Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (138)
- Computer Sciences (126)
- Information Security (56)
- Engineering (46)
- Social and Behavioral Sciences (38)
-
- Computer Engineering (27)
- Library and Information Science (25)
- Business (23)
- Databases and Information Systems (23)
- Law (15)
- Medicine and Health Sciences (13)
- Systems Architecture (12)
- Electrical and Computer Engineering (11)
- Software Engineering (10)
- Data Storage Systems (9)
- Health Information Technology (9)
- Management Information Systems (8)
- Technology and Innovation (8)
- Digital Communications and Networking (7)
- Environmental Sciences (7)
- OS and Networks (7)
- Operations Research, Systems Engineering and Industrial Engineering (7)
- Computer and Systems Architecture (6)
- Life Sciences (6)
- Other Computer Sciences (6)
- Water Resource Management (6)
- Computer Law (5)
- Education (5)
- Public Affairs, Public Policy and Public Administration (5)
- Economics (4)
- Institution
-
- Singapore Management University (58)
- University of Nebraska - Lincoln (18)
- City University of New York (CUNY) (17)
- Edith Cowan University (12)
- Zayed University (11)
-
- Old Dominion University (9)
- University of Kentucky (8)
- Technological University Dublin (7)
- Portland State University (5)
- Loyola University Chicago (4)
- Purdue University (4)
- Boise State University (3)
- Brigham Young University (3)
- Maurer School of Law: Indiana University (3)
- Missouri University of Science and Technology (3)
- University of Pennsylvania Carey Law School (3)
- University of Rhode Island (3)
- University of Washington Tacoma (3)
- Western University (3)
- Florida International University (2)
- Kennesaw State University (2)
- Mississippi State University (2)
- Mitchell Hamline School of Law (2)
- Munster Technological University (2)
- Rochester Institute of Technology (2)
- San Jose State University (2)
- Southern Methodist University (2)
- University of Massachusetts Amherst (2)
- University of South Carolina (2)
- University of Texas Rio Grande Valley (2)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (56)
- Library Philosophy and Practice (e-journal) (17)
- All Works (11)
- Faculty Publications (8)
- Open Educational Resources (8)
-
- International Conference on Hydroinformatics (6)
- Computer Science Faculty Publications and Presentations (5)
- Information Technology & Decision Sciences Faculty Publications (5)
- Articles (4)
- Computer Science: Faculty Publications and Other Works (4)
- Faculty Scholarship (4)
- All Faculty Scholarship (3)
- Articles by Maurer Faculty (3)
- Australian Information Security Management Conference (3)
- Computer Science Faculty Research & Creative Works (3)
- Electrical and Computer Engineering Publications (3)
- Engineering and Technology Management Faculty Publications and Presentations (3)
- Information Science Faculty Publications (3)
- Publications and Research (3)
- Research outputs 2014 to 2021 (3)
- Computer Science Faculty Publications (2)
- Conference papers (2)
- Department of Computer Science Publications (2)
- Dissertations (2)
- FIU Electronic Theses and Dissertations (2)
- Faculty Journal Articles and Book Chapters (2)
- Faculty and Research Publications (2)
- Geography Faculty Publications (2)
- Presentations and other scholarship (2)
- Research outputs 2012 (2)
Articles 1 - 30 of 232
Full-Text Articles in Entire DC Network
Performing Distributed Quantum Calculations In A Multi-Cloud Architecture Secured By The Quantum Key Distribution Protocol, Jose Luis Lo Huang, Vincent C. Emeakaroha
Performing Distributed Quantum Calculations In A Multi-Cloud Architecture Secured By The Quantum Key Distribution Protocol, Jose Luis Lo Huang, Vincent C. Emeakaroha
Department of Computer Science Publications
Quantum computing (QC) is an emerging area that yearly improves and develops more advances in the number of qubits and the available infrastructure for public users. Nowadays, the main cloud service providers (CSP) are implementing different mechanisms to support access to their quantum computers, which can be used to perform small experiments, test hybrid algorithms and prove quantum theories. Recent research work have discussed the low capacity of using quantum computers in a single CSP to perform quantum computation that are needed to solve different experiments for real world problems. Thus, there are needs for computing powers in the form …
Librarian' Understanding, Perception, And Attitudes Regarding Cloud Computing In Academic Libraries Punjab, Pakistan: A Survey, Shahid Mehmood, Prof.Dr.Rais Ahmed Samdani, Muhammad Wahid
Librarian' Understanding, Perception, And Attitudes Regarding Cloud Computing In Academic Libraries Punjab, Pakistan: A Survey, Shahid Mehmood, Prof.Dr.Rais Ahmed Samdani, Muhammad Wahid
Library Philosophy and Practice (e-journal)
People who used the University of Sargodha library were asked what they thought about Cloud Computing for the study. The goal of this study was to find out more about how people feel about cloud computing in general and how well they understand it. There were both descriptive and quantitative methods used in the study. Over sixty-nine people were asked to take part in the study, and 65 were randomly picked from the census. The study used SPSS version 21 to turn table data with numbers into percentages and rates. Most people know what Cloud Computing is and how it …
Privacy-Preserving Arbitrary Geometric Range Query In Mobile Internet Of Vehicles, Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng
Privacy-Preserving Arbitrary Geometric Range Query In Mobile Internet Of Vehicles, Yinbin Miao, Lin Song, Xinghua Li, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng
Research Collection School Of Computing and Information Systems
The mobile Internet of Vehicles (IoVs) has great potential for intelligent transportation, and creates spatial data query demands to realize the value of data. Outsourcing spatial data to a cloud server eliminates the need for local computation and storage, but it leads to data security and privacy threats caused by untrusted third-parties. Existing privacy-preserving spatial range query solutions based on Homomorphic Encryption (HE) have been developed to increase security. However, in the single server model, the private key is held by the query user, which incurs high computation and communication burdens on query users due to multiple rounds of interactions. …
Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman
Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman
Research outputs 2022 to 2026
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, …
Dbscan Inspired Task Scheduling Algorithm For Cloud Infrastructure, S. M.F.D.Syed Mustapha, Punit Gupta
Dbscan Inspired Task Scheduling Algorithm For Cloud Infrastructure, S. M.F.D.Syed Mustapha, Punit Gupta
All Works
Cloud computing in today's computing environment plays a vital role, by providing efficient and scalable computation based on pay per use model. To make computing more reliable and efficient, it must be efficient, and high resources utilized. To improve resource utilization and efficiency in cloud, task scheduling and resource allocation plays a critical role. Many researchers have proposed algorithms to maximize the throughput and resource utilization taking into consideration heterogeneous cloud environments. This work proposes an algorithm using DBSCAN (Density-based spatial clustering) for task scheduling to achieve high efficiency. The proposed DBScan-based task scheduling algorithm aims to improve user task …
How To Resuscitate A Sick Vm In The Cloud, Xuhua Ding
How To Resuscitate A Sick Vm In The Cloud, Xuhua Ding
Research Collection School Of Computing and Information Systems
A guest virtual machine in a cloud platform may fall “sick” when its kernel encounters a fatal low-level bug or is subverted by an adversary. The VM owner is hence likely to lose her control over it due to a kernel hang or being denied of remote accesses. While the VM can be rebooted with the assistance from the cloud server, the owner not only faces service disruption but also is left with no opportunity to make an in-depth diagnosis and forensics on the spot, not to mention a live rectification. Currently, the cloud service provider has neither incentive nor …
Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan
Are You Cloud-Certified? Preparing Computing Undergraduates For Cloud Certification With Experiential Learning, Eng Lieh Ouh, Benjamin Gan
Research Collection School Of Computing and Information Systems
Cloud Computing skills have been increasing in demand. Many software engineers are learning these skills and taking cloud certification examinations to be job competitive. Preparing undergraduates to be cloud-certified remains challenging as cloud computing is a relatively new topic in the computing curriculum, and many of these certifications require working experience. In this paper, we report our experiences designing a course with experiential learning to prepare our computing undergraduates to take the cloud certification. We adopt a university project-based experiential learning framework to engage industry partners who provide project requirements for students to develop cloud solutions and an experiential risk …
Determinants Of Cloud Computing Integration And Its Impact On Sustainable Performance In Smes: An Empirical Investigation Using The Sem-Ann Approach, Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed I. Alzahrani, Fadi Herzallah, Norziana Jamil
Determinants Of Cloud Computing Integration And Its Impact On Sustainable Performance In Smes: An Empirical Investigation Using The Sem-Ann Approach, Mohammed A. Al-Sharafi, Mohammad Iranmanesh, Mostafa Al-Emran, Ahmed I. Alzahrani, Fadi Herzallah, Norziana Jamil
Research outputs 2022 to 2026
Although extant literature has thoroughly investigated the incorporation of cloud computing services, examining their influence on sustainable performance, particularly at the organizational level, is insufficient. Consequently, the present research aims to assess the factors that impact the integration of cloud computing within small and medium-sized enterprises (SMEs) and its subsequent effects on environmental, financial, and social performance. The data were collected from 415 SMEs and were analyzed using a hybrid SEM-ANN approach. PLS-SEM results indicate that relative advantage, complexity, compatibility, top management support, cost reduction, and government support significantly affect cloud computing integration. This study also empirically demonstrated that SMEs …
Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag
Cognitive Software Defined Networking And Network Function Virtualization And Applications, Sachin Sharma, Avishek Nag
Articles
The emergence of Software-Defined Networking (SDN) and Network Function Virtualization (NFV) has revolutionized the Internet. Using SDN, network devices can be controlled from a centralized, programmable control plane that is decoupled from their data plane, whereas with NFV, network functions (such as network address translation, firewall, and intrusion detection) can be virtualized instead of being implemented on proprietary hardware. In addition, Artificial Intelligence (AI) and Machine Learning (ML) techniques will be key to automating network operations and enhancing customer service. Many of the challenges behind SDN and NFV are currently being investigated in several projects all over the world using …
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets, Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das
Geo-Distributed Multi-Tier Workload Migration Over Multi-Timescale Electricity Markets, Sourav Kanti Addya, Anurag Satpathy, Bishakh Chandra Ghosh, Sandip Chakraborty, Soumya K. Ghosh, Sajal K. Das
Computer Science Faculty Research & Creative Works
Virtual machine (VM) migration enables cloud service providers (CSPs) to balance workload, perform zero-downtime maintenance, and reduce applications' power consumption and response time. Migrating a VM consumes energy at the source, destination, and backbone networks, i.e., intermediate routers and switches, especially in a Geo-distributed setting. In this context, we propose a VM migration model called Low Energy Application Workload Migration (LEAWM) aimed at reducing the per-bit migration cost in migrating VMs over Geo-distributed clouds. With a Geo-distributed cloud connected through multiple Internet Service Providers (ISPs), we develop an approach to find out the migration path across ISPs leading to the …
Reks: Role-Based Encrypted Keyword Search With Enhanced Access Control For Outsourced Cloud Data, Yibin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Reks: Role-Based Encrypted Keyword Search With Enhanced Access Control For Outsourced Cloud Data, Yibin Miao, Feng Li, Xiaohua Jia, Huaxiong Wang, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Research Collection School Of Computing and Information Systems
Keyword-based search over encrypted data is an important technique to achieve both data confidentiality and utilization in cloud outsourcing services. While commonly used access control mechanisms, such as identity-based encryption and attribute-based encryption, do not generally scale well for hierarchical access permissions. To solve this problem, we propose a Role-based Encrypted Keyword Search (REKS) scheme by using the role-based access control and broadcast encryption. Specifically, REKS allows owners to deploy hierarchical access control by allowing users with parent roles to have access permissions from child roles. Using REKS, we further facilitate token generation preprocessing and efficient user management, thereby significantly …
Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty
Design Of Robust Blockchain-Envisioned Authenticated Key Management Mechanism For Smart Healthcare Applications, Siddhant Thapiyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty
VMASC Publications
The healthcare sector is a very crucial and important sector of any society, and with the evolution of the various deployed technologies, like the Internet of Things (IoT), machine learning and blockchain it has numerous advantages. However, in this section, the data is much more vulnerable than others, because the data is strictly private and confidential, and it requires a highly secured framework for the transmission of data between entities. In this article, we aim to design a blockchain-envisioned authentication and key management mechanism for the IoMT-based smart healthcare applications (in short, we call it SBAKM-HS). We compare the various …
The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi
The Future Of Enterprise Information Systems, Ali Sunyaev, Tobias Dehling, Susanne Strahringer, Li Da Xu, Martin Heinig, Michael Perscheid, Rainer Alt, Matti Rossi
Information Technology & Decision Sciences Faculty Publications
[First paragraph] Enterprise information systems (EIS) have been important enablers of crossfunctional processes within businesses since the 1990s. Often referred to as enterprise resource planning (ERP) systems, they were extended in line with electronic businesses to integrate with suppliers as well as customers. Today, EIS architectures comprise not only ERP, supply chain, and customer relationship management systems, but also business intelligence and analytics. Recently, the move towards decentralized technologies has created new perspectives for EIS. Information systems (IS) research has already addressed opportunities and challenges of these developments quite well, but what will be the pressing opportunities and challenges for …
Soci: A Toolkit For Secure Outsourced Computation On Integers, Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, Hwee Hwa Pang, Robert H. Deng
Soci: A Toolkit For Secure Outsourced Computation On Integers, Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, Hwee Hwa Pang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Secure outsourced computation is a key technique for protecting data security and privacy in the cloud. Although fully homomorphic encryption (FHE) enables computations over encrypted data, it suffers from high computation costs in order to support an unlimited number of arithmetic operations. Recently, secure computations based on interactions of multiple computation servers and partially homomorphic encryption (PHE) were proposed in the literature, which enable an unbound number of addition and multiplication operations on encrypted data more efficiently than FHE and do not add any noise to encrypted data; however, these existing solutions are either limited in functionalities (e.g., computation on …
Vpsl: Verifiable Privacy-Preserving Data Search For Cloud-Assisted Internet Of Things, Qiuyun Tong, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Vpsl: Verifiable Privacy-Preserving Data Search For Cloud-Assisted Internet Of Things, Qiuyun Tong, Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng
Research Collection School Of Computing and Information Systems
Cloud-assisted Internet of Things (IoT) is increasingly prevalent used in various fields, such as the healthcare system. While in such a scenario, sensitive data (e.g., personal electronic medical records) can be easily revealed, which incurs potential security challenges. Thus, Symmetric Searchable Encryption (SSE) has been extensively studied due to its capability of supporting efficient search on encrypted data. However, most SSE schemes require the data owner to share the complete key with query users and take malicious cloud servers out of consideration. Seeking to address these limitations, in this paper we propose a Verifiable Privacy-preserving data Search scheme with Limited …
Computing Technologies And Paperless Classroom In Library Schools In Rivers State, Anthonia Omehia, Onyema Nsirim
Computing Technologies And Paperless Classroom In Library Schools In Rivers State, Anthonia Omehia, Onyema Nsirim
Library Philosophy and Practice (e-journal)
Paper has been a convenience medium of communicating information, accessing information, as well as delivering and receiving lecture. However, as time changes, the mode of communication and instructional methodology takes a paradigm shift. This has resulted to the use of paperless classroom. Paperless classroom is the use of computing and communication technologies to replace the traditional method of teaching and learning in the classroom. It offers speed and ease of using electronic means in delivering lecture to a large number of students which is cost effective to students and lecturers. Consequently, schools are using computing technologies to ease the cost …
Deepen Electronic Health Record Diffusion Beyond Breadth: Game Changers And Decision Drivers, Xuan Wang, Jun Sun, Ying Wang, Yi Liu
Deepen Electronic Health Record Diffusion Beyond Breadth: Game Changers And Decision Drivers, Xuan Wang, Jun Sun, Ying Wang, Yi Liu
Information Systems Faculty Publications and Presentations
Cloud computing, financial incentive and patient-centered care are the game changers that deepen EHR diffusion beyond breadth. Based on the innovation diffusion theory (IDT), technology-organization-environment (TOE) framework and alignment literature, this study examines how these changes shape business requirement, service value and society need that drive different phases of EHR diffusion in terms of planning, adoption, usage and upgrade. A longitudinal analysis with the USA National Ambulatory Medical Care Survey (NAMCS) reveals the impacts of different drivers on EHR diffusion. In addition to quantitative results, interview observations corroborate the relationships among game changers, decision drivers and EHR diffusion. The findings …
Batchlens: A Visualization Approach For Analyzing Batch Jobs In Cloud Systems, Shaolun Ruan, Yong Wang, Hailong Jiang, Weijia Xu, Qiang. Guan
Batchlens: A Visualization Approach For Analyzing Batch Jobs In Cloud Systems, Shaolun Ruan, Yong Wang, Hailong Jiang, Weijia Xu, Qiang. Guan
Research Collection School Of Computing and Information Systems
Cloud systems are becoming increasingly powerful and complex. It is highly challenging to identify anomalous execution behaviors and pinpoint problems by examining the overwhelming intermediate results/states in complex application workflows. Domain scientists urgently need a friendly and functional interface to understand the quality of the computing services and the performance of their applications in real time. To meet these needs, we explore data generated by job schedulers and investigate general performance metrics (e.g., utilization of CPU, memory and disk I/O). Specifically, we propose an interactive visual analytics approach, BatchLens, to provide both providers and users of cloud service with an …
Match In My Way: Fine-Grained Bilateral Access Control For Secure Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng
Match In My Way: Fine-Grained Bilateral Access Control For Secure Cloud-Fog Computing, Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng
Research Collection School Of Computing and Information Systems
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to provide a variety of on demand data services via the edge network. Many cryptographic tools have been introduced to preserve data confidentiality against the untrustworthy network and cloud servers. However, how to efficiently identify and retrieve useful data from a large number of ciphertexts without a costly decryption mechanism remains a challenging problem. In this paper, we introduce a cloud fog-device data sharing system (CFDS) with data confidentiality and data source identification simultaneously based on a new cryptographic primitive named matchmaking attribute-based encryption (MABE) by extending …
Democratizing Bioinformatics Through Easily Accessible Software Platforms For Non-Experts In The Field, Konstantinos Krampis
Democratizing Bioinformatics Through Easily Accessible Software Platforms For Non-Experts In The Field, Konstantinos Krampis
Publications and Research
No abstract provided.
Ascp-Iomt: Ai-Enabled Lightweight Secure Communication Protocol For Internet Of Medical Things, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J.P.C. Rodrigues
Ascp-Iomt: Ai-Enabled Lightweight Secure Communication Protocol For Internet Of Medical Things, Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J.P.C. Rodrigues
VMASC Publications
The Internet of Medical Things (IoMT) is a unification of smart healthcare devices, tools, and software, which connect various patients and other users to the healthcare information system through the networking technology. It further reduces unnecessary hospital visits and the burden on healthcare systems by connecting the patients to their healthcare experts (i.e., doctors) and allows secure transmission of healthcare data over an insecure channel (e.g., the Internet). Since Artificial Intelligence (AI) has a great impact on the performance and usability of an information system, it is important to include its modules in a healthcare information system, which will be …
Secure Storage Model For Digital Forensic Readiness, Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter
Secure Storage Model For Digital Forensic Readiness, Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter
All Works
Securing digital evidence is a key factor that contributes to evidence admissibility during digital forensic investigations, particularly in establishing the chain of custody of digital evidence. However, not enough is done to ensure that the environment and access to the evidence are secure. Attackers can go to extreme lengths to cover up their tracks, which is a serious concern to digital forensics – particularly digital forensic readiness. If an attacker gains access to the location where evidence is stored, they could easily alter the evidence (if not remove it altogether). Even though integrity checks can be performed to ensure that …
Lightweight And Expressive Fine-Grained Access Control For Healthcare Internet-Of-Things, Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu
Lightweight And Expressive Fine-Grained Access Control For Healthcare Internet-Of-Things, Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu
Research Collection School Of Computing and Information Systems
Healthcare Internet-of-Things (IoT) is an emerging paradigm that enables embedded devices to monitor patients vital signals and allows these data to be aggregated and outsourced to the cloud. The cloud enables authorized users to store and share data to enjoy on-demand services. Nevertheless, it also causes many security concerns because of the untrusted network environment, dishonest cloud service providers and resource-limited devices. To preserve patients' privacy, existing solutions usually apply cryptographic tools to offer access controls. However, fine-grained access control among authorized users is still a challenge, especially for lightweight and resource-limited end-devices. In this paper, we propose a novel …
Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman
Partnering For Value Perfection And Business Sustainability In The Cloud Services Brokerage Market, Richard Shang, Robert John Kauffman
Research Collection School Of Computing and Information Systems
The cloud computing and services market has advanced in the past ten years. They now include most IT services from fundamental computing to cutting-edge AI capabilities. With the widespread adoption of cloud services, clients are facing the fact that they are utilizing cloud resources at a sub-optimal level. Cloud services brokers (CSBs) grew from the market to fill the needs for cloud resource management and risk mitigation. Based on analysis of the cloud market and the case of cloud services brokerage and related activities in North America, we offer theoretical analysis for how value creation works, its impacts on the …
Computing Technologies And Paperless Classroom In Library Schools In Rivers State, Anthonia Eghieso Omehia, Onyema Nsirim
Computing Technologies And Paperless Classroom In Library Schools In Rivers State, Anthonia Eghieso Omehia, Onyema Nsirim
Library Philosophy and Practice (e-journal)
Paper has been a convenience medium of communicating information, accessing information, as well as delivering and receiving lecture. However, as time changes, the mode of communication and instructional methodology takes a paradigm shift. This has resulted to the use of paperless classroom. Paperless classroom is the use of computing and communication technologies to replace the traditional method of teaching and learning in the classroom. It offers speed and ease of using electronic means in delivering lecture to a large number of students which is cost effective to students and lecturers. Consequently, schools are using computing technologies to ease the cost …
Workflow Critical Path: A Data-Oriented Critical Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen, Karen L. Karavanic
Workflow Critical Path: A Data-Oriented Critical Path Metric For Holistic Hpc Workflows, Daniel D. Nguyen, Karen L. Karavanic
Computer Science Faculty Publications and Presentations
Current trends in HPC, such as the push to exascale, convergence with Big Data, and growing complexity of HPC applications, have created gaps that traditional performance tools do not cover. One example is Holistic HPC Workflows — HPC workflows comprising multiple codes, paradigms, or platforms that are not developed using a workflow management system. To diagnose the performance of these applications, we define a new metric called Workflow Critical Path (WCP), a data-oriented metric for Holistic HPC Workflows. WCP constructs graphs that span across the workflow codes and platforms, using data states as vertices and data mutations as edges. …
Modeling Of Groundwater Potential Using Cloud Computing Platform: A Case Study From Nineveh Plain, Northern Iraq, Ali Za. Al-Ozeer, Alaa M. Al-Abadi, Tariq Abed Hussain, Alan E. Fryar, Biswajeet Pradhan, Abdullah Alamri, Khairul Nizam Abdul Maulud
Modeling Of Groundwater Potential Using Cloud Computing Platform: A Case Study From Nineveh Plain, Northern Iraq, Ali Za. Al-Ozeer, Alaa M. Al-Abadi, Tariq Abed Hussain, Alan E. Fryar, Biswajeet Pradhan, Abdullah Alamri, Khairul Nizam Abdul Maulud
Earth and Environmental Sciences Faculty Publications
Knowledge of the groundwater potential, especially in an arid region, can play a major role in planning the sustainable management of groundwater resources. In this study, nine machine learning (ML) algorithms—namely, Artificial Neural Network (ANN), Decision Jungle (DJ), Averaged Perceptron (AP), Bayes Point Machine (BPM), Decision Forest (DF), Locally-Deep Support Vector Machine (LD-SVM), Boosted Decision Tree (BDT), Logistic Regression (LG), and Support Vector Machine (SVM)—were run on the Microsoft Azure cloud computing platform to model the groundwater potential. We investigated the relationship between 512 operating boreholes with a specified specific capacity and 14 groundwater-influencing occurrence factors. The unconfined aquifer in …
A Model Approach To Cloud Implementation On Public Libraries With A Focus On West Bengal, India, Tanmay De Sarkar , Corresponding Author, Jitendra Nath Shaw , Main Author
A Model Approach To Cloud Implementation On Public Libraries With A Focus On West Bengal, India, Tanmay De Sarkar , Corresponding Author, Jitendra Nath Shaw , Main Author
Library Philosophy and Practice (e-journal)
The purpose of this paper is to explore the possibility of introducing cloud architecture for public library system in areas where library automation is operational on a standalone server. It also proposes a cloud based model library management system to function on an affordable, robust architecture. The paper made an attempt to highlight the present status of library automation and networking among public libraries in West Bengal. It presents functional requirements for a SaaS based (Software as a Service) model. The simulation approach for the model architecture supports the possibility to connect all public libraries across different hierarchical tiers under …
Reconsidering Big Data Security And Privacy In Cloud And Mobile Cloud Systems, Lo'ai A. Tawalbeh, Gokay Saldamli
Reconsidering Big Data Security And Privacy In Cloud And Mobile Cloud Systems, Lo'ai A. Tawalbeh, Gokay Saldamli
Faculty Research, Scholarly, and Creative Activity
Large scale distributed systems in particular cloud and mobile cloud deployments provide great services improving people's quality of life and organizational efficiency. In order to match the performance needs, cloud computing engages with the perils of peer-to-peer (P2P) computing and brings up the P2P cloud systems as an extension for federated cloud. Having a decentralized architecture built on independent nodes and resources without any specific central control and monitoring, these cloud deployments are able to handle resource provisioning at a very low cost. Hence, we see a vast amount of mobile applications and services that are ready to scale to …
Outsourcing Service Fair Payment Based On Blockchain And Its Applications In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng
Outsourcing Service Fair Payment Based On Blockchain And Its Applications In Cloud Computing, Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng
Research Collection School Of Computing and Information Systems
As a milestone in the development of outsourcing services, cloud computing enables an increasing number of individuals and enterprises to enjoy the most advanced services from outsourcing service providers. Because online payment and data security issues are involved in outsourcing services, the mutual distrust between users and service providers may severely impede the wide adoption of cloud computing. Nevertheless, most existing solutions only consider a specific type of services and rely on a trusted third-party to realize fair payment. In this paper, to realize secure and fair payment of outsourcing services in general without relying on any third-party, trusted or …