-
Extending Affordable Reliable Broadband Internet to Educational Institutions in Edo State
Issue:
Volume 6, Issue 1, March 2018
Pages:
1-11
Received:
16 January 2018
Accepted:
31 January 2018
Published:
27 February 2018
Abstract: Information Communication Technologies have demonstrated potentials to transform the globe into a cohesive functional global village. This is evident in many instances such as Education, International trade, Manufacturing, Healthcare delivery, etc. where digital technologies have boosted growth, expanded opportunities, and improved service delivery. As interesting as it may sound the digital dividend, that is, the broader development benefits from using such technologies have lagged behind when considering their aggregate impact which is adjudged to fall shorts well as its unevenly distribution especially in developing countries. It is believed that for these technologies to benefit access to education, research and development regardless of location, the remaining digital divide, especially in internet access should be greatly reduced or even eliminated. This paper proposes a point to multipoint controlled internet provisioning model based on WIMAX technology particularly aimed at achieving an even distribution of reliable internet access across tertiary Institutions in Edo state of Nigeria.
Abstract: Information Communication Technologies have demonstrated potentials to transform the globe into a cohesive functional global village. This is evident in many instances such as Education, International trade, Manufacturing, Healthcare delivery, etc. where digital technologies have boosted growth, expanded opportunities, and improved service delivery...
Show More
-
Security Enhancement in Multi Clouds Using Serverless Computing Approach
R. Poorvadevi,
S. Ramamoorthy
Issue:
Volume 6, Issue 1, March 2018
Pages:
12-16
Received:
18 January 2018
Accepted:
1 February 2018
Published:
14 March 2018
Abstract: Nowadays, in any application specific domain security plays a vital role in the service access environment. Because customers needs to make use of distinct services and resources in an attacks free surface. In cloud computing environment, the security services and portal systems have been highly progressed based on the user requirements. However, cloud offers plenty of resources through the service vendor globally; still the multi clouds problems are not resolved completely. So, it is very essential to protect the data and other resources from the intruders are a most primary factor. The proposed work will establish a security layer on the multiple cloud environments by introducing the concept of “Serverless Computing”. The serverless computing is a kind of cloud computing execution model through which the cloud service provider (CSP) can manage the allocation of system resources in a dynamic manner. This mechanism will follow the property of utility computing. This approach can be used to hide the operations on entire cloud server management end and capacity planning decisions and also uses no provisioned services. Any type of vulnerabilities is taken care of by the cloud service provider. In this process, attacks rate are compared with the traditional security architectures and each component is an entry point to the serverless application. With this approach, customers can control and monitor the workloads by using IDS / IPS technique.
Abstract: Nowadays, in any application specific domain security plays a vital role in the service access environment. Because customers needs to make use of distinct services and resources in an attacks free surface. In cloud computing environment, the security services and portal systems have been highly progressed based on the user requirements. However, c...
Show More
-
Identification of Nonlinear Model with General Disturbances
Wang Xiaoping,
Yao Jie,
Wang Jianhong,
Liu Feifei
Issue:
Volume 6, Issue 1, March 2018
Pages:
17-24
Received:
5 February 2018
Accepted:
25 February 2018
Published:
26 March 2018
Abstract: The nonlinear model has a linear dynamic system following some static nonlinearity. The dominating approach to estimate the components of this model has been to minimize the error between the simulated and the measured outputs. For the special case of Gaussian input signals, we estimate the linear part of the Hammerstein model using the Bussgang’s classic theorem. For the case with general disturbances, we derive the Maximum Likelihood method. Finally one simulation example is used to prove the efficiency of our theory.
Abstract: The nonlinear model has a linear dynamic system following some static nonlinearity. The dominating approach to estimate the components of this model has been to minimize the error between the simulated and the measured outputs. For the special case of Gaussian input signals, we estimate the linear part of the Hammerstein model using the Bussgang’s ...
Show More
-
Secure Cloud Auditing Over Encrypted Data
Yesu Ragavi Kannadasan,
Rajagopal Devarajan
Issue:
Volume 6, Issue 1, March 2018
Pages:
25-35
Received:
8 February 2018
Accepted:
8 March 2018
Published:
13 April 2018
Abstract: Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud result may lose physical control over their data. Certain Cloud Service Providers (CSPs) may operate dishonestly with the cloud users’ data, they may sneak the data from cloud and sell it to third parties in order to earn profit. Even though outsourcing data on cloud is inexpensive and reduces long duration storage and maintenance complexity, there is least assurance of data integrity, privacy, security and availability on cloud servers. A number of solutions have been recommended to solve the security issues in cloud. This paper mainly focuses on the integrity verification strategy for outsourced data. The proposed scheme combines the encrypting mechanism.
Abstract: Cloud computing is a popular technology which permits storing and accessing data over Internet instead of storing it on local machines’ hard drive. Cloud users can enable to store their data on cloud without any anxiety about its accuracy and reliability. However storing data on cloud imposes certain security challenges. Outsourcing data in cloud r...
Show More