سال انتشار: ۱۳۹۱
محل انتشار: کنفرانس بین المللی مدل سازی غیر خطی و بهینه سازی
تعداد صفحات: ۶
Mohammad Abedi, – Department of Electrical Engineering and Computer Science at Iran University of Science and Technology
Mehdi Darbandi –
The term Cloud has become commonplace in discussions on IT provision but what is actually meant by the Cloud? In crude terms it can betaken to mean any computing provision provided by anexternal supplier over a network − this could be simple external hosting of an application, could be use ofexternal services for a particular task, or it could be something rather more complicated, which allows an organization to grow and contract the resources it usesaccording to business needs. EDUCAUSE, UCISA’s sister organization in the US, gives a useful definition:Cloud computing is the delivery of scalable IT resources over the Internet, as opposed to hosting and operating those resources locally, such as on a college or universitynetwork. Those resources can include applications and services, as well as the infrastructure on which they operate. Therefore, external hosting of your virtual learning environment is a cloud provision where the application is delivered over the Internet, using anapplication such as salesforce.com would be an exampleof a service, and use of Amazon’s service for computing resources an example of infrastructure. There arevarious categories and terms used regarding cloud computing; many companies that are considering adopting cloud computing raise concerns over the security of data being stored and accessed via the internet. What a lot of people don’t realize is that goodvendors adhere to strict privacy policies andsophisticated security measures, with data encryption being one example of this. Companies can choose toencrypt data before even storing it on a third-party provider’s servers. As a result, many cloud-computing vendors offer greater data security and confidentialitythan companies that choose to store their data in-house. However, not all vendors will offer the same level of security. It is recommended that anyone with concerns over security and access should research vendors’ policies before using their services. In this paper, at firstwe consider significant influences of this technology on some of the biggest companies and organizations all over the world, after that we present simple definitions ofKalman-Bucy filter, after simple definition we present its principle mathematical relations and finally we demonstrate our idea by enough mathematic proofs.With use of this filter we are able to estimate an predict the presence of hackers or spyware actions , and alsowe’re able to estimate and predict which part of cloud resources were used more than others or even estimate the peak hour of such networks or estimate and predictthe next profile or page that the user may used in the next time step; so that by knowing such information we’re able to implement and construct our databases more precisely.