Software-defined networking (SDN) is reshaping the networking paradigm. Previous research shows that SDN has advantages over traditional networks because it separates the control and data plane, leading to greater flexibility through network automation and programmability. Small business and academia networks require flexibility, like service provider networks, to scale, deploy, and self-heal network infrastructure that comprises of cloud operating systems, virtual machines, containers, vendor networking equipment, and virtual network functions (VNFs); however, as SDN evolves in industry, there has been limited research to develop an SDN architecture to fulfil the requirements of small business and academia networks. This research proposes a network architecture that can abstract, orchestrate, and scale configurations based on academia and small business network requirements. Our results show that the proposed architecture provides enhanced network management and operations when combined with the network orchestration application (NetO-App) developed in this research. The NetO-App orchestrates network policies, automates configuration changes, secures container infrastructure, and manages internal and external communication between the campus networking infrastructure.
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
This document discusses security protocols for high performance grid computing architectures. It analyzes the different network layers in grid computing protocols and identifies various security disciplines. It also analyzes various security suites available in the TCP/IP protocol architecture. The paper aims to define security disciplines at different levels of cluster computing architecture and propose applicable security suites from the TCP/IP security protocol suite. Grid computing allows sharing and aggregation of distributed computing resources to enable more powerful applications. Security is an important consideration in grid computing due to sharing resources across administrative domains.
This document discusses how software defined networking (SDN) can enhance network administration. SDN separates the data plane and control plane, making network devices simple packet forwarders controlled by a centralized software program. This allows for easier introduction of new network management ideas and centralized control of network-wide policies. The document proposes using SDN to address three problems with current network management: enabling frequent changes to network state, supporting network configuration in a high-level language, and providing better network analysis and troubleshooting visibility and control. It provides background on limitations of current network technologies and how SDN addresses these issues through its centralized control and programmability of the network.
Softwarization has been transforming industries like data center and communications businesses. The established hardware-based architectures are being replaced by fundamentally new approaches - software-based systems which are essentially more flexible, dynamic and powerful. In this paper we analyse the evolution in data centers and communications networks towards virtualized platforms and study how a similar type of evolution could impact and benefit power distribution. Following the softwarization process in other industry sectors, we consider that next a Software Defined Grid (SDG) will emerge.
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources) within cloud based infrastructure,meanfully overcome the cost and improve the reliability and performance of whole system. Cloud computing provides on-demand network access and batch of computing services for SCADA system. The current research paper takes two conceptual ideas to implement SCADA system within cloud computing (Hybrid Cloud) environment. In the first phase, SCADA applications are processed entirely inside the hybrid cloud. In the second phase, SCADA applications are running in separate application server directly connected to devices in a SCADA network and rest of paper discusses the security related to SCADA and cloud computing communication.
This architecture proposes a hybrid cloud-based firewalling approach to improve performance and reliability. The architecture has both a physical firewall and virtual firewalls in the cloud. Traffic is redirected from the physical firewall to the virtual firewalls in the cloud when the physical firewall becomes overloaded. This improves computational power by leveraging the resources of the cloud. Experimental results showed the hybrid approach improved latency, memory usage, and CPU performance compared to only using a physical firewall.
Advanced infrastructure for pan european collaborative engineering - E-collegXavier Warzee
This article presents challenges, visions, and solutions for a true Pan-
European collaborative engineering infrastructure that is a target of the IST project
E-COLLEG. The consortium aims at the definition of a transparent infrastructure
that will enable engineers from various domains to collaborate during the design of
complex heterogeneous systems.
Software Defined Networking (SDN): A Revolution in Computer NetworkIOSR Journals
Abstract: SDN creates a dynamic and flexible network architecture that can change as the business
requirements change. The growth of the SDN market and cloud computing are very much connected. As the
applications change and the network is abstracted, virtualization become a necessary step and SDN serves as
the fundamental building blocks for the network. Traditional networking devices are composed of an embedded
control plane that manages switching, routing and traffic engineering activities while the data plane forwards
packet/frames based on traffic. In SDN architecture, control plane functions are removed from individual
networking devices and embedded in a centralizedserver. The SDN controller makes all traffic related decisions
in the network without nodes active participation, as opposed to today’s networks.
Keyword-API, cloud computing, IT, middleware, OpenFlow, SDN
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
As SD-WAN disrupts legacy WAN technologies and becomes the preferred WAN technology adopted by corporations, and Kubernetes becomes the de-facto container orchestration tool, the opportunities for deploying edge-computing containerized applications running over SD-WAN are vast. Service orchestration in SD-WAN has not been provided with enough attention, resulting in the lack of research focused on service discovery in these scenarios. In this article, an in-house service discovery solution that works alongside Kubernetes’ master node for allowing improved traffic handling and better user experience when running micro-services is developed. The service discovery solution was conceived following a design science research approach. Our research includes the implementation of a proof-ofconcept SD-WAN topology alongside a Kubernetes cluster that allows us to deploy custom services and delimit the necessary characteristics of our in-house solution. Also, the implementation's performance is tested based on the required times for updating the discovery solution according to service updates. Finally, some conclusions and modifications are pointed out based on the results, while also discussing possible enhancements.
This document discusses security protocols for high performance grid computing architectures. It analyzes the different network layers in grid computing protocols and identifies various security disciplines. It also analyzes various security suites available in the TCP/IP protocol architecture. The paper aims to define security disciplines at different levels of cluster computing architecture and propose applicable security suites from the TCP/IP security protocol suite. Grid computing allows sharing and aggregation of distributed computing resources to enable more powerful applications. Security is an important consideration in grid computing due to sharing resources across administrative domains.
This document discusses how software defined networking (SDN) can enhance network administration. SDN separates the data plane and control plane, making network devices simple packet forwarders controlled by a centralized software program. This allows for easier introduction of new network management ideas and centralized control of network-wide policies. The document proposes using SDN to address three problems with current network management: enabling frequent changes to network state, supporting network configuration in a high-level language, and providing better network analysis and troubleshooting visibility and control. It provides background on limitations of current network technologies and how SDN addresses these issues through its centralized control and programmability of the network.
Softwarization has been transforming industries like data center and communications businesses. The established hardware-based architectures are being replaced by fundamentally new approaches - software-based systems which are essentially more flexible, dynamic and powerful. In this paper we analyse the evolution in data centers and communications networks towards virtualized platforms and study how a similar type of evolution could impact and benefit power distribution. Following the softwarization process in other industry sectors, we consider that next a Software Defined Grid (SDG) will emerge.
Conceptual Model of Real Time Infrastructure Within Cloud Computing EnvironmentCSCJournals
Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources) within cloud based infrastructure,meanfully overcome the cost and improve the reliability and performance of whole system. Cloud computing provides on-demand network access and batch of computing services for SCADA system. The current research paper takes two conceptual ideas to implement SCADA system within cloud computing (Hybrid Cloud) environment. In the first phase, SCADA applications are processed entirely inside the hybrid cloud. In the second phase, SCADA applications are running in separate application server directly connected to devices in a SCADA network and rest of paper discusses the security related to SCADA and cloud computing communication.
This architecture proposes a hybrid cloud-based firewalling approach to improve performance and reliability. The architecture has both a physical firewall and virtual firewalls in the cloud. Traffic is redirected from the physical firewall to the virtual firewalls in the cloud when the physical firewall becomes overloaded. This improves computational power by leveraging the resources of the cloud. Experimental results showed the hybrid approach improved latency, memory usage, and CPU performance compared to only using a physical firewall.
Advanced infrastructure for pan european collaborative engineering - E-collegXavier Warzee
This article presents challenges, visions, and solutions for a true Pan-
European collaborative engineering infrastructure that is a target of the IST project
E-COLLEG. The consortium aims at the definition of a transparent infrastructure
that will enable engineers from various domains to collaborate during the design of
complex heterogeneous systems.
Software Defined Networking (SDN): A Revolution in Computer NetworkIOSR Journals
Abstract: SDN creates a dynamic and flexible network architecture that can change as the business
requirements change. The growth of the SDN market and cloud computing are very much connected. As the
applications change and the network is abstracted, virtualization become a necessary step and SDN serves as
the fundamental building blocks for the network. Traditional networking devices are composed of an embedded
control plane that manages switching, routing and traffic engineering activities while the data plane forwards
packet/frames based on traffic. In SDN architecture, control plane functions are removed from individual
networking devices and embedded in a centralizedserver. The SDN controller makes all traffic related decisions
in the network without nodes active participation, as opposed to today’s networks.
Keyword-API, cloud computing, IT, middleware, OpenFlow, SDN
This document is Priyanka R. Nayak's seminar report on cloud computing submitted to Visvesvaraya Technological University. It discusses key concepts of cloud computing including cyber infrastructure, service-oriented architecture, cloud types (public, private, hybrid), cloud architecture, and cloud components. The report provides an introduction to cloud computing and covers topics such as virtualization and users.
The Abstracted Network for Industrial InternetMeshDynamics
Widespread adoption of TCI/IP protocols over the last two decades appears on the surface to have created a lingua franca for computer networking. And with the emergence of IPv6 removing the addressing restrictions of earlier versions, it would appear that now every device in the world may easily be connected with a common protocol.
But three emerging factors are requiring a fresh look at this worldview. The first is the coming wave of sensors, actuators, and devices making up the Internet of Things (IOT). Although not yet widely recognized, it is beginning to be understood that a majority of these devices will be too small, too cheap, too dumb, and too copious to run the hegemonic IPv6 protocol. Instead, much simpler protocols will predominate (see below), which must somehow be incorporated into the IP networks of Enterprises and the Internet.
At the other end of the scale from these tiny devices are huge Enterprise networks, increasing movingly to the cloud for computing and communication resources. An important requirement of these Enterprises is the capacity to manage, control, and tune their networks using a variety of Software Defined Networking (SDN) technologies and protocols. These depend on computing resource at the edges of the network to manage the interactions.
The third element is a conundrum presented by the first two: Enterprises will be struggling with the need to bring vast numbers of simple IOT devices into their networks. Though many of these devices will lack computing and protocol smarts, the requirement will still remain to manage everything via SDN. Along with this, many legacy Machine-to-Machine (M2M) networks (such as those on the factory floor) present the same challenges as the IOT: simple and/or proprietary protocols operating in operational silos today that Enterprises desire to manage and tune with SDN techniques.
Efficient architectural framework of cloud computing Souvik Pal
This document discusses an efficient architectural framework for cloud computing. It begins by providing background on cloud computing and discusses challenges such as security, privacy, and reliability. It then proposes a new architectural framework that separates infrastructure as a service (IaaS) into three sub-modules: IaaS itself, a hypervisor monitoring environment (HME), and resources as a service (RaaS). The HME acts as middleware between IaaS and physical resources, using a hypervisor to allocate resources from a pool managed by RaaS. This proposed framework is intended to improve performance and access speed for cloud computing.
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
This document discusses the requirements and challenges for securing cloud applications and services. It begins with an abstract that introduces cloud computing security as complex due to many factors. The document then provides context on cloud computing architectural frameworks and models to help evaluate security risks when adopting cloud services. It discusses key aspects of cloud architecture like deployment models, service models, and multi-tenancy that impact security. Understanding these relationships is important for informed risk management decisions regarding cloud adoption strategies.
Grid computing is a model of distributed computing that uses geographically and administratively disparate resources to solve large problems. It involves sharing computing power, data, and other resources across organizational boundaries. Key aspects include applying resources from many computers to a single problem, combining resources from multiple administrative domains for tasks requiring large processing power or data, and using middleware to coordinate resources as a virtual system. The document then discusses definitions of grid computing from various organizations and the core functional requirements and characteristics needed for grid applications and users.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
Thisstudy addresses the factors responsible for cloud computing adoption in implementing cloud computing for any organization. Service Level Agreements play a major role for cloud consumer as well as for cloud provider. SLA depends on the requirements gathered by the cloud providers and they vary with the type of organizations for which process is being performed such as education, retail, IT industry etc. SLAs for cloud computing involves technical as well as business requirements which makes the gathering of requirements from stakeholders point of view the heterogeneous process. This research work proposes a 360 degree requirement gathering framework, which reduces the complexitiesduring the process of requirement gathering by cloud service providersas well as SLAs more reliant.
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
Enterprise networks are increasingly required to support cloud applications, mobile users, and diverse devices seamlessly. This has heightened network requirements at the edge and driven demand for cloud-enabled campus networks that connect the network edge to cloud resources reliably. Modern networks must recognize a variety of wired and wireless devices, applications, users, and IoT things while optimizing for cloud apps and providing pervasive, reliable connectivity between remote offices, mobile users, and cloud/datacenter resources.
The document discusses optimizing data transfer in service-oriented architectures. It proposes an approach called Promulgate that uses a hybrid orchestration and choreography model. Promulgate introduces proxy services that invoke actual web services on behalf of a centralized workflow engine. The proxies can cache and transfer data between each other to optimize transmission between services. The document evaluates Promulgate's use of data caching techniques like dynamic proxy deployment and SOAP compression to reduce redundant data transfer compared to a pure orchestration model. It describes the Promulgate architecture and actors, web service implementation using .NET and Axis, and SOAP compression using zipped SOAP. Experimental setup and configurations are also outlined to test Promulgate's performance over different network
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
Software-Defined Networking (SDN): An Opportunity?Ahmed Banafa
Software-Defined Networking (SDN) is an emerging architecture that is dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, dynamic nature of today's applications. This architecture decouples the network control and forwarding functions (Routing) enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services, which can treat the network as a logical or virtual entity.
IRJET- Effective Privacy based Distributed Storage StructureIRJET Journal
This document summarizes a research paper that proposes an effective and secure distributed storage structure for cloud computing. The proposed structure classifies user data into three categories based on importance. More important data is encrypted with stronger encryption algorithms and larger key sizes, while less important data uses lighter encryption. This reduces complexity and cost compared to encrypting all data with the same encryption. The structure aims to provide security for data transmission and storage in the cloud while balancing efficiency. It was found to have better performance than other existing cloud storage structures.
An enhanced wireless presentation system for large scale content distribution Conference Papers
An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve up to 125 audience devices with an average delay of 1.74ms per page load. The system utilized CPU and memory resources efficiently, indicating it could potentially serve a much larger audience size.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
This document proposes a new method for improving cloud computing security using RSA encryption with Fermat's Little Theorem. RSA is widely used for encryption but has drawbacks related to key generation time. Fermat's Little Theorem can help speed up the RSA key generation process. The document discusses cloud computing concepts and challenges, related work on encryption techniques for cloud security, an overview of the RSA algorithm and its security, and how the proposed method would integrate Fermat's Little Theorem into RSA key generation to improve encryption performance for cloud computing.
An study of security issues & challenges in cloud computingijsrd.com
"Cloud Computing" is a term, which involves virtualization, distributed computing, networking and web-services. It is a way of offering services to users by allowing them to tap into a massive pool of shared computing resources such as servers, storage and network. User can use services by simply plug into the cloud and pay only for what he uses. All these features made a cloud computing very advantageous and demanding. But the data privacy is a key security problem in cloud computing which comprises of data integrity, data confidentiality and user privacy specific concerns. Most of the persons do not prefer cloud to store their data as they are having a fear of losing the privacy of their confidential data. This paper introduces some cloud computing data security problem and its strategy to solve them which also satisfies the user regarding their data security.
Cloud Computing is an attractive research area for the last few years; and there have been a tremendous grows in the number of educational institutions all over the world who have either adopted or are considering migrating to cloud computing. However, there are many concerns and reservations about adopting conventional or public cloud based solutions. A new paradigm of cloud based solution has been proposed, namely, the private cloud based solutions, which becomes an attractive choice to educational Institutions. This paper presents the adjustment and implementation of private-based cloud solution for multi-campus educational institution, namely, Al-Balqa Applied University (BAU) in Jordan.
Automatic Management of Wireless Sensor Networks through Cloud Computingyousef emami
This document presents a framework for integrating wireless sensor networks (WSNs) with cloud computing. The framework uses policy-based network management to automate WSN management tasks. It proposes adding a policy analyzer to a publish/subscribe broker to match sensor data with stored policies and mandate appropriate actions. The framework includes software as a service, virtualization management, a publish/subscribe broker, management services like SLA and change management, fault tolerance, and security measures. The goal is to facilitate and automate WSN management through the use of cloud computing and policy-based network rules.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
An Investigation into Convergence of Networking and Storage Solutions Blesson Babu
This document discusses convergence of networking and storage solutions through technologies like software-defined networking (SDN) and network function virtualization (NFV). It investigates SDN and networked storage, how they can improve efficiency by reducing wasted capacity and simplifying management. The document also examines using SDN in a cloud computing environment to increase operational efficiency of data centers.
This document is Priyanka R. Nayak's seminar report on cloud computing submitted to Visvesvaraya Technological University. It discusses key concepts of cloud computing including cyber infrastructure, service-oriented architecture, cloud types (public, private, hybrid), cloud architecture, and cloud components. The report provides an introduction to cloud computing and covers topics such as virtualization and users.
The Abstracted Network for Industrial InternetMeshDynamics
Widespread adoption of TCI/IP protocols over the last two decades appears on the surface to have created a lingua franca for computer networking. And with the emergence of IPv6 removing the addressing restrictions of earlier versions, it would appear that now every device in the world may easily be connected with a common protocol.
But three emerging factors are requiring a fresh look at this worldview. The first is the coming wave of sensors, actuators, and devices making up the Internet of Things (IOT). Although not yet widely recognized, it is beginning to be understood that a majority of these devices will be too small, too cheap, too dumb, and too copious to run the hegemonic IPv6 protocol. Instead, much simpler protocols will predominate (see below), which must somehow be incorporated into the IP networks of Enterprises and the Internet.
At the other end of the scale from these tiny devices are huge Enterprise networks, increasing movingly to the cloud for computing and communication resources. An important requirement of these Enterprises is the capacity to manage, control, and tune their networks using a variety of Software Defined Networking (SDN) technologies and protocols. These depend on computing resource at the edges of the network to manage the interactions.
The third element is a conundrum presented by the first two: Enterprises will be struggling with the need to bring vast numbers of simple IOT devices into their networks. Though many of these devices will lack computing and protocol smarts, the requirement will still remain to manage everything via SDN. Along with this, many legacy Machine-to-Machine (M2M) networks (such as those on the factory floor) present the same challenges as the IOT: simple and/or proprietary protocols operating in operational silos today that Enterprises desire to manage and tune with SDN techniques.
Efficient architectural framework of cloud computing Souvik Pal
This document discusses an efficient architectural framework for cloud computing. It begins by providing background on cloud computing and discusses challenges such as security, privacy, and reliability. It then proposes a new architectural framework that separates infrastructure as a service (IaaS) into three sub-modules: IaaS itself, a hypervisor monitoring environment (HME), and resources as a service (RaaS). The HME acts as middleware between IaaS and physical resources, using a hypervisor to allocate resources from a pool managed by RaaS. This proposed framework is intended to improve performance and access speed for cloud computing.
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
This document discusses the requirements and challenges for securing cloud applications and services. It begins with an abstract that introduces cloud computing security as complex due to many factors. The document then provides context on cloud computing architectural frameworks and models to help evaluate security risks when adopting cloud services. It discusses key aspects of cloud architecture like deployment models, service models, and multi-tenancy that impact security. Understanding these relationships is important for informed risk management decisions regarding cloud adoption strategies.
Grid computing is a model of distributed computing that uses geographically and administratively disparate resources to solve large problems. It involves sharing computing power, data, and other resources across organizational boundaries. Key aspects include applying resources from many computers to a single problem, combining resources from multiple administrative domains for tasks requiring large processing power or data, and using middleware to coordinate resources as a virtual system. The document then discusses definitions of grid computing from various organizations and the core functional requirements and characteristics needed for grid applications and users.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
360º Degree Requirement Elicitation Framework for Cloud Service ProvidersIJERA Editor
Thisstudy addresses the factors responsible for cloud computing adoption in implementing cloud computing for any organization. Service Level Agreements play a major role for cloud consumer as well as for cloud provider. SLA depends on the requirements gathered by the cloud providers and they vary with the type of organizations for which process is being performed such as education, retail, IT industry etc. SLAs for cloud computing involves technical as well as business requirements which makes the gathering of requirements from stakeholders point of view the heterogeneous process. This research work proposes a 360 degree requirement gathering framework, which reduces the complexitiesduring the process of requirement gathering by cloud service providersas well as SLAs more reliant.
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
Enterprise networks are increasingly required to support cloud applications, mobile users, and diverse devices seamlessly. This has heightened network requirements at the edge and driven demand for cloud-enabled campus networks that connect the network edge to cloud resources reliably. Modern networks must recognize a variety of wired and wireless devices, applications, users, and IoT things while optimizing for cloud apps and providing pervasive, reliable connectivity between remote offices, mobile users, and cloud/datacenter resources.
The document discusses optimizing data transfer in service-oriented architectures. It proposes an approach called Promulgate that uses a hybrid orchestration and choreography model. Promulgate introduces proxy services that invoke actual web services on behalf of a centralized workflow engine. The proxies can cache and transfer data between each other to optimize transmission between services. The document evaluates Promulgate's use of data caching techniques like dynamic proxy deployment and SOAP compression to reduce redundant data transfer compared to a pure orchestration model. It describes the Promulgate architecture and actors, web service implementation using .NET and Axis, and SOAP compression using zipped SOAP. Experimental setup and configurations are also outlined to test Promulgate's performance over different network
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
Software-Defined Networking (SDN): An Opportunity?Ahmed Banafa
Software-Defined Networking (SDN) is an emerging architecture that is dynamic, manageable, cost-effective, and adaptable, making it ideal for the high-bandwidth, dynamic nature of today's applications. This architecture decouples the network control and forwarding functions (Routing) enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services, which can treat the network as a logical or virtual entity.
IRJET- Effective Privacy based Distributed Storage StructureIRJET Journal
This document summarizes a research paper that proposes an effective and secure distributed storage structure for cloud computing. The proposed structure classifies user data into three categories based on importance. More important data is encrypted with stronger encryption algorithms and larger key sizes, while less important data uses lighter encryption. This reduces complexity and cost compared to encrypting all data with the same encryption. The structure aims to provide security for data transmission and storage in the cloud while balancing efficiency. It was found to have better performance than other existing cloud storage structures.
An enhanced wireless presentation system for large scale content distribution Conference Papers
An enhanced wireless presentation system (eWPS) was developed to distribute presentation content to larger audiences over WiFi networks. The eWPS uses multiple access points connected via a high-speed Ethernet switch to provide WiFi coverage to audiences. It captures screenshots of presentations and stores them on an external web server for access by audience devices through a web browser. Testing showed the eWPS could serve up to 125 audience devices with an average delay of 1.74ms per page load. The system utilized CPU and memory resources efficiently, indicating it could potentially serve a much larger audience size.
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
Cloud computing is an important transition that makes change in service oriented computing
technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as
many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of
service in the form of a service level agreement. For transparent billing, each billing transaction should be
protected against forgery and false modifications. Although CSPs provide service billing records, they cannot
provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party
cannot confirm that the user’s record is correct or CSPs record is correct. To overcome these limitations we
introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of
cloud notary authority (CNA). CNA generates mutually verifiable binding information that can be used to
resolve future disputes between user and CSP. This project will produce the secure billing through monitoring
the service level agreement (SLA) by using the SMon module. CNA can get a service logs from SMon and stored
it in a local repository for further reference. Even administrator of a cloud system cannot modify or falsify the
data.
This document proposes a new method for improving cloud computing security using RSA encryption with Fermat's Little Theorem. RSA is widely used for encryption but has drawbacks related to key generation time. Fermat's Little Theorem can help speed up the RSA key generation process. The document discusses cloud computing concepts and challenges, related work on encryption techniques for cloud security, an overview of the RSA algorithm and its security, and how the proposed method would integrate Fermat's Little Theorem into RSA key generation to improve encryption performance for cloud computing.
An study of security issues & challenges in cloud computingijsrd.com
"Cloud Computing" is a term, which involves virtualization, distributed computing, networking and web-services. It is a way of offering services to users by allowing them to tap into a massive pool of shared computing resources such as servers, storage and network. User can use services by simply plug into the cloud and pay only for what he uses. All these features made a cloud computing very advantageous and demanding. But the data privacy is a key security problem in cloud computing which comprises of data integrity, data confidentiality and user privacy specific concerns. Most of the persons do not prefer cloud to store their data as they are having a fear of losing the privacy of their confidential data. This paper introduces some cloud computing data security problem and its strategy to solve them which also satisfies the user regarding their data security.
Cloud Computing is an attractive research area for the last few years; and there have been a tremendous grows in the number of educational institutions all over the world who have either adopted or are considering migrating to cloud computing. However, there are many concerns and reservations about adopting conventional or public cloud based solutions. A new paradigm of cloud based solution has been proposed, namely, the private cloud based solutions, which becomes an attractive choice to educational Institutions. This paper presents the adjustment and implementation of private-based cloud solution for multi-campus educational institution, namely, Al-Balqa Applied University (BAU) in Jordan.
Automatic Management of Wireless Sensor Networks through Cloud Computingyousef emami
This document presents a framework for integrating wireless sensor networks (WSNs) with cloud computing. The framework uses policy-based network management to automate WSN management tasks. It proposes adding a policy analyzer to a publish/subscribe broker to match sensor data with stored policies and mandate appropriate actions. The framework includes software as a service, virtualization management, a publish/subscribe broker, management services like SLA and change management, fault tolerance, and security measures. The goal is to facilitate and automate WSN management through the use of cloud computing and policy-based network rules.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
An Investigation into Convergence of Networking and Storage Solutions Blesson Babu
This document discusses convergence of networking and storage solutions through technologies like software-defined networking (SDN) and network function virtualization (NFV). It investigates SDN and networked storage, how they can improve efficiency by reducing wasted capacity and simplifying management. The document also examines using SDN in a cloud computing environment to increase operational efficiency of data centers.
Ericsson Review: Software-Defined-NetworkingEricsson
An architecture based on software-defined networking (SDN) techniques gives operators greater freedom to balance operational and business parameters, such as network resilience, service performance and QoE against opex and capex. With its beginnings in data-center technology, software-defined networking (SDN) technology has developed to the point where it can offer significant opportunities to service providers.
The traditional way of describing network architecture and how a network behaves is through the fixed designs and behaviors of its various elements. The concept of software-defined networking (SDN) describes networks and how they behave in a more flexible way – through software tools that describe network elements in terms of programmable network states.
To maximize the potential benefits and deliver superior user experience, software-defined networking (SDN) needs to be implemented outside the sphere of the data center across the entire network. This can be achieved through enabling network programmability based on open APIs. Service Provider SDN will help operators to scale networks and take advantage of new revenue-generating possibilities.
For more from Ericsson Review visit: http://www.ericsson.com/thinkingahead/technology_insights
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
This volume of the Open Datacenter Interoperable Network (ODIN) describes software defined networking (SDN) and OpenFlow. SDN is used to simplify network control and management, automate network virtualization services, and provide a platform from which to build agile ....
The document discusses implementing a hybrid SDN network at RAF Company by introducing SDN functionality into the wireless network segment. A Floodlight controller was installed on a virtual machine to optimize traffic forwarding and provide flexible allocation of wireless resources. Applications were developed to dynamically manage network security and control user throughput. The benefits of SDN for enterprises include network programmability, simplified management, reduced costs, and the ability to accelerate services to meet business needs.
Load Balance in Data Center SDN Networks IJECEIAES
In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control a nd forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and forwarding planes. So, due to the rapid increase in the number of applications, websites, storage space, and some of the network resources are being underutilized due to static routing mechanisms. To overcome these limitations, a Software Defined Network based Openflow Data Center network architecture is used to obtain better performance parameters and implementing traffic load balancing function. The load balancing distributes the traffic requests over the connected servers, to diminish network congestions, and reduce un derutilization problem of servers. As a result, SDN is developed to afford more effective configuration, enhanced performance, and more flexibility to deal with huge network designs.
This document provides a survey of machine and deep learning techniques for resource allocation in multi-access edge computing (MEC). It first presents tutorials on applying machine learning (ML) and deep learning (DL) in MEC to address its challenges. It then discusses enabling technologies for running ML/DL training and inference quickly in MEC. It provides an in-depth survey of ML/DL methods for task offloading, scheduling, and joint resource allocation in MEC. Finally, it discusses key challenges and future research directions of applying ML/DL for resource allocation in MEC networks.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...ijseajournal
This paper presents an overview of our learning-based orchestrator for intelligent Open vSwitch that we
present this using Machine Learning in Software-Defined Networking technology. The first task consists of
extracting relevant information from the Data flow generated from a SDN and using them to learn, to
predict and to accurately identify the optimal destination OVS using Reinforcement Learning and QLearning Algorithm. The second task consists to select this using our hybrid orchestrator the optimal
Intelligent SDN controllers with Supervised Learning. Therefore, we propose as a solution using Intelligent
Software-Defined Networking controllers (SDN) frameworks, OpenFlow deployments and a new intelligent
hybrid Orchestration for multi SDN controllers. After that, we feeded these feature to a Convolutional
Neural Network model to separate the classes that we’re working on. The result was very promising the
model achieved an accuracy of 72.7% on a database of 16 classes. In any case, this paper sheds light to
researchers looking for the trade-offs between SDN performance and IA customization
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...ijseajournal
This paper presents an overview of our learning-based orchestrator for intelligent Open vSwitch that we present this using Machine Learning in Software-Defined Networking technology. The first task consists of extracting relevant information from the Data flow generated from a SDN and using them to learn, to predict and to accurately identify the optimal destination OVS using Reinforcement Learning and QLearning Algorithm. The second task consists to select this using our hybrid orchestrator the optimal
Intelligent SDN controllers with Supervised Learning. Therefore, we propose as a solution using Intelligent
Software-Defined Networking controllers (SDN) frameworks, OpenFlow deployments and a new intelligent
hybrid Orchestration for multi SDN controllers. After that, we feeded these feature to a Convolutional Neural Network model to separate the classes that we’re working on. The result was very promising the model achieved an accuracy of 72.7% on a database of 16 classes. In any case, this paper sheds light to
researchers looking for the trade-offs between SDN performance and IA customization.
Architecture evolution for automation and network programmabilityEricsson
http://www.ericsson.com/review
Automation and network programmability are key concepts in the evolution of telecom networks. Architecture designed with high degrees of automation and network programmability can rapidly adapt to emerging requirements, and as such improve operational efficiency and time to market for new services.
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
This document summarizes a research paper on scheduling flows in hybrid optical and electrical networks for cloud data centers. The paper proposes a strategy for selecting which flows are suitable to switch from the electrical packet network to the optical circuit network. It presents techniques for detecting bottlenecks in the packet network and selecting flows to offload. Simulation results showed improved network performance from this flow selection approach, including higher average throughput, lower configuration delay, and more stable offloaded flows.
This document discusses the deployment of a software-defined network testbed on the cloud. It begins with an introduction to software-defined networking and its advantages over traditional networking. It then discusses the design and implementation of an SDN testbed using OpenDaylight as the SDN controller, Mininet as the network emulator, and Wireshark for network traffic analysis. Various network topologies are implemented in Mininet including linear, single, tree and torus topologies. OpenFlow messages are captured to understand communication between the controller and switches. Network performance is evaluated by generating and measuring traffic across the testbed. The goal is to demonstrate and analyze the SDN concept in a practical virtualized environment.
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...IOSR Journals
This document discusses improving latency in distributed cloud data centers through virtualization and automation. It begins by explaining the benefits of distributed over centralized data centers, such as lower latency and financial benefits from positioning services close to customers. Virtualizing data centers increases utilization and flexibility. Automation streamlines operations and provisioning. The document proposes using a virtual network with components like switches and virtual LANs to connect virtualized distributed data centers and improve latency. Automating configuration management avoids manual errors and complexity in managing dynamic cloud environments.
The document discusses how future networking is being impacted by cloud/hybrid IT, software-defined networking, and network functions virtualization. Specifically:
1) The emergence of public cloud and hybrid IT models is driving more traffic to data centers and changing expectations around network flexibility and costs.
2) Software-defined WAN (SD-WAN) solutions allow businesses more control over their networks by using overlays to connect sites over multiple networks like broadband internet and MPLS.
3) Network functions virtualization (NFV) enables network functions to be deployed as software, increasing flexibility and reducing costs compared to hardware appliances.
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
This document summarizes a research paper on virtual network recognition and optimization in an SDN-enabled cloud environment. The paper proposes using SDN and cloud computing technologies to increase the functionality and capacity of wireless networks. It formulates an online routing problem to maximize traffic flow over time while meeting constraints. A fast approximation algorithm is developed based on time-dependent duals. Extensive simulations show the algorithm outperforms heuristics by enabling end-to-end optimization and awareness of congestion and budgets. The paper concludes SDN is still emerging but highlights areas of expanding its scope and applications.
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
This document discusses cloud computing and its usage with real-time applications. It begins by defining cloud computing and noting how it has evolved since 2006. It then discusses the key characteristics of cloud computing, including flexibility, cost reductions, and scalability.
The document outlines the three main service models of cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It provides examples of each model and describes how they differ in the level of abstraction provided.
The deployment models of private cloud, public cloud, and hybrid cloud are also summarized. Private cloud is for exclusive use within an organization while public cloud is open for public use.
Similaire à A Centralized Network Management Application for Academia and Small Business Networks (20)
Securing Cloud Computing Through IT GovernanceITIIIndustries
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers what the business needs and the business is able to deliver what the market needs. IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment. Furthermore, as the use of cloud computing for delivering IT functions becomes pervasive, organizations using cloud computing must effectively apply IT governance to it. While cloud computing presents tremendous
opportunities, it comes with risks as well. Information security
is one of the top risks in cloud computing. Thus, IT governance must be applied to cloud computing information security to help manage the risks associated with cloud computing information security. This study advances knowledge by extending IT governance to cloud computing and information security governance.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
This document describes the design of a cloud robotics testbed to be used as capstone projects for IT students at La Trobe University. It discusses the requirements for capstone subjects and outlines the five pillars of the IT curriculum. The testbed is proposed to provide authentic, real-world capstone projects that integrate elements from the different IT pillars. The testbed will include multiple robotic platforms and sensors connected to a cloud infrastructure, allowing students to take on sub-projects related to areas like programming, networking, databases, and more.
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
The goal of this research is to explore effects of dimensionality reduction and feature selection on the problem of script identification from images of printed documents. The kadjacent segment is ideal for this use due to its ability to capture visual patterns. We have used principle component analysis to reduce the size of our feature matrix to a handier size that can be trained easily, and experimented by including varying combinations of dimensions of the super feature set. A modular
approach in neural network was used to classify 7 languages – Arabic, Chinese, English, Japanese, Tamil, Thai and Korean.
Image Matting via LLE/iLLE Manifold LearningITIIIndustries
Accurately extracting foreground objects is the problem of isolating the foreground in images and video, called image matting which has wide applications in digital photography. This problem is severely ill-posed in the sense that, at each pixel, one must estimate the foreground and background pixels and the so-called alpha value from only pixel information. The most recent work in natural image matting rely on local smoothness assumptions about foreground and background colours on which a cost function has been established. In this paper, we propose an extension to the class of affinity based matting techniques by incorporating local manifold structural
information to produce both a smoother matte based on the socalled improved Locally Linear Embedding. We illustrate our new algorithm using the standard benchmark images and very comparable results have been obtained.
Annotating Retina Fundus Images for Teaching and Learning Diabetic Retinopath...ITIIIndustries
1) The document discusses the development of a software to annotate retina fundus images for teaching and learning about diabetic retinopathy.
2) The authors collected 625 fundus images from Bangladesh and designed annotation software to store patient information, infection levels, and locations in the images. They introduced a K-nearest neighbor technique to accurately select regions of interest since it can be difficult for experts.
3) Once experts annotate the images using this software, it can be used by students for learning about diabetic retinopathy stages and symptoms. The dataset and software aim to address the lack of proper diabetic retinopathy datasets and aid medical education.
A Framework for Traffic Planning and Forecasting using Micro-Simulation Calib...ITIIIndustries
This paper presents the application of microsimulation for traffic planning and forecasting, and proposes a new framework to model complex traffic conditions by calibrating and adjusting traffic parameters of a microsimulation model. By using an open source micro-simulator package, TRANSIMS, in this study, animated and numerical results were produced and analysed. The framework of traffic model calibration was evaluated for its usefulness and practicality. Finally, we discuss future applications such as providing end users with real time traffic information through Intelligent Transport System (ITS) integration.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
Blind Image Watermarking Based on Chaotic MapsITIIIndustries
Security of a watermark refers to its resistance to unauthorized detecting and decoding, while watermark robustness refers to the watermark’s resistance against common processing. Many watermarking schemes emphasize robustness more than security. However, a robust watermark is not enough to accomplish protection because the range of hostile attacks is not limited to common processing and distortions. In this paper, we give consideration to watermark security. To achieve this, we employ chaotic maps due to their extreme sensitivity to the initial values. If one fails to provide these values, the watermark will be wrongly extracted. While the chaotic maps provide perfect watermarking security, the proposed scheme is also intended to achieve robustness.
Programmatic detection of spatial behaviour in an agent-based modelITIIIndustries
The automated detection of aspects of spatial behaviour in an agent-based model is necessary for model testing and analysis. In this paper we compare four predictors of herding behaviour in a model of a grazing herbivore. We find that a) the mean number of neighbours adjusted to account for population variation and b) the mean Hamming distance between rows of the two-dimensional environment can be used to detect herding. Visual inspection of the model behaviour revealed that herding occurs when the herbivore mobility reaches a threshold level. Using this threshold we identify a limits for these predictors to use in the program code. These results apply only to one set of parameters and environment size; future research will involve a wider parameter space.
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
This paper describes the curriculum of the three year IT undergraduate program at La Trobe University, and the faculty requirements in designing a capstone subject, followed by the ACM’s recommended IT curriculum covering the five pillars of the IT discipline. Cloud robotics, a broad multidisciplinary research area, requiring expertise in all five pillars with mechatronics, is an ideal candidate to offer capstone experiences to IT students. Therefore, in this paper, we propose a long term master project in developing a cloud robotics testbed, with many capstone sub-projects spanning across the five IT pillars, to meet the objectives of capstone experience. This paper also describes the design and implementation of the testbed, and proposes potential capstone projects for students with different interests.
A Smart Fuzzing Approach for Integer Overflow DetectionITIIIndustries
Fuzzing is one of the most commonly used methods to detect software vulnerabilities, a major cause of information security incidents. Although it has advantages of simple design and low error report, its efficiency is usually poor. In this paper we present a smart fuzzing approach for integer overflow detection and a tool, SwordFuzzer, which implements this approach. Unlike standard fuzzing techniques, which randomly change parts of the input file with no information about the underlying syntactic structure of the file, SwordFuzzer uses online dynamic taint analysis to identify which bytes in the input file are used in security sensitive operations and then focuses on mutating such bytes. Thus, the generated inputs are more likely to trigger potential vulnerabilities. We evaluated SwordFuzzer with an example program and a number of real-world applications. The experimental results show that SwordFuzzer can accurately locate the key bytes of the input file and dramatically improve the effectiveness of fuzzing in detecting real-world vulnerabilities
The banking experience for many people today is fundamentally an application of technology to be able to carry out their financial tasks. While the need to visit a bank branch remains essential for a number of activities, increasingly the need to support mobile usage is becoming the central focus of many bank strategies. The core banking systems that process financial transactions must remain highly available and able to support large volumes of activity. These systems represent a long term investment for banks and when the need arises to modernize these large systems, the transformation initiative is often very expensive and of high risk. We present in this paper our experiences in bank modernization and transformation, and outline the strategies for rolling out these large programs. As banking institutions embark upon transformation programs to upgrade their banking channels and core banking systems, it is hoped that the insights presented here are useful as a framework to support these initiatives.
Detecting Fraud Using Transaction Frequency DataITIIIndustries
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. In this paper, we present a fraud detection method which detects irregular frequency of transaction usage in an Enterprise Resource Planning (ERP) system. We discuss the design, development and empirical evaluation of outlier detection and distance measuring techniques to detect frequency-based anomalies within an individual user’s profile, relative to other similar users. Primarily, we propose three automated techniques: a univariate method, called Boxplot which is based on the sample’s median; and two multivariate methods which use Euclidean distance, for detecting transaction frequency anomalies within each transaction profile. The two multivariate approaches detect potentially fraudulent activities by identifying: (1) users where the Euclidean distance between their transaction-type set is above a certain threshold and (2) users/data points that lie far apart from other users/clusters or represent a small cluster size, using k-means clustering. The proposed methodology allows an auditor to investigate the transaction frequency anomalies and adjust the different parameters, such as the outlier threshold and the Euclidean distance threshold values to tune the number of alerts. The novelty of the proposed technique lies in its ability to automatically trigger alerts from transaction profiles, based on transaction usage performed over a period of time. Experiments were conducted using a real dataset obtained from the production client of a large organization using SAP R/3 (presently the most predominant ERP system), to run its business. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Mapping the Cybernetic Principles of Viable System Model to Enterprise Servic...ITIIIndustries
This paper describes the results of a theoretical mapping of the cybernetic principles of the Viable System Model (VSM) to an Enterprise Service Bus (ESB) model, with the aim to identify the management principles for the integration of services at all levels in the enterprise. This enrichment directly contributes to the viability of service-oriented systems and the justification of Business/IT alignment within enterprise. The model was identified to be suitable for further adaption in the industrial setting planned within Australian governmental departments.
Using Watershed Transform for Vision-based Two-Hand Occlusion in an Interacti...ITIIIndustries
To achieve a natural interaction in augmented reality environment, we have suggested to use markerless visionbased two-handed gestures for the interaction; with an outstretched hand and a pointing hand used as virtual object registration plane and pointing device respectively. However, twohanded interaction always causes mutual occlusion which jeopardizes the hand gesture recognition. In this paper, we present a solution for two-hand occlusion by using watershed transform. The main idea is to start from a two-hand occlusion image in binary format, then form a grey-scale image based on the distance of each non-object pixel to object pixel. The watershed algorithm is applied to the negation of the grey scaled image to form watershed lines which separate the two hands. Fingertips are then identified and each hand is recognized based on the number of fingertips on each hand. The outstretched hand is assumed to contain 5 fingertips and the pointing device contains less than 5 fingertips. An example of applying our result in hand and virtual object interaction is displayed at the end of the paper.
Speech Feature Extraction and Data VisualisationITIIIndustries
—This paper presents a signal processing approach to analyse and identify accent discriminative features of four groups of English as a second language (ESL) speakers, including Chinese, Indian, Japanese, and Korean. The features used for speech recognition include pitch, stress, formant frequencies, the Mel frequency coefficient, log frequency coefficient, and the intensity and duration of vowels spoken. This paper presents our study using the Matlab Speech Analysis Toolbox, and highlights how data processing can be automated and results visualised. The proposed algorithm achieved an average success rate of 57.3% in identifying vowels spoken in a speech by the four nonnative English speaker groups.
Bayesian-Network-Based Algorithm Selection with High Level Representation Fee...ITIIIndustries
A real-world intelligent system consists of three basic modules: environment recognition, prediction (or estimation), and behavior planning. To obtain high quality results in these modules, high speed processing and real time adaptability on a case by case basis are required. In the environment recognition module many different algorithms and algorithm networks exist with varying performance. Thus, a mechanism that selects the best possible algorithm is required. To solve this problem we are using an algorithm selection approach to the problem of natural image understanding. This selection mechanism is based on machine learning; a bottom-up algorithm selection from real-world image features and a top-down algorithm selection using information obtained from a high level symbolic world description and algorithm suitability. The algorithm selection method iterates for each input image until the high-level description cannot be improved anymore. In this paper we present a method of iterative composition of the high level description. This step by step approach allows us to select the best result for each region of the image by evaluating all the intermediary representations and finally keep only the best one.
Instance Selection and Optimization of Neural NetworksITIIIndustries
Credit scoring is an important tool in financial institutions, which can be used in credit granting decision. Credit applications are marked by credit scoring models and those with high marks will be treated as “good”, while those with low marks will be regarded as “bad”. As data mining technique develops, automatic credit scoring systems are warmly welcomed for their high efficiency and objective judgments. Many machine learning algorithms have been applied in training credit scoring models, and ANN is one of them with good performance. This paper presents a higher accuracy credit scoring model based on MLP neural networks trained with back propagation algorithm. Our work focuses on enhancing credit scoring models in three aspects: optimize data distribution in datasets using a new method called Average Random Choosing; compare effects of training-validation-test instances numbers; and find the most suitable number of hidden units. Another contribution of this paper is summarizing the tendency of scoring accuracy of models when the number of hidden units increases. The experiment results show that our methods can achieve high credit scoring accuracy with imbalanced datasets. Thus, credit granting decision can be made by data mining methods using MLP neural networks.
Signature Forgery and the Forger – An Assessment of Influence on Handwritten ...ITIIIndustries
Signatures are widely used as a form of personal authentication. Despite ubiquity in deployment, individual signatures are relatively easy to forge, especially when only the static ‘pictorial’ outcome of the signature is considered at verification time. In this study, we explore opinions on signature usage for verification purposes, and how individuals rate a particular third-party signature in terms of ease of forgeability and their own ability to forge. We examine responses with respect to an individual’s experience of the forgeability/complexity of their own signature. Our study shows that past experience does not generally have an effect on perceived signature complexity nor the perceived effectiveness of an individual to themselves forge a signature. In assessing forgeability, most subjects cite the overall signature complexity and distinguishing features in reaching this decision. Furthermore, our research indicates that individuals typically vary their signature according to the scenario but generally little effort into the production of the signature.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.