i-manager's Journal on Cloud Computing (JCC)


Volume 3 Issue 4 August - October 2016

Research Paper

Cloud-Based ERP for Arab Manufacturing Firms

Subramaniam Arunachalam* , Mohammad Alsadi**, Aloysius A. Edohis***
*-*** School of Architecture, Computing and Engineering, University of East London, UK.
Arunachalam. S., Alsadi. M., and Edoh. A. (2016). Cloud-Based ERP for Arab Manufacturing Firms. i-manager’s Journal on Cloud Computing, 3(4), 1-6. https://doi.org/10.26634/jcc.3.4.13592

Abstract

Enterprise Resource Planning (ERP) is a successful technique of integrating business processes to one computer system so that the information is easily available and accessible to everybody in the system. Even though the technique is successful and helps in reducing the lead times, inventory costs, labour costs, etc., the adoption rate is very low in Arab. This study focuses on the problem areas that Arab companies face while implementing ERP in their business processes. The study explores how ERP can be implemented successfully in Arab medium sized manufacturing firms and to understand why only some firms are able to implement ERP successfully, while others experience ERP failure. The study involves an empirical analysis to identify the issues and barriers in adopting ERP and outlines a research methodology to establish a novel framework to implement cloud-based ERP suitable for Arab manufacturing firms.

Research Paper

Machine Learning methods for Cloud Computing

P. Kiran Rao* , R. Sandeep Kumar**
*-** Assistant Professor, Department of Computer Science and Engineering, G. Pullaiah College of Engineering & Technology, Kurnool, AP, India.
Rao. P. K., and Kumar. R. S. (2016). Machine Learning methods for Cloud Computing. i-manager’s Journal on Cloud Computing, 3(4), 7-11. https://doi.org/10.26634/jcc.3.4.13593

Abstract

Due to the huge use of data made available in cloud computing, cloud computing challenged with issues of security on demand application resource management and self-monitoring without latency. This paper explores supervised and unsupervised learning methods on resource provisioning, monitoring, and management topics in cloud computing and examines a number of methods which propose to make use of machine learning to either allow for more self-monitored on demand application resource management or used to know the work level of resources in infinity cloud computing. The authors have also compared regular techniques in resource management in cloud computing like FIFO, VMs cluster management, etc., with machine learning methods.

Research Paper

An IoT Based Motion Detection using Raspberry PI

Yerrajennugari Raj Kumar* , Mutala Kishore Reddy**, Dr. D. Rajaveerappa***
*-** PG Scholar, Department of Electronics and Communication Engineering, MITS College, Madanapalle, India.
*** Professor, Department of Electronics and Communication Engineering, MITS College, Madanapalle, India.
Kumar. Y. R., Reddy. M. K., and Rajaveerappa. D. (2016). An IoT Based Motion Detection using Raspberry PI. i-manager’s Journal on Cloud Computing, 3(4), 12-17. https://doi.org/10.26634/jcc.3.4.13594

Abstract

This paper intends to depict a security caution framework having low handling power chips utilizing Internet of things, which screens and gets alert when a movement is distinguished and sends photographs and recordings to a cloud server. Web of things is the correspondence of anything with any other things, the correspondence basically refers to exchanging of usable information, for instance a sensor in a cloud to screen and control the temperature. It is evaluated that by 2020, there will be around 50 billion web empowered gadgets. It helps in observing and controlling of home appliances from outside and within industry for checking the hardwares and so on. In present days, cost is an essential element. So, this work will be valuable to principally diminish the cost for observing the movements. So, to actualize this technique, the authors have utilized Raspberry pi, to act as a server inside the home to capture as photos. Later, these photos are changed into video, which will be sent to a Web Page already developed or sent to a URL, or an IP address. With this goal, we can perceive what is occurring at our home or office by simply entering the URL or IP address.

Research Paper

Effective Key Management (EKM) for Class Based Cloud Data

Dileep Kumar Reddy P* , R. Praveen Sam**
* Lecturer, Department of Computer Science and Engineering, JNTUA College of Engineering, Ananthapuramu, India.
** Professor, Department of Computer Science and Engineering, GPREC, Kurnool, India.
Reddy. P. D. K., and Sam. R. P. (2016). Effective Key Management (EKM) for Class Based Cloud Data. i-manager’s Journal on Cloud Computing, 3(4), 18-25. https://doi.org/10.26634/jcc.3.4.13595

Abstract

Security in Class Based Cloud Data is undoubtedly one of the challenging tasks in Cloud Computing. Class based Cloud structure is totally a new concept where the cloud can be divided into a number of classes. Through this, a protected cloud could be implemented in hybrid cloud which helps to reduce the time and cost of searching and maintenance. Normally, the classes can be divided based on the usage of the cloud and for each and every class, there is a key for data security. This paper explains about the key management to different classes and allows the authenticated users to use them.

Research Paper

Information Replication in Cloud Computing Datacenters Using Most Efficient Overall Performance and Safety

M. Saraswathi Mani* , V. Ramya**
* Research Scholar, Department of Computer Science, Government College (Autonomous), Nandanam, Chennai, India.
** Assistant Professor, Department of Computer Science, Government College (Autonomous), Nandanam, Chennai, India.
Mani. S. M., and Ramya. V. (2016). Information Replication In Cloud Computing Datacenters Using Most Efficient Overall Performance And Safety. i-manager’s Journal on Cloud Computing, 3(4), 26-33. https://doi.org/10.26634/jcc.3.4.13596

Abstract

The online records storage, a cloud utility wishes clients to move the records in cloud's virtualized and shared environment to be able to end in numerous safety issues. Pooling, a property of a cloud, permits the resources (assets) to be shared among numerous clients. Moreover, the shared assets are additionally reassigned to various users at a few occurrence of them, which can gradually end in an information compromise through data recovery methodologies. Multi-tenant virtualized surroundings could likely result in a VM to urge away the bounds of virtual tool screen (VM). The open VM can intervene with entirely different VM to get entry to unauthorized data. In addition, multi-tenant virtualized network gets right to entry for flexible data privacy and integrity. Additionally, to improve the retrieval time; the information is fragmented over the nodes. The results of the simulations explain protection and performance have resulted in increased security level of information.