You are on page 1of 10

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.

ORG

16

Predicting keen and eagerness of users to new emerging application on a cloud platforms and enhancing passive defense reliability on such networks via Kalman filtering with a relationship to recursive Bayesian estimation
Jalal Nakhaei1*, Mehdi Darbandi2
Department of Art and Architecture, Science and Research Branch Islamic Azad University; Tehran, Iran Department of Electrical Engineering and Computer Science at Iran University of Science and Technology (IUST); Tehran, Iran (*Corresponding Author: Jalal Nakhaei)
Abstract Before the invention of computers if you want to find and use special information about something, you should physically go to libraries and if youre luck and found your interested textbooks, you can find out something about that subject, this method has several negative points, such as, it consumes more of your time and your energy and even you may find nothing. But with the advent of computers and use of electronic versions of books and magazines you can find about your interested topic in a jiffy. Even with use of social and communicational networks such as Cloud Computing you can read other suggestions and opinions about your interested topic, even you can establish new workgroup through such networks and work on a specific project simultaneously from anywhere. Information Technology (IT) world which is became one of the vial necessities in current era, face with lots of revolutions and fundamental changes through this century. According to these changes, necessity to security of information, fast and agility in processing, dynamic accessing, has improved. Only concern of users and organizations is about security of information on cloud computing resources. For satisfying such important concern, all scientists and organizations all over the world do their bests to release new standards and also develop other standards about accessing to the information and using of them. The only purpose of all research papers and standards is to increase the security level of cloud computing. In each paper, each researcher introduces new methods in intensifying security of such networks. They applying evolutionary algorithms or using track and trace methods or even using intelligence methods for detecting and eliminating hazardous actions. Some of them have several positive points and some of them are not practical at all. In

were able to eliminate malicious and spyware treatments from the beginning points of our network.

Keywords-

Computer era, Cloud evolutionary algorithms, Kalman filtering.

computing,

I.

INTRODUCTION

this paper, at first we tell about cloud computing we define it completely and discuss about all aspects of this new generation of internet after that when we understand about all of its concepts, a brief review about different uses of cloud computing on different industries and technologies were present. In the next section by the knowing of whole concepts and key features of this network and also by knowing the critical uses of this network on different industries we introduce Kalman Filter with relationship to recursive Bayesian estimation; which can be used for estimation and prediction of different parameters in such network. For example, we can use this for estimation and prediction about permeating of hackers or for predicting the amount of users that will use special part of our network in a particular period of time or by tracking and tracing the packets or even users. By performing such activities

Today all peoples all around the world hear the Cloud Computing term several times, but only few peoples comprehend what it means and what features does it has. One general description about Cloud Computing is: it provides comprehensive processing and storage power without any restrictions according to network demand. In fact if you use one software that is provided by the web software supporters such as Amazon, Google and other well-known companies you use Cloud Computing. Today, most of the applications that are presented use cloud computing powers directly or indirectly, as such applications we can tell about Dropbox, Google Docs. When you connect and use one of these services, in fact you use the power of some gigantic servers that are shared for use. In fact, Cloud Computing technology was existing for several years, but we dont pay enough attention to it and the services that it provides. This technology, paves the way for migrating from old and huge datacenters into new generation of data-processors and data-storages. The reason for using Cloud in the term of Cloud Computing is because of its architecture, because we dont have any information about its architecture or its location and amount of powers. With use of Cloud Computing, we can access to all of information and processes that we wants, without using of special peripheral devices. The best example for this feature is Dropbox, which enable users all around the world to access their information without any limitations. For example, suppose you are a business man and all the times you are in travel and you cant use traditional servers, because you wants to constantly check your accounts or check the status of your offices and buys and/or sells. But by the means of

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

17

Cloud Computing, without any restrictions just with having one broadband internet connection, you can check all of your necessities even from your smart phone. The reason for using cloud computing is, all the data and information are in the web and all the time we connect to it and use the information or data that we wants, but if someone wants to connect to it through his/her smart mobile phone and his/her mobile phone didnt has enough processing and storage power, then what he/she should done? The answer of this question led us to new generation of communicational and computational networks which is known as Cloud Computing. In cloud computing there isnt any obligation in updating your software or hardware according to progress of this technology in daily industries. Only you should have one device that allowed you to connect to internet after that with the use of powers which provided by the servers that are located in clouds you can use all of the software or do anything that you want. As an example, suppose you are a university student and you should present a new presentation in your university but you forget to bring your laptop with yourself, so your presentation will cancel and all of your researches and studies were loss; but suppose youre one of the Cloud Computing users, if you forgot to bring your laptop with yourself you connect to your account through your mobile phone or your friends laptop, and through your account you access to your information about your presentation; even if you prefer your presentation files several days ago before your presentation you can use Cloud Computing to share your project files and ask other people around the world to develop your project by the means of their ideas. Also, another prominent feature of cloud computing is, if you use traditional systems and servers if your systems are crashed or they faced with some problems, your data were lost; but if you use cloud computing as your host or platform of your networks you has very reliable and secure space of working. Because, even if your systems are crash, your data arent lost, because your data are saved and storage in clouds. Also, according to the latest news which are released from Amazon Company, service providers of cloud computing are using double servers, one as an active server and the other as passive server. Therefore, this feature ensures you about locating of your information on cloud resources. Because even if, one server face with any problem such as crashing or hacking, other servers can satisfy your needs. So, in these days, because of users rarely get backup from their information maybe they dont have enough storage capacity or they didnt pay enough attention to this important parameter this feature is very important feature for all of the users.

Another important feature of such network is remote accessing. Consider you are one of the staff of a big company, and you want to access to your work profiles from your home or even you are in the mission and you need to access your profile. Just with use of cloud computing you can provide such feature and ability for all of your employees. Even they can become in some working groups and then each group works on a definite and special projects. With use of cloud computing they can do such tasks very easily and without any problem, because in such networks the distance dimension doesnt has enough impact of the workability of group. Because workers can connect to their profile whenever and from every place that they are. They work simultaneously on projects and see all modifications that are made by other users at the same time. Another important function of this network is its updated software and hardware and everything that you need. Thats because of the kernel of these networks are on the internet. And all the software and applications that you use in your system are became updated all the time. So these features increment your security and viability. Because, organizations and users when migrate to cloud computing platforms use the resources and powers that provide by cloud computing you didnt need to update your system hardware and software. They updated all the time and simultaneously without any more charges or restrictions. This feature is gigantic and impressive feature for all of the users of computers and servers, because updating software or hardware of the system cause additional charges for traditional system users. But suppose you use cloud platforms as your system power providers, without any limitations, even with your pocket PC or you mobile smart phone, you can connect to these networks and use even the power of supercomputers. For example, Mathwork MATLAB Corp. design new version of their MATLAB software based on cloud resources, with this prominent feature users can connect to such networks with their mobile phones, and use the features that are need high processing power, in these days we cant easily access to kind of mobile phones that are provide such power and even if you find such mobile phone it has very invaluable price and most of the users cant afford such high costs, in addition, by the updating of such software form their manufacturers, you should update the processing and storage power of your phone or pocket PC, and most of the users cannot afford such huge amount of moneys. But with use of new generation of communicational and computational networks, you can login to your account in cloud computing without any limitation, you didnt need pay additional charges for updating your software or hardware platform, just

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

18

you login to your profile you access to the latest versions of software and hardware. This important parameter is very useful and reliable feature. Suppose youre an engineer that need to access the latest version of special software that you want, by the means of cloud computing, you can access to this important feature without any additional charges. This feature is so prominent for organizations or users who are need the latest versions of Antivirus and secureprovider software, because of their works they need more and reliable protection over their systems. With use of cloud computing they have this important feature. The law requires certainty and although cloud providers usually present comprehensive contract terms of service, many terms and conditions include wide-ranging disclaimers of liability. Also, they may not provide a warranty that the service will operate as described, or indeed at all. It is likely that as the cloud market expands and matures, terms of service will evolve to more closely represent what institutions require and how the law operates. In the mean time, the following points may be useful to bear in mind when examining cloud computing terms and conditions: Many cloud services are offered under the laws of US states and subject to terms that purport to restrict legal disputes to the courts of those states. Clearly entering into a contract that is governed by the relevant UK legal system will simplify obtaining advice and provide for more local resolution of disputes. When planning to use a cloud-based solution for backup of important data, particular note should be taken of terms by which a cloud provider advises or requires customers separately to backup data placed on their cloud service (in other words, where the proposed backup solution itself disclaims responsibility for being a reliable backup). Many cloud providers will seek to exclude, as far as possible under the legal system applying to the contract, any warranty of service or acceptance of liability. Such liability as cannot be disclaimed altogether will typically be strictly limited. Where the institution has contractually committed to safeguard licensed educational resources, for example, it will be necessary to obtain warranties from cloud providers that host these resources on their behalf. The service provider should provide assurances that best efforts will be made to prevent access by unlicensed users and to prevent any unauthorised usage of the licensed resources.

The responsibility to bind users to acceptable use remains for IT directors even when learners are not strictly using the institutions infrastructure to interact and to publish information. Responsibilities such as the prevention of bullying by means of the institutions technology systems will continue to be addressed with terms of acceptable use for users. In many cases, the cloud infrastructure will be invisible to learners and where learners sign up to external cloud providers on the instruction of the institution, it will be necessary to ensure that they agree to use the service responsibility with the sanction that service can be withdrawn by the institution. As a JANET User Organisation the institution is bound by the JANET Acceptable Use Policy which defines acceptable and unacceptable use. The agreement requires the User Organisation to bind users to acceptable use by means of terms and conditions. While users may increasingly be using computing infrastructure that is cloud based, it is apparent that acceptable use of institution provided facilities must still be regulated by means of terms and conditions that bind the user. The Computer Misuse Act 1990 (CMA) criminalises unauthorised access to any program or data held on a computer. Clearly this extends to unauthorised access to information that a cloud provider hosts on behalf of the institution. For IT professionals the security hierarchy has to be extended to embrace cloud based activities as well as interaction with cloud hosted data. At the operational level, what is acceptable use should be strictly enforced and a culture of legal use predominant. There are three distinct types of information which law enforcement agencies may require an FE or HE institution to disclose: Communications data - information associated with but not including the actual content of a communication. Includes email addresses and telephone numbers (sender and recipient). An itemised telephone bill is a good example Keys to access protected or encrypted information most likely information recovered by an interception but which is encoded Content - e.g. the actual content of a message sent by email, or a telephone conversation. These obligations remain for FE and HE institutions irrespective of the type of infrastructure being used, cloud or otherwise. By far the most common request made by the police is to identify an individual user or to provide information about their online activity. Information about communications and the individuals who made them (e.g. the identity of users of a particular email or IP address, when they logged in and to whom they sent emails), but not including the content of any files or

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

19

communications, is covered by the Regulation of Investigatory Powers Act 2000 (RIPA), where it is referred to as "communications data". The police must always use RIPA s.22, and not any other process, to obtain communications data. An FE or HE institution receiving the appropriate notice must comply with it by disclosing the information specified in the notice. Having appropriate procedures in place to carry this out should data be hosted in the cloud is now necessary. Under s.49 RIPA, properly authorised persons (such as members of the law enforcement, security and intelligence agencies) may serve notice on an institution requiring the disclosure of protected (e.g. encrypted) information which they lawfully hold, or are likely to, in an intelligible form. S.49 limits the information to which the right to serve such a notice applies but an example could be material seized by police under a judicial warrant or intercepted under a warrant authorised in accordance with Chapter I, Part I of RIPA. An FE or HE institution receiving the appropriate notice must comply with it by disclosing the information specified in the notice in an intelligible form or by disclosing any key to the information which is in their possession. It is now necessary to have appropriate procedures in place to carry this out should data be hosted in the cloud. Information that is not communications data, and therefore not covered by the Regulation of Investigatory Powers Act 2000, includes the content of emails and files. Two different processes (one mandatory, one not) cover the disclosure of this type of information: 1. A court may make an order that an institution must disclose specified information to the court, usually for use as evidence. An institution that receives such an order must comply with it, generally by disclosing the required information to a police constable. For IT directors it is necessary therefore to ensure that such an order can be complied with where it is stored with a cloud provider. 2. Sections 28 and 29 of the Data Protection Act 1998 allow an institution that holds personal data (including the content of emails and files) to choose to disclose data if it is persuaded that the disclosure is both necessary and proportionate in the interests of national security (s.28) or of the detection, investigation or prevention of crime (s.29). In both cases, it is the responsibility of the institution that has the data to ensure that the risk of harm if the information is not disclosed justifies the breach of privacy that will be caused by disclosing it. Institutions respect the right to free speech but where information published by a university or college, or

one of its members, breaks the criminal or civil law (these are generally also breaches of the JANET Acceptable Use Policy) the publication may be altered or removed. The normal situation under UK law is contained within the Electronic Communications (EC Directive) Regulations 2002. This protects those that provide services such as web hosting from liability so long as they act promptly when informed of a particular publication that may be unlawful. If the publication continues after a complaint, the institution may be held to have approved the content of the publication and may be liable if the publication is later found to break the law. Institutions should therefore have efficient processes to receive and consider complaints of unlawful material where material is published, including on their websites, and to remove or alter any material that they would not be prepared to defend in court. The attraction of using computing infrastructure, platforms and software on pay as you go is fairly obvious. The ability to scale down in-house provision of IT services is appealing in an environment where costs need to be scrutinised robustly. The risks of such a strategy need to be assessed and decision makers will want to know how the changes will affect the institution. In particular as a senior manager you will want to know whether new or revised systems of governance will need to be in place to maintain oversight of existing information strategies and data handling procedures. The Information Commissioners Office (ICO) has the power to serve a monetary penalty notice on a data controller for serious breaches of the DPA. A monetary penalty of up to 500,000 will only be appropriate in the most serious situations. Until now control over where data was and who had access to it could be centrally managed. The security hierarchy was certain and provided safeguards that essentially fulfilled the institutions obligations to keep personal data secure and private. In an environment where data is stored off campus and transactions take place somewhere remotely beyond the IT Directors physical reach how oversight can be achieved to the required legal level needs to be established. The DPA applies to personal data which is defined as data relating to a living individual from which the individual can be identified or which if combined with other data may identify the individual. As data controllers, those in senior management positions at the institution are responsible for compliance with the DPA legal obligations. When using a cloud provider, the institution will continue to be the data controller and the cloud provider will be the data processor. The cloud provider should be required to act in accordance with agreed terms

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

20

between the institution and the cloud provider in order to ensure compliance with the DPA. One issue to be re-examined, for example, is the matter of retention schedules. Your institution is likely to have committed to and have in place practices and procedures for records handling to enable disposal and retention as required by various legal obligations. How these retention schedules are complied with when the data is hosted and processed remotely needs to be clarified. Cloud providers are likely to store and move data around multiple servers situated in a number of jurisdictions which may very likely be outside the European Economic Area (EEA). This can be a breach of the Data Protection Act 1998 by the institution unless there are adequate security measures in place for personal data. Compliance may be achieved if EU approved contract terms are used with a cloud provider. Alternatively, if using a US based cloud provider, ensuring that they are signed up to the Safe Harbour provisions will be necessary. The probability of the occurrence of serious data loss may not be very high but should a loss occur the impact on the institution is likely to be significant. Dealing with the regulatory authorities is one aspect in addition to restoring the confidence of staff and learners in the ability of the institution to managing the privacy and security of personal information. One main reason for using cloud computing is to enable the institution to use the cloud technology to process information and thus generate outputs. In doing so the institution may also generate know how or trade secrets, which are not set out in any particular information output but reside in the data structures or processes which the institution establishes through its use of the cloud. The cloud provider too, will be generating information of various different types. Cloud providers will collect information about the operation of their systems and service for management purposes. Some of this information will consist of know how or trade secrets belonging to the service provider.
II.

According to the United Nations Convention on Persons with Disabilities, disability affects between 15 percent and 20 percent of the population in every country worldwide, and the incidence of disability in industrialized nations is increasing as their populations get older. A Forrester Research Inc. study commissioned by Microsoft found that 57 percent of working-age computer users (1864 years old) would likely benefit from accessible technology because of difficulties and impairments that affect their computer use. As the population continues to age, the number of computer users in the 6574 age range will increase significantly, as will the number of people who would benefit from accessible technology. For more than 25 years, Microsoft has been at the forefront of efforts to make computers and the Internet more accessible. These efforts include:
Building accessibility options into Windows and

other Microsoft products that let users personalize the computer display, mouse, keyboard, sound, and speech options. Working with AT companies to facilitate the creation of software and hardware products such as screen readers, magnifiers, and specialty keyboards that enable individuals with significant vision, hearing, dexterity, language or learning needs to use computers. Creating developer technologies and tools that make it easier to build AT products and accessible applications that interoperate and work well together. Today, a vibrant worldwide ecosystem of accessible technology tools, technologies, and solutions is helping enable and empower millions of people of all ages and abilities. However, as the technology landscape continues to evolve, so too must the building blocks that support this accessible technology ecosystem. Of particular significance is the rise of cloud computing, which encompasses a major shift in how technology will be used in the years ahead and what people and organizations can do with it. In the simplest terms, cloud computing represents the convergence of smart Internet-connected devices, innovative software applications, and data storage and services hosted on the Internet. This convergence of hosted data storage and services, applications, and devices is sometimes referred to as three screens and a cloud. (The three screens being laptop or desktop computers, smartphones, and TVs.) Advances in client-based operating systems like Windows 7 and applications like Microsoft Office 2010 are powering many of these devices with more intuitive user interfaces and the ability to perform increasingly complex computing functions, such as

EVALUATING MICROSOFT PROGRAMS ABOUT FUTURE OF CLOUD COMPUTING

As computers and the Internet play an increasingly important part in peoples livesat work, at school, and at homemaking technology accessible to people with a wide range of abilities is an imperative. Accessible technology makes it easier for people with visual, dexterity, cognitive and speech needs to use computers and other devices to communicate and share information, access government services, and secure and retain employment.

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

21

data visualization and real-time simulation of 3D environments. At the same time, development of large data centers capable of storing huge volumes of data and hosting a rapidly expanding universe of online applications and services is opening new realms of communication, collaboration, commerce, learning, and entertainment. Microsoft Office 365, the cloudbased version of Microsoft Office, utilizes the power of these online capabilities to simplify sharing, collaboration and storage of Office documents, spreadsheets and presentations. Microsoft also offers many other online services, solutions, and platforms that are enabling individuals, businesses, and governments to take advantage of the convenience and flexibility of the cloud. For individuals, the cloud has the potential to offer seamless, on-demand access to content, social networks, and online services across a range of devices. For organizations, the cloud offers the ability to dynamically scale IT capacity depending on evolving needs, better manage spending on IT infrastructure, and concentrate more resources on core business functions. As these shifts pick up steam, Microsoft believes it is important to expand the vision of an accessible computing ecosystem to encompass technologies, tools, products, and services that enable all people to benefit from the cloud and to more easily control the devices around them to live a more independent life. As a starting point, people will always need a smart client device with built-in accessibility capabilities to serve as a gateway to the cloud and to perform tasks offline or when no Internet access is available. When browsing the Internet, accessing social networking sites, or tapping into cloud services, users will use applications or a web browser such as Internet Explorer to access and retrieve information. These devices also enable individuals who may require AT applications or specialty computing hardware that enables text to be read, video to be captioned, or that facilitates hands-free entry of information. Over time, we envision a world of accessible, cloudconnected devices powered by Microsoft technologies that an individual can rely on to understand and interpret their needs, preferences, and immediate surroundings to create an adaptive experience. In combination with reliable broadband connectivity and the virtually unlimited computing power of the cloud, it will be possible for these preferences to follow users wherever they go and to supplement the capabilities of any particular device in ways that increase communication and collaboration and help reduce social isolation at work and at home. Microsofts commitment to creating an ecosystem of accessible technologies runs deep, and includes development of a number of core accessible technology building blocks. In 2005, Microsoft User

Interface Automation (UI Automation) introduced a new approach to exchanging information between Windows applications, web content and ATs. UI Automations unique approach allows application developers to make their software compatible with AT products such as screen readers for users with limited sight and on-screen keyboards for users with limited physical access. It also allows AT developers to design their products to be forward compatible with future versions of those applications. UI Automation is supported across Microsofts popular development frameworks, including Microsoft Silverlight, the .NET Framework, Windows Presentation Foundation, and other frameworks that have been in use for decades. Developers use these frameworks to create interactive user experiences, content, and video for the PC, web, mobile devices, and the cloud. Support for UI Automation was first added to Microsoft Internet Explorer 8, and then significantly expanded in Internet Explorer 9, released in early 2011. As developers increasingly embrace Internet Explorer as a platform for deploying the latest HTML5 cloud-based applications, support for UI Automation in the browser will enable AT developers to make richer, immersive web content and applications accessible to people with disabilities. By extending support for UI Automation across all its platforms such as the Windows client and Windows server operating systems, Internet Explorer, and Silverlight Microsoft is ensuring that as the cloud evolves more of its potential and power is accessible to people with disabilities. Two of the most promising areas of innovation to help users tap the power of the cloud are speech recognition and text-to-speech technology. Speech recognition (and commanding) technologies allow computers to hear and understand human speech. This is an important feature for people with hand or arm injuries, paraplegia, or absence of fine motor control. Microsoft has two primary investments in this area. Windows Speech Recognition listens and reacts to spoken commands, enabling a user to run applications and interact with their Windows computer. For example, it allows a user to dictate an e-mail, surf the web, or fill out online forms by voice instead of with a keyboard and mouse. Microsoft Tellme is a cloud-based speech platform that enables speech recognition in a range of Microsoft products, including Windows Phone 7, Bing, Office, Exchange Server, and Office Communications Server. It also allows developers of third-party products to add speech recognition to their solutions. In Windows Phone 7, for example, speech recognition technology supports phone dialing, navigation and web search. The Windows Phone 7.5 update extended this to also include dictating and sending a text

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

22

message and advanced phone functions, such as call forwarding, redial and contact list. The Bing for Mobile search engineavailable as an application for many web-enabled phones or as a web page accessible from a mobile phone browserlets users speak a search term instead of typing it. Similarly, speech recognition technology in Kinectan add-on peripheral for the Xbox 360 game consolelets individuals use voice commands to have live video chats, play music and videos, and watch thousands of live and on-demand ESPN sporting events without ever using a game controller. Tellmes cloud-based platform analyzes billions of speech interactions to improve the underlying speech recognition engine and better understand a users intent. The more you use it, the more it learns and more accurate it becomes. Text-to-speech (TTS) technologyalso known as speech synthesisenables computers to talk. This capability is used in screen readers for people who are blind, reading aids for people with reading disabilities, and as a synthetic voice for people who are unable to speak. Microsoft has three key investments in TTS: speech engines installed in the Windows operating system, available as a cloud service, and integrated into specific applications. The cloud service and installed speech engines offer value for assistive technology vendors building accessibility solutions. One example of TTS in the cloud is through the Bing Translator, where a consumer can type a phrase, have it translated into one of 18 languages and have the resulting phrase read aloud. For people with visual impairments or reading disabilities, the TTS engine in Windows 7 powers a screen reader called Narrator, which reads on-screen text aloud and can help the user navigate the interface without seeing the screen. It also drives the Speak feature in Office 2010, which enables a computer to play back written text as spoken words. Lync 2010, Microsofts newest unified communications tool, uses TTS technology so users can more easily connect, communicate, and share information in the cloud. For instance, incoming instant messages and other communications requests can be read out by a screen reader and accompanied by audio cues. Notifications are also read out as they appear. Just as the cloud itself is a work in progress, so, too, are Microsofts efforts to enable the cloud for people of all abilities. As we continue to invest in building a more seamless cloud-based spectrum of solutions, we will also back the contributions of other developers of accessible products, services, and content. We believe that a healthy, market-driven ecosystem comprised of many products, business models, and development philosophies is the fastest route to achieving a more accessible cloud.

Many different approaches are represented in the current ecosystem, and Microsoft supports many of them. For example, Microsoft is working in partnership with an organization called LucyTech and with government organizations worldwide to pilot a commercially-viable model for cloud-based accessibility solutions, which will be made available at little or no cost to consumers. Although LucyTech will build on existing cloud, platform, and application investments, it is pushing the boundaries of existing technologies and cloud infrastructure and will include some new cloud-based service offerings to fill critical gaps. It is a distributed accessibility solution with the promise to provide globally available AT solutions. Another international effort we support is the Global Public Inclusive Infrastructure (GPII). The goal of GPII is to increase awareness of the existing accessibility infrastructure (such as APIs, operating system features, and tools) and accelerate development of new accessibility building blocks that make the benefits of the cloud more easily available to everyone. Participants in the GPII process agree that a client device and associated operating system form the foundation of accessibility solutions and are the first line of functionality that people will use. There also is a shared understanding that cloud-based services offer significant opportunities to complement and extend those built-in capabilities to create new and better customer-ready features. For example, a fullydeveloped accessible cloud infrastructure would enable people who cannot use standard interfaces and content to use a broadband connection to invoke the interface adoptions they need, automatically, on any device, anywhere and anytime. The GPII vision aligns with Microsofts long-standing desire for an adaptive computing environment. In some respects, GPII is helping clarify the vision and need for better cloudconnected accessibility products and services, while the LucyTech project is focusing on the development and delivery of a working solution that fully utilizes existing Microsoft cloud technologies, services, and commercial AT products to realize this vision. Microsoft sees value in both projects, so is participating in and supporting both efforts. Governments around the world are increasingly aware of the enormous potential of cloud computing to benefit citizens and society. Microsoft has developed a set of policy principles to support its commitment to both digital inclusion and to the cloud. Microsoft believes these principles are at the core of effective policy frameworks for accessibility and the cloud, and will encourage the widespread development and implementation of accessible technologies, products, programs, and services. These policies include:

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

23

Harmonizing International Standards and Procurement Approaches: Market-led, globally


harmonized standards and the procurement policies that reference them are the foundation of accessible and interoperable IT products and cloud services. Globally-harmonized standards bring major advantages to both business and individual users of accessible technology. Because the speed of innovation in the IT sector can outpace legislative measures put in place to encourage accessibility and promote cloud services, Microsoft believes it is important that globally harmonized standards constitute the basis of product development. Promoting Effective Conformance: Accessible technology can be advanced most effectively by minimizing undue regulatory burden. When standards for cloud and accessibility are referenced in government procurement policies, Microsoft supports effective and rigorous conformance mechanisms that provide adequate assurance of compliance, encourage innovation, and promote consumer choice. One such example is the voluntary supplier declaration of accessibility, as defined in the ISO/IEC 17050 standard and used in a number of countries around the world.

open source software, as well as on open standards and proprietary standards, to develop accessibility solutions. By encouraging choice, governments will enable the broadest possible array of solutions for people with disabilities and drive down the cost of building accessible mainstream products.

Enhancing the Ecosystem: In order for technology companies to invest in and develop accessible cloud solutions, they must understand user needs and be confident that there will be a market for such solutions. Today, the accessible technology PC ecosystem is a vibrant and healthy collection of more than 350 products that offer tremendous customer benefit. Assistive technologies for the cloud will require similar breadth and depth. Microsoft believes that governments should take steps to ensure accessibility is not undermined by cloud policies that put the existing AT ecosystem at risk or that diminish the ability of entrepreneurs to continue serving the disability community.
III.

KALMAN FILTER WITH A RELATIONSHIP


TO THE RECURSIVE BAYESIAN ESIMATION:

Promoting Interoperability: Interoperability is


crucial to creating an accessible cloud computing environment for users with a broad range of abilities. It is a key feature of Microsoft accessible technologies and we advocate for public policies that allow a variety of complementary ways to achieve it. We believe that governments should not engineer interoperability by prescribing specific approaches and excluding others, but instead should allow IT vendors and purchasers to use the solutions that best suit their needs. AT/IT interoperability standards such as ISO 13066 will help ensure that vendors cloud-ready technologies are also interoperable with assistive technology. Aligning user needs with a dynamic and growing array of devices, technology platforms, development tools, assistive technologies, and services is a complex challenge that will require industry-wide innovation and collaboration, appropriate government policies, and the active involvement of the disability community.

The Kalman filter can be considered to be one of the simplest dynamic Bayesian networks. The Kalman filter calculates estimates of the true values of measurements recursively over time using incoming measurements and a mathematical process model. Similarly, recursive Bayesian estimation calculates estimates of an unknown probability density function (PDF) recursively over time using incoming measurements and a mathematical process model (for example in this place it means model of cloud resources). In recursive Bayesian estimation, the true state is assumed to be an unobserved Markov process, and the measurements are the observed states of a hidden Markov model (HMM).

Ensuring Technology Neutrality: Technologyneutral policies promote innovation, eliminate barriers to trade and market access, enhance competition, and prevent bias in government procurement. Microsoft believes that a flexible cloud policy approach based on a commitment to technology neutrality and choice is particularly appropriate in the rapidly evolving IT environment. Customers and governments today increasingly rely on a combination of proprietary and

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

24

Because of the Markov assumption, the true state is conditionally independent of all earlier states given the immediately previous state. Note that the PDF at the previous time-step is inductively assumed to be the estimated state and covariance. This is justified because, as an optimal estimator, the Kalman filter makes best use of the measurements; therefore the PDF for given the measurements is the Kalman filter estimate.
IV.

Similarly the measurement at the k-th time-step is dependent only upon the current state and is conditionally independent of all other states given the current state.

CONCLUSION

Using these assumptions the probability distribution over all states of the hidden Markov model can be written simply as:

However, when the Kalman filter is used to estimate the state x, the probability distribution of interest is that associated with the current states conditioned on the measurements up to the current time-step. This is achieved by marginalizing out the previous states and dividing by the probability of the measurement set. This leads to predict and update steps of the Kalman filter written probabilistically. The probability distribution associated with the predicted state is the sum (integral) of the products of the probability distribution associated with the transition from the (k 1)-th time-step to the k-th and the probability distribution associated with the previous state, over all possible . The measurement set up to time t is:

Ordering of these paper consist of an abstract which is provide brief research about definition of cloud computing and obligations to migrate to such comprehensive network, also in this section authors of paper tell briefly about new methods which can be used for incrementing the security and reliability levels of such network. After that a reader can read introduction, which is include basic definitions of cloud computing and the necessity of availability of such network in these days. After that, in the next section, a discussion about Microsoft programs about using of cloud computings on his prospect products were present. By studying this section, reader acquire general perception about future of cloud computing, because in this section programs of the king of computer industry Microsoft Corp. were explain. After studying these sections and understand about all aspects and necessities of such network, using of one evolutionary algorithm on cloud computing for the purpose of gaining more security and liability were discuss.

REFERENCES:
The probability distribution of the update is proportional to the product of the measurement likelihood and the predicted state.
[1]

[2]

The denominator:
[3]

is a normalization term. The remaining probability density functions are:


[4]

Mehdi Darbandi Applying Kalman Filtering in solving SSM estimation problem by the means of EM algorithm with considering a practical example; published by the Journal of Computing Springer, 2012; USA. Mehdi Darbandi; Comparison between miscellaneous platforms that present for cloud computing and accreting the security of these platforms by new filter; published by the Journal of Computing Springer, 2012; USA. Mehdi Darbandi; New and novel technique in designing electromagnetic filter for eliminating EMI radiations and optimization performances; published by the Journal of Computing - Springer, 2012; USA. Mehdi Darbandi; Appraising the role of cloud computing in daily life and presenting new solutions for stabilization of this technology;

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

JOURNAL OF COMPUTING, VOLUME 4, ISSUE 10, OCTOBER 2012, ISSN (Online) 2151-9617 https://sites.google.com/site/journalofcomputing WWW.JOURNALOFCOMPUTING.ORG

25

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12] [13]

published by the Journal of Computing - Springer, 2012; USA. Mehdi Darbandi; Cloud Computing make a revolution in economy and Information Technology; published by the Journal of Computing - Springer, 2012; USA. Mehdi Darbandi; Considering the high impact of gettering of silicon on fabrication of wafer designing and optimize the designing with new innovative solutions; published by the Journal of Computing Springer, 2012; USA. Mehdi Darbandi; Developing concept of electromagnetic filter design by considering new parameters and use of mathematical analysis; published by the Journal of Computing - Springer, 2012; USA. Mehdi Darbandi; Is the cloud computing real or hype Affirmation momentous traits of this technology by proffering maiden scenarios; published by the Journal of Computing Springer, 2012; USA. Mehdi Darbandi; Measurement and collation overriding traits of computer networks and ascertainment consequential exclusivities of cloud computing by the means of Bucy filtering; published by the Journal of Computing - Springer, 2012; USA. Mehdi Darbandi; Unabridged collation about multifarious computing methods and outreaching cloud computing based on innovative procedure; published by the Journal of Computing - Springer, 2012; USA. Mehdi Darbandi; Scrutiny about all security standards in cloud computing and present new novel standard for security of such networks; published by the Journal of Computing - Springer, 2012; USA. Microsofts Accessible Technology Vision and Strategy; September 2011. IEEE Standards and research papers about Cloud Computing and different aspects of such social networks.

Mehdi Darbandi: received his


B.Sc. degree in Electrical Engineering from University of Mashhad in 2012. His research areas are Kalman Filter, Matlab Simulink, Evolutionary Algorithms, and Cloud Computing. Now he is master student in Iran University of Science and Technology (IUST); Tehran, Iran.

Biographies:
Jalal Nakhaei:
Student in Art Engineering in Science and Research is currently PhD. and Architecture

Branch Islamic Azad University; Tehran, Iran. His research areas are Information Technology (IT), Secure Spaces, and Structures.

2012 Journal of Computing Press, NY, USA, ISSN 2151-9617

You might also like