China uncovered their preferences and commonalities for cultural works and shared experiences in appreciating them. Results demonstrate that both generations’ shared appreciation of cultural work is a necessary but insufficient condition for its effective response to the generational aesthetic gap. Coding analysis rendered six dimensions that cultural works with the potential to bridge the intergenerational aesthetic divide should satisfy simultaneously: genre, theme, content, elements, quality, and accessibility. Cultural works that engage multiple senses/ compound realistic, domestic and contemporary cultural memories/ contain the narrative of family life and nationalism/ include more elements familiar to the previous generation/ are superb-produced and unaffected/ are more accessible better promote intergenerational aesthetic exchange and value recognition. Moreover, compared to the dilemma of the previous generation facing the aesthetic gap, the later generation plays a crucial role in bridging the generational aesthetic divide.

Keywords: cultural works, generation gap, generation X, generation Z, cultural memory

Procedia PDF Downloads 95
1325 Themes in Aesthetic Perceptions of Restorative Urban Landscapes

Authors: Rachel Bechtold, Catherine Shoulders, Donald Johnson, Jennie Popp, Elena Garcia, Lisa Wood

Abstract:

Creating successfully restored urban landscapes involves both the sound design of natural resources and the incorporation of human perceptions of landscape. Moving forward with an invested interest from society is a challenge for the efficacy of reclaimed landscape design. In particular, urban areas present a dynamic environment wherein society and nature compete for resources and space. This review is meant to examine how perceptions of urban community members, the stakeholders for the plant species that share their environment, are reflected in aesthetic considerations. Findings from this literature review include themes of (1) aesthetic perceptions of stakeholders in rehabilitated landscapes and (2) the importance of organizing indicators of aesthetic perception for future design decisions. Recommendations include addressing the gap in research on aesthetic perceptions of reclaimed urban landscapes and addressing the lack of a consistent and widely accepted framework for these interdisciplinary studies. With knowledge of stakeholder perceptions, improved aesthetic and ecologic designs can more seamlessly merge into reclaimed urban landscapes.

Keywords: phytoremediation, urban landscape design, aesthetic perception, landscape ecology, phytorestoration, landscape reclamation, rehabilitation

Procedia PDF Downloads 152
1324 Key Technologies and Evolution Strategies for Computing Force Bearer Network

Authors: Zhaojunfeng

Abstract:

Driven by the national policy of "East Data and Western Calculation", the computing first network will attract a new wave of development. As the foundation of the development of the computing first network, the computing force bearer network has become the key direction of technology research and development in the industry. This article will analyze typical computing force application scenarios and bearing requirements and sort out the SLA indicators of computing force applications. On this basis, this article carries out research and discussion on the key technologies of computing force bearer network in a slice packet network, and finally, gives evolution policy for SPN computing force bearer network to support the development of SPN computing force bearer network technology and network deployment.

Keywords: component-computing force bearing, bearing requirements of computing force application, dual-SLA indicators for computing force applications, SRv6, evolution strategies

Procedia PDF Downloads 95
1323 Cloud Computing in Jordanian Libraries: An Overview

Authors: Mohammad A. Al-Madi, Nagham A. Al-Madi, Fanan A. Al-Madi

Abstract:

The current concept of the technology of cloud computing libraries has been increasing where users can store their data in a virtual space and can be retrieved from anywhere whilst using the network. By using cloud computing technology, industries and individuals save money, time, and space. Moreover, data and information about libraries can be placed in the cloud. This paper discusses the meaning of cloud computing along with its types. Further, the focus has been given to the application of cloud computing in modern libraries. Additionally, the advantages of cloud computing and the areas in which cloud computing be applied with current usage are discussed. Finally, the present situation of the Jordanian libraries is considered and discussed in further detail.

Keywords: cloud computing, community cloud, hybrid cloud, private cloud, public cloud

Procedia PDF Downloads 181
1322 An Aesthetic Spatial Turn - AI and Aesthetics in the Physical, Psychological, and Symbolic Spaces of Brand Advertising

Authors: Yu Chen

Abstract:

In line with existing philosophical approaches, this research proposes a conceptual model with an innovative spatial vision and aesthetic principles for Artificial Intelligence (AI) application in brand advertising. The model first identifies the major constituencies in contemporary advertising on three spatial levels—physical, psychological, and symbolic. The model further incorporates the relationships among AI, aesthetics, branding, and advertising and their interactions with the major actors in all spaces. It illustrates that AI may follow the aesthetic principles-- beauty, elegance, and simplicity-- to reinforce brand identity and consistency in advertising, to collaborate with stakeholders, and to satisfy different advertising objectives on each level. It proposes that, with aesthetic guidelines, AI may assist consumers to emerge into the physical, psychological, and symbolic advertising spaces and helps transcend the tangible advertising messages to meaningful brand symbols. Conceptually, the research illustrates that even though consumers’ engagement with brand mostly begins with physical advertising and later moves to psychological-symbolic, AI-assisted advertising should start with the understanding of brand symbolic-psychological and consumer aesthetic preferences before the physical design to better resonate. Limits of AI and future AI functions in advertising are discussed.

Keywords: AI, spatial, aesthetic, brand advertising

Procedia PDF Downloads 39
1321 Aesthetic Modification with Combined Orthognathic Surgery and Closed Rhinoplasty

Authors: Alessandro Marano

Abstract:

Aim: The author describes the aesthetic modification using orthognathic surgery and closed rhinoplasty. Methods: Series of case study. After orthognathic surgery we can observe a dramatical change of aesthetic especially in the mid-face and nose projection. The advancement of maxillary bone through Le Fort I osteotomy will change the nasal tip projection and lips roundness; combining orthognathic surgery with closed approach rhinoplasty will manage both function and aesthetic of all mid face district. Results: Combining Le Fort I osteotomy with closed approach rhinoplasty resulted in good objective results with high patient satisfaction. Le Fort I osteotomy will increase projection of mid face and the closed approach rhinoplasty will modify the nasal shape to be more harmonic with the new maxillary district. The scars are not visible because hidden inside the mouth and nose. Conclusions: The orthognathic surgery combined with closed approach rhinoplasty are very effective for changing the aesthetic of the mid face. The results illustrate the difference between the use of orthognathic surgery only and to use it in association of closed approach rhinoplasty. Using both will allow to obtain a long lasting and pleasing results.

Keywords: orthognathic, rhinoplasty, aesthetic, face

Procedia PDF Downloads 61
1320 Cloud Computing Architecture Based on SOA

Authors: Negin Mohammadrezaee Larki

Abstract:

Cloud Computing is a popular solution that has been used in recent years to cooperate and collaborate among distributed applications over networks. Moving successfully into cloud computing requires an architecture that will support the new cloud capabilities. Many business leaders and analysts agree that moving to cloud requires having a solid, service-oriented architecture to provide the infrastructure needed for successful cloud implementation.

Keywords: Service Oriented Architecture (SOA), Service Oriented Cloud Computing Architecture (SOCCA), cloud computing, cloud computing architecture

Procedia PDF Downloads 342
1319 The Transformation of Beauty and Ugliness in Art Aesthetics

Authors: Wenjin Li, Jing Sun

Abstract:

Since the mid-eighteenth century, when philosophers began to talk about aesthetic consciousness, beauty gradually became an independent system, and ugliness was often considered the opposite of beauty and neglected. Yet, ugliness itself has its self-regulation and aesthetic value. This paper explores the relationship between beauty and ugliness and the three forms of transformation between beauty and ugliness in artworks, looking at the history of ugliness in the East and the West, and giving an insight into the role of the artist in the transformation between beauty and ugliness.

Keywords: artistic aesthetics, arts theory, aesthetic of the ugly, beauty and ugliness, arts of east and west

Procedia PDF Downloads 50
1318 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 445
1317 Evaluating the Impact of Cloud Computing on Collaboration Service in Knowledge Management Systems

Authors: Hamid Reza Nikkhah, Abbas Toloei Eshlaghi, Hossein Ali Momeni

Abstract:

One of the most important services of Knowledge Management Systems (KMS) is collaboration service which plays a decisive role in organization efficiency. Cloud computing as one of the latest IT technologies has brought a new paradigm in delivering services and communications. In this research, we evaluate the impact of cloud computing on the collaboration service of KMS and for doing so, four variables of cloud computing and three variables of the collaboration service were detected to be assessed.It was found that cloud computing has a far-fetching direct impact on the collaboration service.

Keywords: cloud computing, collaboration service, knowledge management systems, cloud computing

Procedia PDF Downloads 478
1316 Use of Cloud Computing and Smart Devices in Healthcare

Authors: Nikunj Agarwal, M. P. Sebastian

Abstract:

Cloud computing can reduce the start-up expenses of implementing EHR (Electronic Health Records). However, many of the healthcare institutions are yet to implement cloud computing due to the associated privacy and security issues. In this paper, we analyze the challenges and opportunities of implementing cloud computing in healthcare. We also analyze data of over 5000 US hospitals that use Telemedicine applications. This analysis helps to understand the importance of smart phones over the desktop systems in different departments of the healthcare institutions. The wide usage of smartphones and cloud computing allows ubiquitous and affordable access to the health data by authorized persons, including patients and doctors. Cloud computing will prove to be beneficial to a majority of the departments in healthcare. Through this analysis, we attempt to understand the different healthcare departments that may benefit significantly from the implementation of cloud computing.

Keywords: cloud computing, smart devices, healthcare, telemedicine

Procedia PDF Downloads 355
1315 Cloud Computing: Major Issues and Solutions

Authors: S. Adhirai Subramaniyam, Paramjit Singh

Abstract:

This paper presents major issues in cloud computing. The paper describes different cloud computing deployment models and cloud service models available in the field of cloud computing. The paper then concentrates on various issues in the field. The issues such as cloud compatibility, compliance of the cloud, standardizing cloud technology, monitoring while on the cloud and cloud security are described. The paper suggests solutions for these issues and concludes that hybrid cloud infrastructure is a real boon for organizations.

Keywords: cloud, cloud computing, mobile cloud computing, private cloud, public cloud, hybrid cloud, SAAS, PAAS, IAAS, cloud security

Procedia PDF Downloads 304
1314 An E-Retailing System Architecture Based on Cloud Computing

Authors: Chanchai Supaartagorn

Abstract:

E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. The world e-retailing is growing at an exponential rate in the Americas, Europe, and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.

Keywords: architecture, cloud computing, e-retailing, internet-based

Procedia PDF Downloads 351
1313 Reading Literature between Aesthetic Values and Ideology

Authors: Ahmed Hassan Sabra

Abstract:

Context: The research explores the impact of ideology on the aesthetic reading of literary texts. It aims to investigate how ideology affects the way in which readers interpret and appreciate literature. The study focuses on a selection of Arabic novels that have been subject to significant controversy among critics, with some praising their aesthetic value and others denouncing it. By analyzing this controversy, the research seeks to demonstrate the extent to which ideology influences aesthetic judgments in literary readings. Research Aim: The aim of this study is to examine the influence of ideology on the aesthetic reading of literary texts. It seeks to understand how the ideological perspective of readers shapes their interpretation and evaluation of literature. Methodology: The research adopts an aesthetic approach as the primary methodology for investigating the relationship between literary reading and ideological reception. By employing this approach, the study aims to uncover the intricate connections between aesthetics and ideology in the process of interpreting and appreciating literature. Findings: The research reveals that ideology cannot be separated from the aesthetic experience of reading literary texts. It argues that the ideological perspective of the reader significantly impacts their aesthetic judgments and interpretations. The differing viewpoints among critics regarding the aesthetic value of the selected Arabic novels highlight the influence of ideology on readers' assessments of artistic merit. Theoretical Importance: The study contributes to the understanding of the complex interplay between aesthetics and ideology in the realm of literary interpretation. It reinforces the notion that aesthetic judgments are not solely based on the intrinsic qualities of the text but are also shaped by the ideological framework of the reader. Data Collection: The research collects data by examining critical responses to a number of Arabic novels that have generated controversy. These responses include both positive and negative evaluations of the novels' aesthetic value. The research also considers the ideological positions and perspectives of the critics. Analysis Procedures: The collected data is analyzed using an aesthetic lens, taking into account the ideological viewpoints expressed in the critical responses. The analysis explores how these ideological perspectives influence the aesthetic judgments made by the critics. Questions Addressed: The research addresses the question of how ideology impacts the aesthetic reading of literary texts. It investigates the extent to which ideology shapes readers' interpretations and evaluations of literature, particularly in the case of controversial novels. Conclusion: The study concludes that ideology plays a significant role in the aesthetic reading of literary texts. It demonstrates that readers' ideological perspectives influence their interpretation and evaluation of a text's aesthetic value. The research highlights the interconnectedness of aesthetics and ideology in the process of literary reception, emphasizing the importance of considering the ideological framework of readers when analyzing the aesthetic qualities of literature.

Keywords: novel, aesthetic, ideology, reading

Procedia PDF Downloads 33
1312 Artificial Intelligence for Cloud Computing

Authors: Sandesh Achar

Abstract:

Artificial intelligence is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, resulting in AI’s implementation into cloud computing to enhance and optimize the technology service rendered. The deployment of AI in cloud-based applications has brought about autonomous computing, whereby systems achieve stated results without human intervention. Despite the amount of research into autonomous computing, work incorporating AI/ML into cloud computing to enhance its performance and resource allocation remain a fundamental challenge. This paper highlights different manifestations, roles, trends, and challenges related to AI-based cloud computing models. This work reviews and highlights excellent investigations and progress in the domain. Future directions are suggested for leveraging AI/ML in next-generation computing for emerging computing paradigms such as cloud environments. Adopting AI-based algorithms and techniques to increase operational efficiency, cost savings, automation, reducing energy consumption and solving complex cloud computing issues are the major findings outlined in this paper.

Keywords: artificial intelligence, cloud computing, deep learning, machine learning, internet of things

Procedia PDF Downloads 68
1311 Towards a Common Architecture for Cloud Computing Interoperability

Authors: Sana Kouchi, Hassina Nacer, Kadda Beghdad-bey

Abstract:

Cloud computing is growing very fast in the market and has become one of the most controversial discussed developments in recent years. Cloud computing providers become very numerous in these areas and each of them prefers its own cloud computing infrastructure, due to the incompatibility of standards and cloud access formats, which prevents them from accepting to support cloud computing applications in a standardized manner, this heterogeneity creates the problem of interoperability between clouds, and considering that cloud customers are probably in search of an interoperable cloud computing, where they will have total control over their applications and simply migrate their services as needed, without additional development investment. A cloud federation strategy should be considered. In this article, we propose a common architecture for the cloud that is based on existing architectures and also the use of best practices from ICT frameworks, such as IBM, ITIL, NIST, etc., to address the interoperability of architectures issues in a multi-cloud system.

Keywords: cloud computing, reference architecture, interoperability, standard

Procedia PDF Downloads 130
1310 Giving Gustatory Aesthetics Its Place at the Table

Authors: Brock Decker

Abstract:

Vision and hearing have been given metaphysical, epistemic, moral and aesthetic preference over the gustatory senses since the very beginnings of Western philosophy. This unjustified prejudice has directed philosophical inquiry away from taste and smell and the values and interests of those concerned with them. The metaphysical and epistemic prejudices that have hindered work in this field are confronted by accepting an oblique invitation from David Hume to pursue a gustatory aesthetics of taste. A framework for further discussion of gustatory experience is added by arguing that taste and smell are cognitively configurable senses capable of bifurcated intentionality and that the taste perception of states of affairs is influenced both by culture and personal preference. Taste perceptions are revealed to admit an aesthetic standard. Using both a Humean aesthetic and a Brillat-Savarin-inspired understanding of taste can explain and discriminate between untrained and expert aesthetic taste experiences and contribute a perspective free from traditional prejudice for future work in the aesthetics of taste.

Keywords: aesthetics, Hume, Korsmeyer, taste, Scruton

Procedia PDF Downloads 31
1309 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 279
1308 Factors Affecting U-Computing Use

Authors: Shui Lien Chen, Chen-Yin Kuo

Abstract:

U-computing use has brings many new services of commerce, which could provide a new experience for customer. Location Based Services (LBS) is one of U-computing service. With increase of the smartphone and mobile internet users, there are many small and medium-sized enterprises (SMEs) take LBS in marketing strategy in Taiwan. For example, they would provide Facebook check-in to get a benefit (e.g. discount, free dessert and coupon) to attract customers purchasing. Therefore, this study is to understand which factors would affect SMEs adoption of u-computing and the performances after adopt U-computing. This study collected 187 useful data that were analyzed by SmartPLS 2.0 software. The results of this study are as follows. First, entrepreneurial orientation and market orientation positively affects innovation. Second, business resources and innovation positively affect u-computing use. Finally, U-computing positively affects both business value and customer value.

Keywords: entrepreneurial orientation, market orientation, innovation, business resources, u-computing use, LBS

Procedia PDF Downloads 543
1307 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 303
1306 A New Paradigm to Make Cloud Computing Greener

Authors: Apurva Saxena, Sunita Gond

Abstract:

Demand of computation, data storage in large amount are rapidly increases day by day. Cloud computing technology fulfill the demand of today’s computation but this will lead to high power consumption in cloud data centers. Initiative for Green IT try to reduce power consumption and its adverse environmental impacts. Paper also focus on various green computing techniques, proposed models and efficient way to make cloud greener.

Keywords: virtualization, cloud computing, green computing, data center

Procedia PDF Downloads 515
1305 The Application of the Enterprise Systems through the Cloud Computing in Company: A Review and Suggestions

Authors: Mohanaad Talal Shakir, Saad AJAJ Khalaf, Nawar Ahmed Aljumaily, Mustafa Talal Shakere

Abstract:

Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Objectives of this paper are to investigate the role of the Enterprise System and Cloud Computing Services to assist and guide him to ensure the initiative become successful. The cloud computing technology offers great potential for Enterprise such as the speed of dealing with data and product introductions, innovations and speed of response. The use of cloud computing technology leads to the rapid development and competitiveness of enterprises in various fields.

Keywords: cloud computing, information management, marketing, enterprise systems

Procedia PDF Downloads 646
1304 A Task Scheduling Algorithm in Cloud Computing

Authors: Ali Bagherinia

Abstract:

Efficient task scheduling method can meet users' requirements, and improve the resource utilization, then increase the overall performance of the cloud computing environment. Cloud computing has new features, such as flexibility, virtualization and etc., in this paper we propose a two levels task scheduling method based on load balancing in cloud computing. This task scheduling method meet user's requirements and get high resource utilization, that simulation results in CloudSim simulator prove this.

Keywords: cloud computing, task scheduling, virtualization, SLA

Procedia PDF Downloads 362
1303 Analyzing the Perceptions of Emotions in Aesthetic Music

Authors: Abigail Wiafe, Charles Nutrokpor, Adelaide Oduro-Asante

Abstract:

The advancement of technology is rapidly making people more receptive to music as computer-generated music requires minimal human interventions. Though algorithms are applied to generate music, the human experience of emotions is still explored. Thus, this study investigates the emotions humans experience listening to computer-generated music that possesses aesthetic qualities. Forty-two subjects participated in the survey. The selection process was purely arbitrary since it was based on convenience. Subjects listened and evaluated the emotions experienced from the computer-generated music through an online questionnaire. The Likert scale was used to rate the emotional levels after the music listening experience. The findings suggest that computer-generated music possesses aesthetic qualities that do not affect subjects' emotions as long as they are pleased with the music. Furthermore, computer-generated music has unique creativity, and expressioneven though the music produced is meaningless, the computational models developed are unable to present emotional contents in music as humans do.

Keywords: aesthetic, algorithms, emotions, computer-generated music

Procedia PDF Downloads 91