Search results for "cloud computing."

showing 10 items of 325 documents

Vertical grid refinement for stratocumulus clouds in the radiation scheme of a global climate model

2021

Abstract. In this study, we implement a vertical grid refinement scheme in the radiation routine of the global aerosol-climate model ECHAM-HAM, aiming to improve the representation of stratocumulus clouds and address the underestimation of their cloud cover. The scheme is based on a reconstruction of the temperature inversion as a physical constraint for the cloud top. On the refined grid, the boundary layer and the free troposphere are separated and the cloud's layer is made thinner. The cloud cover is re-calculated either by conserving the cloud volume (SC-VOLUME) or by using the Sundqvist cloud cover routine on the new grid representation (SC-SUND). In global climate simulations, we find…

TroposphereBoundary layerCover (telecommunications)Meteorologybusiness.industryGeneral Circulation ModelCloud coverEnvironmental scienceInversion (meteorology)Cloud computingGridbusinessAstrophysics::Galaxy Astrophysics
researchProduct

2021

Abstract. In this study, we implement a vertical grid refinement scheme in the radiation routine of the global aerosol–climate model ECHAM-HAM, aiming to improve the representation of stratocumulus clouds and address the underestimation of their cloud cover. The scheme is based on a reconstruction of the temperature inversion as a physical constraint for the cloud top. On the refined grid, the boundary layer and the free troposphere are separated and the cloud's layer is made thinner. The cloud cover is recalculated either by conserving the cloud volume (SC-VOLUME) or by using the Sundqvist cloud cover routine on the new grid representation (SC-SUND). In global climate simulations, we find …

TroposphereBoundary layerMeteorologyCover (telecommunications)business.industryCloud coverEnvironmental scienceA priori and a posterioriCloud computingInversion (meteorology)businessGridGeoscientific Model Development
researchProduct

Effects of model configuration for superparametrised long-term simulations – Implementation of a cloud resolving model in EMAC (v2.50)

2019

Abstract. A new module has been implemented in the ECHAM5/MESSy Atmospheric Chemistry (EMAC) Model that simulates cloud related processes on a much smaller grid. This so called superparametrisation acts as a replacement for the convection parametrisation and large-scale cloud scheme. The concept of embedding an ensemble of cloud resolving models (CRMs) inside of each grid box of a general circulation model leads to an explicit representation of cloud dynamics. The new model component is evaluated against observations and the conventional usage of EMAC using a convection parametrisation. In particular, effects of applying different configurations of the superparametrisation are analyzed in a…

TroposphereMeteorologyPlanetary boundary layerDiurnal cyclebusiness.industryCloud coverEnvironmental scienceCloud computingClimate stateSensible heatbusinessGrid
researchProduct

Global Understanding Environment: Towards Self-managed Web of Everything

2012

Current Web grows rapidly to several directions (from the Web of Documents to the Webs of Humans, Things, Services, Knowledge, Intelligence, etc.). Consequently the recent and future Web-based applications, systems and frameworks (like, e.g., Social and Ubiquitous Computing, SOA and Cloud Computing, etc.) should take into account challenges related to extremely high heterogeneity of components and exponentially increased complexity of a business logic connecting and making them interoperable. Enabling self-management enhanced with semantic technology seems to be an only option to handle that. We suggest adding a "virtual representative" to every resource in the Web to solve the global inter…

Ubiquitous computingComputer sciencebusiness.industryCloud computingcomputer.software_genreSocial Semantic WebWorld Wide WebIntelligent agentSemantic gridSemantic technologyWeb resourcebusinesscomputerSemantic Web
researchProduct

A Novel Model for E-Business and E-Government Processes on Social Media

2013

Abstract The global digital economy tends to grow up through the adoption of key technologies, mobility, cloud computing, data mining, artificial intelligence or the extension of social environments. These influences turns up the economy and give rise to new tendencies for obtaining the value. The e-business and e-government strategy is not an easy to organize, although in terms of a fundamental strategy of e-business will be led by the super-expansion of the market. For this reason, the aim of this study is to demonstrate the implications that social media has in the development of electronic business (e-business) and to provide, through a mode, a viable solution to companies or even Gover…

Value (ethics)Electronic businessbusiness.industrySuiteGeneral EngineeringEnergy Engineering and Power TechnologyCloud computingModellingSoftwareKey (cryptography)EconomicsE-GovernmentSocial mediaDigital economyMarketingE-BusinessbusinessIndustrial organizationProcedia Economics and Finance
researchProduct

Together We Stand, Divided We Fall : Analyzing Information Systems Acquisition as Service

2016

Information systems (IS) acquisition is not a widely studied topic in the literature. In particular, although the role and participation of different stakeholders such as business people, IT people, and external vendors and consultants is acknowledged, little is known about how they cooperate in an IS acquisition project. In this paper, we will apply a value co-creation framework taken from service research as a lens to study an IS acquisition project in an organization. The case organization intends to acquire their new IS as a cloud service. This approach is novel to all stakeholders, so they have to intensively cooperate for example under tight time constraints. The analysis reveals that…

Value (ethics)Service (business)ta113Knowledge managementComputer sciencebusiness.industry05 social sciencesContext (language use)Cloud computing02 engineering and technologyService research020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation systeminformation systems acquisition050211 marketingbusiness
researchProduct

BEGIN: Big Data Enabled Energy-Efficient Vehicular Edge Computing

2018

Vehicular edge computing is essential to support future emerging multimedia-rich and delay-sensitive applications in vehicular networks. However, the massive deployment of edge computing infrastructures induces new problems including energy consumption and carbon pollution. This motivates us to develop BEGIN (Big data enabled EnerGy-efficient vehIcular edge computiNg), a programmable, scalable, and flexible framework for integrating big data analytics with vehicular edge computing. In this article, we first present a comprehensive literature review. Then the overall design principle of BEGIN is described with an emphasis on computing domain and data domain convergence. In the next section, …

Vehicular ad hoc networkComputer Networks and Communicationsbusiness.industryComputer scienceEnergy managementDistributed computingQuality of service020208 electrical & electronic engineeringBig data020206 networking & telecommunicationsCloud computing02 engineering and technologyEnergy consumptionComputer Science ApplicationsScalability0202 electrical engineering electronic engineering information engineeringResource managementElectrical and Electronic EngineeringbusinessEdge computingEfficient energy useIEEE Communications Magazine
researchProduct

Security, QoS and self-management within an end-to-end Cloud Computing environment

2015

Today, Cloud Networking is one of the recent research areas within the Cloud Computing research communities. The main challenges of Cloud Networking concern Quality of Service (QoS) and security guarantee as well as its management in conformance with a corresponding Service Level Agreement (SLA). In this thesis, we propose a framework for resource allocation according to an end-to-end SLA established between a Cloud Service User (CSU) and several Cloud Service Providers (CSPs) within a Cloud Networking environment (Inter-Cloud Broker and Federation architectures). We focus on NaaS and IaaS Cloud services. Then, we propose the self-establishing of several kinds of SLAs and the self-managemen…

Videoconférence[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Cloud NetworkingCalcul IntensifQuality of ServiceSécuritéCloud ComputingGestion AutonomeInter-CloudSecuritySelf-managementVideoconferencingService Level AgreementQualité de ServiceIntensive Computing
researchProduct

Experiments in Non-Coherent Post-editing

2017

Market pressure on translation productivity joined with technological innovation is likely to fragment and decontextualise translation jobs even more than is cur-rently the case. Many different translators increasingly work on one document at different places, collaboratively working in the cloud. This paper investigates the effect of decontextualised source texts on behaviour by comparing post-editing of sequentially ordered sentences with shuffled sentences from two different texts. The findings suggest that there is little or no effect of the decontextualised source texts on behaviour.

Work (electrical)Fragment (logic)business.industryComputer scienceNon coherentCloud computingArtificial intelligencebusinesscomputer.software_genrecomputerProductivityNatural language processingProceedings of the Workshop on Human-Informed Translation and Interpreting Technology
researchProduct

Protection concepts from optical radiation used in places of danger from explosion of gases, vapour or cloud of particles

2005

Use of optical systems in hazardous locations can result in ignition of surrounding explosive atmosphere. The conducted research work allowed to propose three protection concepts. The primary protection concept - inherently safe optical radiation - consists in use of optical radiation with power, energy or irradiance incapable of causing ignition of surrounding explosive atmosphere. However, the arbitrary determination of values of these parameters is considered as excessively rigorous. The work presents the proposed protection concepts in relation to zone classification. The author describes his own method to determine safe values based on probability mathematics that can be used not only …

Work (thermodynamics)Explosive materialbusiness.industryCloud computingRadiationPower (physics)law.inventionIgnition systemOpticsHazardous wastelawOptical radiationAerospace engineeringbusinessMathematicsSPIE Proceedings
researchProduct