An OptiAssign-PSO Based Optimisation for Multi-Objective Multi-Level Multi-Task Scheduling in Cloud Computing Environment
Advanced Analytics for Disease Tracking & Remote Intravenous Injection Monitoring
DevKraft - Fueling Collaboration in Coding Challenges
Comparative Security and Compliance Analysis of Serverless Computing Platforms: AWS Lambda, Azure Functions, and Google Cloud Functions
Blockchain Healthcare Management using Patients
A Comprehensive Review of Security Issues in Cloud Computing
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology
GridSim Installation and Implementation Process
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Genetic Algorithm Using MapReduce - A Critical Review
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
Encroachment of Cloud Education for the Present Educational Institutions
Fog computing systems, by design, have a high degree of redundancy in terms of computing and storage resources. To make the most of this redundancy, coding techniques can be used to transform the data being transferred and processed. Two specific coding ideas that have been proposed for use in fog computing are minimum bandwidth codes and minimum latency codes. These codes have the potential to significantly reduce data transfer capacity utilization and computation inactivity. Minimum bandwidth codes focus on reducing the amount of data that needs to be transferred, while minimum latency codes focus on reducing the amount of time it takes for data to be processed. These two coding methods can be combined in a linked coding structure that allows for a trade-off between computation inactivity and communication load, leading to improved system performance. Fog computing has been proposed as a solution to meet the management requirements of the growing Internet of Things (IoT) and smart networks. This research breaks down the capabilities and challenges of fog computing in smart networks, presents the state-of-theart in the field, defines a fog computing-based smart grid, and provides a use case scenario for the proposed model.
The interior technology of the blockchain is the decentralized ledger, which can be used to record and secure transaction data across many parties in a blockchain. Cryptocurrencies such as Bitcoin, Ethereum, and other coins can use the blockchain to perform transactions between infinity and unknown parties without the need for an intermediary. A blockchain-based supply chain can support participants in recording price, location, cost, certification, quality, and other significant information. As a characteristic of blockchain, the information available within the blockchain can provide traceability of the material supply chain, reduce losses from the fake and grey markets, improve visibility and agreement over outsourced contract manufacturing, and effectively enhance an organization's position as a leader in responsible manufacturing. This paper proposed a Supply Chain Management (SCM) framework and tested it against various blockchain-based new age attacks, like peer-to-peer network-based attacks and consensus and ledger-based attacks, to analyze the impact of SCM.
When it comes to the use of the Internet of Things (IoT), the healthcare sector is set to become the next frontier of the digital revolution thanks to the Internet of Medical Things (IoMT). Due to their weight, importance, and sensitivity, these files must be protected in the strictest manner. Now that blockchain is becoming more widespread, scientists are concentrating on how to use blockchain tactics within healthcare management to improve data security. Nevertheless, owing to the differing needs of these two technologies, such integration is exceptionally complex and demanding. In order to help users, take full control of their data, this study provides an overview of the current state of blockchain platforms for the IoMT by focusing on the difficulties presented by combination systems. This article will examine blockchain's use in healthcare IoT, including supply chain transparency, health data arrangement, smart contracts, and IoT security for remote monitoring. The final portions focus on challenges and potential developments in the future.
Cloud computing offers services to the end users, or the consumers, in a convenient and on-demand fashion. This computing model has several other features which increase its dependency to an incomparable degree, such as resource pooling, pay-per-use (economic), scalability, rapid elasticity, security, and availability. This model allows big or small organizations to get started with the work and to focus primarily on the business modules without worrying about the underlying infrastructure setup costs, i.e., the cost of powerful servers, expensive network devices, etc. Cloud computing finds a very important utility in e-Governance, which allows government applications to offer uninterrupted services to its citizens. Cost-effective, scalable, and secure e-services are possible with the integration of cloud computing. This paper shows the importance of cloud computing in e-Governance.
High-Performance Computing (HPC) has evolved into a tool that is essential to every researcher's work. The vast majority of issues that arise in contemporary research may be simulated, explained, or put to the test through the use of computer simulations. Researchers often struggle with computational issues while concentrating on the issues that arise from the study. Because the majority of researchers have a minimal or nonexistent understanding of low-level computer science, it tends to view computer programs as extensions of the thoughts and bodies rather than as fully independent systems. As a result of the fact that computers do not function in the same manner as people do, the typical outcome is lowperformance computing in situations where high-performance computing would be expected.