To see the other types of publications on this topic, follow the link: Cloud-Ready Application.

Journal articles on the topic 'Cloud-Ready Application'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud-Ready Application.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhu, Tong, and Zhuo Gao. "The Design and Implementation of Cloud Services Callback Mobile Device." Applied Mechanics and Materials 263-266 (December 2012): 2779–84. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2779.

Full text
Abstract:
This template explains and demonstrates how to prepare your camera-ready paper for Trans Tech Publications. The best is to read these instructions and follow the outline of this text. This paper presents a solution of private cloud security accessing issues by utilizing callbacks of mobile terminal application through cloud service, as well as an implementation of JNI (Java Native Interface) based on Android system. This solution enables the third party application to access the private cloud service transparently.
APA, Harvard, Vancouver, ISO, and other styles
2

Campbell, Patrick C., Weifeng (Rick) Jiang, Zachary Moon, Sonny Zinn, and Youhua Tang. "NOAA’s Global Forecast System Data in the Cloud for Community Air Quality Modeling." Atmosphere 14, no. 7 (2023): 1110. http://dx.doi.org/10.3390/atmos14071110.

Full text
Abstract:
Herein, we present the initial application of the NOAA-EPA Atmosphere-Chemistry Coupler (NACC) in the cloud (“NACC-Cloud”, version 1), which processes NOAA’s operational Global Forecast System version 16 (GFSv16) meteorology on-demand and produces model-ready meteorological files needed to drive U.S. EPA’s Community Multiscale Air Quality (CMAQ) model. NACC is adapted from the U.S. EPA’s Meteorology-Chemistry Interface Processor version 5 (MCIPv5) and is used as the primary model coupler in the current operational NWS/NOAA air quality forecasting model. The development and use of NACC-Cloud in this work are critical to provide the scientific community streamlined access to NOAA’s operational GFSv16 data and user-defined processing and download of model-ready, meteorological input for any regional CMAQ domain worldwide. The NACC-Cloud system was implemented on the Amazon® Web Services High-Performance Computing platform, and results from this work show that the NACC-Cloud system is immediately beneficial to the air quality modeling community worldwide.
APA, Harvard, Vancouver, ISO, and other styles
3

Kanoje, Shyamrao, Nishant Dhage, Ankita Gawali, Urvesh Rahate, and Rakesh A. Bairagi. "Development of Recruitment App." Journal of Android and IOS Applications and Testing 8, no. 2 (2023): 17–22. http://dx.doi.org/10.46610/joaat.2023.v08i02.003.

Full text
Abstract:
The purpose of this project is to build a central recruitment process based on our company. Human resource companies create vacancies, save applicant information, initiate interview processes, schedule interviews, store candidate interview results, and finally, application settings are all integral components of this system. To use the HR Recruiting App, a report might need to be prepared. Cloud computing provides a shared pool of readily available computing resources provisioning and sharing based on user demand. In this article, universities and educational institutions can benefit from cloud computing in terms of cost, efficiency, and reliability, portability, flexibility and security. In the end, the purpose of this undertaking is to create a centralized onboarding process system for the HR Company, creating job openings, managing applicant information, conducting interviews, scheduling interviews, storing candidate interviews and results, and ultimately, handling payment and hiring processes. The application is the quality of this system. To use the HR getting newcomers telephone operations, a written statement might need to be got ready. Cloud computing provides a common set of data-processable materials that can be rapidly deployed and distributed based on user demand. This paper makes test of how organizations for higher education and deeply rooted ways of acting can get help form could computing in words of price, doing work well, level of being ready for work, ability to make ready adjustments, and security.
APA, Harvard, Vancouver, ISO, and other styles
4

Ahirwar, Dr Anamika, Nikita Prajapat, and Simran Raj. "AN ANALYTICAL STUDY ON CLOUD COMPUTING." BSSS journal of computer 12, no. 1 (2021): 30–35. http://dx.doi.org/10.51767/jc1204.

Full text
Abstract:
This paper is about the An Analytical Study on Cloud Computing. Cloud computing is the development of parallel computing, grid computing, distributed computing, and virtualization technologies which define the shape of a new area. In contrast to a variety of benefits related with cloud computing, there are certain challenges as well. These challenges include security, privacy and reliability of data, high costs of data transfers, and regularity in the availability of services, and bugs in large-scale distributed systems. Cloud computing is a method of computing in a place that provides users with the ability of information technology as a service and allows them to have access to these services on the Internet without having limited information. Cloud computing can help businesses transform their closing server infrastructures into dynamic environments, expanding and reducing server capacity depending on their demand. Cloud is a image to describe web as a space where computing has been pre-installed and close as a service; data, operating systems, applications, storage and processing power close on the web ready to be shared. In cloud computing data owners expand their complex data management systems from community sites to the public cloud for great pliability and cost-effective. The searching of this study that highlight there are five main issues related with cloud computing execution which are Mobility and Cloud Government Application security issues, Cloud Security data, cloud security platform, Cloud Security Services and Application, cloud network security issues and infrastructure issues.
APA, Harvard, Vancouver, ISO, and other styles
5

Cuadra, Julen, Ekaitz Hurtado, Isabel Sarachaga, Elisabet Estévez, Oskar Casquero, and Aintzane Armentia. "Enabling DevOps for Fog Applications in the Smart Manufacturing domain: A Model-Driven based Platform Engineering approach." Future Generation Computer Systems 157 (April 8, 2024): 360–75. https://doi.org/10.1016/j.future.2024.03.053.

Full text
Abstract:
Cloud Computing is revolutionizing smart manufacturing by offering on-demand and scalable computer systems that facilitate plant data analysis and operational efficiency optimization. DevOps is a methodology, widely used for developing Cloud Computing systems, that streamlines software development by improving its integration, delivery, and deployment. Although cloud application designers within a DevOps team are assumed to have development and operational knowledge, this does not fall within the skills of experts that design analytics applications of plant data. The deployment environment is also relevant since, as such applications are often hosted in the Fog, the proliferation of application components may hinder their composition and validation. This work is aimed at embracing the Platform Engineering approach to provide a tailored toolkit that guides the design and development of OpenFog compliant applications for the experts in the Smart Manufacturing domain. The platform uses Model Driven Engineering techniques and a flow-based visual editor to allow application designers to graphically compose applications from components previously delivered by component developers, abstracting them from the underlying technologies. As a result, containerized applications, ready to be deployed and run by a container orchestrator, are obtained. The feasibility of the proposal is proved through an industrial case study.
APA, Harvard, Vancouver, ISO, and other styles
6

Kulpa, Artur, and Jakub Swacha. "Application Programming Interface for the Cloud-Based Management of Gamified eGuides." Information 11, no. 6 (2020): 307. http://dx.doi.org/10.3390/info11060307.

Full text
Abstract:
The popularity of smartphones and widespread access to mobile internet removed earlier barriers to reliance on mobile applications run on visitors’ own devices for guidance in tourist attractions. At the same time, the tourists’ rising expectations call for solutions that can increase their engagement and satisfaction, such as gamification. Despite the availability of platforms for both general-purpose gamification and configurable eguides, until now, there have not been any ready-made solutions of this kind supporting the implementation of gamification for eguides. In this paper, we would like to present a solution filling this gap: the eMused.eu Application Programming Interface, which can be used by mobile applications (web or native) to access both tour content and gamification functionality provided on a cloud.
APA, Harvard, Vancouver, ISO, and other styles
7

A. Karunamurthy, Dr. "Scalable Web Application Deployment Using Auto Scaling, Load Balancer, And RDS." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49702.

Full text
Abstract:
Abstract The rapid growth of web applications and the increasing demand for high availability, scalability, and performance have made traditional deployment methods inadequate. This project, titled "Scalable Web Application Deployment Using Auto Scaling, Load Balancer, and RDS," focuses on creating a robust and efficient infrastructure for deploying web applications on the cloud. The main goal is to ensure that the application can automatically adapt to changing workloads while maintaining optimal performance and availability. The proposed system utilizes Amazon Web Services (AWS) as the cloud platform. Key components include Auto Scaling, which dynamically adjusts the number of EC2 instances based on demand; an Elastic Load Balancer (ELB) that distributes incoming traffic evenly across multiple instances to prevent overloading; and Amazon RDS (Relational Database Service) for a scalable and managed database solution. This architecture ensures that the application remains responsive and cost-effective even under varying traffic conditions. The implementation involves configuring a web server environment using EC2 instances, integrating the load balancer, setting up Auto Scaling policies based on CPU utilization, and deploying the backend database using Amazon RDS. Security, fault tolerance, and performance optimization techniques are also applied to ensure a production-ready environment. This project demonstrates the benefits of using cloud-native services to automate deployment processes and enhance application resilience. It significantly reduces manual intervention, minimizes downtime, and ensures that the application can scale in and out based on real- time user demand. The outcome is a highly available, fault-tolerant, and cost-efficient deployment model suitable for modern web applications. Keywords: Amazon Web Services (AWS), EC2,Auto Scaling, RDS, S3, VPC, IAM, Security Groups Scalable deployment, Web application, Auto Scaling, Load Balancer, Amazon RDS, AWS, Cloud computing, High availability, Fault tolerance, Elastic infrastructure, Cost optimization.
APA, Harvard, Vancouver, ISO, and other styles
8

Jain, Aman, Prof Ritu, and Chirag Saini. "Implementation of Personal Cloud using Cryptography." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 278–81. http://dx.doi.org/10.22214/ijraset.2024.61491.

Full text
Abstract:
Abstract: This Python-based personal cloud application leverages Flask and cryptography to establish a secure file storage system. Employing the Fernet encryption algorithm, the server encrypts uploaded files, ensuring data confidentiality. Users can securely upload, store, and download files, with each file automatically encrypted upon upload and decrypted for download. While this example prioritizes simplicity, a production-ready system should include robust user authentication, access controls, and further security enhancements. The abstract encapsulates the project's essence, highlighting its focus on file security within a personal cloud environment while acknowledging the need for additional features in a real-world deployment.
APA, Harvard, Vancouver, ISO, and other styles
9

Prasad, Shweta Sukhram, and Aarti Kanahiyalal Yadava. "Research on Cloud Data Storage Security." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3507–10. http://dx.doi.org/10.22214/ijraset.2022.44694.

Full text
Abstract:
Abstract: Cloud computing is a revolutionary mechanism that changing way to enterprise hardware and software design and procurements. Because of cloud simplicity everyone is moving data and application software to cloud data centers there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing. This paper gives an overview of the security issues on data storage along with its possible solutions many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud. This paper also provides a process to avoid Collusion attacks of server modification by unauthorized users.
APA, Harvard, Vancouver, ISO, and other styles
10

Damiani, Andrea, Giorgia Fiscaletti, Marco Bacis, Rolando Brondolin, and Marco D. Santambrogio. "BlastFunction: A Full-stack Framework Bringing FPGA Hardware Acceleration to Cloud-native Applications." ACM Transactions on Reconfigurable Technology and Systems 15, no. 2 (2022): 1–27. http://dx.doi.org/10.1145/3472958.

Full text
Abstract:
“Cloud-native” is the umbrella adjective describing the standard approach for developing applications that exploit cloud infrastructures’ scalability and elasticity at their best. As the application complexity and user-bases grow, designing for performance becomes a first-class engineering concern. As an answer to these needs, heterogeneous computing platforms gained widespread attention as powerful tools to continue meeting SLAs for compute-intensive cloud-native workloads. We propose BlastFunction, an FPGA-as-a-Service full-stack framework to ease FPGAs’ adoption for cloud-native workloads, integrating with the vast spectrum of fundamental cloud models. At the IaaS level, BlastFunction time-shares FPGA-based accelerators to provide multi-tenant access to accelerated resources without any code rewriting. At the PaaS level, BlastFunction accelerates functionalities leveraging the serverless model and scales functions proactively, depending on the workload’s performance. Further lowering the FPGAs’ adoption barrier, an accelerators’ registry hosts accelerated functions ready to be used within cloud-native applications, bringing the simplicity of a SaaS-like approach to the developers. After an extensive experimental campaign against state-of-the-art cloud scenarios, we show how BlastFunction leads to higher performance metrics (utilization and throughput) against native execution, with minimal latency and overhead differences. Moreover, the scaling scheme we propose outperforms the main serverless autoscaling algorithms in workload performance and scaling operation amount.
APA, Harvard, Vancouver, ISO, and other styles
11

Tulchinsky, Vadim, Serhii Lavreniuk, Viacheslav Roganov, Petro Tulchinsky, and Valerii Khalimendik. "Factors of Performance for Application of AI Models in GPU Cloud." Cybernetics and Computer Technologies, no. 1 (March 31, 2020): 74–82. http://dx.doi.org/10.34229/2707-451x.20.1.8.

Full text
Abstract:
Introduction. In machine learning (ML) and artificial intelligence (AI) works, the emphasis is usually on the quality of classification or the accuracy of parameter estimation. If the focus is on performance, then it is also mainly about the performance of the model's training phase. However, with the proliferation of AI applications in real-world problems, the problem of ensuring high data processing performance with ready models becomes more important. By its nature, this problem is fundamentally different from the one of model training: the latter deals with intensive calculations and the former with simple calculations, but large flows of data (files) coming from the network or file system for processing. That is, the typical task of parallel processing with intensive input-output. Besides, in terms of application, the AI module that performs classification, evaluation, or other data processing is a "black box": the cost of developing and training the model, as well as the risks of failure, are too high to handle such tasks in a non-professional manner. Therefore, performance optimization primarily involves the selection and balancing of system parameters. Cloud systems with their flexibility, manageability and easy scaling are the ideal platforms for such tasks. Consider in more detail the task of investigating the factors which affect performance on a single, but notable, pattern recognition sample of a subset of ImageNet image collection [1] classified by the 50-layer deep learning neural network ResNet-50 [2]. The purpose of the paper is to experimentally investigate the factors that influence the performance of a ready-to-use neural network model application in GPU cloud systems of various architectures. Results. Overheads related to microservices and distributed architectures, memory, network, batch size, synchronous and asynchronous interactions are estimated. The complex nonlinear nature of the influence of the system parameters in various combinations is demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
12

Wieland, M., F. Fichtner, and S. Martinis. "UKIS-CSMASK: A PYTHON PACKAGE FOR MULTI-SENSOR CLOUD AND CLOUD SHADOW SEGMENTATION." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIII-B3-2022 (May 30, 2022): 217–22. http://dx.doi.org/10.5194/isprs-archives-xliii-b3-2022-217-2022.

Full text
Abstract:
Abstract. Cloud and cloud shadow segmentation is a crucial pre-processing step for any application that uses multi-spectral satellite images. In particular, time-critical disaster applications, require accurate and immediate cloud and cloud shadow masks while being able to adapt to possibly large variations caused by different sensor characteristics, scene properties or atmospheric conditions. This study introduces the newly developed open-source Python package ukis-csmask for cloud and cloud shadow segmentation in multi-spectral satellite images. Segmentation with ukis-csmask is performed with a pre-trained Convolutional Neural Network based on a U-Net architecture. It works directly on Level-1C data, eliminating the need for prior atmospheric correction. Images need to be in top of atmosphere reflectance and include at least the Blue, Green, Red, NIR, SWIR1 and SWIR2 spectral bands. We provide a performance evaluation on a recent benchmark dataset for cloud and cloud shadow segmentation and proof the generalization ability of our method across multiple satellites (Landsat-5, Landsat-7, Landsat-8, Landsat-9 and Sentinel-2). We also show the influence of augmentation and image bands on the segmentation performance and compare it to the widely used Fmask algorithm and a Random Forest classifier. Compared to previous work in this direction, our study focuses on multi-sensor generalization ability, simplicity and efficiency and provides a ready-to-use software package that has been thoroughly tested.
APA, Harvard, Vancouver, ISO, and other styles
13

Hsieh, Cheng Tiao. "A New Kinect-Based Scanning System and its Application." Applied Mechanics and Materials 764-765 (May 2015): 1375–79. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.1375.

Full text
Abstract:
This paper aims at presenting a simple approach utilizing a Kinect-based scanner to create models available for 3D printing or other digital manufacturing machines. The outputs of Kinect-based scanners are a depth map and they usually need complicated computational processes to prepare them ready for a digital fabrication. The necessary processes include noise filtering, point cloud alignment and surface reconstruction. Each process may require several functions and algorithms to accomplish these specific tasks. For instance, the Iterative Closest Point (ICP) is frequently used in a 3D registration and the bilateral filter is often used in a noise point filtering process. This paper attempts to develop a simple Kinect-based scanner and its specific modeling approach without involving the above complicated processes.The developed scanner consists of an ASUS’s Xtion Pro and rotation table. A set of organized point cloud can be generated by the scanner. Those organized point clouds can be aligned precisely by a simple transformation matrix instead of the ICP. The surface quality of raw point clouds captured by Kinect are usually rough. For this drawback, this paper introduces a solution to obtain a smooth surface model. Inaddition, those processes have been efficiently developed by free open libraries, VTK, Point Cloud Library and OpenNI.
APA, Harvard, Vancouver, ISO, and other styles
14

Phan Huong, Thao. "The Roles and Challenges of Cloud Computing to Accounting System of Vietnamese Enterprises in the Fourth Industrial Revolution." International Journal of Economics and Financial Research, no. 69 (September 30, 2020): 207–13. http://dx.doi.org/10.32861/ijefr.69.207.213.

Full text
Abstract:
In the context of the 4.0 revolution, technology applications, especially cloud computing will have strong impacts on all areas, including accounting systems of enterprises. Cloud computing contributes to helping the enterprise accounting apparatus become compact, help automate the input process, improve the accuracy of the input data. Besides, the issur of accounting, reporting, risk control and information security also became better, contributing to improving the effectiveness of accounting. However, besides the positive impacts, businesses also face many difficulties in deploying and applying cloud computing. However, this application requirement will become an inevitable trend contributing to improving the operational efficiency of enterprises. To promote this process requires from the State as well as businesses themselves must have awareness and appropriate decisions. Breakthroughs in information technology have dramatically changed the accounting industry and the creation of financial statements. The Internet and the technologies that use the power of the Internet are playing an important role in the management and accounting activities of businesses - who always tend to be ready to receive and use public innovations technology in collecting, storing, processing and reporting information.
APA, Harvard, Vancouver, ISO, and other styles
15

Terminanto, Agung, Achmad Nizar Hidayanto, and Wahyu Nugroho. "Measurement of Readiness Levels for Adoption of Enterprise Resource Planning Clouds in Small Medium Enterprise with Net Ready Model." Journal of Computational and Theoretical Nanoscience 16, no. 12 (2019): 5396–407. http://dx.doi.org/10.1166/jctn.2019.8609.

Full text
Abstract:
Industry 4.0 has changed the way we live, work and interact, creating new opportunities and challenges. To deal with these challenges, SMEs need an application that can integrate and automate SME business processes. Small and Medium Enterprises are very important for Indonesia’s economic growth. The 2016 economic census conducted by the Central Bureau of Statistics stated the rapid economic growth among MSMEs. The more rapid growth of the market, the greater the competition in the market coupled with the current digital era. The study was conducted to measure the readiness of small and medium enterprises in the Bogor area that are engaged in fashion for Cloud ERP adoption. Readiness measurement is done by the Net Ready method which has four variables, namely: Leadership, Governance, Competencies, Technology. The Net Ready method further assesses the readiness to the level of the organization and the results of measurements which each have different value contributions. Governance provides the biggest contribution in the assessment of Net Ready which has a score of 1.06. Competencies provide the second largest contribution which has a score of 0.77. Technology provides the third largest contribution which has a value of 0.72. Leadership makes the smallest contribution in this study which has a score of 0.58, lack of management awareness of integrated information systems to make new business strategies. The total score obtained from the summary of each variable total score produces a value of 3.12. The total score can be categorized as Bogor region SMEs engaged in fashion, quite ready to adopt Cloud ERP.
APA, Harvard, Vancouver, ISO, and other styles
16

Belovitskiy, V. I. "The Concept of the Receipts & Promotions Cloud Service: a New Level of Communication between Bank, Store, and Customer." INFORMACIONNYE TEHNOLOGII 26, no. 12 (2020): 697–700. http://dx.doi.org/10.17587/it.26.697-700.

Full text
Abstract:
The development of cloud services improving the interaction of banks, stores and customers becomes high-demanded by digitalized society, that is ready to use innovative software products. The Receipts & Promotions cloud service, developed at the concept level, allows to realize the idea of providing complete information of a receipt in electronic form along with printed receipt for the Mir plastic card holders through the "Privet, Mir!" mobile application. Information from electronic receipts accumulated in the Mir cloud will allow the customer to receive personalized bonus offers from the stores — partners of the program, as well as manage the family budget. The introduction of the service opens up the wide opportunities to the stores for communication with customers. The Receipts & Promotions service is able to become the first software product based on the collection and analysis of information from electronic receipts linked to a specific user. The system of flexible personalization of bonus offers and their assessment by customers is unique and not implemented in other software products. It will be possible to consider the display of electronic receipts in the "Privet, Mir!" mobile application in a user-friendly interface as the first fully automated option of providing electronic receipts to a wide range of users.
APA, Harvard, Vancouver, ISO, and other styles
17

Wildana, Faiq. "IMPLEMENTASI CLOUD COMPUTING DI BEBERAPA INSTANSI PEMERINTAHAN." Masyarakat Telematika Dan Informasi : Jurnal Penelitian Teknologi Informasi dan Komunikasi 8, no. 2 (2018): 97. http://dx.doi.org/10.17933/mti.v8i2.105.

Full text
Abstract:
AbstractAlong with the development of cloud computing technology, several government institution are ready to use cloud computing, even some have started implementing this technology. Currently cloud computing has just recently adapted in Indonesia. It is important to know the comparison and usage analysis of some instituitions that have been used. This study used a qualitative approach with interview instrument conducted for each instituition. Respondents who become the object of this research are LKPP, BIG, Balai IPTEK-net BPPT, and Ministry of Communications and Informatics. The four instituitions are selected because it is a central instituition that has been implemented cloud computing with a wide range of services. The method of analysis used is a comparative method which compares cloud computing services. Comparative analysis approach is issues and challenges of cloud computing. The study produces an overview of the application of cloud computing in government instituitions along with suggestions that should be done.AbstrakSeiring dengan perkembangan teknologi cloud computing, beberapa instansi pemerintahan sudah merencanakan pemanfaatan cloud computing, bahkan sudah ada yang mulai memanfaatkan teknologi ini. Sedangkan cloud computing belum lama ini baru mulai diadaptasi di Indonesia. Kiranya penting untuk mengetahui komparasi dan analisis pemakaian oleh beberapa instansi yang sudah menggunakan. Penelitian ini menggunakan pendekatan kualitatif dengan instrumen wawancara yang dilakukan kepada masing-masing instansi. Responden yang menjadi objek penelitian ini yaitu LKPP, BIG, Balai IPTEK-net BPPT, dan Kementerian Kominfo. Keempat instansi tersebut dipilih karena merupakan instansi pusat yang diketahui sudah menerapkan cloud computing dengan jangkauan layanan yang luas. Metode analisis yang digunakan adalah metode komparatif dimana membandingkan keempat objek penelitian terkait layanan cloud computing yang diberikan. Analisis komparasi menggunakan pendekatan isu dan tantangan cloud computing. Studi menghasilkan gambaran penerapan cloud computing di instansi pemerintahan beserta saran yang seharusnya dilakukan.
APA, Harvard, Vancouver, ISO, and other styles
18

Noh, Yoo-Jeong, John M. Forsythe, Steven D. Miller, et al. "Cloud-Base Height Estimation from VIIRS. Part II: A Statistical Algorithm Based on A-Train Satellite Data." Journal of Atmospheric and Oceanic Technology 34, no. 3 (2017): 585–98. http://dx.doi.org/10.1175/jtech-d-16-0110.1.

Full text
Abstract:
AbstractKnowledge of cloud-base height (CBH) is important to describe cloud radiative feedbacks in numerical models and is of practical relevance to the aviation community. Whereas satellite remote sensing with passive radiometers traditionally has provided a ready means for estimating cloud-top height (CTH) and cloud water path (CWP), assignment of CBH requires heavy assumptions on the distribution of CWP within the cloud profile. An attempt to retrieve CBH has been included as part of the VIIRS environmental data records, produced operationally as part of the Suomi–National Polar-Orbiting Partnership (SNPP) and the forthcoming Joint Polar Satellite System. Through formal validation studies tied to the program, it was found that the operational CBH algorithm failed to meet performance specifications in many cases. This paper presents a new methodology for retrieving CBH of the uppermost cloud layer, developed through statistical analyses relating cloud geometric thickness (CGT) to CTH and CWP. The semiempirical approach, which relates these parameters via piecewise fitting, enlists A-Train satellite data [CloudSat cloud profiling radar (CPR), CALIPSO/CALIOP, and Aqua MODIS]. CBH is provided as the residual difference between CTH and CGT. By eliminating cloud type–dependent assumptions on CWP distribution, artifacts common to the operational algorithm (which contribute to high errors) are reduced. Special accommodations are made for handling optically thin cirrus and deep convection. An application to SNPP VIIRS is demonstrated, and the results are compared against global CloudSat observations. From the VIIRS–CloudSat daytime matchups (September–October 2013 and January–May 2015), the new algorithm outperforms the operational SNPP VIIRS algorithm, particularly when the retrieved CTH is accurate. Best performance is expected for single-layer liquid-phase clouds.
APA, Harvard, Vancouver, ISO, and other styles
19

Campero-Taboada, Milton J., Eduardo Luquin, Manuel Montesino-SanMartin, María González-Audícana, and Miguel A. Campo-Bescós. "Evaluation of R Tools for Downloading MODIS Images and Their Use in Urban Growth Analysis of the City of Tarija (Bolivia)." Remote Sensing 14, no. 14 (2022): 3404. http://dx.doi.org/10.3390/rs14143404.

Full text
Abstract:
The aim of this study was to compare the available tools in R for downloading and processing Moderate Resolution Imaging Spectroradiometer (MODIS) data, specifically the Enhanced Vegetation Index (EVI) product. The R tools evaluated were the MODIS package, RGISTools, MODISTools, R Google Earth Engine (RGEE) package, MODIStsp, and the Application for Extracting and Exploring Analysis Ready Samples (AppEEARS) application. Each tool was used to download the same product (EVI) corresponding to the same day (3 December 2015), and downloaded data were used to analyze the urban growth of Tarija (Bolivia) as an interesting application. The following features were analyzed: download time and memory used during the download, additional post-processing time, local memory occupied on the computer, and downloaded file formats. Results showed that the most efficient R tools were those that work directly in the “cloud” or use text queries (RGEE and AppEEARS, respectively) and provide, as a final product, a cropped.tif image according to the area of interest.
APA, Harvard, Vancouver, ISO, and other styles
20

Auric, Auric, and Hotma Pangaribuan. "IMPLEMENTASI APLIKASI E-WALLET UNTUK UMKM MENGGUNAKAN METODE AGILE DENGAN QR CODE PADA TENSORFLOW BERBASIS ANDROID." Computer and Science Industrial Engineering (COMASIE) 8, no. 1 (2023): 119–29. http://dx.doi.org/10.33884/comasiejournal.v8i1.6743.

Full text
Abstract:
Receh is designed to make learning easier for those who have trouble learning applications that are too complex to use. The author is ready to help small merchants who want to integrate digital payments. To introduce this project, first of all we were worried about the reduced cash payments and switched to E-wallet since the COVID-19 pandemic. The reason the author made this application is to make it easier for those who have difficulty learning applications that are too complex to be very simple and easy to use. Some target markets need the solutions provided by the author. According to the data, internet usage will increase from year to year. The author provides a solution that makes it easy for customers to use E-wallet as the primary payment method for their applications. The method used in the E-wallet application is the Agile Method because this method prioritizes the advantages of technical features when implementing the software. For the implementation here I use a QR code scanner as its main function because it is simple and practical. Scan can encode QR Code from any side or any position. This model is then used in Android Studio to build mobile applications using the Kotlin programming language. For cloud computing, first, research the service or backend required by the application. Second, create a private API using node.js. Finally, implement APIs built for online compute engines.
APA, Harvard, Vancouver, ISO, and other styles
21

Hafez, Ahmed Ibrahem, Beatriz Soriano, Aya Allah Elsayed, et al. "Client Applications and Server-Side Docker for Management of RNASeq and/or VariantSeq Workflows and Pipelines of the GPRO Suite." Genes 14, no. 2 (2023): 267. http://dx.doi.org/10.3390/genes14020267.

Full text
Abstract:
The GPRO suite is an in-progress bioinformatic project for -omics data analysis. As part of the continued growth of this project, we introduce a client- and server-side solution for comparative transcriptomics and analysis of variants. The client-side consists of two Java applications called “RNASeq” and “VariantSeq” to manage pipelines and workflows based on the most common command line interface tools for RNA-seq and Variant-seq analysis, respectively. As such, “RNASeq” and “VariantSeq” are coupled with a Linux server infrastructure (named GPRO Server-Side) that hosts all dependencies of each application (scripts, databases, and command line interface software). Implementation of the Server-Side requires a Linux operating system, PHP, SQL, Python, bash scripting, and third-party software. The GPRO Server-Side can be installed, via a Docker container, in the user’s PC under any operating system or on remote servers, as a cloud solution. “RNASeq” and “VariantSeq” are both available as desktop (RCP compilation) and web (RAP compilation) applications. Each application has two execution modes: a step-by-step mode enables each step of the workflow to be executed independently, and a pipeline mode allows all steps to be run sequentially. “RNASeq” and “VariantSeq” also feature an experimental, online support system called GENIE that consists of a virtual (chatbot) assistant and a pipeline jobs panel coupled with an expert system. The chatbot can troubleshoot issues with the usage of each tool, the pipeline jobs panel provides information about the status of each computational job executed in the GPRO Server-Side, while the expert system provides the user with a potential recommendation to identify or fix failed analyses. Our solution is a ready-to-use topic specific platform that combines the user-friendliness, robustness, and security of desktop software, with the efficiency of cloud/web applications to manage pipelines and workflows based on command line interface software.
APA, Harvard, Vancouver, ISO, and other styles
22

Deenadhayalan, Pratiba, Ramakanth Kumar Pattar, and Vijay Chiranjith Reddy. "Functional segments and software defined trends in enterprise networks." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 2 (2023): 957. http://dx.doi.org/10.11591/ijeecs.v31.i2.pp957-967.

Full text
Abstract:
In the current scenarios most of the business growth comes from the user experience, while using the business applications. Any enterprise network performance depends on the fundamental process of securely serving the user with applications. The network usage patterns have completely changed from just data transfer, voice, and video transmissions to serving entire applications over the networks. With all the modern applications served over the private and public clouds the network resources utilization must be optimized and take full advantage of them which is not possible with current network architectures. The enterprises are currently shifting towards software defined implementation due to many reasons like consistent policy application across the network, run time analytics for troubleshooting the problems and making the network cloud computing ready. Software defined approaches provide centralized security monitoring and control, user data and identity-based segmentation over the network, dynamic recovery from network infrastructure failure and finally virtualization of almost everything. This paper is an overview of the functioning of enterprises in the networking perspective along with current software defined approaches being used in enterprise networking which will soon take over the traditional networks by solving the challenges present in the software defined networking.
APA, Harvard, Vancouver, ISO, and other styles
23

Pratiba, Deenadhayalan, Kumar Pattar Ramakanth, and Chiranjith Reddy Vijay. "Functional segments and software defined trends in enterprise networks." Functional segments and software defined trends in enterprise networks 31, no. 2 (2023): 957–67. https://doi.org/10.11591/ijeecs.v31.i2.pp957-967.

Full text
Abstract:
In the current scenarios most of the business growth comes from the user experience, while using the business applications. Any enterprise network performance depends on the fundamental process of securely serving the user with applications. The network usage patterns have completely changed from just data transfer, voice, and video transmissions to serving entire applications over the networks. With all the modern applications served over the private and public clouds the network resources utilization must be optimized and take full advantage of them which is not possible with current network architectures. The enterprises are currently shifting towards software defined implementation due to many reasons like consistent policy application across the network, run time analytics for troubleshooting the problems and making the network cloud computing ready. Software defined approaches provide centralized security monitoring and control, user data and identity-based segmentation over the network, dynamic recovery from network infrastructure failure and finally virtualization of almost everything. This paper is an overview of the functioning of enterprises in the networking perspective along with current software defined approaches being used in enterprise networking which will soon take over the traditional networks by solving the challenges present in the software defined networking.
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Hankui K., Dong Luo, and David P. Roy. "Improved Landsat Operational Land Imager (OLI) Cloud and Shadow Detection with the Learning Attention Network Algorithm (LANA)." Remote Sensing 16, no. 8 (2024): 1321. http://dx.doi.org/10.3390/rs16081321.

Full text
Abstract:
Landsat cloud and cloud shadow detection has a long heritage based on the application of empirical spectral tests to single image pixels, including the Landsat product Fmask algorithm, which uses spectral tests applied to optical and thermal bands to detect clouds and uses the sun-sensor-cloud geometry to detect shadows. Since the Fmask was developed, convolutional neural network (CNN) algorithms, and in particular U-Net algorithms (a type of CNN with a U-shaped network structure), have been developed and are applied to pixels in square patches to take advantage of both spatial and spectral information. The purpose of this study was to develop and assess a new U-Net algorithm that classifies Landsat 8/9 Operational Land Imager (OLI) pixels with higher accuracy than the Fmask algorithm. The algorithm, termed the Learning Attention Network Algorithm (LANA), is a form of U-Net but with an additional attention mechanism (a type of network structure) that, unlike conventional U-Net, uses more spatial pixel information across each image patch. The LANA was trained using 16,861 512 × 512 30 m pixel annotated Landsat 8 OLI patches extracted from 27 images and 69 image subsets that are publicly available and have been used by others for cloud mask algorithm development and assessment. The annotated data were manually refined to improve the annotation and were supplemented with another four annotated images selected to include clear, completely cloudy, and developed land images. The LANA classifies image pixels as either clear, thin cloud, cloud, or cloud shadow. To evaluate the classification accuracy, five annotated Landsat 8 OLI images (composed of >205 million 30 m pixels) were classified, and the results compared with the Fmask and a publicly available U-Net model (U-Net Wieland). The LANA had a 78% overall classification accuracy considering cloud, thin cloud, cloud shadow, and clear classes. As the LANA, Fmask, and U-Net Wieland algorithms have different class legends, their classification results were harmonized to the same three common classes: cloud, cloud shadow, and clear. Considering these three classes, the LANA had the highest (89%) overall accuracy, followed by Fmask (86%), and then U-Net Wieland (85%). The LANA had the highest F1-scores for cloud (0.92), cloud shadow (0.57), and clear (0.89), and the other two algorithms had lower F1-scores, particularly for cloud (Fmask 0.90, U-Net Wieland 0.88) and cloud shadow (Fmask 0.45, U-Net Wieland 0.52). In addition, a time-series evaluation was undertaken to examine the prevalence of undetected clouds and cloud shadows (i.e., omission errors). The band-specific temporal smoothness index (TSIλ) was applied to a year of Landsat 8 OLI surface reflectance observations after discarding pixel observations labelled as cloud or cloud shadow. This was undertaken independently at each gridded pixel location in four 5000 × 5000 30 m pixel Landsat analysis-ready data (ARD) tiles. The TSIλ results broadly reflected the classification accuracy results and indicated that the LANA had the smallest cloud and cloud shadow omission errors, whereas the Fmask had the greatest cloud omission error and the second greatest cloud shadow omission error. Detailed visual examination, true color image examples and classification results are included and confirm these findings. The TSIλ results also highlight the need for algorithm developers to undertake product quality assessment in addition to accuracy assessment. The LANA model, training and evaluation data, and application codes are publicly available for other researchers.
APA, Harvard, Vancouver, ISO, and other styles
25

Iacopo, Colonnelli, Aldinucci Marco, Cantalupo Barbara, and al. et. "Distributed workflows with Jupyter." Future generation computer systems 128 (March 1, 2022): pp. 282–298. https://doi.org/10.1016/j.future.2021.10.007.

Full text
Abstract:
The designers of a new coordination interface enacting complex workflows have to tackle a dichotomy: choosing a language-independent or language-dependent approach. Language-independent approaches decouple workflow models from the host code’s business logic and advocate portability. Language-dependent approaches foster flexibility and performance by adopting the same host language for business and coordination code. Jupyter Notebooks, with their capability to describe both imperative and declarative code in a unique format, allow taking the best of the two approaches, maintaining a clear separation between application and coordination layers but still providing a unified interface to both aspects. We advocate the Jupyter Notebooks’ potential to express complex distributed workflows, identifying the general requirements for a Jupyter-based Workflow Management System (WMS) and introducing a proof-of-concept portable implementation working on hybrid Cloud-HPC infrastructures. As a byproduct, we extended the vanilla IPython kernel with workflow-based parallel and distributed execution capabilities. The proposed Jupyter-workflow (Jw) system is evaluated on common scenarios for High Performance Computing (HPC) and Cloud, showing its potential in lowering the barriers between prototypical Notebooks and production-ready implementations.
APA, Harvard, Vancouver, ISO, and other styles
26

Wolde, Behailu Getachew, and Abiot Sinamo Boltana. "REST API Composition for Effective Testing the Cloud." Journal of Applied Research and Technology 19, no. 6 (2021): 676–93. http://dx.doi.org/10.22201/icat.24486736e.2021.19.6.924.

Full text
Abstract:
Cloud offers many ready-made REST services for the end users. This offer realizes the service composition through implementation somewhere on internet based on Service Level Agreement (SLA). For ensuring this SLA, a software testing is a useful means for attesting a non-functional requirement that guarantees quality assurance from end user's perspective. However, test engineer experiences only what goes in and out through an interface that contains a high level behaviors separated from its underlying details. Testing with these behaviors become an issue for classical testing procedures. So, REST API through composition is an alternative new promising approach for modeling behaviors with parameters against the cloud. This new approach helps to devise test effectiveness in terms of REST based behavior-driven implementation. It aims to understand functional behaviors through API methods based on input domain modeling (IDM) on the standard keyboard pattern. By making an effective REST design the test engineer sends complete test inputs to its API directly on application, and gets test responses from the infrastructure. We consider NEMo mobility API specification to design an IDM, which represents pattern match of mobility search URL API path scope. With this scope, sample mobility REST API service compositions are used. Then, the test assertions are implemented to validate each path resource to test the components and the end-to-end integration on the specified service.
APA, Harvard, Vancouver, ISO, and other styles
27

Strogush, Oleh. "Processes of access of computer-aided design systems to cloud services." Management of Development of Complex Systems, no. 61 (March 28, 2025): 128–35. https://doi.org/10.32347/2412-9933.2025.61.128-135.

Full text
Abstract:
The paper explores the integration of cloud technologies into computer-aided design (CAD) systems, highlighting their advantages, implementation challenges, and impact on modern engineering and design. These features significantly reduce costs associated with technical maintenance, software updates, and infrastructure while improving workflow flexibility and efficiency. Engineers and designers can work on projects remotely, ensuring seamless execution regardless of location. Existing cloud computing models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) – are analyzed for their applicability in CAD. IaaS offers flexible infrastructure for computationally intensive tasks, PaaS supports application development, while SaaS provides ready-to-use design tools accessible via the internet. The study also examines methods for optimizing computing resource allocation to ensure efficient use of cloud capacities, reduce operational costs, and enhance system performance. A key focus is the impact of cloud computing on engineering calculations and complex structure modeling. Cloud services allow for high-speed simulations, making it easier to analyze and optimize designs. The ability to perform resource-intensive computations remotely enhances processing speed and enables more sophisticated simulations in fields like mechanical engineering, architecture, and electronics. Additionally, cloud-based CAD systems facilitate seamless collaboration, allowing engineers and designers to share data, edit models, and analyze results in real-time. This accelerates development cycles, minimizes errors, and improves final project outcomes. Security remains a critical concern in cloud-based design environments. The paper discusses strategies to safeguard data integrity, protect intellectual property, and ensure compliance with industry standards. Encryption, multi-factor authentication, and access control mechanisms are essential for securing cloud-based CAD solutions. Moreover, integrating artificial intelligence (AI) and machine learning into cloud CAD systems automates routine tasks, improves predictive modeling, and enhances decision-making, leading to increased productivity. The economic benefits of cloud technology are also examined, emphasizing reduced hardware costs, lower energy consumption, and increased operational efficiency. By leveraging cloud infrastructure, companies can reduce investments in expensive local hardware while still maintaining high computational performance. This shift not only cuts costs but also promotes sustainability by reducing energy consumption and carbon footprints. The conclusions underscore the transformative impact of cloud technologies on CAD. Beyond improving accessibility and collaboration, cloud integration streamlines design processes, enhances efficiency, and reduces time and resource expenditures. As cloud adoption in CAD continues to grow, it presents new opportunities for innovation across industries. The ongoing advancement of cloud-based solutions marks a pivotal shift in modern engineering and design, making them an essential area for further research and development.
APA, Harvard, Vancouver, ISO, and other styles
28

Consoli, Davide, Leandro Parente, Rolf Simoes, et al. "A computational framework for processing time-series of earth observation data based on discrete convolution: global-scale historical Landsat cloud-free aggregates at 30 m spatial resolution." PeerJ 12 (December 4, 2024): e18585. https://doi.org/10.7717/peerj.18585.

Full text
Abstract:
Processing large collections of earth observation (EO) time-series, often petabyte-sized, such as NASA’s Landsat and ESA’s Sentinel missions, can be computationally prohibitive and costly. Despite their name, even the Analysis Ready Data (ARD) versions of such collections can rarely be used as direct input for modeling because of cloud presence and/or prohibitive storage size. Existing solutions for readily using these data are not openly available, are poor in performance, or lack flexibility. Addressing this issue, we developed TSIRF (Time-Series Iteration-free Reconstruction Framework), a computational framework that can be used to apply diverse time-series processing tasks, such as temporal aggregation and time-series reconstruction by simply adjusting the convolution kernel. As the first large-scale application, TSIRF was employed to process the entire Global Land Analysis and Discovery (GLAD) ARD Landsat archive, producing a cloud-free bi-monthly aggregated product. This process, covering seven Landsat bands globally from 1997 to 2022, with more than two trillion pixels and for each one a time-series of 156 samples in the aggregated product, required approximately 28 hours of computation using 1248 Intel® Xeon® Gold 6248R CPUs. The quality of the result was assessed using a benchmark dataset derived from the aggregated product and comparing different imputation strategies. The resulting reconstructed images can be used as input for machine learning models or to map biophysical indices. To further limit the storage size the produced data was saved as 8-bit Cloud-Optimized GeoTIFFs (COG). With the hosting of about 20 TB per band/index for an entire 30 m resolution bi-monthly historical time-series distributed as open data, the product enables seamless, fast, and affordable access to the Landsat archive for environmental monitoring and analysis applications.
APA, Harvard, Vancouver, ISO, and other styles
29

Abdurrahim, Hanif, Rifqi Fachri Wibowo, and Rindang Widuri. "The Effect of Organizational Factors and Social Influence on the Digital Fluency of Accounting Students." E3S Web of Conferences 388 (2023): 03026. http://dx.doi.org/10.1051/e3sconf/202338803026.

Full text
Abstract:
Businesses and organizations have already integrated information and communications technology into their everyday work cycle, one of these technologies is Software-as-a-Service based cloud accounting applications, this makes digital fluency in the 21st century paramount for accounting students getting ready to dive into the working environment. The objective of this study is to prove the effect of organizational factors and social influence on the digital fluency of accounting students. This paper uses the quantitative method of data collection using electronic questionnaires, the data is then processed and observed using the Partial Least Squares Structural Equation Modelling (PLS-SEM) with the SmartPLS application. We have discovered through the study that organizational factors do, have a significant influence on behavioral intention, and how that intention significantly affects the actual use of SaaS, which in turn, has also a favorable influence on accounting students’ propensity for digital fluency. The findings of this study can be used for other related literature as a benchmark, and to also push organizations and universities to provide necessary help and resources for accounting students to become more digitally fluent in the 21st century through the use of SaaS.
APA, Harvard, Vancouver, ISO, and other styles
30

AGRAFIOTIS, ATHANASIOS. "Cloud Computing: Testing a Key Generation Encryption Algorithm." International Journal of Computer Science and Mobile Computing 13, no. 6 (2024): 59–67. http://dx.doi.org/10.47760/ijcsmc.2024.v13i06.008.

Full text
Abstract:
On the cloud computing the number of instances represents the space that application shares. AI artificial intelligence and machine learning nowadays has been used as a provision system for virtualization purposes in the cloud. A database on cloud is hosted in an instance and is ready to be filled with data. Database is an organized collection of information that is stored and accessed by applications. Database instance contains raw data, figures, values. Database Management System it is possible to manage data such as queries and table schema. An example of database management system where all the utilities that the system offers, dbms is the interface system of the database, that includes data storage, data retrieval administration, reports and data security. The database makes use of a schema which is a set of rules. The table that is part of the database can be organized as a schema. The importance of the database is to ensure that data are stored and later to be accessed. Technologies are using schema, write into the database entries into separate tables. Operational data is the data produced by the organizations. Transaction are the operations that take place into the database such as updates. Next the OLTP represents the online transaction processing. Applications that makes use of queries are ATM (automated teller machine). The OLTP is make use of the ACID model(atomic,changing,isolation, durables) are transactions that takes place under specific constraints. Modern technologies are facing issues such as high volume data on the database and low-latency of the OLTP system. OLAP is the data analysis, and are technologies of data aggregation and queuing them using ascending ordering. The technologies are highly depend to each other the OLTP applications that handles operational data and the OLAP that querying them for aggregation analysis. Scaling the process of managing the underlying resources. The scale up handles the computing power and the temporary memory that is required for an instance to run and the scale out increase the number of databases. Data warehouse is a single place data from multiple data sources. Ingest large amounts of data, optimized for OLAP use cases. In a data warehouse makes uses of big data and are petabytes. Row is going to be transformed to a new structure OLTP database. Data Lake is a centralized repository for storing all structured and unstructured data. Keeps the collected data and is not possible to transformed the data or copy them.
APA, Harvard, Vancouver, ISO, and other styles
31

Karjadi, Daniel Avian. "Proposed Event Organizer Small Medium Business Enterprise Architecture in Pandemic Industry 4.0 Era." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 1 (2022): 168–77. http://dx.doi.org/10.35957/jatisi.v9i1.1962.

Full text
Abstract:
Covid-19 pandemic affects businesses around the world and the most impacted are small and medium event organizer business (SMB EO) that usually having social gathering event participated by a few hundred participants only. Digital transformation must be executed immediately to adapt to the conditions utilizing Industry 4.0 technology especially in recent pandemic era. This paper study the enterprise architecture design of SMB EO utilizing Industry 4.0 to survive in pandemic era and beyond. The enterprise architecture based on Togaf framework consists of business, application, information, and technology architecture is decribed in this paper. Small business doesn’t have the big capital on investing in technologies and during pandemic where certain technology is scarce may cause the business to be left behind. Choice of utilizing public social media and cloud providers according to the architecture is the key. Once the technology is adopted, business is digitalized then business can be ready to face future metaverse business model.
APA, Harvard, Vancouver, ISO, and other styles
32

Fulbone, Mangesh. "Empowering Education: Healthcare Revenue Cycle Management and Their Role in Learning Enhancement Using Azure Data Engineering Stack." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–9. https://doi.org/10.55041/isjem03866.

Full text
Abstract:
Abstract: In the rapidly evolving landscape of healthcare and education, leveraging technology to bridge the gap between industry practices and academic learning has become crucial. This research explores the integration of Healthcare Revenue Cycle Management (RCM) systems with modern educational methodologies through the application of Microsoft Azure's Data Engineering Stack. The study emphasizes how real-world healthcare financial data, when harnessed using tools like Azure, Azure Data Factory, Synapse Analytics, DataBricks, Apache Spark, Apache Airflow and PySpark can enrich educational experiences, foster practical data analytics skills, and enhance curriculum relevance. By designing a prototype pipeline that simulates the end-to-end data flow of RCM processes, the paper demonstrates how educators and students can gain insights into operational efficiencies, predictive analytics, and compliance monitoring within healthcare. Additionally, the research highlights the role of cloud-based platforms in creating scalable, secure, and interactive learning environments. The findings underline the transformative potential of aligning healthcare informatics with data-driven education, offering a roadmap for academic institutions aiming to produce industry-ready graduates with both technical and domain-specific expertise. KEYWORDS: Healthcare Revenue Cycle Management (RCM), Azure Data Engineering, Educational Enhancement, Data Analytics in Education, Azure Synapse Analytics, Azure Data Factory, Healthcare Informatics, Cloud-based Learning, Microsoft Azure, Data-driven Education, Ed Tech, Revenue Cycle Data, Healthcare Analytics, Azure Databricks, Curriculum Development.
APA, Harvard, Vancouver, ISO, and other styles
33

Dei, Michele, Joan Aymerich, Massimo Piotto, Paolo Bruschi, Francisco del Campo, and Francesc Serra-Graells. "CMOS Interfaces for Internet-of-Wearables Electrochemical Sensors: Trends and Challenges." Electronics 8, no. 2 (2019): 150. http://dx.doi.org/10.3390/electronics8020150.

Full text
Abstract:
Smart wearables, among immediate future IoT devices, are creating a huge and fast growing market that will encompass all of the next decade by merging the user with the Cloud in a easy and natural way. Biological fluids, such as sweat, tears, saliva and urine offer the possibility to access molecular-level dynamics of the body in a non-invasive way and in real time, disclosing a wide range of applications: from sports tracking to military enhancement, from healthcare to safety at work, from body hacking to augmented social interactions. The term Internet of Wearables (IoW) is coined here to describe IoT devices composed by flexible smart transducers conformed around the human body and able to communicate wirelessly. In addition the biochemical transducer, an IoW-ready sensor must include a paired electronic interface, which should implement specific stimulation/acquisition cycles while being extremely compact and drain power in the microwatts range. Development of an effective readout interface is a key element for the success of an IoW device and application. This review focuses on the latest efforts in the field of Complementary Metal–Oxide–Semiconductor (CMOS) interfaces for electrochemical sensors, and analyses them under the light of the challenges of the IoW: cost, portability, integrability and connectivity.
APA, Harvard, Vancouver, ISO, and other styles
34

Swati, Jadhao. "Multiple motion control of Robotic Car based on Internet of Things." Journals of Advancement in Electronics Design 5, no. 2 (2022): 1–20. https://doi.org/10.5281/zenodo.6813317.

Full text
Abstract:
<em>Control is an interesting field that has burst with new technologies, bringing the Internet of Things (IoT) concept to life. This paper presents a multiple motion control method for a robotic car that uses the Raspberry Pi. The controlling software uniquely identifies each device, which is the essential principle of IoT. The client can control the car&#39;s operations from afar through the internet using voice commands and a Universal Windows application, as well as receive data and feedback. The key contribution of this work is that it takes use of the robot&#39;s motion control system&#39;s efficiency by allowing the robotic car to receive direct commands from numerous sources at the same time, making the navigating system more efficient. It is not necessary for both the device and the client to be online at the same time. The commands and data are saved in the cloud and delivered when the device is ready to accept them. The car is equipped with a GPS system, allowing customers to track it. For avoiding impediments in its route, the device features an IR sensor. We show how to drive the car using commands and applications, as well as the architecture and design of the Raspberry Pi and connection software. </em>
APA, Harvard, Vancouver, ISO, and other styles
35

Swati, Jadhao, and J. Bhiwani R. "Multiple motion control of Robotic Car based on Internet of Things." Journals of Advancement in Electronics Design 5, no. 2 (2022): 1–20. https://doi.org/10.5281/zenodo.6874865.

Full text
Abstract:
<em>Control is an interesting field that has burst with new technologies, bringing the Internet of Things (IoT) concept to life. This paper presents a multiple motion control method for a robotic car that uses the Raspberry Pi. The controlling software uniquely identifies each device, which is the essential principle of IoT. The client can control the car&#39;s operations from afar through the internet using voice commands and a Universal Windows application, as well as receive data and feedback. The key contribution of this work is that it takes use of the robot&#39;s motion control system&#39;s efficiency by allowing the robotic car to receive direct commands from numerous sources at the same time, making the navigating system more efficient. It is not necessary for both the device and the client to be online at the same time. The commands and data are saved in the cloud and delivered when the device is ready to accept them. The car is equipped with a GPS system, allowing customers to track it. For avoiding impediments in its route, the device features an IR sensor. We show how to drive the car using commands and applications, as well as the architecture and design of the Raspberry Pi and connection software. </em>
APA, Harvard, Vancouver, ISO, and other styles
36

Gupta, Sumit, Dheresh Soni, Ankur Goyal, Arpita Baronia, and Shivkant Kaushik. "Enhanced intelligent home automation security system using IoT and cloud computing security on android platform." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 7 (2024): 2027–39. http://dx.doi.org/10.47974/jdmsc-2077.

Full text
Abstract:
With the aid of cutting-edge technology that makes life easier and more accessible, the world has changed through time to become a better place. With home automation, a number of the home’s components may be controlled remotely. The primary goal of building a wireless, low-cost home automation smart control system was to provide the security, reduce power consumption and enable automated control from a distance. Home automation is a useful concept and offers a number of advantages, including improved comfort and quality of life as well as security in every house by enabling users to manage electrical devices with their fingers within its range. It makes use of the microcontroller, and Wi-Fi is utilized for connection with the application. The paper is exploring the cloud connectivity with embedded board to perform the home automation system along with security based on the basic protocols of IOT. This manuscript proposed a home automation system for intelligent lighting, gas detection, plant watering system, water tank monitoring and password-based home security system. Developed system includes ready-to-deploy software and real-time HTTP and MQTT protocols monitoring through smartphones or PCs.
APA, Harvard, Vancouver, ISO, and other styles
37

Dian Sano, Albert V., Bintang Fadhli Muhammad, Edward Kristian Mangare, Jeremy Jason, and Taufiq Hidayah. "PERANCANGAN APLIKASI BERBASIS ANDROID UNTUK KOMUNITAS PENGGEMAR BURUNG KICAU." Infotech: Journal of Technology Information 5, no. 2 (2020): 93–98. http://dx.doi.org/10.37365/jti.v5i2.70.

Full text
Abstract:
Industry 4.0 is developing and industry 4.0 is the name of the latest automation and data exchange trends in manufacturing technology. This term covers physical-cyber systems, the internet for everything, cloud computing, and cognitive computing. Industry 4.0 produces "smart factories". Industry 4.0 can be seen from More than 50 percent or about 143 million people out of 262 million Indonesians have been connected to the internet throughout 2017, at least according to the latest report by the Indonesian Internet Service Providers Association. The problem in this research is not understanding the advantages and disadvantages of the birds owned and the level of extinction of birds owned. The purpose of this research is to design an Android-based application for the bird enthusiast community. Twitter is an android based forum for the bird lovers community. The application of Android technology to information about the activities of the birds chirping community is an application that serves to provide effective information for members of the chirping mania community at various events, competitions and buying and selling birds. In this application users can post photos of birds, bird trading transactions. see news and race schedule information and tips on bird care to be ready to compete. This application was built using Android Studio and uses Business Model Canvas (BMC) design methods, Use Cases, Activity Diagrams, and Mock-ups. The result can simplify the process of buying and selling birdsong, and makes it easier for community members to get information on various events related to birdsong.
APA, Harvard, Vancouver, ISO, and other styles
38

Chang, Yi-Feng, Yen-En Huang, Meng-Lun Tsai, et al. "Semi-automated approach towards efficient HD Maps generation and verification with Lanelet2 formats." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVIII-1-2024 (May 10, 2024): 79–84. http://dx.doi.org/10.5194/isprs-archives-xlviii-1-2024-79-2024.

Full text
Abstract:
Abstract. HD Maps (High-Definition Maps) serve as crucial resources for the domain of autonomous vehicle. Because HD Maps can provide detailed and accurate road information, the generation of HD Maps has been a labour-intensive and high cost. This research presents an innovative and semi-automated approach for efficient HD Maps generation by using assure mapping tool with deep learning techniques and mobile laser scanned point cloud geometry. The proposed method starts with data collection from various sources such as images, LiDAR point clouds, and integrated INS/GNSS trajectory data. These data are labelled by using a pre-trained model. After finishing post-labelling, these data are subjected to deep learning training by using VoxelNet and Yolact++ framework and leading to the generation of an AI model. The tool effectively recognizes and categorizes features such as road surface markings, traffic signs, and traffic lights, which can be further expanded as per requirements. Finally, the output format can be converted to OpenDRIVE, Lanelet2, and other else. Hence, the extracted lane lines can compare to the manual mapping data for verifying the accuracy. This study demonstrates that the proposed approach can be instrumental in streamlining the HD Maps generation procedure, reducing manual labour, and enhancing efficiency. The assure mapping tool proves to be an effective instrument, particularly when powered by deep learning algorithms and point cloud geometries, in the creation of reliable, comprehensive, and application-ready HD Maps.
APA, Harvard, Vancouver, ISO, and other styles
39

Prokopowicz, Dariusz, and Jan Grzegorek. "THE APPLICATION OF THE MS EXCEL PROGRAM AND THE INFORMALIZED BUSINESS INTELLIGENCE ANALYTICS PLATFORMS IN THE MANAGEMENT OF THE ENTERPRISES." International Journal of New Economics and Social Sciences 5, no. 1 (2017): 0. http://dx.doi.org/10.5604/01.3001.0010.2589.

Full text
Abstract:
Rapid progress is being made in the field of IT applications in the analysis of the economic and financial situation of enterprises and in the processes supporting management of organizations. In terms of the fastest growing areas of information and communication technology, which are the prerequisites for the progress of online electronic banking, it is necessary to disseminate the standards of financial operations have been carried out. The cloud as well as the use of large data sets in the so-called. Big Data platforms. The current Big Data technology solutions are not just large databases, data warehouses allow for multifaceted analysis of huge volumes of quantitative data for periodic managerial reporting. Business decision-making processes should be based on the analysis of reliable and up-to-date market and business data. The information necessary for the decision-making processes has been collected, stored, ordered and pre-summed up in the form of Business Intelligence analytics reports in corporations. Business Intelligence analyzes give managers the ability to analyze the large data sets in real time, which significantly contributes to improving business management efficiency. At present, business analytics use either the advanced analytical formulas of Ms Excel or computerized platforms that include ready-made Business Intelligence reporting formulas.
APA, Harvard, Vancouver, ISO, and other styles
40

Beckett, Frances M., Claire S. Witham, Susan J. Leadbetter, et al. "Atmospheric Dispersion Modelling at the London VAAC: A Review of Developments since the 2010 Eyjafjallajökull Volcano Ash Cloud." Atmosphere 11, no. 4 (2020): 352. http://dx.doi.org/10.3390/atmos11040352.

Full text
Abstract:
It has been 10 years since the ash cloud from the eruption of Eyjafjallajökull caused unprecedented disruption to air traffic across Europe. During this event, the London Volcanic Ash Advisory Centre (VAAC) provided advice and guidance on the expected location of volcanic ash in the atmosphere using observations and the atmospheric dispersion model NAME (Numerical Atmospheric-Dispersion Modelling Environment). Rapid changes in regulatory response and procedures during the eruption introduced the requirement to also provide forecasts of ash concentrations, representing a step-change in the level of interrogation of the dispersion model output. Although disruptive, the longevity of the event afforded the scientific community the opportunity to observe and extensively study the transport and dispersion of a volcanic ash cloud. We present the development of the NAME atmospheric dispersion model and modifications to its application in the London VAAC forecasting system since 2010, based on the lessons learned. Our ability to represent both the vertical and horizontal transport of ash in the atmosphere and its removal have been improved through the introduction of new schemes to represent the sedimentation and wet deposition of volcanic ash, and updated schemes to represent deep moist atmospheric convection and parametrizations for plume spread due to unresolved mesoscale motions. A good simulation of the transport and dispersion of a volcanic ash cloud requires an accurate representation of the source and we have introduced more sophisticated approaches to representing the eruption source parameters, and their uncertainties, used to initialize NAME. Finally, upper air wind field data used by the dispersion model is now more accurate than it was in 2010. These developments have resulted in a more robust modelling system at the London VAAC, ready to provide forecasts and guidance during the next volcanic ash event.
APA, Harvard, Vancouver, ISO, and other styles
41

Sudip, Chakraborty, and S. Aithal P. "Let Us Create A Physical IoT Device Using AWS and ESP Module." International Journal of Management, Technology, and Social Sciences (IJMTS) 7, no. 1 (2023): 224–33. https://doi.org/10.5281/zenodo.7779097.

Full text
Abstract:
<strong>Purpose: </strong>This research paper explores the feasibility of creating a physical AWS IoT device using an ESP module. The paper describes the steps and process of building such a device, including the required hardware and software components. The ESP module is chosen for its low cost, small size, and ability to connect to the internet through Wi-Fi. The AWS IoT platform manages and monitors the device, including the ability to receive and send data to and from the device. The paper includes a detailed explanation of the programming and setup involved in creating the device and the challenges and limitations encountered during the process. Ultimately, this paper demonstrates that creating a physical AWS IoT device using an ESP module is possible, providing a cost-effective solution for developers looking to build IoT devices. The project code is available to download. <strong>Design/Methodology/Approach</strong>: Initially, we create things inside the AWS cloud. Download all certificates and credentials. Then the downloaded credential, we added to the project variable&mdash;the Code compiles and runs. Our ESP8266 hardware is then ready to receive the topic. We use two channels to send the topic to our ESP Module. We can send topics using the AWS cloud MQTT test client interface. Another way is from the C# dot net MQTT client application. We develop an application in the visual studio that can update the AWS device shadows. We will notice that data sending to the AWS Device shadows and updating the ESP module almost in real-time. <strong>Findings/Result: </strong>We use the ESP module to experiment with the AWS IoT interface. Sometimes researchers need to transfer the data over IoT. So here we provide the complete practical guide for IoT experiments. Here we demonstrate How to create the IoT devices and send/update the IoT Devices&#39; Shadow. We integrated the C# MQTT client. Using our created application, we will update AWS cloud MQTT devices shadows. It might be more help full for new researchers to integrate IoT into their projects. <strong>Originality/Value: </strong>After studying Several documents, we created this paper after doing lots of experiments so that our researcher could experiment easily. The available Code is wholly tested and workable. Our researchers can integrate it into their projects with a little customizing effort. The researcher can find some revenant documents for their research work. <strong>Paper Type: </strong>Experimental-based Research.
APA, Harvard, Vancouver, ISO, and other styles
42

Savio, Paolo, Anantaram Varatharajan, Erasmo Vizzaccaro, et al. "Control of Power Electronics through a Photonic Bus: Feasibility and Prospects." Journal of Sensor and Actuator Networks 7, no. 4 (2018): 53. http://dx.doi.org/10.3390/jsan7040053.

Full text
Abstract:
The ubiquitous diffusion of Power Electronic Converters (PECs) in many fields of application including traction and energy conversion suggests the possibility of new and better integration of advanced power conversion and Information and Communication Technology (ICT) services. This work investigates the possible advancements in the use of optical communication links made of plastic optical fibers for control of PECs. The optical communication link connects the switching control to the converter control, following the line of separation between the expertise of power electronic and control engineers. Control wise, a PEC is a black box compatible with any off-board controller, now immune from the Electromagnetic Interference (EMI) produced by the power switches. The redundant optical link is ready for the high switching and sampling frequencies, made possible by relying on SiC power semiconductor devices (100+ kHz). Distributed control of multiple PEC units and advanced telemetry for diagnostics and prognostics are targeted. A proof-of-concept demonstrator is presented and tested. Moreover, the possible evolution towards a power electronic cloud with remote management and orchestration is described.
APA, Harvard, Vancouver, ISO, and other styles
43

Peláez Valencia, Luis Eduardo, Alonso Toro Lazo, Diana Lizeth Carvajal Portilla, and Daniel Carolina López López. "Desarrollo de software aplicando una propuesta metodológica diseñada en la Universidad Católica de Pereira." Entre Ciencia e Ingeniería 7, no. 14 (2013): 85–92. https://doi.org/10.31908/19098367.628.

Full text
Abstract:
This article is the result of the research project entitled “Validation of a model for the software development in order to improve the process and the product in MSMEs and SMEs which create software in Colombia “. It is carried out at Universidad Católica de Pereira by the research group Innovation and Engineering (GIII-UCP). The model comprises a number of phases and activities around the development and management: requirements, architecture, construction, testing, implementation, planning and estimating, SQA, versions’ settings, incident reporting and documentation. In order to validate the model, it is planned at first; to carry out software development following a specific methodology. One of these developments is “a good standing certificate system” - that allows the management of information and documents in the cloud-. The general objective of this work is the application of an own model in the process of development and management of the system. So that, the means to validate the quality of the software developed, in the implementation of future projects, contrasted to others similar existing in the market, will be ready.
APA, Harvard, Vancouver, ISO, and other styles
44

Farag, Mohammed M. "Matched Filter Interpretation of CNN Classifiers with Application to HAR." Sensors 22, no. 20 (2022): 8060. http://dx.doi.org/10.3390/s22208060.

Full text
Abstract:
Time series classification is an active research topic due to its wide range of applications and the proliferation of sensory data. Convolutional neural networks (CNNs) are ubiquitous in modern machine learning (ML) models. In this work, we present a matched filter (MF) interpretation of CNN classifiers accompanied by an experimental proof of concept using a carefully developed synthetic dataset. We exploit this interpretation to develop an MF CNN model for time series classification comprising a stack of a Conv1D layer followed by a GlobalMaxPooling layer acting as a typical MF for automated feature extraction and a fully connected layer with softmax activation for computing class probabilities. The presented interpretation enables developing superlight highly accurate classifier models that meet the tight requirements of edge inference. Edge inference is emerging research that addresses the latency, availability, privacy, and connectivity concerns of the commonly deployed cloud inference. The MF-based CNN model has been applied to the sensor-based human activity recognition (HAR) problem due to its significant importance in a broad range of applications. The UCI-HAR, WISDM-AR, and MotionSense datasets are used for model training and testing. The proposed classifier is tested and benchmarked on an android smartphone with average accuracy and F1 scores of 98% and 97%, respectively, which outperforms state-of-the-art HAR methods in terms of classification accuracy and run-time performance. The proposed model size is less than 150 KB, and the average inference time is less than 1 ms. The presented interpretation helps develop a better understanding of CNN operation and decision mechanisms. The proposed model is distinguished from related work by jointly featuring interpretability, high accuracy, and low computational cost, enabling its ready deployment on a wide set of mobile devices for a broad range of applications.
APA, Harvard, Vancouver, ISO, and other styles
45

Sugiarto, Indar, Doddy Prayogo, Henry Palit, et al. "Custom Built of Smart Computing Platform for Supporting Optimization Methods and Artificial Intelligence Research." Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences 58, S (2021): 59–64. http://dx.doi.org/10.53560/ppasa(58-sp1)733.

Full text
Abstract:
This paper describes a prototype of a computing platform dedicated to artificial intelligence explorations. The platform, dubbed as PakCarik, is essentially a high throughput computing platform with GPU (graphics processing units) acceleration. PakCarik is an Indonesian acronym for Platform Komputasi Cerdas Ramah Industri Kreatif, which can be translated as “Creative Industry friendly Intelligence Computing Platform”. This platform aims to provide complete development and production environment for AI-based projects, especially to those that rely on machine learning and multiobjective optimization paradigms. The method for constructing PakCarik was based on a computer hardware assembling technique that uses commercial off-the-shelf hardware and was tested on several AI-related application scenarios. The testing methods in this experiment include: high-performance lapack (HPL) benchmarking, message passing interface (MPI) benchmarking, and TensorFlow (TF) benchmarking. From the experiment, the authors can observe that PakCarik's performance is quite similar to the commonly used cloud computing services such as Google Compute Engine and Amazon EC2, even though falls a bit behind the dedicated AI platform such as Nvidia DGX-1 used in the benchmarking experiment. Its maximum computing performance was measured at 326 Gflops. The authors conclude that PakCarik is ready to be deployed in real-world applications and it can be made even more powerful by adding more GPU cards in it.
APA, Harvard, Vancouver, ISO, and other styles
46

Swati, V. Jadhao, and J. Bhiwani R. "A Review: Robotic Car Based Motion Control System Using Internet of Things." Research and Applications: Emerging Technologies 4, no. 1 (2022): 1–8. https://doi.org/10.5281/zenodo.6477464.

Full text
Abstract:
<em>Control is an interesting field that has burst with new technologies, bringing the Internet of Things (IoT) concept to life. This paper presents a multiple motion control method for a robotic car that uses the Raspberry Pi as the master and the Arduino UNO as the slave. The controlling software uniquely identifies each device, which is the essential principle of IoT. The client can control the car&#39;s operations from afar through the internet using voice commands and a Universal Windows application, as well as receive data and feedback. The key contribution of this work is that it takes use of the robot&#39;s motion control system&#39;s efficiency by allowing the robotic car to receive direct commands from numerous sources at the same time, making the navigating system more efficient. It is not necessary for both the device and the client to be online at the same time. The commands and data are saved in the cloud and delivered when the device is ready to accept them. The car is equipped with a GPS system, allowing customers to track it. For avoiding impediments in its route, the device features an ultrasonic distance sensor. We show how to drive the car using commands and applications, as well as the architecture and design of the Raspberry Pi and Arduino connection software.</em> &nbsp;
APA, Harvard, Vancouver, ISO, and other styles
47

Sutiyono, Akhmad, and Tommy Hastomo. "Zoom Conference: A Study of Students' Perception on the Academic Achievement during COVID-19 Pandemic." English Education: Jurnal Tadris Bahasa Inggris 15, no. 2 (2022): 193–205. http://dx.doi.org/10.24042/ee-jtbi.v15i2.13539.

Full text
Abstract:
In the pandemic era of Covid-19, the students must study from home through online platform. One of many new platforms used by the students during such pandemic era of Covid-19 was Zoom. Zoom is a cloud based application for video conference. Consequently, as one of many schools that cannot conduct offline learning, STKIP PGRI Bandar Lampung also used online learning. This research wanted to understand how online learning affected the STKIP PGRI Bandar Lampung students, regarding their academix achievement. The researchers used Cluster Random Sampling as a sampling technique to get the research sample. This research used questionnaires to collect the data. The questionnaires were given to and answered by 23 students from the second semester in STKIP PGRI Bandar Lampung. SPSS, consistency analysis, static analysis, and regression analysis were used as data collection technique and analysis. The results showed that Zoom can be used as an alternative educational platform, and this platform was an appropriate educational media at STKIP PGRI Bandar Lampung. The researchers concluded that STKIP PGRI Bandar Lampung students had a clear understanding and were ready to learn English using Zoom in the pandemic Covid-19 era
APA, Harvard, Vancouver, ISO, and other styles
48

Hairil Akbar, Sarman, and Muhammad Ichsan Hadiansyah. "Edukasi Tips Memilih, Mengolah, dan Menyajikan Makanan yang Aman pada Mahasiswa STIKES Graha Medika Secara Daring Menggunakan Aplikasi Zoom Cloud Meetings." Jurnal Pengabdian UntukMu NegeRI 5, no. 1 (2021): 12–16. http://dx.doi.org/10.37859/jpumri.v5i1.2212.

Full text
Abstract:
Efforts to achieve Indonesian citizen with quality are closely related to food and nutrition factors. Fulfillment of food and nutrition adequacy can be seen from the level of food provided and the quality and diversity of food and nutrition available. Approximately 70% of cases of food poisoning in the world are caused by ready-to-eat food, namely processed food, especially by catering businesses, restaurants, canteens, restaurants, or street food. Food poisoning is usually caused by the food being contaminated with bacteria or microbes. The purpose of this community service is to increase students' knowledge and understanding regarding selecting, processing, and serving safe food. Methods used consisted of counseling and health education on tips for selecting, processing, and serving food using the zoom cloud meeting application, with the target of Graha Medika Kotamobagu Health Institute students. The activity was held on Monday, October 12, 2020. The results of the community service activities showed that of the 34 students who participated in the activity, 80% of students knew and could mention tips on choosing, processing, and serving safe food. The implementation of social service is very important to increase knowledge in selecting, processing and serving food that is safe for consumption.
APA, Harvard, Vancouver, ISO, and other styles
49

Alfirna Rizqi Lahitani, Adkhan Sholeh, and Eriksa Gutama. "Cybersecurity Issues in ASEAN Country for Society 5.0: Bibliometric Analysis on Scopus Databases." International Journal of Politic, Public Policy and Environmental Issues 3, no. 1 (2023): 31–38. https://doi.org/10.53622/ij3pei.v3i1.200.

Full text
Abstract:
Implementation of Society 5.0 was adopted in various countries, including ASEAN. The abbreviation of ASEAN is the Association of Southeast Asian Nations with a total of ten member countries, mainly to promote regional peace and security. The development of decentralized data and communication that has spread across various media and channels has had a positive impact considering ASEAN's role as a link for many investors in various lines such as banking, transportation, e-commerce, telecommunications, and shipping, but it has also raised new concerns about cybercrime. Without supervision, government data including confidential information can be stolen due to cybercrime. It can be a threat to countries that are the target of terrorist attacks or wars through cyberattacks. Cyber security is a concern, without monitoring, the potential for cyberattacks and crimes will become a threat at any time. This study will analyze the development of cybersecurity in ASEAN countries in the Society 5.0 era using a bibliometric approach on several studies in Scopus indexed journals. The research phase begins with data collection using the Publish or Perish (PoP) application, data processing using the Mendeley and Ms. applications. Excel with the aim of selection so that the data is ready to be processed, then analyzed with the VOSviewer application. Based on the results of network visualization analysis, it was found that the keywords that appear the most in each cluster are: ‘ASEAN-civil society', cloud-storage', 'attack-cyberspace-defense', and 'big-data'. This cluster represents the "research stream" of cybersecurity and society. The keywords that appear are based on co-occurrence. The results of the analysis are expected to provide an overview of the latest research themes in the field of cybersecurity and international relations.
APA, Harvard, Vancouver, ISO, and other styles
50

МІХАЛЕВCЬКИЙ, ВІТАЛІЙ, ТЕТЯНА СКРИПНИК та МАРІЯ ТИМЧУК. "СИСТЕМА ПЕРЕВЕЗЕННЯ ЗАМОВЛЕНЬ ПОВІТРЯНИМИ ТРАНСПОРТНИМИ ОДИНИЦЯМИ (ДРОНАМИ) У ДИНАМІЧНІЙ МЕРЕЖІ". Herald of Khmelnytskyi National University. Technical sciences 343, № 6(1) (2024): 333–39. https://doi.org/10.31891/2307-5732-2024-343-6-50.

Full text
Abstract:
The article proposes an approach to the transportation of orders by air transport units (drones) in a dynamic network. The issue of using drones as transport units in the logistics sector is becoming more important every year. The growth of technology forces various types of enterprises and organizations to engage in the use of modern information and technical support in order to meet the needs of their enterprise and compete with their opponents. Therefore, one of the next steps in transport logistics may be the use of drones and accompanying software for their management. The idea of ​​implementing air delivery of orders is currently only at the stage of formation and its successful application depends on a list of factors, one of which is the use of software for optimal system operation. The principle of operation is as follows: the company provides an open API service for creating a delivery request both by an ordinary user through an application, website or physical branch, and for entrepreneurs and companies to integrate the API with their service. The logistics system assumes the presence of centers, where each has a certain number of vehicles (drones), their current unit ready for work, maximum and involved in the work quantity. The direction of practical use of the developed method and tools is the automation of the selection of the optimal order delivery route in a dynamic network based on cloud technologies.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!