3 resultados para pervasive computing

em Dalarna University College Electronic Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cloud computing innebär användning av datorresurser som är tillgängliga via ett nätverk, oftast Internet och är ett omrÃ¥de som har vuxit fram i snabb takt under de senaste Ã¥ren. Allt fler fÃretag migrerar hela eller delar av sin verksamhet till molnet. Sogeti i Borlänge har behov av att migrera sina utvecklingsmiljÃer till en molntjänst dÃ¥ drift och underhÃ¥ll av dessa är kostsamma och tidsÃdande. Som Microsoftpartners vill Sogeti använda Microsoft tjänst fÃr cloud computing, Windows Azure, fÃr detta syfte. Migration till molnet är ett nytt omrÃ¥de fÃr Sogeti och de har inga beskrivningar fÃr hur en sÃ¥dan process gÃ¥r till. VÃ¥rt uppdrag var att utveckla ett tillvägagÃ¥ngssätt fÃr migration av en IT-lÃsning till molnet. En del av uppdraget blev dÃ¥ att kartlägga cloud computing, dess bestÃ¥ndsdelar samt vilka fÃr- och nackdelar som finns, vilket har gjort att vi har fÃ¥tt grundläggande kunskap i ämnet. FÃr att utveckla ett tillvägagÃ¥ngssätt fÃr migration har vi utfÃrt flera migrationer av virtuella maskiner till Windows Azure och utifrÃ¥n dessa migrationer, litteraturstudier och intervjuer dragit slutsatser som mynnat ut i ett generellt tillvägagÃ¥ngssätt fÃr migration till molnet. Resultatet har visat att det är svÃ¥rt att gÃra en generell men samtidigt detaljerad beskrivning Ãver ett tillvägagÃ¥ngssätt fÃr migration, dÃ¥ scenariot ser olika ut beroende pÃ¥ vad som ska migreras och vilken typ av molntjänst som används. Vi har dock utifrÃ¥n vÃ¥ra erfarenheter frÃ¥n vÃ¥ra migrationer, tillsammans med litteraturstudier, dokumentstudier och intervjuer lyft vÃ¥r kunskap till en generell nivÃ¥. FrÃ¥n denna kunskap har vi sammanställt ett generellt tillvägagÃ¥ngssätt med stÃrre fokus pÃ¥ de fÃrberedande aktiviteter som en organisation bÃr genomfÃra innan migration. VÃ¥ra studier har även resulterat i en fÃrdjupad beskrivning av cloud computing. I vÃ¥r studie har vi inte sett att nÃ¥gon tidigare har beskrivit kritiska framgÃ¥ngsfaktorer i samband med cloud computing. I vÃ¥rt empiriska arbete har vi dock identifierat tre kritiska framgÃ¥ngsfaktorer fÃr cloud computing och i och med detta täckt upp en del av kunskapsgapet där emellan.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Learning from anywhere anytime is a contemporary phenomenon in the field of education that is thought to be flexible, time and cost saving. The phenomenon is evident in the way computer technology mediates knowledge processes among learners. Computer technology is however, in some instances, faulted. There are studies that highlight drawbacks of computer technology use in learning. In this study we aimed at conducting a SWOT analysis on ubiquitous computing and computer-mediated social interaction and their affect on education. Students and teachers were interviewed on the mentioned concepts using focus group interviews. Our contribution in this study is, identifying what teachers and students perceive to be the strength, weaknesses, opportunities and threats of ubiquitous computing and computer-mediated social interaction in education. We also relate the findings with literature and present a common understanding on the SWOT of these concepts. Results show positive perceptions. Respondents revealed that ubiquitous computing and computer-mediated social interaction are important in their education due to advantages such as flexibility, efficiency in terms of cost and time, ability to acquire computer skills. Nevertheless disadvantages where also mentioned for example health effects, privacy and security issues, noise in the learning environment, to mention but a few. This paper gives suggestions on how to overcome threats mentioned.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of personâs physiological or behavioral characteristics, it enables authentication of a personâs identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.