Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Western University (6)
- Selected Works (4)
- Technological University Dublin (4)
- Florida International University (3)
- University of Nebraska - Lincoln (3)
-
- Embry-Riddle Aeronautical University (2)
- University for Business and Technology in Kosovo (2)
- University of Massachusetts Amherst (2)
- University of Texas at El Paso (2)
- Walden University (2)
- Wayne State University (2)
- Wright State University (2)
- Association of Arab Universities (1)
- California State University, San Bernardino (1)
- Georgia Southern University (1)
- Grand Valley State University (1)
- Maurer School of Law: Indiana University (1)
- Michigan Technological University (1)
- Missouri University of Science and Technology (1)
- Purdue University (1)
- Sacred Heart University (1)
- Texas A&M University-Commerce (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of New Haven (1)
- University of North Dakota (1)
- Virginia Commonwealth University (1)
- Publication Year
- Publication
-
- Electronic Thesis and Dissertation Repository (5)
- FIU Electronic Theses and Dissertations (3)
- Browse all Theses and Dissertations (2)
- Conference papers (2)
- Doctoral Dissertations (2)
-
- Library Philosophy and Practice (e-journal) (2)
- Open Access Theses & Dissertations (2)
- UBT International Conference (2)
- Walden Dissertations and Doctoral Studies (2)
- Wayne State University Dissertations (2)
- Articles (1)
- Computer Science Faculty Publications (1)
- Computer Science and Computer Engineering Undergraduate Honors Theses (1)
- Culminating Experience Projects (1)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (1)
- Dissertations (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Electrical & Computer Engineering and Computer Science Faculty Publications (1)
- Electrical and Computer Engineering Publications (1)
- Electronic Theses and Dissertations (1)
- Faculty Publications (1)
- Faith Joel Shimba (1)
- Federal Communications Law Journal (1)
- Future Computing and Informatics Journal (1)
- Hong-Ning Dai (1)
- International Journal of Aviation, Aeronautics, and Aerospace (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of International Technology and Information Management (1)
- Katarina Grolinger (1)
- Librarian Publications (1)
- Publication Type
Articles 1 - 30 of 49
Full-Text Articles in Entire DC Network
Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap
Infrastructure-As-Code: Automating The Deployment On Aws Using Terraform, Srikar Pratap
Culminating Experience Projects
In my master’s project, I used Terraform to create a scalable infrastructure on Amazon Web Services (AWS) for my personal website. Terraform is an open-source infrastructure-as-code (IAC) tool that allows you to create, manage and provision infrastructure resources, such as virtual machines, storage accounts, networks, and more, across multiple cloud providers and on-premises data centers using a declarative configuration language. A scalable infrastructure is important because it enables a system or application to handle increasing amounts of traffic or workload without experiencing performance issues or downtime. It ensures that the system remains responsive, available, and reliable as an organization grows …
Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban
Enhancing Query Processing On Stock Market Cloud-Based Database, Hagger Essam, Ahmed G. Elish, Essam M. Shaban
Future Computing and Informatics Journal
Cloud computing is rapidly expanding because it allows users to save the development and implementation time on their work. It also reduces the maintenance and operational costs of the used systems. Furthermore, it enables the elastic use of any resource rather than estimating workload, which may be inaccurate, as database systems can benefit from such a trend. In this paper, we propose an algorithm that allocates the materialized view over cloud-based replica sets to enhance the database system's performance in stock market using a Peer-to-Peer architecture. The results show that the proposed model improves the query processing time and network …
Cost-Efficient Resource Provisioning For Cloud-Enabled Schedulers, Lurdh Pradeep Reddy Ambati
Cost-Efficient Resource Provisioning For Cloud-Enabled Schedulers, Lurdh Pradeep Reddy Ambati
Doctoral Dissertations
Since the last decade, public cloud platforms are rapidly becoming de-facto computing platform for our society. To support the wide range of users and their diverse applications, public cloud platforms started to offer the same VMs under many purchasing options that differ across their cost, performance, availability, and time commitments. Popular purchasing options include on-demand, reserved, and transient VM types. Reserved VMs require long time commitments, whereas users can acquire and release the on-demand (and transient) VMs at any time. While transient VMs cost significantly less than on-demand VMs, platforms may revoke them at any time. In general, the stronger …
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
Library Philosophy and Practice (e-journal)
With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …
Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni
Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni
Library Philosophy and Practice (e-journal)
Background: This study aims to analyze the work done in domain of cloud computing and edge computing using artificial intelligence from 2015 to 2021. Recent research shows the bibliometric methods are useful for such kind of analysis. Thus in this paper analysis is carried out using the bibliometric methods.
Methods: different articles on edge computing and edge intelligence were retrieved using one of the most popular database- Scopus. The research articles are considered between 2015 to 2021. Scopus analyzer is used for getting some analysis results such as documents by year, source, country and so on. VOSviewer Version 1.6.16 is …
Digital Twin-Based Cooperative Control Techniques For Secure And Intelligent Operation Of Distributed Microgrids, Ahmed Aly Saad Ahmed
Digital Twin-Based Cooperative Control Techniques For Secure And Intelligent Operation Of Distributed Microgrids, Ahmed Aly Saad Ahmed
FIU Electronic Theses and Dissertations
Networked microgrids play a key role in constructing future active distribution networks for providing the power system with resiliency and reliability against catastrophic physical and cyber incidents. Motivated by the increasing penetration of renewable resources and energy storage systems in the distribution grids, utility companies are encouraged to unleash the capabilities of the distributed microgrid to work as virtual power plants that can support the power systems. The microgrids nature is transforming the grid and their control systems from centralized architecture into distributed architectures. The distributed networked microgrids introduced many benefits to the future smart grids, it created many challenges …
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
FIU Electronic Theses and Dissertations
Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.
The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters …
Does The Age Of An It Executive Impact Adoption Levels Of Cloud Computing Services?, Marcus L. Smith
Does The Age Of An It Executive Impact Adoption Levels Of Cloud Computing Services?, Marcus L. Smith
Faculty Publications
This author researched previously the personal decision factors considered by information technology (IT) executives when making the cloud computing services adoptionchoice. The conclusions in that work (Smith, Jr., 2016) supported four hypotheses, namely, (a) advancement, recognition and satisfaction from accomplishments, (b) top management support, (c) diminishment of personal image, and (d) a pattern of technology readiness have a positive influence on business intentions to adopt cloud computing services. Interestingly, a fifth hypothesis, diminishment of personal image, was found to have a negative influence on business intentions. The relationship between age of the survey respondents and adoption levels was highlighted in …
Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam
Algorithms For Achieving Fault-Tolerance And Ensuring Security In Cloud Computing Systems, Md. Tariqul Islam
Theses and Dissertations--Computer Science
Security and fault tolerance are the two major areas in cloud computing systems that need careful attention for its widespread deployment. Unlike supercomputers, cloud clusters are mostly built on low cost, unreliable, commodity hardware. Therefore, large-scale cloud systems often suffer from performance degradation, service outages, and sometimes node and application failures. On the other hand, the multi-tenant shared architecture, dynamism, heterogeneity, and openness of cloud computing make it susceptible to various security threats and vulnerabilities. In this dissertation, we analyze these problems and propose algorithms for achieving fault tolerance and ensuring security in cloud computing systems.
First, we perform a …
Applications Of Fog Computing In Video Streaming, Kyle Smith
Applications Of Fog Computing In Video Streaming, Kyle Smith
Computer Science and Computer Engineering Undergraduate Honors Theses
The purpose of this paper is to show the viability of fog computing in the area of video streaming in vehicles. With the rise of autonomous vehicles, there needs to be a viable entertainment option for users. The cloud fails to address these options due to latency problems experienced during high internet traffic. To improve video streaming speeds, fog computing seems to be the best option. Fog computing brings the cloud closer to the user through the use of intermediary devices known as fog nodes. It does not attempt to replace the cloud but improve the cloud by allowing faster …
Automatic Resource Management And Performance Optimization In Clusters, Yudi Wei
Automatic Resource Management And Performance Optimization In Clusters, Yudi Wei
Wayne State University Dissertations
Virtual machine is a primary way to increase resource utilizations in data centers by encapsulating multi-resource demands for applications and providing performance isolation. Moreover, the resource configuration can change on the fly to satisfy performance target. Container is another popular way for fine-grained multi-resource allocation. In this disser- tation work, we aim to design and implement an automatic resource management system to improve application performance, optimize system efficiency and job completion times in virtual and physical clusters respectively.
For large-scale applications hosted in data center, automatic resource configuration is crucial to service availability and quality. The workload dynamics, cloud dynamics …
Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu
Data-Driven Intelligent Scheduling For Long Running Workloads In Large-Scale Datacenters, Guoyao Xu
Wayne State University Dissertations
Cloud computing is becoming a fundamental facility of society today. Large-scale public or private cloud datacenters spreading millions of servers, as a warehouse-scale computer, are supporting most business of Fortune-500 companies and serving billions of users around the world. Unfortunately, modern industry-wide average datacenter utilization is as low as 6% to 12%. Low utilization not only negatively impacts operational and capital components of cost efficiency, but also becomes the scaling bottleneck due to the limits of electricity delivered by nearby utility. It is critical and challenge to improve multi-resource efficiency for global datacenters.
Additionally, with the great commercial success of …
Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez
Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez
International Journal of Aviation, Aeronautics, and Aerospace
The constant demands that technology creates in aerospace engineering also influence education. The identification of the technologies with practical application in aerospace engineering is of current interest to decision makers in both universities and industry. A social network approach enhances this scoping review of the research literature to identify the main topics using the Big Five technologies in aerospace engineering education. The conceptual structure of the dataset (n=447) was analyzed from different approaches: at macro-level, a comparative of the digital technology identified by cluster analysis with the number of co-words established in 3 and 8 and, a keyword central structure …
Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell
Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell
Conference papers
Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically …
Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma
Transiency-Driven Resource Management For Cloud Computing Platforms, Prateek Sharma
Doctoral Dissertations
Modern distributed server applications are hosted on enterprise or cloud data centers that provide computing, storage, and networking capabilities to these applications. These applications are built using the implicit assumption that the underlying servers will be stable and normally available, barring for occasional faults. In many emerging scenarios, however, data centers and clouds only provide transient, rather than continuous, availability of their servers. Transiency in modern distributed systems arises in many contexts, such as green data centers powered using renewable intermittent sources, and cloud platforms that provide lower-cost transient servers which can be unilaterally revoked by the cloud operator. Transient …
Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi
Optimization And Management Techniques For Geo-Distributed Sdn-Enabled Cloud Datacenters' Provisioning, Khaled M. Alhazmi
Electronic Thesis and Dissertation Repository
Cloud computing has become a business reality that impacts technology users around the world. It has become a cornerstone for emerging technologies and an enabler of future Internet services as it provides on-demand IT services delivery via geographically distributed data centers. At the core of cloud computing, virtualization technology has played a crucial role by allowing resource sharing, which in turn allows cloud service providers to offer computing services without discrepancies in platform compatibility.
At the same time, a trend has emerged in which enterprises are adopting a software-based network infrastructure with paradigms, such as software-defined networking, gaining further attention …
The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz
The Effect Of Data Marshalling On Computation Offloading Decisions, Julio Alberto Reyes Muñoz
Open Access Theses & Dissertations
Computation offloading consists in allowing resource constrained computers, such as smartphones and other mobile devices, to use the network for the remote execution of resource intensive computing tasks in powerful computers. However, deciding whether to offload or not is not a trivial problem, and it depends in several variables related to the environment conditions, the computing devices involved in the process, and the nature of the task to be remotely executed. Furthermore, it comprises the optimal solution to some questions, like how to partition the application and where to execute the tasks.
The computation offloading decision problem has been widely …
Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto
Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto
Electronic Theses and Dissertations
The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home.
Mpart: Miss Ratio Curve Guided Partitioning In Key-Value Stores, Daniel Byrne
Mpart: Miss Ratio Curve Guided Partitioning In Key-Value Stores, Daniel Byrne
Dissertations, Master's Theses and Master's Reports
Web applications employ key-value stores to cache the data that is most commonly accessed. The cache improves an web application’s performance by serving its requests from memory, avoiding fetching them from the backend database. Since the memory space is limited, maximizing the memory utilization is a key to delivering the best performance possible. This has lead to the use of multi-tenant systems, allowing applications to share cache space. In addition, application data access patterns change over time, so the system should be adaptive in its memory allocation. In this thesis, we address both multi-tenancy (where a single cache is used …
Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi
Mobile Cloud Computing: A New Way Of Cloud Computing, Festim Halili, Verda Misimi, Rilinda Iseini, Mirije Salihi
UBT International Conference
Cloud Computing seems to be the most promising technology of the century we are living. It provides a new manner of sharing distributed resources and services that may be part of different organizations, geographically located in different places and different time zones. Mobile Cloud Computing offers partially the same functionality, with the only additional requirement that, at least, some of the devices are mobile. In this paper, we will try to provide a detailed explanation of Mobile Cloud Computing concept by providing different examples, figures and charts showing usage, accessibility, pros and cons and comparison of different cloud platforms.
Comparison Study Of The Most Common Virtual Machine Load Balancing Algorithms In Large-Scale Cloud Environment Using Cloud Simulator, Rowaa Filimban
Comparison Study Of The Most Common Virtual Machine Load Balancing Algorithms In Large-Scale Cloud Environment Using Cloud Simulator, Rowaa Filimban
Dissertations
This is era of internet. There is barely any field where internet do not play important role. Nowadays, CloudComputing links to the internet that has rebelled the whole universe. CloudComputing is a rapid enlarging domain in computing industry and research. Three main services offered by the cloud are SaaS, PaaS and IaaS. With the technology advancement of the CloudComputing, there are many new chances pioneer on how applications can be developed and how several services can be provided to the end user throughout Virtualization, on the internet. What's more, there are cloud service providers who offer and provide large-scaled computing …
Analysis Of Outsourcing Data To The Cloud Using Autonomous Key Generation, Mortada Abdulwahed Aman
Analysis Of Outsourcing Data To The Cloud Using Autonomous Key Generation, Mortada Abdulwahed Aman
Masters Theses
"Cloud computing, a technology that enables users to store and manage their data at a low cost and high availability, has been emerging for the past few decades because of the many services it provides. One of the many services cloud computing provides to its users is data storage. The majority of the users of this service are still concerned to outsource their data due to the integrity and confidentiality issues, as well as performance and cost issues, that come along with it. These issues make it necessary to encrypt data prior to outsourcing it to the cloud. However, encrypting …
Accelerating Big Data Applications Using Lightweight Virtualization Framework On Enterprise Cloud, Janki Bhimani, Zhengyu Yang, Miriam Leeser, Ningfang Mi
Accelerating Big Data Applications Using Lightweight Virtualization Framework On Enterprise Cloud, Janki Bhimani, Zhengyu Yang, Miriam Leeser, Ningfang Mi
Zhengyu Yang
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane
Enhancing Mobile Cloud Computing Security Using Steganography, Hassan Reza, Madhuri Sonawane
Computer Science Faculty Publications
Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized …
Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh
Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh
Electronic Thesis and Dissertation Repository
With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on …
On Optimizations Of Virtual Machine Live Storage Migration For The Cloud, Yaodong Yang
On Optimizations Of Virtual Machine Live Storage Migration For The Cloud, Yaodong Yang
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Virtual Machine (VM) live storage migration is widely performed in the data cen- ters of the Cloud, for the purposes of load balance, reliability, availability, hardware maintenance and system upgrade. It entails moving all the state information of the VM being migrated, including memory state, network state and storage state, from one physical server to another within the same data center or across different data centers. To minimize its performance impact, this migration process is required to be transparent to applications running within the migrating VM, meaning that ap- plications will keep running inside the VM as if there were …
Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin
Source Separation Approach To Video Quality Prediction In Computer Networks, Ruairí De Fréin
Articles
Time-varying loads introduce errors in the estimated model parameters of service-level predictors in Computer Networks. A load-adjusted modification of a traditional unadjusted service-level predictor is contributed, based on Source Separation (SS). It mitigates these errors and improves service-quality predictions for Video-on-Demand (VoD) by :6 to 2dB.
Flash Caching For Cloud Computing Systems, Dulcardo Ariel Arteaga Clavijo
Flash Caching For Cloud Computing Systems, Dulcardo Ariel Arteaga Clavijo
FIU Electronic Theses and Dissertations
As the size of cloud systems and the number of hosted virtual machines (VMs) rapidly grow, the scalability of shared VM storage systems becomes a serious issue. Client-side flash-based caching has the potential to improve the performance of cloud VM storage by employing flash storage available on the VM hosts to exploit the locality inherent in VM IOs. However, there are several challenges to the effective use of flash caching in cloud systems. First, cache configurations such as size, write policy, metadata persistency and RAID level have significant impacts on flash caching. Second, the typical capacity of flash devices is …
An Analysis Of The Technological, Organizational, And Environmental Factors Influencing Cloud Adoption, Joe Malak
Walden Dissertations and Doctoral Studies
Cloud computing provides an answer to the increasing costs of managing information technology (IT), and has become a model that aligns IT services with an organization's business strategies. However, concerns and uncertainties associated with cloud computing are deterring IT decision makers from making sound decisions regarding the adoption of the technology. The purpose of this online survey study was to examine the relationship between relative advantage, compatibility, organizational size, top management support, organizational readiness, mimetic pressure, normative pressures, coercive pressure, and the IT decision makers' intent to adopt cloud computing. The theoretical framework incorporated the diffusion of innovations theory, a …