Science topic

Cloud - Science topic

Explore the latest publications in Cloud, and find Cloud experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Cloud (10,000)
Sorted by most recent
Article
Full-text available
This paper proposes a new technique designed to prevent and detect address resolution protocol (ARP) spoofing attacks in general, and specifically Man-in-the-Middle (MitM) attacks, within the context of cloud computing. The solution focuses on establishing appropriate flow filtering rules based on parameters such as 'time feature' and internet cont...
Article
Full-text available
The excessively high temperature poses a significant risk to battery health, accelerating degradation and causing damage. Despite the recognized importance of battery thermal management (BTM), numerous studies in this domain often overlook the distinct timescales associated with vehicle and battery thermal dynamics. This oversight can compromise th...
Article
Full-text available
Himawari-8/9 is a next-generation Japanese Geostationary Earth Orbit (GEO) meteorological satellite with an onboard sensor – the Advanced Himawari Imager (AHI). Because Himawari-8/9 AHI observe the Earth's hemispheres every 10 min with multiple spectral bands, AHI providing an unprecedented opportunity to facilitate its observation datasets are exp...
Article
Full-text available
Retrieving the optical depth of the Martian clouds (𝜏cld) is a powerful way to monitor their spatial and temporal evolution. However, such retrievals from nadir imagery rely on several assumptions, including the vertical structure of the clouds in the atmosphere. Here we compare the results of cloud optical depth retrievals at 320 nm from the Emira...
Article
Full-text available
In the evolving landscape of Intelligent Transportation Systems (ITS), the need for secure and reliable data sharing is more critical than ever. As ITS increasingly rely on the exchange of sensitive information, challenges related to data privacy, security, and the integrity of communication have emerged. Traditional approaches to securing vehicula...
Conference Paper
Full-text available
Edge deployments perform complex deep learning inference and analysis in the wild in highly resource constrained environment. They are positioned everywhere from our largest cities to the bottom of our oceans, and often necessitate significant financial resources and labor to create and deploy. These properties make correctness of edge deployments...
Article
Full-text available
As surveillance cameras have proliferated in usage, their widespread deployment has raised privacy concerns. We introduce an inventive strategy to safeguard privacy in surveillance videos to address these concerns. This article designs a secure system for detecting and encrypting regions of interest (ROIs) that depict multiple individuals within vi...
Article
Full-text available
With the development of cloud computing, an increasing number of resource-constrained image owners tend to store their images in the cloud and rely on image retrieval services to obtain the images they desire. However, the security of the cloud cannot be fully guaranteed. To ensure image security while achieving good retrieval performance, we have...
Article
Full-text available
Herein an extremely low (0.32-0.25 Wm −1 K −1) and glassy temperature-dependence (300-600 K) of lattice thermal conductivity (lat) in a monoclinic K 2 Ag 4 Se 3 is reported. It is found that the effective carrier delocalization, contributed by the perfect p−d * hybridization paradigm, can efficiently facilitate the spatial transfer of electron clou...
Article
Full-text available
We have created a pure rotational Raman (PRR) lidar for round-the-clock and large-height-range quantitatively-physical measurements of atmospheric temperature profiles. A seeded frequency-doubled Nd:YAG laser is utilized as the light source. It has a typical power of ∼18 W and a pulse repetition rate of 30 Hz. The lidar uses a 0.3-m-diameter receiv...
Article
Full-text available
The popularity of cloud computing (CC) has increased significantly in recent years due to its cost-effectiveness and simplified resource allocation. Owing to the exponential rise of cloud computing in the past decade, many corporations and businesses have moved to the cloud to ensure accessibility, scalability, and transparency. The proposed resear...
Article
Full-text available
Digital transformation is reshaping how businesses operate. Companies aim to optimize processes, enhance customer experiences, and embrace innovation. A critical enabler of this shift is robust network infrastructure. VMware SD-WAN plays a pivotal role in ensuring seamless connectivity in modern networks. As enterprises adopt it, the need for skill...
Article
Full-text available
In autonomous driving environments, Generative Adversarial Network (GAN) are often used to predict the future trajectories of objects in the scene, providing decision support for autonomous driving systems. However, integrating GAN models into the Internet of Vehicles (IoV) poses numerous challenges. Firstly, GAN models necessitate user data and ex...
Article
Full-text available
Cloud image segmentation is a technique that divides images captured by meteorological satellites or ground-based observations into different regions or categories. By extracting the distribution, shape, and dynamic features of clouds, it provides precise data support for the meteorological and environmental fields, significantly influencing photov...
Preprint
Full-text available
Wind dynamics play a pivotal role in governing transport processes within planetary atmospheres, influencing atmospheric chemistry, cloud formation, and the overall energy budget. Understanding the strength and patterns of winds is crucial for comprehensive insights into the physics of ultra-hot Jupiter atmospheres. Current research has proposed tw...
Article
Full-text available
Prefabricated construction has garnered widespread attention worldwide. As an important part in purchasing management, prefabricated component suppliers (PCSs) undertake the bulk of the work and responsibility in the supply chain from on-site to off-site. Therefore, it is crucial and necessary to establish a decision-making framework to comprehensi...
Article
Full-text available
Experimental platforms based on ultracold atomic gases have significantly advanced the quantum simulation of complex systems, yet the exploration of phenomena driven by long-range interactions remains a formidable challenge. Currently available methods utilizing dipolar quantum gases or multimode cavities allow us to implement long-range interactio...
Article
Full-text available
The paper investigates how changes in soil resistivity due to porosity and water content variations affect the outage rate of distribution lines due to cloud to ground lightning strikes. The hybrid electromagnetic model is considered to model the grounding system for the distribution poles. The representations of other system elements are considere...
Article
Full-text available
This paper introduces a novel model for virtual machine (VM) requests with predefined start and end times, referred to as scheduled virtual machine demands (SVMs). In cloud computing environments, SVMs represent anticipated resource requirements derived from historical data, usage trends, and predictive analytics, allowing cloud providers to optimi...
Presentation
Full-text available
How Energy Crisis Fosters Innovation: Data Centers Under Water and Above Cloud
Preprint
Full-text available
We present Atacama Large Millimeter/submillimeter Array (ALMA) Band 6 (1.3 mm) observations of dense cores in three massive molecular clouds within the Central Molecular Zone (CMZ) of the Milky Way, including the Dust Ridge cloud e, Sgr C, and the 20 km s-1 cloud, at a spatial resolution of 2000 au. Among the 834 cores identified from the 1.3 mm co...
Article
Full-text available
The Internet of Things encapsulates a vision of a world in which billions of objects, called connected devices, are endowed with intelligence, communication capabilities, and integrated sensing and actuation capabilities. They often outsource their storage and computing needs to more powerful resources in the cloud. In Edge computing, it is the dev...
Article
Full-text available
We consider energetic electron (EE, 30–600 keV) flux variations, connected with magnetic dipolarizations, at geosynchronous orbit. Two types of these variations, due to injections and drift shell crossing (DSC), have been known since the 1960s, but no methods to separate them were suggested. To reach this goal we apply the hodogram Je(Bz) technique...
Article
Full-text available
By increasing the number and variety of areas where IoT technology is being applied, the challenges regarding the design and deployment of IoT applications and services have recently become the subject of many studies. Many IoT applications are machine learning jobs that collect and analyze sensor measurements in smart cities, farms, or industrial...
Article
Full-text available
Image-based ship monitoring technology has extensive applications, and is widely used in various aspects of port management, including illegal activity surveillance, vessel identification at entry and exit points, channel and berth management, unmanned vessel control, and incident warning and emergency response. However, most current ship identific...
Article
Full-text available
Herein an extremely low (0.32‒0.25 Wm⁻¹K⁻¹) and glassy temperature‐dependence (300–600 K) of lattice thermal conductivity (κlat) in a monoclinic K2Ag4Se3 is reported. It is found that the effective carrier delocalization, contributed by the perfect p−d* hybridization paradigm, can efficiently facilitate the spatial transfer of electron cloud pertur...
Preprint
Full-text available
Deformable object manipulation remains a key challenge in developing autonomous robotic systems that can be successfully deployed in real-world scenarios. In this work, we explore the challenges of deformable object manipulation through the task of sculpting clay into 3D shapes. We propose the first coarse-to-fine autonomous sculpting system in whi...
Article
Full-text available
The assessment of aerosol–cloud interactions remains a major source of uncertainty in understanding climate change, partly due to the difficulty in making accurate observations of aerosol impacts on clouds. Ships can release large numbers of aerosols that serve as cloud condensation nuclei, which can create artificially brightened clouds known as s...
Article
Full-text available
This study offers a unified surgical conception of skin neoplasms using deep learning and genetic optimization techniques to improve classification values and speed of diagnosis. In this case, the architecture of Convolutional Neural Networks such as MobileNet, Xception and Inception is enhanced on the basis of the creative algorithms of Particle S...
Preprint
Full-text available
To protect large-scale computing environments necessary to meet increasing computing demand, cloud providers have implemented security measures to monitor Operations and Maintenance (O&M) activities and therefore prevent data loss and service interruption. Command interception systems are used to intercept, assess, and block dangerous Command-line...
Article
Full-text available
The IT industry is advancing rapidly, with virtually every branch of modern computing experiencing swift development. Concepts such as Cloud Computing and Artificial Intelligence no longer surprise anyone. Recently, Software Defined Networks (SDN) have been gaining significant popularity. This innovative approach to computer networks allows for gre...
Book
Full-text available
Buku Modern Database Management : Tren, Teknologi, dan Penerapan mengupas tuntas berbagai aspek penting dalam pengelolaan basis data di era modern. Dimulai dengan pengenalan manajemen basis data modern, buku ini menjelaskan konsep, perkembangan, dan peran penting basis data dalam dunia digital saat ini. Selanjutnya, pembahasan dilanjutkan dengan ar...
Article
Full-text available
The polar vortices of Mars are characterized by strong zonal winds that isolate cold air above the pole, allowing CO2 to condense out of the atmosphere through snowfall and direct deposition. Due to their key role in seasonal variability of the atmosphere, it is important to understand the different factors that affect the strength, shape, and stab...
Article
Full-text available
Laser powder bed fusion (LPBF) is a cost-effective and relatively fast additive manufacturing (AM) technique, utilizing a laser source to selectively melt metallic powder and produce objects with intricate geometries. Nevertheless, establishing effective real-time monitoring methods for this process remains a notable challenge. The interaction betw...
Article
Full-text available
The Internet of Things (IoT) can be defined as a network of intelligent objects where physical objects are equipped with electronic and network components to enable connectivity. These smart objects are embedded with sensors that enable them to monitor, sense, and gather data pertaining to their surroundings, including the environment and human act...
Article
Full-text available
Laporan ini disusun sebagai salah satu tugas mata kuliah Pengantar Teknik Informatika untuk memberikan pemahaman tentang konsep, manfaat, dan penerapan teknologi cloud computing dalam berbagai bidang.
Preprint
Full-text available
A Mesoscale Convective System (MCS) is a collection of thunderstorms that function as a system, representing a widely discussed phenomenon in both the natural sciences and visual effects industries, and embodying the untamed forces of nature.In this paper, we present the first interactive, physically inspired mesoscale thunderstorms simulation mode...
Article
Full-text available
Automated Machine Learning (AutoML) has revolutionized the field of machine learning by automating complex and time-intensive tasks such as data preprocessing, model selection, and hyperparameter tuning. This study explores the capabilities, limitations, and practical applications of six widely used AutoML tools: Auto-sklearn, TPOT, H2O.ai, Google...
Article
Full-text available
Based on the information technology service model, an on-demand services towards user becomes cost effective, which is provided with cloud computing. The network attack is detected with research community that pays huge interest. The novel proposed framework is intended with the combination of mitigation and detection of attack. While enormous traf...
Article
Full-text available
Autonomous vehicles (AVs) bring advantages such as comfort, safety, and eco-friendliness compared to conventional ones. The focus on comfort has become increasingly important as it plays a key role in the widespread acceptance of AVs. Passenger demand for alleviating motion sickness (MS) during travel has also driven extensive research in this area...
Article
Full-text available
span>The study investigates the potential of integrating radon gas concentration telemonitoring systems with machine learning techniques to enhance earthquake magnitude prediction. Conducted in Pacitan, East Java, Indonesia, where the stations are near the active Grundulu fault, the research employs Random Forest (RF), Extreme Gradient Boosting (XG...
Research
Full-text available
The increasing complexity of distributed systems presents significant challenges for software testing. As applications scale across multiple nodes, networks, and cloud environments, traditional testing methods struggle to maintain efficiency, accuracy, and speed. Artificial Intelligence (AI) and Machine Learning (ML) offer promising solutions to th...
Article
Full-text available
This study proposes a novel approach to urban perception studies by integrating street view imagery and multi-source social media data to infer user perceptions and preferences of urban spaces, thereby informing placemaking strategies. With advanced pre-trained Google Cloud Vision AI, this study regards street view imagery as a baseline to compare...
Research
Full-text available
The COVID-19 pandemic has significantly influenced how users interact with digital platforms, especially in sectors like accounting, where mobile applications have become integral to personal and business financial management. This study explores the evolution of mobile software usability in accounting applications, with a focus on the post-pandemi...
Article
Full-text available
The main focus of this study is the transmission of SARS-CoV-2 through virus-laden aerosols in enclosed spaces that utilize ceiling fans. The impact of an air circulation of ceiling fans on virus transmission is not clear. Computational modeling is employed to investigate aerosol transmission within an enclosed space that features ceiling fans. The...
Article
Full-text available
The challenge issue of Big data in security point of view to protect data against malicious users. Big data contains huge amounts of personal identifiable information stored data. The breaches affecting big data can have devastating consequences than potential affect. Large number of people are with consequences not only from reputational point of...
Article
Full-text available
Thanks to the capability of fine-grained resource allocation and fast task scheduling, serverless computing has been adopted into edge cloud to accommodate various applications, e.g., DNN inference for Artificial Intelligence of Things (AIoT). In serverless edge cloud, the servers are started up on-demand. However, as a container-based architecture...
Article
Full-text available
The video game industry has witnessed a switching of gamers from traditional means of gaming to cloud gaming. Understanding the psychological mechanisms underlying such switching behavior at the individual level is important. Drawing on the technology switching literature and the push-pull-mooring (PPM) framework, we proposed a research model expla...
Research
Full-text available
Edge computing is transforming modern traffic management by enabling real-time data processing and analysis at the point of collection, reducing latency and improving efficiency. In the context of speed detection, edge computing allows traffic sensors and surveillance systems, such as cameras and radars, to quickly process vehicle speed data locall...
Article
Full-text available
The coronavirus disease 2019 (COVID-19) pandemic has sparked changes across various domains, encompassing health, commerce, education, and the economy. Given the widespread impact of COVID-19 across numerous nations, it has strained hospital resources, oxygen reserves, and healthcare personnel. Consequently, there exists an urgent necessity to expl...
Article
Full-text available
Given that clouds can absorb and scatter radiation signals in the visible and infrared bands, cloud detection is a key preprocessing step for ocean color and sea surface temperature retrievals. In this research, a Spectral-and-Textural-Information-Guided deep neural Network (STIGNet) is designed for cloud detection in global ocean data from the Hai...
Article
Full-text available
Remote health care is needed when direct medical monitoring is unavailable. Modern technology provides several ways to make patient access simpler. In particular, cloud, IoT, and data mining technologies have been successful in health care and medicine. This method identifies illnesses using data collected from two groups of patients, a male group...
Article
Full-text available
Bias correction (BC) of the cloud‐affected infrared (IR) radiances is one of the most difficult challenges in the all‐sky data assimilation. This study introduces an offline nonlinear bias correction model based on the machine learning (ML) technology of Random Forest to enhance the impacts of Fengyun‐4A Advanced Geostationary Radiation Imager (AGR...
Article
Full-text available
With the growing demand for efficient and versatile tools in the modern workplace, this project introduces a cloud-based collaborative workspace designed to integrate key communication and productivity features. The platform offers seamless communication channels, including video conferencing, voice messaging, and real-time chat, while enabling sec...
Article
Full-text available
Volcanic Ash Advisory Centers (VAACs) have generated volcanic ash forecasts for the aviation industry since the mid‐1990s. The excellent spatial and temporal coverage of satellite data makes them critical to the validation of ash dispersion model forecasts. This study investigates the limitations of satellite‐retrieved volcanic ash data through the...
Article
Full-text available
Glass facades are known to be fascinating building systems that require specific design strategies, experimental protocols and simulation tools. Especially for seismic-resistant buildings, their mechanical performance should be verified against possible failure mechanisms. For this, both numerically optimized and robust approaches are needed, along...
Article
Full-text available
Security is a major concern these days because of the increasing use of smart technologies and the Internet. Security is required to preserve the confidentiality, integrity, and availability of the resources over the network [2]. Homomorphic encryption (HE) is privacy preserving technique for sharing of data with cloud backend securely [20]. It off...
Article
Full-text available
Efficient virtual machine (VM) movement and task scheduling are crucial for optimal resource utilization and system performance in cloud computing. This paper introduces AMS-DDPG, a novel approach combining Deep Deterministic Policy Gradient (DDPG) with Adaptive Multi-Agent strategies to enhance resource allocation. To further refine AMS-DDPG's per...
Article
Full-text available
Considering the significant growth of the Internet of Things network in recent years, the volume of requests sent to cloud servers was predicted to increase. Therefore, to solve the concern that has arisen in recent years, Cisco proposed the fog computing model to reduce the delay and load sent to the cloud servers. However, despite the mentioned a...
Article
Full-text available
In this paper, we find an exact black hole solution for the Einstein gravity in the presence of Ayón–Beato–García nonlinear electrodynamics and a cloud of strings. The resulting black hole solution is singular, and the solution becomes nonsingular when gravity is coupled with Ayón–Beato–García nonlinear electrodynamics only. This solution interpola...
Chapter
Full-text available
Dentro de los instrumentos necesarios para una Administración inteligente destaca la prestación de servicios de cloud o en la nube. Este servicio supone la puesta a disposición de la entidad contratante de servidores remotos para gestionar y almacenar datos. La adquisición de soluciones de computación en la nube es una muestra de compra pública de...
Article
Full-text available
This review paper explores the scalability of healthcare applications by adopting microservices architecture in cloud environments. As healthcare systems face increasing demands for efficient and flexible application performance, traditional monolithic architectures often struggle to accommodate fluctuating workloads and rapidly evolving technologi...
Article
Full-text available
Efficient virtual machine (VM) movement and task scheduling are crucial for optimal resource utilization and system performance in cloud computing. This paper introduces AMS- DDPG, a novel approach combining Deep Deterministic Policy Gradient (DDPG) with Adaptive Multi-Agent strategies to enhance resource allocation. To further refine AMS-DDPG'...
Article
Full-text available
Designing multi-cloud architecture models has become a critical strategy for enterprises seeking scalability and cost reduction in their cloud operations. Multi-cloud environments, which involve the use of multiple cloud service providers (CSPs), offer businesses the flexibility to optimize performance, improve resource allocation, and mitigate ris...
Article
Full-text available
The advent of serverless computing has revolutionized the cloud computing landscape, providing scalable, cost-effective, and flexible solutions for modern application development. This paper comprehensively reviews cloud architectures for distributed serverless computing, focusing on event-driven and Function-as-a-Service (FaaS) paradigms. This res...
Article
Full-text available
Recent research has shown that enhancing instructional videos with questions, such as self-explanation prompts, and thus shifting the process from receptive to constructive learning, is beneficial to learning. However, the inclusion of questions is often confounded with the implementation of learner pacing through navigation features. Furthermore,...
Article
Full-text available
The integration of Machine Learning (ML) and Artificial Intelligence (AI) into cloud computingframeworks represents a transformative shift towards enhanced operational efficiency andresource management. This paper explores advanced ML and AI strategies designed to optimizecloud computing environments by improving performance, scalability, and cost-...
Article
Full-text available
This paper examines the role of artificial intelligence (AI) and machine learning (ML) in enhancing threat intelligence and anomaly detection within cloud networks. As cloud environments become more complex and dynamic, traditional security methods struggle to keep pace with evolving threats. AI and ML offer a solution by automating the analysis of...
<