|
Go
Nov 29, 2023Open Access
In this paper, an improved genetic algorithm with delay constraint was designed. When initializing the population, a greedy strategy was adopted to ensure that there were enough excellent genes in the initial population, a normal distribution ordering selection strategy was adopted when selecting the next generation, so that high-quality chromosomes have a greater probability of being selected, and an adaptive cross-mutation strategy was proposed to achieve dynamic probability when cross-mutatio...
Nov 28, 2023Open Access
Cybersecurity is the study of protecting information and systems. One of the most secure ways of protecting information online is through cloud services when used appropriately. In St. Mary’s university, cloud computing adaption has rapidly grown and evolved over the years. However, the protection and safety of students and staff’s information is still unsteady, which prompted the evaluation and survey of this research. In this paper, a risk analysis is performed on one of the university’s cloud...
Jun 29, 2023Open Access
Data analytics is crucial in health services, supporting healthcare delivery, research, and decision-making. This article provides an overview of data analytics’s benefits, challenges, and limitations in health services. The first section highlights how data analytics improves health service outcomes by identifying risk factors, enabling early disease detection, and creating personalized treatment plans. It aids in predicting disease progression, identifying potential drug interactions, and trac...
Feb 15, 2023Open Access
Coronavirus had some healthcare organizations embrace cloud hosting without proper investigation or review. This raises challenges concerning security and privacy aspects and could lead to lasting risks and vulnerabilities in the system. Our project’s main objectives include separating medical information from other data, such as billing and accounting information, and integrating e-health cards into the system. The TVD infrastructure isolates and protects the TVD from adversaries from the outsi...
Sep 27, 2022Open Access
In this era characterized by rapid technological innovations, mobile devices such as tablets and smartphones have become inevitable due to the variety of services they offer. These devices are susceptible to loss due to their small portable sizes. The personal identification numbers (PIN) and patterns used as security controls have minimal encryption. One of the main challenges of using mobile devices is the risk of private and/or confidential data stored in the device’s internal memory being ex...
Sep 11, 2018Open Access
Nowadays, the usage of
mobile devices is progressively increased. Until, delay sensitive applications
(Augmented Reality, Online Banking and 3D Game) are required lower delay while
executed in the
mobile device. Mobile Cloud Computing provides a rich resource environment to
the constrained-resource mobility to run above mentioned applications, but due
to long distance between mobile user application and cloud server introduces
hyb ...
May 30, 2016Open Access
Cloud Computing has made software more attractive as a service and
transformed a large part of IT industry. At present, cloud computing is a
popular topic for conferences and magazines. The unique attribute of cloud computing
poses a lot of security risks in the cloud environment. In this paper, we
present the essentials of Security Management of the cloud computing. The management
contains a distributed authentication method and ...
Apr 28, 2016Open Access
Mobile Cloud computing is a technology of delivering services, such as software,
hardware (virtual as well) and bandwidth over the Internet. Mobile devices are enabled
in order to explore, especially Smart phones. The mobile cloud computing technology
is growing rapidly among the customers and many companies such as Apple, Google,
Facebook and Amazon with rich users. Users can access their data at any time, at
any place, even with any device including mobile devices by using the cloud storage
se...
Jun 18, 2014Open Access
Scientific computation and data intensive analyses are ever more frequent. On the one hand, the MapReduce programming model has gained a lot of attention for its applicability in large parallel data analyses and Big Data applications. On the other hand, Cloud computing seems to be increasingly attractive in solving these computing problems that demand a lot of resources. This paper explores the potential symbiosis between MapReduce and Cloud Computing, in order to create a robust and scalable en...
Go
|
|
|