مطالب مرتبط با کلیدواژه

Cloud Computing


۱.

Top Benefits and Hindrances to Cloud Computing Adoption in Saudi Arabia: A Brief Study(مقاله علمی وزارت علوم)

نویسنده:

کلیدواژه‌ها: Cloud Computing Benefit Hindrance Adoption of Technology SMEs Saudi Arabia

حوزه‌های تخصصی:
تعداد بازدید : ۲۱۸ تعداد دانلود : ۱۳۲
Cloud computing is an emerging concept of information technology that in many countries has an influence on many companies. The research was conducted to evaluate cloud computing adoption in Saudi Arabia; Benefits and hindrances for small and medium-sized enterprises (SMEs). The qualitative research approach is performed by interviews with the management of a variety of SMEs active in the information and communication technology (ICT) industry. This paper illustrates a significant positive correlation between the use of cloud computing and organizational quality performances. The paper concluded that the knowledge level of SMEs on the accessibility of cloud services is below average scale. The greatest challenges about the cloud service are privacy and security in the cloud among providers and users for the Saudi Arabian firms.
۲.

Cloud Computing Technology Algorithms Capabilities in Managing and Processing Big Data in Business Organizations: MapReduce, Hadoop, Parallel Programming(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Cloud Computing Data Data Warehouse Big Data artificial intelligence (AI) Business Organizations

حوزه‌های تخصصی:
تعداد بازدید : ۱۹۰ تعداد دانلود : ۱۲۱
The objective of this study is to verify the importance of the capabilities of cloud computing services in managing and analyzing big data in business organizations because the rapid development in the use of information technology in general and network technology in particular, has led to the trend of many organizations to make their applications available for use via electronic platforms hosted by various Companies on their servers or so-called cloud computing that have become an excellent opportunity to provide services efficiently and at low cost, but managing big data presents a definite challenge in the cloud space beginning with the processes of extracting, processing data, storing data and analyze it. Through this study, we dealt with the concept of cloud computing and its capabilities in business organizations. We also interpreted the notion of big data and its distinct characteristics and sources. Finally, the relationship between cloud computing with big data was also explained (extraction, storage, analysis).
۳.

Cloud Computing Application and Its Advantages and Difficulties in the Teaching Process(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Cloud Computing Challenges teaching

حوزه‌های تخصصی:
تعداد بازدید : ۳۹۷ تعداد دانلود : ۱۱۸
The objective of this research is to identify the technology of cloud computing in terms of its concept, its development, its objectives, its components, models, classifications, and the advantages of its use in the teaching process at the University of Samarra, as well as to identify the most important challenges and obstacles that teachers face in using University of Samarra. The researcher used the descriptive approach in his research. This research was carried out on an objective sample of 40 teaching staff members in the Department of Life Sciences and English at the Faculty of Education / Samarra University. A questionnaire consisting of 22 questions were used as a data collection tool, which included two axes: The first axis: the advantages of using cloud computing technology in the process of teaching at the University of Samarra. The second axis: the challenges of using cloud computing technology in the process of teaching at the University of Samarra. The researcher used the statistical program (SPSS 20) in order to examine the differences between the responses of the members of the research sample. The results revealed that the estimates of the teaching of the advantages of the use of cloud computing technology in the teaching process at the University of Samarra, which included the search tool, came very much, and the results revealed the most important challenges which stand in the way of the use of cloud computing technology in university education. The study recommended institutions of higher learning and universities with a set of important recommendations regarding the use of cloud computing technology in educational institutions. 
۴.

Enhanced Blockchain-based Key Generation using Butterfly Optimization Algorithm for Efficient Data Sharing in Cloud Computing(مقاله علمی وزارت علوم)

نویسنده:
تعداد بازدید : ۱۴۸ تعداد دانلود : ۷۳
Cloud Computing, employed in various applications and services, refers to using computational resources as a service depending on customer needs via the Internet. The computing paradigm is built on data outsourcing to third-party-controlled data centers. Despite the significant developments in Cloud Services and Applications, various security vulnerabilities remain. This research proposes the EBBKG Model for Efficient Data Sharing in Cloud. For secure data sharing in the cloud, the approach combines BBKG with ABS. The method offers good data management that efficiently specifies the subsequent processing processes. The paradigm imposes encrypted access control, along with specific enhanced access capabilities. Secondly, the user's privacy may be adequately protected with a secure authentication paradigm that employs ABS to safeguard the user's private data. The key is optimized using BOA to enhance security and cloud providers and limit dangerous user threats using these implementations. Criteria like security, time complexity, and accountability govern the suggested method's effectiveness.
۵.

A Dynamic Load Balancing Architecture for Fog Computing using Tree Base Resource Arrangement and Flexible Task Prioritization(مقاله علمی وزارت علوم)

تعداد بازدید : ۱۵۰ تعداد دانلود : ۱۰۱
A greater community of researchers widely studies fog computing as it reduces the massive data flow to the existing cloud-connected network and performs better for real-time systems that expect a quick response. As the fog layer plays a significant role in a fog-cloud system, all of the devices participating in fog computing must be balanced with appropriate load to upstretched the system performance. The proposed method is founded on a tree-based dynamic resources arrangement mechanism that refreshes the fog clusters created using Fuzzy C Mean (FCM) to increase the speed of resource allocation. With the help of Fuzzy rule-based load calculation and intra-cluster job allocation, the load inside the group is maintained. The system also has the facility of inter-cluster job forwarding, which works on demand. A novel load balancing strategy, Real-Time Flexi Forwarded Cluster Refreshing System (RTFRS) is proposed by which all the tasks can be handled efficiently within the fog cloud system. The proposed system is designed so that overall complexity is not upraised and becomes suitable for fog computing architecture with low processing capacity by maintaining the quality of service. Experimental results show that the proposed model outperforms standard methods and algorithms used in fog computing concerning average turnaround time, average waiting time, resource utilization, average failure rate, and the load on the gateway.
۶.

Metaheuristic Algorithms for Optimization and Feature Selection in Cloud Data Classification Using Convolutional Neural Network(مقاله علمی وزارت علوم)

کلیدواژه‌ها: feature selection Classification Cloud Computing Metaheuristic algorithm Convolution neural network

حوزه‌های تخصصی:
تعداد بازدید : ۱۱۴ تعداد دانلود : ۱۰۶
Cloud Computing has drastically simplified the management of IT resources by introducing the concept of resource pooling. It has led to a tremendous improvement in infrastructure planning. The major goals of cloud computing include maximization of computing resources with minimization of cost. But the truth is that everything has a price and cloud computing is no different. With Cloud computing there comes a number of security concerns which need to be addressed. Cloud forensics plays a vital role to address the security issues related to cloud computing by identifying, collecting and studying digital evidence in cloud environment. The aim of the research paper is to explore the concept of cloud forensic by applying optimization for feature selection before classification of data on cloud side. The data is classified as malicious and non-malicious using convolutional neural network. The proposed system makes a comparison of models with and without feature selection algorithms before applying the data to CNN. A comparison of different metaheuristics algorithms- Particle Swarm Optimization, Shuffled Frog Leap Optimization and Fire fly algorithm for feature optimization is done based on convergence rate and efficiency.
۷.

Investigating the Identification of Technological Business Criteria Based on Cloud Computing in Small and Medium-Sized Bompanies Using Fuzzy Delphi Method(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Business Technology Cloud Computing Fuzzy Delphi

حوزه‌های تخصصی:
تعداد بازدید : ۱۲۹ تعداد دانلود : ۱۴۰
This article was conducted with the purpose of identifying the criteria of technological businesses based on cloud computing in small and medium-sized companies using the fuzzy Delphi method. The main concern of this research is to identify the criteria of technological businesses based on cloud computing in small and medium-sized businesses using the fuzzy Delphi method. It depends on mixed research (qualitative-quantitative) and collecting information through the background of previous researches and experts' opinions and the method of gathering information through questionnaires and interviews. Delphi's opinion of experts was taken. In the current research, many factors led to the formation of technological businesses; therefore, it should not be considered a simple phenomenon, and due to the intensity of electronic commerce in the world, the multi-dimensional concept of this phenomenon should be looked at more carefully.
۸.

Factors Influencing the Security Framework in Cloud Computing: A Case Study of Infrastructure Communications Company(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Security framework Cloud Computing Communications Infrastructure Company

حوزه‌های تخصصی:
تعداد بازدید : ۸۸ تعداد دانلود : ۵۹
Cloud computing technology could bring about cost-effectiveness, scalability, usage easiness, and flexibility against environmental changes. Despite several advantages of this technology, the acceptance and movement to the cloud computing environment occurs slowly, particularly in several organizations in developing countries. Cloud computing allows an individual to share distributed sources and services. This study aims to identify the optimal security framework in cloud computing, focusing on the Infrastructure Communications Company as a case study. The method used in this study is descriptive (non-test) and the correlative research scheme is PLS (partial least squares). The participants of the current study were selected among the Tehran Communication Infrastructure Company employees. Based on the Cochran formula and the research population which was 600, 234 were selected using the random sampling method. To measure the security framework in cloud computing, the questionnaires related to Joils and Opria (2017), Tari (2014), Qio and Gayi (2017), and Sing et al. (2016) were used. Findings indicate that the impacts of technological and technical factors, experienced human resources, financial resource provision and secure infrastructures on information technology security were significant (0.01). Moreover, information technology management and supporting regulations on security risk assessment have significant effects. The assessment of security risk has a significant effect on information security. Additionally, information security management and supporting regulations have a significant effect on Goal setting (0.01). Goal setting has a significant effect on environmental and physical security. Based on the results, the evaluated model of the research could explain 0.53 of information security management, 0.50 of security evaluation, 0.36 of goal setting, 0.55 of information security, and 0.35 of environmental security.
۹.

A New Resource Allocation Method Based on PSO in Cloud Computing(مقاله علمی وزارت علوم)

تعداد بازدید : ۶۷ تعداد دانلود : ۵۲
Cloud computing has emerged as a pivotal technology for managing and processing data, with a primary objective to offer efficient resource access while minimizing expenses. The allocation of resources is a critical aspect that can significantly reduce costs. This process necessitates the continuous assessment of the current status of each resource to design algorithms that optimize allocation and enhance overall system performance. Numerous algorithms have been developed to address the challenge of resource allocation, yet many fail to satisfy requirements of time efficiency and load balancing in cloud computing environments. This paper introduces a novel approach that classifies tasks according to their resource demands, employs a modified particle swarm optimization (PSO) algorithm, and incorporates load balancing strategies. The proposed method initially clusters tasks based on their resource requirements, subsequently utilizes the PSO algorithm to determine the best task-to-resource assignments, and finally implements a load balancing algorithm to reduce costs through balanced load distribution. The validity of the proposed method is tested and simulated using the Cloudsim tool. The simulation results indicate that the proposed method achieves lower average response time, waiting times, and energy consumption than existing baseline methods.