Search results for "cloud computing."

showing 10 items of 325 documents

Cost-Effective eHealth System Based on a Multi-Sensor System-on-Chip Platform and Data Fusion in Cloud for Sport Activity Monitoring

2018

eHealth systems provide medical support to users and contribute to the development of mobile and quality health care. They also provide results on the prevention and follow-up of diseases by monitoring health-status indicators and methodical data gathering in patients. Telematic management of health services by means of the Internet of Things provides immediate support and it is cheaper than conventional physical presence methods. Currently, wireless communications and sensor networks allow a person or group to be monitored remotely. The aim of this paper is to develop and assess a system for monitoring physiological parameters to be applied in different scenarios, such as health or sports.…

020205 medical informaticsStandardizationComputer Networks and CommunicationsComputer sciencelcsh:TK7800-8360Cloud computing02 engineering and technologycomputer.software_genre01 natural sciencesNetwork simulationHealth servicesElectrònica mèdicasensor networksHealth care0202 electrical engineering electronic engineering information engineeringeHealthSalutTelematicsElectrical and Electronic Engineeringdata fusionData collectionMultimediabusiness.industry010401 analytical chemistrylcsh:ElectronicsSensor fusion0104 chemical sciencesHardware and ArchitectureControl and Systems EngineeringSignal ProcessingbiomonitoringeHealthbusinesssportcomputerWireless sensor networkCloudElectronics
researchProduct

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct

Intelligent virtual manufacturing cell formation in cloud-based design and manufacturing

2018

Abstract Cloud-based design and manufacturing (CBDM) can presumably stimulate greater intelligence in cloud-based models. This paper assumes that cloud-based design for cellular manufacturing can be referred to as a multiscale, uncertain, and dynamic service-oriented network where a set of CAD parts, modelled by set of features, can be manufactured in intelligent virtual manufacturing cells under certain constraints. Using the concepts of the holon and the attractor, integrating the uncertainty in the modelling of part design and part–manufacturing network, an approach to address intelligent virtual manufacturing cell formation in CBDM is proposed. The powerful role of the CAD features is e…

0209 industrial biotechnologyCloud-based design and manufacturingComputer scienceHolon (philosophy)business.industryCellular manufacturingDistributed computingCloud computing02 engineering and technologycomputer.software_genreFuzzy logic[SHS]Humanities and Social SciencesIntelligent agent020901 industrial engineering & automationArtificial IntelligenceControl and Systems Engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringCloud manufacturingManufacturing cellbusinesscomputerComputingMilieux_MISCELLANEOUSEngineering Applications of Artificial Intelligence
researchProduct

Summarizing Large Scale 3D Point Cloud for Navigation Tasks

2017

International audience; Democratization of 3D sensor devices makes 3D maps building easier especially in long term mapping and autonomous navigation. In this paper we present a new method for summarizing a 3D map (dense cloud of 3D points). This method aims to extract a summary map facilitating the use of this map by navigation systems with limited resources (smartphones, cars, robots...). This Vision-based summarizing process is applied in a fully automatic way using the photometric, geometric and semantic information of the studied environment.

0209 industrial biotechnologyComputer scienceProcess (engineering)business.industry[INFO.INFO-RB] Computer Science [cs]/Robotics [cs.RO][ INFO.INFO-RB ] Computer Science [cs]/Robotics [cs.RO]Point cloud020206 networking & telecommunicationsCloud computing02 engineering and technologyTerm (time)020901 industrial engineering & automationHuman–computer interaction0202 electrical engineering electronic engineering information engineering[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]RobotScale (map)business
researchProduct

Impact of accounting process characteristics on accounting outsourcing - Comparison of users and non-users of cloud-based accounting information syst…

2019

Article In Press The article of record as published may be found at https://doi.org/10.1016/j.accinf.2019.06.002 Prior literature informs us that a company's decision to outsource a business process depends on process characteristics such as how frequently the process is performed or how specific the assets required by the process are. In this article, we compare the effects of accounting process characteristics on outsourcing decisions across users of traditional and cloud-based accounting information systems (AIS). By focusing on outsourcing of accounting processes among small and medium sized enterprises, we investigate the effect of five business process characteristics (frequency, huma…

0209 industrial biotechnologyInformation Systems and ManagementulkoistaminenProcess (engineering)Business processcloud-based accounting information systemsaccountingsmall and medium-sized enterprisesAccountingCloud computing02 engineering and technologyAsset specificitytransaction costsManagement Information SystemsOutsourcingpilvipalvelut020901 industrial engineering & automationAccounting0502 economics and businessTransaction costkirjanpitobusiness.industrytransaktiokustannukset05 social scienceseconomics050201 accountingkustannuksetVariety (cybernetics)outsourcingAccounting information systembusinesspienet ja keskisuuret yrityksetFinance
researchProduct

Towards Shipping 4.0. A preliminary gap analysis

2020

Abstract The paradigm of Industry 4.0 involves a substantial innovation to the value creation approach thought the supply chain and the application of digital enabling technologies like the Internet of Things (IoT), Big Data Analytics (BDA) and cloud computing. The fourth industrial revolution is thus expected to have a disruptive impact on maritime transport and shipping sectors, where smart ships and autonomous vessels well be part of a new and fully interconnected maritime ecosystem. Specific hardware components, such as sensors, actuators, or processors will be embedded in the ship’s key systems in order to provide valuable information to increase the efficiency, sustainability and safe…

0209 industrial biotechnologysmart shipBig Data Analytics (BDA)business.industryComputer scienceSupply chainBig dataCloud computing02 engineering and technologyGap analysisBusiness modelIndustry 4.0Maturity (finance)Industrial and Manufacturing EngineeringInternet of Things (IoT)Engineering management020303 mechanical engineering & transports020901 industrial engineering & automation0203 mechanical engineeringArtificial IntelligenceSettore ING-IND/17 - Impianti Industriali MeccaniciSustainabilityValue chainbusinessProcedia Manufacturing
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage

2019

Given two strings: pattern $p$ of length $m$ and text $t$ of length $n$ . The string matching problem is to find all (or some) occurrences of the pattern $p$ in the text $t$ . We introduce a new simple data structure, called index arrays, and design fast privacy-preserving matching algorithm for string matching. The motivation behind introducing index arrays is determined by the need for pattern matching on distributed cloud-based datasets with semi-trusted cloud providers. It is intended to use encrypted index arrays both to improve performance and protect confidentiality and privacy of user data.

021110 strategic defence & security studiesTheoretical computer scienceComputer sciencebusiness.industry0211 other engineering and technologiesCloud computing02 engineering and technologyString searching algorithmData structureEncryptionSimple (abstract algebra)Computer data storagePattern matchingbusinessBlossom algorithm2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

2017

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on d…

021110 strategic defence & security studiesbusiness.industryComputer scienceVisibility (geometry)0211 other engineering and technologiesBotnetCloud computingcloud environments02 engineering and technologycomputer.software_genrepilvipalvelutInformation sensitivityMode (computer interface)Virtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingState (computer science)co-residence detectiontietoturvavirtual networksbusinessVirtual networkcomputerComputer network
researchProduct