Search Results

Results (81)

Search Parameters:

Keyword: Cloud
Order results
Results per page
Open AccessArticle
13 Pages, 1,997 KB Download PDF

Towards an Efficient Federated Cloud Service Selection to Support Workflow Big Data Requirements

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 235–247, 2018; DOI: 10.25046/aj030529
Abstract:

Cloud Computing is considered nowadays an attractive solution to serve the Big Data storage, processing, and analytics needs. Given the high complexity of Big Data workflows and their contingent requirements, a single cloud provider might not be able alone to satisfy these needs. A multitude of cloud providers that offer myriad of cloud services and…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
8 Pages, 912 KB Download PDF

Evaluating the effect of Locking on Multitenancy Isolation for Components of Cloud-hosted Services

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 92–99, 2018; DOI: 10.25046/aj030312
Abstract:

Multitenancy isolation is a way of ensuring that the performance, stored data volume and access privileges required by one tenant and/or component does not affect other tenants and/or components. One of the conditions that can influence the varying degrees of isolation is when locking is enabled for a process or component that is being shared.…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
5 Pages, 602 KB Download PDF

Frameworks for Performing on Cloud Automated Software Testing Using Swarm Intelligence Algorithm: Brief Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 252–256, 2018; DOI: 10.25046/aj030229
Abstract:

This paper surveys on Cloud Based Automated Testing Software that is able to perform Black-box testing, White-box testing, as well as Unit and Integration Testing as a whole. In this paper, we discuss few of the available automated software testing frameworks on the cloud. These frameworks are found to be more efficient and cost effective…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 812 KB Download PDF

A Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 174–183, 2018; DOI: 10.25046/aj030220
Abstract:

Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 2,305 KB Download PDF

Hardware Acceleration on Cloud Services: The use of Restricted Boltzmann Machines on Handwritten Digits Recognition

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 483–495, 2018; DOI: 10.25046/aj030159
Abstract:

Cloud computing allows users and enterprises to process their data in high performance servers, thus reducing the need for advanced hardware at the client side. Although local processing is viable in many cases, collecting data from multiple clients and processing them in a server gives the best possible performance in terms of processing rate. In…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,695 KB Download PDF

Comparison of K-Means and Fuzzy C-Means Algorithms on Simplification of 3D Point Cloud Based on Entropy Estimation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 38–44, 2017; DOI: 10.25046/aj020508
Abstract:

In this article we will present a method simplifying 3D point clouds. This method is based on the Shannon entropy. This technique of simplification is a hybrid technique where we use the notion of clustering and iterative computation. In this paper, our main objective is to apply our method on different clouds of 3D points.…

Read More
(This article belongs to Section Applied Mathematics (MAP))
Open AccessArticle
9 Pages, 854 KB Download PDF

Distributing the computation in combinatorial optimization experiments over the cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 136–144, 2017; DOI: 10.25046/aj020617
Abstract:

Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 2,878 KB Download PDF

Clean Energy Use for Cloud Computing Federation Workloads

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 1–12, 2017; DOI: 10.25046/aj020601
Abstract:

Cloud providers seek to maximize their market share. Traditionally, they deploy datacenters with sufficient capacity to accommodate their entire computing demand while maintaining geographical affinity to its customers. Achieving these goals by a single cloud provider is increasingly unrealistic from a cost of ownership perspective. Moreover, the carbon emissions from underutilized datacenters place an increasing…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 5,165 KB Download PDF

Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 553–561, 2017; DOI: 10.25046/aj020371
Abstract:

Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 700 KB Download PDF

Intrusion detection in cloud computing based attack patterns and risk assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 479–484, 2017; DOI: 10.25046/aj020361
Abstract:

This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 702 KB Download PDF

Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 44–50, 2017; DOI: 10.25046/aj020406
Abstract:

The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 1,057 KB Download PDF

Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 30–35, 2017; DOI: 10.25046/aj020305
Abstract:

Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers.  Traditional data center security best practices involving network segmentation are not well suited to these new environments.  We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 1,825 KB Download PDF

Frame Filtering and Skipping for Point Cloud Data Video Transmission

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 76–83, 2017; DOI: 10.25046/aj020109
Abstract:

Sensors for collecting 3D spatial data from the real world are becoming more important. They are a prime research area topic and have applications in consumer markets, such as medical, entertainment, and robotics. However, a primary concern with collecting this data is the vast amount of information being generated, and thus, needing to be processed…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Imaging Science & Photographic Technology (IPT))
Open AccessArticle
8 Pages, 540 KB Download PDF

Web Application Interface Data Collector for Issue Reporting

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 5, Page # 01–08, 2024; DOI: 10.25046/aj090501
Abstract:

Insufficient information is often pointed out as one of the main problems with bug reports as most bugs are reported manually, they lack detailed information describing steps to reproduce the unexpected behavior, leading to increased time and effort for developers to reproduce and fix bugs. Current bug reporting systems lack support for self-hosted systems that…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
8 Pages, 1,553 KB Download PDF

Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 84–91, 2024; DOI: 10.25046/aj090308
Abstract:

Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
17 Pages, 2,552 KB Download PDF

Evaluation of Various Deep Learning Models for Short-Term Solar Forecasting in the Arctic using a Distributed Sensor Network

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 12–28, 2024; DOI: 10.25046/aj090302
Abstract:

The solar photovoltaic (PV) power generation industry has experienced substantial, ongoing growth over the past decades as a clean, cost-effective energy source. As electric grids use ever-larger proportions of solar PV, the technology’s inherent variability—primarily due to clouds—poses a challenge to maintaining grid stability. This is especially true for geographically dense, electrically isolated grids common…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Electrical Engineering (ELE))
Open AccessArticle
9 Pages, 8,945 KB Download PDF

Infrastructure-as-a-Service Ontology for Consumer-Centric Assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 37–45, 2023; DOI: 10.25046/aj080605
Abstract:

In the context of adopting cloud Infrastructure-as-a-Service (IaaS), prospective consumers need to consider a wide array of both business and technical factors associated with the service. The development of an intelligent tool to aid in the assessment of IaaS offerings is highly desirable. However, the creation of such a tool requires a robust foundation of…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
15 Pages, 366 KB Download PDF

Leakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 156–170, 2022; DOI: 10.25046/aj070216
Abstract:

Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 1,720 KB Download PDF

Enhanced Data Transportation in Remote Locations Using UAV Aided Edge Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 1091–1100, 2021; DOI: 10.25046/aj0602124
Abstract:

In recent years, the applications in the field of Unmanned Aerial Vehicle (UAV) systems has procured research interests among various communities. One of the primary factors being, thinking beyond the box of what could UAV system bring to the table other than military applications? Evidence to any answer for this question is the current day…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Aerospace Engineering (EAR))
Open AccessArticle
7 Pages, 779 KB Download PDF

Blockchain-Based Decentralized Digital Self-Sovereign Identity Wallet for Secure Transaction

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 977–983, 2021; DOI: 10.25046/aj0602112
Abstract:

Blockchain (BC) as the widespread innovations in the 21st century has recognized itself to be immutable, tamper-resistant, decentralize and secure. This emerging technology is used as a functional technology for refining present technology and forming new applications for its robustness and disintermediation. Decentralized Digital Self-Sovereign Identity (DDSSI) is an identity mapped with individual identity information…

Read More
(This article belongs to Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
15 Pages, 468 KB Download PDF

A Model for the Application of Automatic Speech Recognition for Generating Lesson Summaries

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 526–540, 2021; DOI: 10.25046/aj060260
Abstract:

Automatic Speech Recognition (ASR) technology has the potential to improve the learning experience of students in the classroom. This article addresses some of the key theoretical areas identified in the pursuit of implementing a speech recognition system, capable of lesson summary generation in the educational setting. The article discusses: some of the applica- tions of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 378–386, 2021; DOI: 10.25046/aj060244
Abstract:

The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. These documents may be in the form of structured, semi-structured, or unstructured formats. In current web technologies, the Semantic Web is an extension for better enabling the people and computers to…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
13 Pages, 886 KB Download PDF

Categorization of RDF Data Management Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 221–233, 2021; DOI: 10.25046/aj060225
Abstract:

The wide acceptance of the semantic web language RDF for ontologies creation in various application fields has led to the emergence of numerous RDF data processing solutions, the so-called triplestores, for the storage of RDF data and its querying using the RDF query language SPARQL. Such solutions are however developed under various perspectives and on…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026