predicting keen and eagerness of users to new emerging application on a cloud platforms and...

Upload: journal-of-computing

Post on 04-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    1/10

    Predicting keen and eagerness of users to new emerging application

    on a cloud platforms and enhancing passive defense reliability on

    such networks via Kalman filtering with a relationship to recursive

    Bayesian estimation

    Jalal Nakhaei1*, Mehdi Darbandi

    2

    Department of Art and Architecture, Science and Research Branch Islamic Azad University; Tehran, Iran

    Department of Electrical Engineering and Computer Science at Iran University of Science and Technology

    (IUST); Tehran, Iran

    (*Corresponding Author: Jalal Nakhaei)

    Abstract Before the invention of computers if you want tofind and use special information about something, you should

    physically go to libraries and if youre luck and found yourinterested textbooks, you can find out something about that

    subject, this method has several negative points, such as, itconsumes more of your time and your energy and even you

    may find nothing. But with the advent of computers and use ofelectronic versions of books and magazines you can find about

    your interested topic in a jiffy. Even with use of social andcommunicational networks such as Cloud Computing you

    can read other suggestions and opinions about your interested

    topic, even you can establish new workgroup through such

    networks and work on a specific project simultaneously from

    anywhere. Information Technology (IT) world which isbecame one of the vial necessities in current era, face with lots

    of revolutions and fundamental changes through this century.

    According to these changes, necessity to security of

    information, fast and agility in processing, dynamic accessing,has improved. Only concern of users and organizations is

    about security of information on cloud computing resources.

    For satisfying such important concern, all scientists and

    organizations all over the world do their bests to release newstandards and also develop other standards about accessing to

    the information and using of them. The only purpose of all

    research papers and standards is to increase the security levelof cloud computing. In each paper, each researcher introducesnew methods in intensifying security of such networks. They

    applying evolutionary algorithms or using track and trace

    methods or even using intelligence methods for detecting and

    eliminating hazardous actions. Some of them have several

    positive points and some of them are not practical at all. In

    this paper, at first we tell about cloud computing we

    define it completely and discuss about all aspects of this

    new generation of internet after that when we

    understand about all of its concepts, a brief review about

    different uses of cloud computing on different industries

    and technologies were present. In the next section by the

    knowing of whole concepts and key features of this

    network and also by knowing the critical uses of this

    network on different industries we introduce KalmanFilter with relationship to recursive Bayesian estimation;

    which can be used for estimation and prediction of

    different parameters in such network. For example, we

    can use this for estimation and prediction about

    permeating of hackers or for predicting the amount of

    users that will use special part of our network in a

    particular period of time or by tracking and tracing the

    packets or even users. By performing such activities

    were able to eliminate malicious and spyware

    treatments from the beginning points of our network.

    Keywords- Computer era, Cloud computing,evolutionary algorithms, Kalman filtering.

    I.

    INTRODUCTIONToday all peoples all around the world hear the Cloud

    Computing term several times, but only few peoples

    comprehend what it means and what features does it

    has. One general description about Cloud Computing

    is: it provides comprehensive processing and storage

    power without any restrictions according to network

    demand. In fact if you use one software that is

    provided by the web software supporters such as

    Amazon, Google and other well-known companies

    you use Cloud Computing. Today, most of the

    applications that are presented use cloud computing

    powers directly or indirectly, as such applications we

    can tell about Dropbox, Google Docs. When youconnect and use one of these services, in fact you use

    the power of some gigantic servers that are shared for

    use. In fact, Cloud Computing technology was existing

    for several years, but we dont pay enough attention to

    it and the services that it provides. This technology,

    paves the way for migrating from old and huge

    datacenters into new generation of data-processors and

    data-storages. The reason for using Cloud in the

    term of Cloud Computing is because of its

    architecture, because we dont have any information

    about its architecture or its location and amount of

    powers. With use of Cloud Computing, we can access

    to all of information and processes that we wants,without using of special peripheral devices. The best

    example for this feature is Dropbox, which enable

    users all around the world to access their information

    without any limitations. For example, suppose you are

    a business man and all the times you are in travel and

    you cant use traditional servers, because you wants to

    constantly check your accounts or check the status of

    your offices and buys and/or sells. But by the means of

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 16

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    2/10

    Cloud Computing, without any restrictions just with

    having one broadband internet connection, you can

    check all of your necessities even from your smart

    phone. The reason for using cloud computing is, all the

    data and information are in the web and all the time we

    connect to it and use the information or data that we

    wants, but if someone wants to connect to it through

    his/her smart mobile phone and his/her mobile phone

    didnt has enough processing and storage power, thenwhat he/she should done? The answer of this question

    led us to new generation of communicational and

    computational networks which is known as Cloud

    Computing. In cloud computing there isnt any

    obligation in updating your software or hardware

    according to progress of this technology in daily

    industries. Only you should have one device that

    allowed you to connect to internet after that with the

    use of powers which provided by the servers that are

    located in clouds you can use all of the software or do

    anything that you want. As an example, suppose you

    are a university student and you should present a new

    presentation in your university but you forget to bringyour laptop with yourself, so your presentation will

    cancel and all of your researches and studies were loss;

    but suppose youre one of the Cloud Computing users,

    if you forgot to bring your laptop with yourself you

    connect to your account through your mobile phone or

    your friends laptop, and through your account you

    access to your information about your presentation;

    even if you prefer your presentation files several days

    ago before your presentation you can use Cloud

    Computing to share your project files and ask other

    people around the world to develop your project by the

    means of their ideas.

    Also, another prominent feature of cloud computing is,if you use traditional systems and servers if your

    systems are crashed or they faced with some problems,

    your data were lost; but if you use cloud computing as

    your host or platform of your networks you has very

    reliable and secure space of working. Because, even if

    your systems are crash, your data arent lost, because

    your data are saved and storage in clouds. Also,

    according to the latest news which are released from

    Amazon Company, service providers of cloud

    computing are using double servers, one as an active

    server and the other as passive server. Therefore, this

    feature ensures you about locating of your information

    on cloud resources. Because even if, one server face

    with any problem such as crashing or hacking, other

    servers can satisfy your needs. So, in these days,

    because of users rarely get backup from their

    information maybe they dont have enough storage

    capacity or they didnt pay enough attention to this

    important parameter this feature is very important

    feature for all of the users.

    Another important feature of such network is remote

    accessing. Consider you are one of the staff of a big

    company, and you want to access to your work profiles

    from your home or even you are in the mission and

    you need to access your profile. Just with use of cloud

    computing you can provide such feature and ability for

    all of your employees. Even they can become in some

    working groups and then each group works on a

    definite and special projects. With use of cloudcomputing they can do such tasks very easily and

    without any problem, because in such networks the

    distance dimension doesnt has enough impact of the

    workability of group. Because workers can connect to

    their profile whenever and from every place that they

    are. They work simultaneously on projects and see all

    modifications that are made by other users at the same

    time.

    Another important function of this network is its

    updated software and hardware and everything that

    you need. Thats because of the kernel of these

    networks are on the internet. And all the software and

    applications that you use in your system are becameupdated all the time. So these features increment your

    security and viability.

    Because, organizations and users when migrate to

    cloud computing platforms use the resources and

    powers that provide by cloud computing you didnt

    need to update your system hardware and software.

    They updated all the time and simultaneously without

    any more charges or restrictions. This feature is

    gigantic and impressive feature for all of the users of

    computers and servers, because updating software or

    hardware of the system cause additional charges for

    traditional system users. But suppose you use cloud

    platforms as your system power providers, without anylimitations, even with your pocket PC or you mobile

    smart phone, you can connect to these networks and

    use even the power of supercomputers. For example,

    Mathwork MATLAB Corp. design new version of

    their MATLAB software based on cloud resources,

    with this prominent feature users can connect to such

    networks with their mobile phones, and use the

    features that are need high processing power, in these

    days we cant easily access to kind of mobile phones

    that are provide such power and even if you find such

    mobile phone it has very invaluable price and most of

    the users cant afford such high costs, in addition, by

    the updating of such software form their

    manufacturers, you should update the processing and

    storage power of your phone or pocket PC, and most

    of the users cannot afford such huge amount of

    moneys. But with use of new generation of

    communicational and computational networks, you

    can login to your account in cloud computing without

    any limitation, you didnt need pay additional charges

    for updating your software or hardware platform, just

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 17

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    3/10

    you login to your profile you access to the latest

    versions of software and hardware. This important

    parameter is very useful and reliable feature. Suppose

    youre an engineer that need to access the latest

    version of special software that you want, by the

    means of cloud computing, you can access to this

    important feature without any additional charges. This

    feature is so prominent for organizations or users who

    are need the latest versions of Antivirus and secure-provider software, because of their works they need

    more and reliable protection over their systems. With

    use of cloud computing they have this important

    feature.

    The law requires certainty and although cloud

    providers usually present comprehensive contract

    terms of service, many terms and conditions include

    wide-ranging disclaimers of liability. Also, they may

    not provide a warranty that the service will operate as

    described, or indeed at all. It is likely that as the cloud

    market expands and matures, terms of service will

    evolve to more closely represent what institutions

    require and how the law operates. In the mean time,the following points may be useful to bear in mind

    when examining cloud computing terms and

    conditions:

    Many cloud services are offered under the laws ofUS states and subject to terms that purport to

    restrict legal disputes to the courts of those states.

    Clearly entering into a contract that is governed by

    the relevant UK legal system will simplify

    obtaining advice and provide for more local

    resolution of disputes.

    When planning to use a cloud-based solution forbackup of important data, particular note should betaken of terms by which a cloud provider advises

    or requires customers separately to backup data

    placed on their cloud service (in other words,

    where the proposed backup solution itself

    disclaims responsibility for being a reliable

    backup).

    Many cloud providers will seek to exclude, as faras possible under the legal system applying to the

    contract, any warranty of service or acceptance of

    liability. Such liability as cannot be disclaimed

    altogether will typically be strictly limited.

    Where the institution has contractually committedto safeguard licensed educational resources, forexample, it will be necessary to obtain warranties

    from cloud providers that host these resources on

    their behalf. The service provider should provide

    assurances that best efforts will be made to prevent

    access by unlicensed users and to prevent any

    unauthorised usage of the licensed resources.

    The responsibility to bind users to acceptable use

    remains for IT directors even when learners are not

    strictly using the institutions infrastructure to interact

    and to publish information. Responsibilities such as

    the prevention of bullying by means of the institutions

    technology systems will continue to be addressed with

    terms of acceptable use for users. In many cases, the

    cloud infrastructure will be invisible to learners and

    where learners sign up to external cloud providers onthe instruction of the institution, it will be necessary to

    ensure that they agree to use the service responsibility

    with the sanction that service can be withdrawn by the

    institution. As a JANET User Organisation the

    institution is bound by the JANET Acceptable Use

    Policy which defines acceptable and unacceptable use.

    The agreement requires the User Organisation to

    bind users to acceptable use by means of terms and

    conditions. While users may increasingly be using

    computing infrastructure that is cloud based, it is

    apparent that acceptable use of institution provided

    facilities must still be regulated by means of terms and

    conditions that bind the user.The Computer Misuse Act 1990 (CMA) criminalises

    unauthorised access to any program or data held on a

    computer. Clearly this extends to unauthorised access

    to information that a cloud provider hosts on behalf of

    the institution. For IT professionals the security

    hierarchy has to be extended to embrace cloud based

    activities as well as interaction with cloud hosted data.

    At the operational level, what is acceptable use

    should be strictly enforced and a culture of legal use

    predominant.

    There are three distinct types of information which law

    enforcement agencies may require an FE or HE

    institution to disclose:

    Communications data - information associated withbut not including the actual content of a

    communication. Includes email addresses and

    telephone numbers (sender and recipient). An

    itemised telephone bill is a good example

    Keys to access protected or encrypted information -most likely information recovered by an

    interception but which is encoded

    Content - e.g. the actual content of a message sentby email, or a telephone conversation.

    These obligations remain for FE and HE institutions

    irrespective of the type of infrastructure being used,cloud or otherwise.

    By far the most common request made by the police is

    to identify an individual user or to provide information

    about their online activity. Information about

    communications and the individuals who made them

    (e.g. the identity of users of a particular email or IP

    address, when they logged in and to whom they sent e-

    mails), but not including the content of any files or

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 18

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    4/10

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    5/10

    between the institution and the cloud provider in order

    to ensure compliance with the DPA.

    One issue to be re-examined, for example, is the

    matter of retention schedules. Your institution is

    likely to have committed to and have in place practices

    and procedures for records handling to enable disposal

    and retention as required by various legal obligations.

    How these retention schedules are complied with when

    the data is hosted and processed remotely needs to beclarified.

    Cloud providers are likely to store and move data

    around multiple servers situated in a number of

    jurisdictions which may very likely be outside the

    European Economic Area (EEA). This can be a

    breach of the Data Protection Act 1998 by the

    institution unless there are adequate security measures

    in place for personal data. Compliance may be

    achieved if EU approved contract terms are used with

    a cloud provider. Alternatively, if using a US based

    cloud provider, ensuring that they are signed up to the

    Safe Harbour provisions will be necessary.

    The probability of the occurrence of serious data lossmay not be very high but should a loss occur the

    impact on the institution is likely to be significant.

    Dealing with the regulatory authorities is one aspect in

    addition to restoring the confidence of staff and

    learners in the ability of the institution to managing the

    privacy and security of personal information.

    One main reason for using cloud computing is to

    enable the institution to use the cloud technology to

    process information and thus generate outputs. In

    doing so the institution may also generate know how

    or trade secrets, which are not set out in any particular

    information output but reside in the data structures or

    processes which the institution establishes through itsuse of the cloud.

    The cloud provider too, will be generating information

    of various different types. Cloud providers will collect

    information about the operation of their systems and

    service for management purposes. Some of this

    information will consist of know how or trade secrets

    belonging to the service provider.

    II. EVALUATING MICROSOFT PROGRAMSABOUT FUTURE OF CLOUD COMPUTING

    As computers and the Internet play an increasinglyimportant part in peoples livesat work, at school,

    and at homemaking technology accessible to people

    with a wide range of abilities is an imperative.

    Accessible technology makes it easier for people with

    visual, dexterity, cognitive and speech needs to use

    computers and other devices to communicate and

    share information, access government services, and

    secure and retain employment.

    According to the United Nations Convention on

    Persons with Disabilities, disability affects between 15

    percent and 20 percent of the population in every

    country worldwide, and the incidence of disability in

    industrialized nations is increasing as their populations

    get older. A Forrester Research Inc. study

    commissioned by Microsoft found that 57 percent of

    working-age computer users (1864 years old) would

    likely benefit from accessible technology because ofdifficulties and impairments that affect their computer

    use. As the population continues to age, the number of

    computer users in the 6574 age range will increase

    significantly, as will the number of people who would

    benefit from accessible technology.

    For more than 25 years, Microsoft has been at the

    forefront of efforts to make computers and the Internet

    more accessible. These efforts include:

    Building accessibility options into Windows andother Microsoft products that let users personalize

    the computer display, mouse, keyboard, sound, and

    speech options. Working with AT companies to facilitate the

    creation of software and hardware products such as

    screen readers, magnifiers, and specialty keyboards

    that enable individuals with significant vision,

    hearing, dexterity, language or learning needs to

    use computers.

    Creating developer technologies and tools thatmake it easier to build AT products and accessible

    applications that interoperate and work well

    together.

    Today, a vibrant worldwide ecosystem of accessible

    technology tools, technologies, and solutions ishelping enable and empower millions of people of all

    ages and abilities. However, as the technology

    landscape continues to evolve, so too must the

    building blocks that support this accessible technology

    ecosystem.

    Of particular significance is the rise of cloud

    computing, which encompasses a major shift in how

    technology will be used in the years ahead and what

    people and organizations can do with it. In the simplest

    terms, cloud computing represents the convergence of

    smart Internet-connected devices, innovative software

    applications, and data storage and services hosted on

    the Internet. This convergence of hosted data storageand services, applications, and devices is sometimes

    referred to as three screens and a cloud. (The three

    screens being laptop or desktop computers,

    smartphones, and TVs.)

    Advances in client-based operating systems like

    Windows 7 and applications like Microsoft Office

    2010 are powering many of these devices with more

    intuitive user interfaces and the ability to perform

    increasingly complex computing functions, such as

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 20

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    6/10

    data visualization and real-time simulation of 3D

    environments. At the same time, development of large

    data centers capable of storing huge volumes of data

    and hosting a rapidly expanding universe of online

    applications and services is opening new realms of

    communication, collaboration, commerce, learning,

    and entertainment. Microsoft Office 365, the cloud-

    based version of Microsoft Office, utilizes the power

    of these online capabilities to simplify sharing,collaboration and storage of Office documents,

    spreadsheets and presentations. Microsoft also offers

    many other online services, solutions, and platforms

    that are enabling individuals, businesses, and

    governments to take advantage of the convenience and

    flexibility of the cloud. For individuals, the cloud has

    the potential to offer seamless, on-demand access to

    content, social networks, and online services across a

    range of devices. For organizations, the cloud offers

    the ability to dynamically scale IT capacity depending

    on evolving needs, better manage spending on IT

    infrastructure, and concentrate more resources on core

    business functions.As these shifts pick up steam, Microsoft believes it is

    important to expand the vision of an accessible

    computing ecosystem to encompass technologies,

    tools, products, and services that enable all people to

    benefit from the cloud and to more easily control the

    devices around them to live a more independent life.

    As a starting point, people will always need a smart

    client device with built-in accessibility capabilities to

    serve as a gateway to the cloud and to perform tasks

    offline or when no Internet access is available. When

    browsing the Internet, accessing social networking

    sites, or tapping into cloud services, users will use

    applications or a web browser such as InternetExplorer to access and retrieve information. These

    devices also enable individuals who may require AT

    applications or specialty computing hardware that

    enables text to be read, video to be captioned, or that

    facilitates hands-free entry of information.

    Over time, we envision a world of accessible, cloud-

    connected devices powered by Microsoft technologies

    that an individual can rely on to understand and

    interpret their needs, preferences, and immediate

    surroundings to create an adaptive experience. In

    combination with reliable broadband connectivity and

    the virtually unlimited computing power of the cloud,

    it will be possible for these preferences to follow users

    wherever they go and to supplement the capabilities of

    any particular device in ways that increase

    communication and collaboration and help reduce

    social isolation at work and at home.

    Microsofts commitment to creating an ecosystem of

    accessible technologies runs deep, and includes

    development of a number of core accessible

    technology building blocks. In 2005, Microsoft User

    Interface Automation (UI Automation) introduced a

    new approach to exchanging information between

    Windows applications, web content and ATs. UI

    Automations unique approach allows application

    developers to make their software compatible with AT

    products such as screen readers for users with limited

    sight and on-screen keyboards for users with limited

    physical access. It also allows AT developers to design

    their products to be forward compatible with futureversions of those applications. UI Automation is

    supported across Microsofts popular development

    frameworks, including Microsoft Silverlight, the .NET

    Framework, Windows Presentation Foundation, and

    other frameworks that have been in use for decades.

    Developers use these frameworks to create interactive

    user experiences, content, and video for the PC, web,

    mobile devices, and the cloud.

    Support for UI Automation was first added to

    Microsoft Internet Explorer 8, and then significantly

    expanded in Internet Explorer 9, released in early

    2011. As developers increasingly embrace Internet

    Explorer as a platform for deploying the latest HTML5cloud-based applications, support for UI Automation

    in the browser will enable AT developers to make

    richer, immersive web content and applications

    accessible to people with disabilities. By extending

    support for UI Automation across all its platforms

    such as the Windows client and Windows server

    operating systems, Internet Explorer, and Silverlight

    Microsoft is ensuring that as the cloud evolves more of

    its potential and power is accessible to people with

    disabilities.

    Two of the most promising areas of innovation to help

    users tap the power of the cloud are speech recognition

    and text-to-speech technology. Speech recognition(and commanding) technologies allow computers to

    hear and understand human speech. This is an

    important feature for people with hand or arm injuries,

    paraplegia, or absence of fine motor control. Microsoft

    has two primary investments in this area. Windows

    Speech Recognition listens and reacts to spoken

    commands, enabling a user to run applications and

    interact with their Windows computer. For example, it

    allows a user to dictate an e-mail, surf the web, or fill

    out online forms by voice instead of with a keyboard

    and mouse. Microsoft Tellme is a cloud-based speech

    platform that enables speech recognition in a range of

    Microsoft products, including Windows Phone 7,

    Bing, Office, Exchange Server, and Office

    Communications Server. It also allows developers of

    third-party products to add speech recognition to their

    solutions.

    In Windows Phone 7, for example, speech recognition

    technology supports phone dialing, navigation and

    web search. The Windows Phone 7.5 update extended

    this to also include dictating and sending a text

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 21

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    7/10

    message and advanced phone functions, such as call

    forwarding, redial and contact list. The Bing for

    Mobile search engineavailable as an application for

    many web-enabled phones or as a web page accessible

    from a mobile phone browserlets users speak a

    search term instead of typing it. Similarly, speech

    recognition technology in Kinectan add-on

    peripheral for the Xbox 360 game consolelets

    individuals use voice commands to have live videochats, play music and videos, and watch thousands of

    live and on-demand ESPN sporting events without

    ever using a game controller. Tellmes cloud-based

    platform analyzes billions of speech interactions to

    improve the underlying speech recognition engine and

    better understand a users intent. The more you use it,

    the more it learns and more accurate it becomes.

    Text-to-speech (TTS) technologyalso known as

    speech synthesisenables computers to talk. This

    capability is used in screen readers for people who are

    blind, reading aids for people with reading disabilities,

    and as a synthetic voice for people who are unable to

    speak. Microsoft has three key investments in TTS:speech engines installed in the Windows operating

    system, available as a cloud service, and integrated

    into specific applications. The cloud service and

    installed speech engines offer value for assistive

    technology vendors building accessibility solutions.

    One example of TTS in the cloud is through the Bing

    Translator, where a consumer can type a phrase, have

    it translated into one of 18 languages and have the

    resulting phrase read aloud. For people with visual

    impairments or reading disabilities, the TTS engine in

    Windows 7 powers a screen reader called Narrator,

    which reads on-screen text aloud and can help the user

    navigate the interface without seeing the screen. It alsodrives the Speak feature in Office 2010, which enables

    a computer to play back written text as spoken words.

    Lync 2010, Microsofts newest unified

    communications tool, uses TTS technology so users

    can more easily connect, communicate, and share

    information in the cloud. For instance, incoming

    instant messages and other communications requests

    can be read out by a screen reader and accompanied by

    audio cues. Notifications are also read out as they

    appear.

    Just as the cloud itself is a work in progress, so, too,

    are Microsofts efforts to enable the cloud for people

    of all abilities. As we continue to invest in building a

    more seamless cloud-based spectrum of solutions, we

    will also back the contributions of other developers of

    accessible products, services, and content. We believe

    that a healthy, market-driven ecosystem comprised of

    many products, business models, and development

    philosophies is the fastest route to achieving a more

    accessible cloud.

    Many different approaches are represented in the

    current ecosystem, and Microsoft supports many of

    them. For example, Microsoft is working in

    partnership with an organization called LucyTech and

    with government organizations worldwide to pilot a

    commercially-viable model for cloud-based

    accessibility solutions, which will be made available at

    little or no cost to consumers. Although LucyTech will

    build on existing cloud, platform, and applicationinvestments, it is pushing the boundaries of existing

    technologies and cloud infrastructure and will include

    some new cloud-based service offerings to fill critical

    gaps. It is a distributed accessibility solution with the

    promise to provide globally available AT solutions.

    Another international effort we support is the Global

    Public Inclusive Infrastructure (GPII). The goal of

    GPII is to increase awareness of the existing

    accessibility infrastructure (such as APIs, operating

    system features, and tools) and accelerate development

    of new accessibility building blocks that make the

    benefits of the cloud more easily available to

    everyone. Participants in the GPII process agree that aclient device and associated operating system form the

    foundation of accessibility solutions and are the first

    line of functionality that people will use. There also is

    a shared understanding that cloud-based services offer

    significant opportunities to complement and extend

    those built-in capabilities to create new and better

    customer-ready features. For example, a fully-

    developed accessible cloud infrastructure would

    enable people who cannot use standard interfaces and

    content to use a broadband connection to invoke the

    interface adoptions they need, automatically, on any

    device, anywhere and anytime. The GPII vision aligns

    with Microsofts long-standing desire for an adaptivecomputing environment. In some respects, GPII is

    helping clarify the vision and need for better cloud-

    connected accessibility products and services, while

    the LucyTech project is focusing on the development

    and delivery of a working solution that fully utilizes

    existing Microsoft cloud technologies, services, and

    commercial AT products to realize this vision.

    Microsoft sees value in both projects, so is

    participating in and supporting both efforts.

    Governments around the world are increasingly aware

    of the enormous potential of cloud computing to

    benefit citizens and society. Microsoft has developed a

    set of policy principles to support its commitment to

    both digital inclusion and to the cloud. Microsoft

    believes these principles are at the core of effective

    policy frameworks for accessibility and the cloud, and

    will encourage the widespread development and

    implementation of accessible technologies, products,

    programs, and services. These policies include:

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 22

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    8/10

    Harmonizing International Standards and

    Procurement Approaches: Market-led, globallyharmonized standards and the procurement policies

    that reference them are the foundation of accessible

    and interoperable IT products and cloud services.

    Globally-harmonized standards bring major

    advantages to both business and individual users of

    accessible technology. Because the speed of

    innovation in the IT sector can outpace legislativemeasures put in place to encourage accessibility and

    promote cloud services, Microsoft believes it is

    important that globally harmonized standards

    constitute the basis of product development.

    Promoting Effective Conformance: Accessible

    technology can be advanced most effectively by

    minimizing undue regulatory burden. When standards

    for cloud and accessibility are referenced in

    government procurement policies, Microsoft supports

    effective and rigorous conformance mechanisms that

    provide adequate assurance of compliance, encourage

    innovation, and promote consumer choice. One suchexample is the voluntary supplier declaration of

    accessibility, as defined in the ISO/IEC 17050

    standard and used in a number of countries around the

    world.

    Promoting Interoperability: Interoperability iscrucial to creating an accessible cloud computing

    environment for users with a broad range of abilities. It

    is a key feature of Microsoft accessible technologies

    and we advocate for public policies that allow a

    variety of complementary ways to achieve it. We

    believe that governments should not engineer

    interoperability by prescribing specific approaches andexcluding others, but instead should allow IT vendors

    and purchasers to use the solutions that best suit their

    needs. AT/IT interoperability standards such as ISO

    13066 will help ensure that vendors cloud-ready

    technologies are also interoperable with assistive

    technology. Aligning user needs with a dynamic and

    growing array of devices, technology platforms,

    development tools, assistive technologies, and services

    is a complex challenge that will require industry-wide

    innovation and collaboration, appropriate government

    policies, and the active involvement of the disability

    community.

    Ensuring Technology Neutrality: Technology-neutral policies promote innovation, eliminate barriers

    to trade and market access, enhance competition, and

    prevent bias in government procurement. Microsoft

    believes that a flexible cloud policy approach based on

    a commitment to technology neutrality and choice is

    particularly appropriate in the rapidly evolving IT

    environment. Customers and governments today

    increasingly rely on a combination of proprietary and

    open source software, as well as on open standards and

    proprietary standards, to develop accessibility

    solutions. By encouraging choice, governments will

    enable the broadest possible array of solutions for

    people with disabilities and drive down the cost of

    building accessible mainstream products.

    Enhancing the Ecosystem: In order for technology

    companies to invest in and develop accessible cloudsolutions, they must understand user needs and be

    confident that there will be a market for such solutions.

    Today, the accessible technology PC ecosystem is a

    vibrant and healthy collection of more than 350

    products that offer tremendous customer benefit.

    Assistive technologies for the cloud will require

    similar breadth and depth. Microsoft believes that

    governments should take steps to ensure accessibility

    is not undermined by cloud policies that put the

    existing AT ecosystem at risk or that diminish the

    ability of entrepreneurs to continue serving the

    disability community.

    III.KALMAN FILTER WITH A RELATIONSHIPTO THE RECURSIVE BAYESIAN

    ESIMATION:

    The Kalman filter can be considered to be one of the

    simplest dynamic Bayesian networks. The Kalman

    filter calculates estimates of the true values of

    measurements recursively over time using incoming

    measurements and a mathematical process model.

    Similarly, recursive Bayesian estimation calculates

    estimates of an unknown probability density function

    (PDF) recursively over time using incomingmeasurements and a mathematical process model (for

    example in this place it means model of cloud

    resources). In recursive Bayesian estimation, the true

    state is assumed to be an unobserved Markov process,

    and the measurements are the observed states of a

    hidden Markov model (HMM).

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 23

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    9/10

    Because of the Markov assumption, the true state is

    conditionally independent of all earlier states given the

    immediately previous state.

    Similarly the measurement at the k-th time-step is

    dependent only upon the current state and is

    conditionally independent of all other states given thecurrent state.

    Using these assumptions the probability distribution

    over all states of the hidden Markov model can be

    written simply as:

    However, when the Kalman filter is used to estimate

    the state x, the probability distribution of interest is

    that associated with the current states conditioned on

    the measurements up to the current time-step. This is

    achieved by marginalizing out the previous states and

    dividing by the probability of the measurement set.

    This leads to predictand update steps of the Kalman

    filter written probabilistically. The probability

    distribution associated with the predicted state is the

    sum (integral) of the products of the probability

    distribution associated with the transition from the (k-

    1)-th time-step to the k-th and the probability

    distribution associated with the previous state, over all

    possible .

    The measurement set up to time tis:

    The probability distribution of the update is

    proportional to the product of the measurement

    likelihood and the predicted state.

    The denominator:

    is a normalization term.

    The remaining probability density functions are:

    Note that the PDF at the previous time-step is

    inductively assumed to be the estimated state and

    covariance. This is justified because, as an optimal

    estimator, the Kalman filter makes best use of the

    measurements; therefore the PDF for given themeasurements is the Kalman filter estimate.

    IV. CONCLUSIONOrdering of these paper consist of an abstract which is

    provide brief research about definition of cloud

    computing and obligations to migrate to such

    comprehensive network, also in this section authors of

    paper tell briefly about new methods which can be

    used for incrementing the security and reliability

    levels of such network. After that a reader can read

    introduction, which is include basic definitions of

    cloud computing and the necessity of availability ofsuch network in these days. After that, in the next

    section, a discussion about Microsoft programs about

    using of cloud computings on his prospect products

    were present. By studying this section, reader acquire

    general perception about future of cloud computing,

    because in this section programs of the king of

    computer industry Microsoft Corp. were explain.

    After studying these sections and understand about all

    aspects and necessities of such network, using of one

    evolutionary algorithm on cloud computing for the

    purpose of gaining more security and liability were

    discuss.

    REFERENCES:[1] Mehdi Darbandi Applying Kalman Filtering in

    solving SSM estimation problem by the means of

    EM algorithm with considering a practical

    example; published by the Journal of Computing

    Springer, 2012; USA.

    [2] Mehdi Darbandi; Comparison betweenmiscellaneous platforms that present for cloud

    computing and accreting the security of these

    platforms by new filter; published by the Journal

    of Computing Springer, 2012; USA.[3] Mehdi Darbandi; New and novel technique in

    designing electromagnetic filter for eliminating

    EMI radiations and optimization performances;

    published by the Journal of Computing - Springer,

    2012; USA.

    [4] Mehdi Darbandi; Appraising the role of cloudcomputing in daily life and presenting new

    solutions for stabilization of this technology;

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 24

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

  • 7/30/2019 Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive

    10/10

    published by the Journal of Computing - Springer,

    2012; USA.

    [5] Mehdi Darbandi; Cloud Computing make arevolution in economy and Information

    Technology; published by the Journal of

    Computing - Springer, 2012; USA.

    [6] Mehdi Darbandi; Considering the high impact ofgettering of silicon on fabrication of wafer

    designing and optimize the designing with newinnovative solutions; published by the Journal of

    Computing Springer, 2012; USA.

    [7] Mehdi Darbandi; Developing concept ofelectromagnetic filter design by considering new

    parameters and use of mathematical analysis;

    published by the Journal of Computing - Springer,

    2012; USA.

    [8] Mehdi Darbandi; Is the cloud computing real orhype Affirmation momentous traits of this

    technology by proffering maiden scenarios;

    published by the Journal of Computing

    Springer, 2012; USA.

    [9] Mehdi Darbandi; Measurement and collationoverriding traits of computer networks and

    ascertainment consequential exclusivities of cloud

    computing by the means of Bucy filtering;

    published by the Journal of Computing - Springer,

    2012; USA.

    [10] Mehdi Darbandi; Unabridged collation aboutmultifarious computing methods and outreaching

    cloud computing based on innovative procedure;

    published by the Journal of Computing - Springer,

    2012; USA.

    [11] Mehdi Darbandi; Scrutiny about all securitystandards in cloud computing and present new

    novel standard for security of such networks;published by the Journal of Computing - Springer,

    2012; USA.

    [12] Microsofts Accessible Technology Vision andStrategy; September 2011.

    [13] IEEE Standards and research papers about CloudComputing and different aspects of such social

    networks.

    Biographies:

    Jalal Nakhaei: is currently PhD.Student in Art and Architecture

    Engineering in Science and Research

    Branch Islamic Azad University;

    Tehran, Iran. His research areas are

    Information Technology (IT), Secure Spaces, and

    Structures.

    Mehdi Darbandi: received hisB.Sc. degree in Electrical Engineering

    from University of Mashhad in 2012.

    His research areas are Kalman Filter,

    Matlab Simulink, Evolutionary

    Algorithms, and Cloud Computing. Now he is

    master student in Iran University of Science and

    Technology (IUST); Tehran, Iran.

    JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617

    https://sites.google.com/site/journalofcomputing

    WWW.JOURNALOFCOMPUTING.ORG 25

    2012 Journal of Computing Press, NY, USA, ISSN 2151-9617