An OptiAssign-PSO Based Optimisation for Multi-Objective Multi-Level Multi-Task Scheduling in Cloud Computing Environment
Advanced Analytics for Disease Tracking & Remote Intravenous Injection Monitoring
DevKraft - Fueling Collaboration in Coding Challenges
Comparative Security and Compliance Analysis of Serverless Computing Platforms: AWS Lambda, Azure Functions, and Google Cloud Functions
Blockchain Healthcare Management using Patients
A Comprehensive Review of Security Issues in Cloud Computing
An Extended Min-Min Scheduling Algorithm in Cloud Computing
Data Quality Evaluation Framework for Big Data
An Architectural Framework for Ant Lion Optimization-based Feature Selection Technique for Cloud Intrusion Detection System using Bayesian Classifier
Be Mindful of the Move: A Swot Analysis of Cloud Computing Towards the Democratization of Technology
GridSim Installation and Implementation Process
A Survey on Energy Aware Job Scheduling Algorithms in Cloud Environment
Genetic Algorithm Using MapReduce - A Critical Review
Clustering based Cost Optimized Resource Scheduling Technique in Cloud Computing
Encroachment of Cloud Education for the Present Educational Institutions
Enterprise Resource Planning (ERP) is a successful technique of integrating business processes to one computer system so that the information is easily available and accessible to everybody in the system. Even though the technique is successful and helps in reducing the lead times, inventory costs, labour costs, etc., the adoption rate is very low in Arab. This study focuses on the problem areas that Arab companies face while implementing ERP in their business processes. The study explores how ERP can be implemented successfully in Arab medium sized manufacturing firms and to understand why only some firms are able to implement ERP successfully, while others experience ERP failure. The study involves an empirical analysis to identify the issues and barriers in adopting ERP and outlines a research methodology to establish a novel framework to implement cloud-based ERP suitable for Arab manufacturing firms.
Due to the huge use of data made available in cloud computing, cloud computing challenged with issues of security on demand application resource management and self-monitoring without latency. This paper explores supervised and unsupervised learning methods on resource provisioning, monitoring, and management topics in cloud computing and examines a number of methods which propose to make use of machine learning to either allow for more self-monitored on demand application resource management or used to know the work level of resources in infinity cloud computing. The authors have also compared regular techniques in resource management in cloud computing like FIFO, VMs cluster management, etc., with machine learning methods.
This paper intends to depict a security caution framework having low handling power chips utilizing Internet of things, which screens and gets alert when a movement is distinguished and sends photographs and recordings to a cloud server. Web of things is the correspondence of anything with any other things, the correspondence basically refers to exchanging of usable information, for instance a sensor in a cloud to screen and control the temperature. It is evaluated that by 2020, there will be around 50 billion web empowered gadgets. It helps in observing and controlling of home appliances from outside and within industry for checking the hardwares and so on. In present days, cost is an essential element. So, this work will be valuable to principally diminish the cost for observing the movements. So, to actualize this technique, the authors have utilized Raspberry pi, to act as a server inside the home to capture as photos. Later, these photos are changed into video, which will be sent to a Web Page already developed or sent to a URL, or an IP address. With this goal, we can perceive what is occurring at our home or office by simply entering the URL or IP address.
Security in Class Based Cloud Data is undoubtedly one of the challenging tasks in Cloud Computing. Class based Cloud structure is totally a new concept where the cloud can be divided into a number of classes. Through this, a protected cloud could be implemented in hybrid cloud which helps to reduce the time and cost of searching and maintenance. Normally, the classes can be divided based on the usage of the cloud and for each and every class, there is a key for data security. This paper explains about the key management to different classes and allows the authenticated users to use them.
The online records storage, a cloud utility wishes clients to move the records in cloud's virtualized and shared environment to be able to end in numerous safety issues. Pooling, a property of a cloud, permits the resources (assets) to be shared among numerous clients. Moreover, the shared assets are additionally reassigned to various users at a few occurrence of them, which can gradually end in an information compromise through data recovery methodologies. Multi-tenant virtualized surroundings could likely result in a VM to urge away the bounds of virtual tool screen (VM). The open VM can intervene with entirely different VM to get entry to unauthorized data. In addition, multi-tenant virtualized network gets right to entry for flexible data privacy and integrity. Additionally, to improve the retrieval time; the information is fragmented over the nodes. The results of the simulations explain protection and performance have resulted in increased security level of information.