predicting keen and eagerness of users to new emerging application on a cloud platforms and...
TRANSCRIPT
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
1/10
Predicting keen and eagerness of users to new emerging application
on a cloud platforms and enhancing passive defense reliability on
such networks via Kalman filtering with a relationship to recursive
Bayesian estimation
Jalal Nakhaei1*, Mehdi Darbandi
2
Department of Art and Architecture, Science and Research Branch Islamic Azad University; Tehran, Iran
Department of Electrical Engineering and Computer Science at Iran University of Science and Technology
(IUST); Tehran, Iran
(*Corresponding Author: Jalal Nakhaei)
Abstract Before the invention of computers if you want tofind and use special information about something, you should
physically go to libraries and if youre luck and found yourinterested textbooks, you can find out something about that
subject, this method has several negative points, such as, itconsumes more of your time and your energy and even you
may find nothing. But with the advent of computers and use ofelectronic versions of books and magazines you can find about
your interested topic in a jiffy. Even with use of social andcommunicational networks such as Cloud Computing you
can read other suggestions and opinions about your interested
topic, even you can establish new workgroup through such
networks and work on a specific project simultaneously from
anywhere. Information Technology (IT) world which isbecame one of the vial necessities in current era, face with lots
of revolutions and fundamental changes through this century.
According to these changes, necessity to security of
information, fast and agility in processing, dynamic accessing,has improved. Only concern of users and organizations is
about security of information on cloud computing resources.
For satisfying such important concern, all scientists and
organizations all over the world do their bests to release newstandards and also develop other standards about accessing to
the information and using of them. The only purpose of all
research papers and standards is to increase the security levelof cloud computing. In each paper, each researcher introducesnew methods in intensifying security of such networks. They
applying evolutionary algorithms or using track and trace
methods or even using intelligence methods for detecting and
eliminating hazardous actions. Some of them have several
positive points and some of them are not practical at all. In
this paper, at first we tell about cloud computing we
define it completely and discuss about all aspects of this
new generation of internet after that when we
understand about all of its concepts, a brief review about
different uses of cloud computing on different industries
and technologies were present. In the next section by the
knowing of whole concepts and key features of this
network and also by knowing the critical uses of this
network on different industries we introduce KalmanFilter with relationship to recursive Bayesian estimation;
which can be used for estimation and prediction of
different parameters in such network. For example, we
can use this for estimation and prediction about
permeating of hackers or for predicting the amount of
users that will use special part of our network in a
particular period of time or by tracking and tracing the
packets or even users. By performing such activities
were able to eliminate malicious and spyware
treatments from the beginning points of our network.
Keywords- Computer era, Cloud computing,evolutionary algorithms, Kalman filtering.
I.
INTRODUCTIONToday all peoples all around the world hear the Cloud
Computing term several times, but only few peoples
comprehend what it means and what features does it
has. One general description about Cloud Computing
is: it provides comprehensive processing and storage
power without any restrictions according to network
demand. In fact if you use one software that is
provided by the web software supporters such as
Amazon, Google and other well-known companies
you use Cloud Computing. Today, most of the
applications that are presented use cloud computing
powers directly or indirectly, as such applications we
can tell about Dropbox, Google Docs. When youconnect and use one of these services, in fact you use
the power of some gigantic servers that are shared for
use. In fact, Cloud Computing technology was existing
for several years, but we dont pay enough attention to
it and the services that it provides. This technology,
paves the way for migrating from old and huge
datacenters into new generation of data-processors and
data-storages. The reason for using Cloud in the
term of Cloud Computing is because of its
architecture, because we dont have any information
about its architecture or its location and amount of
powers. With use of Cloud Computing, we can access
to all of information and processes that we wants,without using of special peripheral devices. The best
example for this feature is Dropbox, which enable
users all around the world to access their information
without any limitations. For example, suppose you are
a business man and all the times you are in travel and
you cant use traditional servers, because you wants to
constantly check your accounts or check the status of
your offices and buys and/or sells. But by the means of
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 16
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
2/10
Cloud Computing, without any restrictions just with
having one broadband internet connection, you can
check all of your necessities even from your smart
phone. The reason for using cloud computing is, all the
data and information are in the web and all the time we
connect to it and use the information or data that we
wants, but if someone wants to connect to it through
his/her smart mobile phone and his/her mobile phone
didnt has enough processing and storage power, thenwhat he/she should done? The answer of this question
led us to new generation of communicational and
computational networks which is known as Cloud
Computing. In cloud computing there isnt any
obligation in updating your software or hardware
according to progress of this technology in daily
industries. Only you should have one device that
allowed you to connect to internet after that with the
use of powers which provided by the servers that are
located in clouds you can use all of the software or do
anything that you want. As an example, suppose you
are a university student and you should present a new
presentation in your university but you forget to bringyour laptop with yourself, so your presentation will
cancel and all of your researches and studies were loss;
but suppose youre one of the Cloud Computing users,
if you forgot to bring your laptop with yourself you
connect to your account through your mobile phone or
your friends laptop, and through your account you
access to your information about your presentation;
even if you prefer your presentation files several days
ago before your presentation you can use Cloud
Computing to share your project files and ask other
people around the world to develop your project by the
means of their ideas.
Also, another prominent feature of cloud computing is,if you use traditional systems and servers if your
systems are crashed or they faced with some problems,
your data were lost; but if you use cloud computing as
your host or platform of your networks you has very
reliable and secure space of working. Because, even if
your systems are crash, your data arent lost, because
your data are saved and storage in clouds. Also,
according to the latest news which are released from
Amazon Company, service providers of cloud
computing are using double servers, one as an active
server and the other as passive server. Therefore, this
feature ensures you about locating of your information
on cloud resources. Because even if, one server face
with any problem such as crashing or hacking, other
servers can satisfy your needs. So, in these days,
because of users rarely get backup from their
information maybe they dont have enough storage
capacity or they didnt pay enough attention to this
important parameter this feature is very important
feature for all of the users.
Another important feature of such network is remote
accessing. Consider you are one of the staff of a big
company, and you want to access to your work profiles
from your home or even you are in the mission and
you need to access your profile. Just with use of cloud
computing you can provide such feature and ability for
all of your employees. Even they can become in some
working groups and then each group works on a
definite and special projects. With use of cloudcomputing they can do such tasks very easily and
without any problem, because in such networks the
distance dimension doesnt has enough impact of the
workability of group. Because workers can connect to
their profile whenever and from every place that they
are. They work simultaneously on projects and see all
modifications that are made by other users at the same
time.
Another important function of this network is its
updated software and hardware and everything that
you need. Thats because of the kernel of these
networks are on the internet. And all the software and
applications that you use in your system are becameupdated all the time. So these features increment your
security and viability.
Because, organizations and users when migrate to
cloud computing platforms use the resources and
powers that provide by cloud computing you didnt
need to update your system hardware and software.
They updated all the time and simultaneously without
any more charges or restrictions. This feature is
gigantic and impressive feature for all of the users of
computers and servers, because updating software or
hardware of the system cause additional charges for
traditional system users. But suppose you use cloud
platforms as your system power providers, without anylimitations, even with your pocket PC or you mobile
smart phone, you can connect to these networks and
use even the power of supercomputers. For example,
Mathwork MATLAB Corp. design new version of
their MATLAB software based on cloud resources,
with this prominent feature users can connect to such
networks with their mobile phones, and use the
features that are need high processing power, in these
days we cant easily access to kind of mobile phones
that are provide such power and even if you find such
mobile phone it has very invaluable price and most of
the users cant afford such high costs, in addition, by
the updating of such software form their
manufacturers, you should update the processing and
storage power of your phone or pocket PC, and most
of the users cannot afford such huge amount of
moneys. But with use of new generation of
communicational and computational networks, you
can login to your account in cloud computing without
any limitation, you didnt need pay additional charges
for updating your software or hardware platform, just
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 17
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
3/10
you login to your profile you access to the latest
versions of software and hardware. This important
parameter is very useful and reliable feature. Suppose
youre an engineer that need to access the latest
version of special software that you want, by the
means of cloud computing, you can access to this
important feature without any additional charges. This
feature is so prominent for organizations or users who
are need the latest versions of Antivirus and secure-provider software, because of their works they need
more and reliable protection over their systems. With
use of cloud computing they have this important
feature.
The law requires certainty and although cloud
providers usually present comprehensive contract
terms of service, many terms and conditions include
wide-ranging disclaimers of liability. Also, they may
not provide a warranty that the service will operate as
described, or indeed at all. It is likely that as the cloud
market expands and matures, terms of service will
evolve to more closely represent what institutions
require and how the law operates. In the mean time,the following points may be useful to bear in mind
when examining cloud computing terms and
conditions:
Many cloud services are offered under the laws ofUS states and subject to terms that purport to
restrict legal disputes to the courts of those states.
Clearly entering into a contract that is governed by
the relevant UK legal system will simplify
obtaining advice and provide for more local
resolution of disputes.
When planning to use a cloud-based solution forbackup of important data, particular note should betaken of terms by which a cloud provider advises
or requires customers separately to backup data
placed on their cloud service (in other words,
where the proposed backup solution itself
disclaims responsibility for being a reliable
backup).
Many cloud providers will seek to exclude, as faras possible under the legal system applying to the
contract, any warranty of service or acceptance of
liability. Such liability as cannot be disclaimed
altogether will typically be strictly limited.
Where the institution has contractually committedto safeguard licensed educational resources, forexample, it will be necessary to obtain warranties
from cloud providers that host these resources on
their behalf. The service provider should provide
assurances that best efforts will be made to prevent
access by unlicensed users and to prevent any
unauthorised usage of the licensed resources.
The responsibility to bind users to acceptable use
remains for IT directors even when learners are not
strictly using the institutions infrastructure to interact
and to publish information. Responsibilities such as
the prevention of bullying by means of the institutions
technology systems will continue to be addressed with
terms of acceptable use for users. In many cases, the
cloud infrastructure will be invisible to learners and
where learners sign up to external cloud providers onthe instruction of the institution, it will be necessary to
ensure that they agree to use the service responsibility
with the sanction that service can be withdrawn by the
institution. As a JANET User Organisation the
institution is bound by the JANET Acceptable Use
Policy which defines acceptable and unacceptable use.
The agreement requires the User Organisation to
bind users to acceptable use by means of terms and
conditions. While users may increasingly be using
computing infrastructure that is cloud based, it is
apparent that acceptable use of institution provided
facilities must still be regulated by means of terms and
conditions that bind the user.The Computer Misuse Act 1990 (CMA) criminalises
unauthorised access to any program or data held on a
computer. Clearly this extends to unauthorised access
to information that a cloud provider hosts on behalf of
the institution. For IT professionals the security
hierarchy has to be extended to embrace cloud based
activities as well as interaction with cloud hosted data.
At the operational level, what is acceptable use
should be strictly enforced and a culture of legal use
predominant.
There are three distinct types of information which law
enforcement agencies may require an FE or HE
institution to disclose:
Communications data - information associated withbut not including the actual content of a
communication. Includes email addresses and
telephone numbers (sender and recipient). An
itemised telephone bill is a good example
Keys to access protected or encrypted information -most likely information recovered by an
interception but which is encoded
Content - e.g. the actual content of a message sentby email, or a telephone conversation.
These obligations remain for FE and HE institutions
irrespective of the type of infrastructure being used,cloud or otherwise.
By far the most common request made by the police is
to identify an individual user or to provide information
about their online activity. Information about
communications and the individuals who made them
(e.g. the identity of users of a particular email or IP
address, when they logged in and to whom they sent e-
mails), but not including the content of any files or
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 18
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
4/10
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
5/10
between the institution and the cloud provider in order
to ensure compliance with the DPA.
One issue to be re-examined, for example, is the
matter of retention schedules. Your institution is
likely to have committed to and have in place practices
and procedures for records handling to enable disposal
and retention as required by various legal obligations.
How these retention schedules are complied with when
the data is hosted and processed remotely needs to beclarified.
Cloud providers are likely to store and move data
around multiple servers situated in a number of
jurisdictions which may very likely be outside the
European Economic Area (EEA). This can be a
breach of the Data Protection Act 1998 by the
institution unless there are adequate security measures
in place for personal data. Compliance may be
achieved if EU approved contract terms are used with
a cloud provider. Alternatively, if using a US based
cloud provider, ensuring that they are signed up to the
Safe Harbour provisions will be necessary.
The probability of the occurrence of serious data lossmay not be very high but should a loss occur the
impact on the institution is likely to be significant.
Dealing with the regulatory authorities is one aspect in
addition to restoring the confidence of staff and
learners in the ability of the institution to managing the
privacy and security of personal information.
One main reason for using cloud computing is to
enable the institution to use the cloud technology to
process information and thus generate outputs. In
doing so the institution may also generate know how
or trade secrets, which are not set out in any particular
information output but reside in the data structures or
processes which the institution establishes through itsuse of the cloud.
The cloud provider too, will be generating information
of various different types. Cloud providers will collect
information about the operation of their systems and
service for management purposes. Some of this
information will consist of know how or trade secrets
belonging to the service provider.
II. EVALUATING MICROSOFT PROGRAMSABOUT FUTURE OF CLOUD COMPUTING
As computers and the Internet play an increasinglyimportant part in peoples livesat work, at school,
and at homemaking technology accessible to people
with a wide range of abilities is an imperative.
Accessible technology makes it easier for people with
visual, dexterity, cognitive and speech needs to use
computers and other devices to communicate and
share information, access government services, and
secure and retain employment.
According to the United Nations Convention on
Persons with Disabilities, disability affects between 15
percent and 20 percent of the population in every
country worldwide, and the incidence of disability in
industrialized nations is increasing as their populations
get older. A Forrester Research Inc. study
commissioned by Microsoft found that 57 percent of
working-age computer users (1864 years old) would
likely benefit from accessible technology because ofdifficulties and impairments that affect their computer
use. As the population continues to age, the number of
computer users in the 6574 age range will increase
significantly, as will the number of people who would
benefit from accessible technology.
For more than 25 years, Microsoft has been at the
forefront of efforts to make computers and the Internet
more accessible. These efforts include:
Building accessibility options into Windows andother Microsoft products that let users personalize
the computer display, mouse, keyboard, sound, and
speech options. Working with AT companies to facilitate the
creation of software and hardware products such as
screen readers, magnifiers, and specialty keyboards
that enable individuals with significant vision,
hearing, dexterity, language or learning needs to
use computers.
Creating developer technologies and tools thatmake it easier to build AT products and accessible
applications that interoperate and work well
together.
Today, a vibrant worldwide ecosystem of accessible
technology tools, technologies, and solutions ishelping enable and empower millions of people of all
ages and abilities. However, as the technology
landscape continues to evolve, so too must the
building blocks that support this accessible technology
ecosystem.
Of particular significance is the rise of cloud
computing, which encompasses a major shift in how
technology will be used in the years ahead and what
people and organizations can do with it. In the simplest
terms, cloud computing represents the convergence of
smart Internet-connected devices, innovative software
applications, and data storage and services hosted on
the Internet. This convergence of hosted data storageand services, applications, and devices is sometimes
referred to as three screens and a cloud. (The three
screens being laptop or desktop computers,
smartphones, and TVs.)
Advances in client-based operating systems like
Windows 7 and applications like Microsoft Office
2010 are powering many of these devices with more
intuitive user interfaces and the ability to perform
increasingly complex computing functions, such as
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 20
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
6/10
data visualization and real-time simulation of 3D
environments. At the same time, development of large
data centers capable of storing huge volumes of data
and hosting a rapidly expanding universe of online
applications and services is opening new realms of
communication, collaboration, commerce, learning,
and entertainment. Microsoft Office 365, the cloud-
based version of Microsoft Office, utilizes the power
of these online capabilities to simplify sharing,collaboration and storage of Office documents,
spreadsheets and presentations. Microsoft also offers
many other online services, solutions, and platforms
that are enabling individuals, businesses, and
governments to take advantage of the convenience and
flexibility of the cloud. For individuals, the cloud has
the potential to offer seamless, on-demand access to
content, social networks, and online services across a
range of devices. For organizations, the cloud offers
the ability to dynamically scale IT capacity depending
on evolving needs, better manage spending on IT
infrastructure, and concentrate more resources on core
business functions.As these shifts pick up steam, Microsoft believes it is
important to expand the vision of an accessible
computing ecosystem to encompass technologies,
tools, products, and services that enable all people to
benefit from the cloud and to more easily control the
devices around them to live a more independent life.
As a starting point, people will always need a smart
client device with built-in accessibility capabilities to
serve as a gateway to the cloud and to perform tasks
offline or when no Internet access is available. When
browsing the Internet, accessing social networking
sites, or tapping into cloud services, users will use
applications or a web browser such as InternetExplorer to access and retrieve information. These
devices also enable individuals who may require AT
applications or specialty computing hardware that
enables text to be read, video to be captioned, or that
facilitates hands-free entry of information.
Over time, we envision a world of accessible, cloud-
connected devices powered by Microsoft technologies
that an individual can rely on to understand and
interpret their needs, preferences, and immediate
surroundings to create an adaptive experience. In
combination with reliable broadband connectivity and
the virtually unlimited computing power of the cloud,
it will be possible for these preferences to follow users
wherever they go and to supplement the capabilities of
any particular device in ways that increase
communication and collaboration and help reduce
social isolation at work and at home.
Microsofts commitment to creating an ecosystem of
accessible technologies runs deep, and includes
development of a number of core accessible
technology building blocks. In 2005, Microsoft User
Interface Automation (UI Automation) introduced a
new approach to exchanging information between
Windows applications, web content and ATs. UI
Automations unique approach allows application
developers to make their software compatible with AT
products such as screen readers for users with limited
sight and on-screen keyboards for users with limited
physical access. It also allows AT developers to design
their products to be forward compatible with futureversions of those applications. UI Automation is
supported across Microsofts popular development
frameworks, including Microsoft Silverlight, the .NET
Framework, Windows Presentation Foundation, and
other frameworks that have been in use for decades.
Developers use these frameworks to create interactive
user experiences, content, and video for the PC, web,
mobile devices, and the cloud.
Support for UI Automation was first added to
Microsoft Internet Explorer 8, and then significantly
expanded in Internet Explorer 9, released in early
2011. As developers increasingly embrace Internet
Explorer as a platform for deploying the latest HTML5cloud-based applications, support for UI Automation
in the browser will enable AT developers to make
richer, immersive web content and applications
accessible to people with disabilities. By extending
support for UI Automation across all its platforms
such as the Windows client and Windows server
operating systems, Internet Explorer, and Silverlight
Microsoft is ensuring that as the cloud evolves more of
its potential and power is accessible to people with
disabilities.
Two of the most promising areas of innovation to help
users tap the power of the cloud are speech recognition
and text-to-speech technology. Speech recognition(and commanding) technologies allow computers to
hear and understand human speech. This is an
important feature for people with hand or arm injuries,
paraplegia, or absence of fine motor control. Microsoft
has two primary investments in this area. Windows
Speech Recognition listens and reacts to spoken
commands, enabling a user to run applications and
interact with their Windows computer. For example, it
allows a user to dictate an e-mail, surf the web, or fill
out online forms by voice instead of with a keyboard
and mouse. Microsoft Tellme is a cloud-based speech
platform that enables speech recognition in a range of
Microsoft products, including Windows Phone 7,
Bing, Office, Exchange Server, and Office
Communications Server. It also allows developers of
third-party products to add speech recognition to their
solutions.
In Windows Phone 7, for example, speech recognition
technology supports phone dialing, navigation and
web search. The Windows Phone 7.5 update extended
this to also include dictating and sending a text
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 21
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
7/10
message and advanced phone functions, such as call
forwarding, redial and contact list. The Bing for
Mobile search engineavailable as an application for
many web-enabled phones or as a web page accessible
from a mobile phone browserlets users speak a
search term instead of typing it. Similarly, speech
recognition technology in Kinectan add-on
peripheral for the Xbox 360 game consolelets
individuals use voice commands to have live videochats, play music and videos, and watch thousands of
live and on-demand ESPN sporting events without
ever using a game controller. Tellmes cloud-based
platform analyzes billions of speech interactions to
improve the underlying speech recognition engine and
better understand a users intent. The more you use it,
the more it learns and more accurate it becomes.
Text-to-speech (TTS) technologyalso known as
speech synthesisenables computers to talk. This
capability is used in screen readers for people who are
blind, reading aids for people with reading disabilities,
and as a synthetic voice for people who are unable to
speak. Microsoft has three key investments in TTS:speech engines installed in the Windows operating
system, available as a cloud service, and integrated
into specific applications. The cloud service and
installed speech engines offer value for assistive
technology vendors building accessibility solutions.
One example of TTS in the cloud is through the Bing
Translator, where a consumer can type a phrase, have
it translated into one of 18 languages and have the
resulting phrase read aloud. For people with visual
impairments or reading disabilities, the TTS engine in
Windows 7 powers a screen reader called Narrator,
which reads on-screen text aloud and can help the user
navigate the interface without seeing the screen. It alsodrives the Speak feature in Office 2010, which enables
a computer to play back written text as spoken words.
Lync 2010, Microsofts newest unified
communications tool, uses TTS technology so users
can more easily connect, communicate, and share
information in the cloud. For instance, incoming
instant messages and other communications requests
can be read out by a screen reader and accompanied by
audio cues. Notifications are also read out as they
appear.
Just as the cloud itself is a work in progress, so, too,
are Microsofts efforts to enable the cloud for people
of all abilities. As we continue to invest in building a
more seamless cloud-based spectrum of solutions, we
will also back the contributions of other developers of
accessible products, services, and content. We believe
that a healthy, market-driven ecosystem comprised of
many products, business models, and development
philosophies is the fastest route to achieving a more
accessible cloud.
Many different approaches are represented in the
current ecosystem, and Microsoft supports many of
them. For example, Microsoft is working in
partnership with an organization called LucyTech and
with government organizations worldwide to pilot a
commercially-viable model for cloud-based
accessibility solutions, which will be made available at
little or no cost to consumers. Although LucyTech will
build on existing cloud, platform, and applicationinvestments, it is pushing the boundaries of existing
technologies and cloud infrastructure and will include
some new cloud-based service offerings to fill critical
gaps. It is a distributed accessibility solution with the
promise to provide globally available AT solutions.
Another international effort we support is the Global
Public Inclusive Infrastructure (GPII). The goal of
GPII is to increase awareness of the existing
accessibility infrastructure (such as APIs, operating
system features, and tools) and accelerate development
of new accessibility building blocks that make the
benefits of the cloud more easily available to
everyone. Participants in the GPII process agree that aclient device and associated operating system form the
foundation of accessibility solutions and are the first
line of functionality that people will use. There also is
a shared understanding that cloud-based services offer
significant opportunities to complement and extend
those built-in capabilities to create new and better
customer-ready features. For example, a fully-
developed accessible cloud infrastructure would
enable people who cannot use standard interfaces and
content to use a broadband connection to invoke the
interface adoptions they need, automatically, on any
device, anywhere and anytime. The GPII vision aligns
with Microsofts long-standing desire for an adaptivecomputing environment. In some respects, GPII is
helping clarify the vision and need for better cloud-
connected accessibility products and services, while
the LucyTech project is focusing on the development
and delivery of a working solution that fully utilizes
existing Microsoft cloud technologies, services, and
commercial AT products to realize this vision.
Microsoft sees value in both projects, so is
participating in and supporting both efforts.
Governments around the world are increasingly aware
of the enormous potential of cloud computing to
benefit citizens and society. Microsoft has developed a
set of policy principles to support its commitment to
both digital inclusion and to the cloud. Microsoft
believes these principles are at the core of effective
policy frameworks for accessibility and the cloud, and
will encourage the widespread development and
implementation of accessible technologies, products,
programs, and services. These policies include:
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 22
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
8/10
Harmonizing International Standards and
Procurement Approaches: Market-led, globallyharmonized standards and the procurement policies
that reference them are the foundation of accessible
and interoperable IT products and cloud services.
Globally-harmonized standards bring major
advantages to both business and individual users of
accessible technology. Because the speed of
innovation in the IT sector can outpace legislativemeasures put in place to encourage accessibility and
promote cloud services, Microsoft believes it is
important that globally harmonized standards
constitute the basis of product development.
Promoting Effective Conformance: Accessible
technology can be advanced most effectively by
minimizing undue regulatory burden. When standards
for cloud and accessibility are referenced in
government procurement policies, Microsoft supports
effective and rigorous conformance mechanisms that
provide adequate assurance of compliance, encourage
innovation, and promote consumer choice. One suchexample is the voluntary supplier declaration of
accessibility, as defined in the ISO/IEC 17050
standard and used in a number of countries around the
world.
Promoting Interoperability: Interoperability iscrucial to creating an accessible cloud computing
environment for users with a broad range of abilities. It
is a key feature of Microsoft accessible technologies
and we advocate for public policies that allow a
variety of complementary ways to achieve it. We
believe that governments should not engineer
interoperability by prescribing specific approaches andexcluding others, but instead should allow IT vendors
and purchasers to use the solutions that best suit their
needs. AT/IT interoperability standards such as ISO
13066 will help ensure that vendors cloud-ready
technologies are also interoperable with assistive
technology. Aligning user needs with a dynamic and
growing array of devices, technology platforms,
development tools, assistive technologies, and services
is a complex challenge that will require industry-wide
innovation and collaboration, appropriate government
policies, and the active involvement of the disability
community.
Ensuring Technology Neutrality: Technology-neutral policies promote innovation, eliminate barriers
to trade and market access, enhance competition, and
prevent bias in government procurement. Microsoft
believes that a flexible cloud policy approach based on
a commitment to technology neutrality and choice is
particularly appropriate in the rapidly evolving IT
environment. Customers and governments today
increasingly rely on a combination of proprietary and
open source software, as well as on open standards and
proprietary standards, to develop accessibility
solutions. By encouraging choice, governments will
enable the broadest possible array of solutions for
people with disabilities and drive down the cost of
building accessible mainstream products.
Enhancing the Ecosystem: In order for technology
companies to invest in and develop accessible cloudsolutions, they must understand user needs and be
confident that there will be a market for such solutions.
Today, the accessible technology PC ecosystem is a
vibrant and healthy collection of more than 350
products that offer tremendous customer benefit.
Assistive technologies for the cloud will require
similar breadth and depth. Microsoft believes that
governments should take steps to ensure accessibility
is not undermined by cloud policies that put the
existing AT ecosystem at risk or that diminish the
ability of entrepreneurs to continue serving the
disability community.
III.KALMAN FILTER WITH A RELATIONSHIPTO THE RECURSIVE BAYESIAN
ESIMATION:
The Kalman filter can be considered to be one of the
simplest dynamic Bayesian networks. The Kalman
filter calculates estimates of the true values of
measurements recursively over time using incoming
measurements and a mathematical process model.
Similarly, recursive Bayesian estimation calculates
estimates of an unknown probability density function
(PDF) recursively over time using incomingmeasurements and a mathematical process model (for
example in this place it means model of cloud
resources). In recursive Bayesian estimation, the true
state is assumed to be an unobserved Markov process,
and the measurements are the observed states of a
hidden Markov model (HMM).
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 23
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
9/10
Because of the Markov assumption, the true state is
conditionally independent of all earlier states given the
immediately previous state.
Similarly the measurement at the k-th time-step is
dependent only upon the current state and is
conditionally independent of all other states given thecurrent state.
Using these assumptions the probability distribution
over all states of the hidden Markov model can be
written simply as:
However, when the Kalman filter is used to estimate
the state x, the probability distribution of interest is
that associated with the current states conditioned on
the measurements up to the current time-step. This is
achieved by marginalizing out the previous states and
dividing by the probability of the measurement set.
This leads to predictand update steps of the Kalman
filter written probabilistically. The probability
distribution associated with the predicted state is the
sum (integral) of the products of the probability
distribution associated with the transition from the (k-
1)-th time-step to the k-th and the probability
distribution associated with the previous state, over all
possible .
The measurement set up to time tis:
The probability distribution of the update is
proportional to the product of the measurement
likelihood and the predicted state.
The denominator:
is a normalization term.
The remaining probability density functions are:
Note that the PDF at the previous time-step is
inductively assumed to be the estimated state and
covariance. This is justified because, as an optimal
estimator, the Kalman filter makes best use of the
measurements; therefore the PDF for given themeasurements is the Kalman filter estimate.
IV. CONCLUSIONOrdering of these paper consist of an abstract which is
provide brief research about definition of cloud
computing and obligations to migrate to such
comprehensive network, also in this section authors of
paper tell briefly about new methods which can be
used for incrementing the security and reliability
levels of such network. After that a reader can read
introduction, which is include basic definitions of
cloud computing and the necessity of availability ofsuch network in these days. After that, in the next
section, a discussion about Microsoft programs about
using of cloud computings on his prospect products
were present. By studying this section, reader acquire
general perception about future of cloud computing,
because in this section programs of the king of
computer industry Microsoft Corp. were explain.
After studying these sections and understand about all
aspects and necessities of such network, using of one
evolutionary algorithm on cloud computing for the
purpose of gaining more security and liability were
discuss.
REFERENCES:[1] Mehdi Darbandi Applying Kalman Filtering in
solving SSM estimation problem by the means of
EM algorithm with considering a practical
example; published by the Journal of Computing
Springer, 2012; USA.
[2] Mehdi Darbandi; Comparison betweenmiscellaneous platforms that present for cloud
computing and accreting the security of these
platforms by new filter; published by the Journal
of Computing Springer, 2012; USA.[3] Mehdi Darbandi; New and novel technique in
designing electromagnetic filter for eliminating
EMI radiations and optimization performances;
published by the Journal of Computing - Springer,
2012; USA.
[4] Mehdi Darbandi; Appraising the role of cloudcomputing in daily life and presenting new
solutions for stabilization of this technology;
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 24
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617
-
7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive
10/10
published by the Journal of Computing - Springer,
2012; USA.
[5] Mehdi Darbandi; Cloud Computing make arevolution in economy and Information
Technology; published by the Journal of
Computing - Springer, 2012; USA.
[6] Mehdi Darbandi; Considering the high impact ofgettering of silicon on fabrication of wafer
designing and optimize the designing with newinnovative solutions; published by the Journal of
Computing Springer, 2012; USA.
[7] Mehdi Darbandi; Developing concept ofelectromagnetic filter design by considering new
parameters and use of mathematical analysis;
published by the Journal of Computing - Springer,
2012; USA.
[8] Mehdi Darbandi; Is the cloud computing real orhype Affirmation momentous traits of this
technology by proffering maiden scenarios;
published by the Journal of Computing
Springer, 2012; USA.
[9] Mehdi Darbandi; Measurement and collationoverriding traits of computer networks and
ascertainment consequential exclusivities of cloud
computing by the means of Bucy filtering;
published by the Journal of Computing - Springer,
2012; USA.
[10] Mehdi Darbandi; Unabridged collation aboutmultifarious computing methods and outreaching
cloud computing based on innovative procedure;
published by the Journal of Computing - Springer,
2012; USA.
[11] Mehdi Darbandi; Scrutiny about all securitystandards in cloud computing and present new
novel standard for security of such networks;published by the Journal of Computing - Springer,
2012; USA.
[12] Microsofts Accessible Technology Vision andStrategy; September 2011.
[13] IEEE Standards and research papers about CloudComputing and different aspects of such social
networks.
Biographies:
Jalal Nakhaei: is currently PhD.Student in Art and Architecture
Engineering in Science and Research
Branch Islamic Azad University;
Tehran, Iran. His research areas are
Information Technology (IT), Secure Spaces, and
Structures.
Mehdi Darbandi: received hisB.Sc. degree in Electrical Engineering
from University of Mashhad in 2012.
His research areas are Kalman Filter,
Matlab Simulink, Evolutionary
Algorithms, and Cloud Computing. Now he is
master student in Iran University of Science and
Technology (IUST); Tehran, Iran.
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617
https://sites.google.com/site/journalofcomputing
WWW.JOURNALOFCOMPUTING.ORG 25
2012 Journal of Computing Press, NY, USA, ISSN 2151-9617