Overview of Cloud Computing and Recent Addendum and An SMS Based Push Email Server


0 new

0 new

0 new

0 new

Project log

Mensah Yaw
added 3 research items
Small and Medium scale Businesses (SMBs) have in the past added to the growth and development of many economies in the world. In time past, the information technology (IT) needs of these SMBs brought about an increase in requirements for enterprise IT solutions that are more efficient and have high availability and scalability over time. Cloud Computing offers such solutions that can be of immense benefit to SMBs. However, reports show that Cloud Computing has not been fully adopted in developing countries, Nigeria inclusive. Therefore, the aim of this research is to investigate the level of awareness and adoption of Cloud Computing in Nigeria and explicate why it is so. The mixed method approach was adopted i.e., both qualitative method (Interview) and quantitative method (Questionnaire) was used to collect data for analysis. The result of the research indicates that SMBs are adopting Cloud Computing services but there is still a need for massive awareness to be created by service providers and other recognized Information Technology bodies to enable SMBs to better utilize the benefits that Cloud Computing offers. The responses of the participants were analyzed using the Statistical Package for Social Sciences (SPSS). Based on the research findings, the main concern of users in the cloud environment is data security and privacy and this also serve as a hindrance for the SMBs who have not adopted the technology yet. These concerns could be lessened by ensuring that effective security policies are put in place by both parties i.e. the cloud service provider and the SMB. This research allows for knowledge-based decision to be made about the security risks and benefits of using Cloud Computing.
Cloud computing is an emerging technology paradigm, which enable and facilitate the dynamic and versatile provision of computational solutions and helps. Despite the fact that the advantages provided by cloud computing are several, security and secrecy concern of the cloud services still race question from users. Security stance of organizations and vital infrastructures is being affected with the Use of cloud services, thus it is necessary that new threats and risks introduced by this new paradigm are clearly understood and mitigated. This paper focus on the ethical constraints in cloud computing, placing emphasis on issues that deal with cloud adoption, recent additions to the cloud, ethical issues like The shifting of control, from technology users to the third parties servicing the cloud due to outsourcing and offshoring of ICT functionality to the cloud and as well as many other issues regarding cloud computing. To this end, this paper intimate us with some new ways cloud service providers has been improving this field of study so as to improve its adoption in the world. It was discovered that cloud computing is becoming the world 5 th most demanded service after crude oil, water, electricity and Telephony as stipulated by many other researcher's in this field.
To enhance network performance, PHY and MAC layer has direct influence besides other factors as these are major layers of OSI based communication system. One way of enhancing network performance is the managing the radio resources intelligently. As cross layer based systems might be faster responding in case of network resource distribution and due to the spectrum limitation for commercial use, there are active researches in this area that targets to enhance the network users’ experience, though RA might be considered as an evergreen topic for all evolving communication systems. This paper aims to focus specifically on how to increase throughput and delay performance leading to overall higher system performance and fairness. We use techniques of graph theoretic tools and optimization mechanism in our solution to improve radio resource allocation. After we optimize the subcarrier allocation using cross layer interaction of mainly MAC and PHY, the final assignment is done along with power allocation to all users. Then we reevaluate each new incoming resource request and use threshold based allocation techniques to cater for more users. Besides showing the performance enhancement we also show the fairness comparison to other existing state of the art research as benchmarking by means of simulation.The methodology of the system involved the identification of the requirements and their relationship with the determination of musculoskeletal pain likelihood; the model involved the allocation of points to each label of the risk factors. Ranges of the sum of points are then used to determine the musculoskeletal pain of each user. The input risk factors’ data were collected from a number of participants as patients which were processed in determining their respective status (unlikely, likely, benign and malignant)-the data was later converted into an .arff file format. For the implementation, the software used in performing the detection was implemented in java using the Netbeans IDE 7.1 while the predictive models were implemented using the java API,– a java oriented; data mining tool used for performing classification and forecasting. At baseline a self-administered questionnaire was distributed to 853 participants from 46 different work sites (382 men and 471 women) who, at baseline, had been free from neck and upper extremity symptoms during the preceding month. Work-related exposures, individual factors, and symptoms from the neck and upper extremities were assessed.