Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00278
Marcel S. Stolz
This paper defines platform neutrality as a concept for large technology companies, most notably, social media platform providers. It is deduced from the concept of state neutrality, and acknowledges societal and political functions as well as state-like structures these companies have put into place. The paper argues that recent developments demonstrate a convergence of social media towards platform neutrality. It explains the benefit of platform neutrality both for businesses as well as societies.
{"title":"Platform Neutrality and the Global Balance of Powers","authors":"Marcel S. Stolz","doi":"10.1109/CSCI54926.2021.00278","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00278","url":null,"abstract":"This paper defines platform neutrality as a concept for large technology companies, most notably, social media platform providers. It is deduced from the concept of state neutrality, and acknowledges societal and political functions as well as state-like structures these companies have put into place. The paper argues that recent developments demonstrate a convergence of social media towards platform neutrality. It explains the benefit of platform neutrality both for businesses as well as societies.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00049
Khalid Amen, Mohamad Zohdy, M. Mahmoud
Phishing is a fraudulent process and a form of cybercrime where an attacker tries to obtain sensitive information for malicious use. A phisher uses social engineering and technical deception to fetch private information from the web user. Previous Machine Learning (ML) approaches have been used to detect whether URLs are valid, or invalid. The purpose of this work is to detect, or predict, the three stages of Phishing URLs starting with valid, not enough info and invalid URLs. We will investigate different potential models that are trained by Machine Learning algorithms and find out which of these models has better accuracy.
{"title":"Machine Learning for Multiple Stage Phishing URL Prediction","authors":"Khalid Amen, Mohamad Zohdy, M. Mahmoud","doi":"10.1109/CSCI54926.2021.00049","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00049","url":null,"abstract":"Phishing is a fraudulent process and a form of cybercrime where an attacker tries to obtain sensitive information for malicious use. A phisher uses social engineering and technical deception to fetch private information from the web user. Previous Machine Learning (ML) approaches have been used to detect whether URLs are valid, or invalid. The purpose of this work is to detect, or predict, the three stages of Phishing URLs starting with valid, not enough info and invalid URLs. We will investigate different potential models that are trained by Machine Learning algorithms and find out which of these models has better accuracy.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00218
Muhittin Yilmaz
This study presents a hands-on research experience for undergraduate senior-level computer architecture course students. The students have investigated scientific research process, literature review approaches, technical writing as well as blind-review principles, and conducted hands-on research on three different computer systems, namely, a supercomputer, an office desktop, and an autonomous vehicle artificial intelligence computer systems, for a budget-constrained final computer configuration of an office desktop computer.The final student team outcomes, relevant feedback, and the corresponding surveys, evaluated by the project administrators, strongly imply the success of the project for an effective research component inclusion in an undergraduate course.
{"title":"Undergraduate In-class Research Experience for Computer Architecture Students","authors":"Muhittin Yilmaz","doi":"10.1109/CSCI54926.2021.00218","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00218","url":null,"abstract":"This study presents a hands-on research experience for undergraduate senior-level computer architecture course students. The students have investigated scientific research process, literature review approaches, technical writing as well as blind-review principles, and conducted hands-on research on three different computer systems, namely, a supercomputer, an office desktop, and an autonomous vehicle artificial intelligence computer systems, for a budget-constrained final computer configuration of an office desktop computer.The final student team outcomes, relevant feedback, and the corresponding surveys, evaluated by the project administrators, strongly imply the success of the project for an effective research component inclusion in an undergraduate course.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116509889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00091
E. Abdollahnejad, Marilynn Kalman, B. Far
Although the widespread use of the Internet provides job recruiters with a larger pool to select the most qualified candidates, the tedious process of going over hundreds of resumes makes a fair and objective decision making more difficult. This paper proposes an end-to-end BERT-based framework to decrease the workload and expedite the shortlisting process of job applicants. Utilizing historical-records data of thousands failed and successful job applications, our model simulates the recruiters’ decision-making process by the state-of-the-art BERT algorithm. The results show that BERT outperforms a variety of models by a high margin.
{"title":"A Deep Learning BERT-Based Approach to Person-Job Fit in Talent Recruitment","authors":"E. Abdollahnejad, Marilynn Kalman, B. Far","doi":"10.1109/CSCI54926.2021.00091","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00091","url":null,"abstract":"Although the widespread use of the Internet provides job recruiters with a larger pool to select the most qualified candidates, the tedious process of going over hundreds of resumes makes a fair and objective decision making more difficult. This paper proposes an end-to-end BERT-based framework to decrease the workload and expedite the shortlisting process of job applicants. Utilizing historical-records data of thousands failed and successful job applications, our model simulates the recruiters’ decision-making process by the state-of-the-art BERT algorithm. The results show that BERT outperforms a variety of models by a high margin.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126595487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00274
Thubelihle S. Zulu, Topside E. Mathonsi
Poor VoIP quality in IP telephone infrastructure is a major concern and it can affect business growth, especially to businesses that deal with interacting with a client over the phone. Speech or audio signals are usually affected by codec mismatch, packet loss, and jitter which affect user perception of voice quality. VoIP telephone system is growing at a rapid speed and has received much attention because of their call cost internationally and national and fewer resources needed compared to traditional voice telephone systems or public switched telephone networks. The main aim of this paper is to develop a solution that will provide an enhanced voice quality in VoIP platform systems by implementing the amended VoIP codec transcoding system that auto negotiates VoIP codec with the intention of preventing VoIP codec mismatch via standalone and software VoIP codec transcoding system. An experimental research with technological tools such as SIP (Session Initiation Protocol) phone, asterisk PBX (Private Branch Exchange) systems and SBC (Session Border Control) will be conducted. A practical test will be carried out in any working environment with the converged network in order to test results or findings to solve the problem of codec mismatch with the intention of enhancing Voice quality and avoiding calls dropping issues in IP telephone infrastructure. This paper is introducing an amended VoIP codec transcoding system that auto-negotiate VoIP codec in order to prevent codec mismatch and enhance voice quality hence codec mismatch is not only the major concern for VoIP quality, VoIP quality can be affected by many factors, such as packet loss, jitter, packet delay, and bandwidth but this paper is focusing on the codec mismatch.
{"title":"An Enhanced VoIP Codec Transcoder to Enhance VoIP Quality for IP Telephone Infrastructure","authors":"Thubelihle S. Zulu, Topside E. Mathonsi","doi":"10.1109/CSCI54926.2021.00274","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00274","url":null,"abstract":"Poor VoIP quality in IP telephone infrastructure is a major concern and it can affect business growth, especially to businesses that deal with interacting with a client over the phone. Speech or audio signals are usually affected by codec mismatch, packet loss, and jitter which affect user perception of voice quality. VoIP telephone system is growing at a rapid speed and has received much attention because of their call cost internationally and national and fewer resources needed compared to traditional voice telephone systems or public switched telephone networks. The main aim of this paper is to develop a solution that will provide an enhanced voice quality in VoIP platform systems by implementing the amended VoIP codec transcoding system that auto negotiates VoIP codec with the intention of preventing VoIP codec mismatch via standalone and software VoIP codec transcoding system. An experimental research with technological tools such as SIP (Session Initiation Protocol) phone, asterisk PBX (Private Branch Exchange) systems and SBC (Session Border Control) will be conducted. A practical test will be carried out in any working environment with the converged network in order to test results or findings to solve the problem of codec mismatch with the intention of enhancing Voice quality and avoiding calls dropping issues in IP telephone infrastructure. This paper is introducing an amended VoIP codec transcoding system that auto-negotiate VoIP codec in order to prevent codec mismatch and enhance voice quality hence codec mismatch is not only the major concern for VoIP quality, VoIP quality can be affected by many factors, such as packet loss, jitter, packet delay, and bandwidth but this paper is focusing on the codec mismatch.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127900617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00286
Shubhangi Rastogi, D. Bansal
The prevalence of fake news has augmented with the rise of digital sources, especially social media. In this paper, current fake news research is studied and examined to offer a succinct road-map for future work. The paper presents a novel three-tier system depending on the lifespan of news and divides the research in three phases: early, mid and late-stage detection. The strategy to be followed for fake news detection varies with the time of detection. Fake news has shown adverse effects in a very short time period of propagation on social media. To mitigate this, it is required to detect fake news at an early stage when limited information about the news is available. In contrast, rich information can be examined like user engagement, propagation patterns, etc., at a later stage when news is deeply spread in the social network. Therefore, it is important to first analyze the time when the news disseminated, and then follow a suitable fake news detection methodology presented in the-state-of-the-art.
{"title":"Time is Important in Fake News Detection: a short review","authors":"Shubhangi Rastogi, D. Bansal","doi":"10.1109/CSCI54926.2021.00286","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00286","url":null,"abstract":"The prevalence of fake news has augmented with the rise of digital sources, especially social media. In this paper, current fake news research is studied and examined to offer a succinct road-map for future work. The paper presents a novel three-tier system depending on the lifespan of news and divides the research in three phases: early, mid and late-stage detection. The strategy to be followed for fake news detection varies with the time of detection. Fake news has shown adverse effects in a very short time period of propagation on social media. To mitigate this, it is required to detect fake news at an early stage when limited information about the news is available. In contrast, rich information can be examined like user engagement, propagation patterns, etc., at a later stage when news is deeply spread in the social network. Therefore, it is important to first analyze the time when the news disseminated, and then follow a suitable fake news detection methodology presented in the-state-of-the-art.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127364121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00303
Dena F. Mujtaba, N. Mahapatra
Seafood comprises the largest globally traded food commodity in the world. Its supply chains are complex, focus on quick distribution, and rely on processing practices that make it difficult to trace products to their source. This has resulted in seafood mislabeling, with investigations revealing mislabeling of more than 30% of marketed seafood products, though the full extent of seafood mislabeling in the U.S. is unknown. When two species are morphologically similar, it is difficult for humans to visually distinguish between them, thus making mislabeling difficult to detect. To address this problem, we present a novel deep-learning-based model to distinguish between morphologically similar fish species in images. Our approach uses transfer learning with state-of-the-art convolutional neural networks (CNN) to build upon previously learned features on millions of images, thereby improving the model’s classification accuracy. We compare three pretrained CNNs: VGG, ResNet, and RegNet. For evaluation, we utilize the FishNet Open Image Database, containing over 85,000 images from electronic monitoring footage of fisheries. We train and test two models: a 4-species classifier of visually-similar tuna species, and a binary classifier of visually-indistinguishable tuna often mislabeled. Our results show CNNs can be used to distinguish between morphologically similar fish species with high accuracy, which otherwise would often be mislabeled by humans.
{"title":"Convolutional Neural Networks for Morphologically Similar Fish Species Identification","authors":"Dena F. Mujtaba, N. Mahapatra","doi":"10.1109/CSCI54926.2021.00303","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00303","url":null,"abstract":"Seafood comprises the largest globally traded food commodity in the world. Its supply chains are complex, focus on quick distribution, and rely on processing practices that make it difficult to trace products to their source. This has resulted in seafood mislabeling, with investigations revealing mislabeling of more than 30% of marketed seafood products, though the full extent of seafood mislabeling in the U.S. is unknown. When two species are morphologically similar, it is difficult for humans to visually distinguish between them, thus making mislabeling difficult to detect. To address this problem, we present a novel deep-learning-based model to distinguish between morphologically similar fish species in images. Our approach uses transfer learning with state-of-the-art convolutional neural networks (CNN) to build upon previously learned features on millions of images, thereby improving the model’s classification accuracy. We compare three pretrained CNNs: VGG, ResNet, and RegNet. For evaluation, we utilize the FishNet Open Image Database, containing over 85,000 images from electronic monitoring footage of fisheries. We train and test two models: a 4-species classifier of visually-similar tuna species, and a binary classifier of visually-indistinguishable tuna often mislabeled. Our results show CNNs can be used to distinguish between morphologically similar fish species with high accuracy, which otherwise would often be mislabeled by humans.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127435744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00135
T. Ovatman, Muhammed Enes Tırnakçı, A. Yılmaz
Recent advances in communication technology has begun to push the data centers towards high altitude platform stations (HAPS) due to their advantages in communication coverage, mobility and cooling. There are plenty of studies that focus on the communication aspects of such devices but the issues regarding deploying micro data centers on HAPS is rarely studied. In the future, there is a potential for a substantial amount of processing power to be offload to such stations to back up terrestrial stations in fog computing scenarios. In this study we have analyzed cloud workload handling and power consumption efficiencies of two different HAPS deployment scenarios. In our simulations, performed with CloudSim Plus, we have experimented with scenarios with varying number of lower and higher altitude HAPS and terrestrial base stations. In our experiments we have identified the trade-offs and cases to provide better performance in handling cloud workloads.
{"title":"Utilizing HAPS Deployed Data Centers in Offloading Cloud Workloads","authors":"T. Ovatman, Muhammed Enes Tırnakçı, A. Yılmaz","doi":"10.1109/CSCI54926.2021.00135","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00135","url":null,"abstract":"Recent advances in communication technology has begun to push the data centers towards high altitude platform stations (HAPS) due to their advantages in communication coverage, mobility and cooling. There are plenty of studies that focus on the communication aspects of such devices but the issues regarding deploying micro data centers on HAPS is rarely studied. In the future, there is a potential for a substantial amount of processing power to be offload to such stations to back up terrestrial stations in fog computing scenarios. In this study we have analyzed cloud workload handling and power consumption efficiencies of two different HAPS deployment scenarios. In our simulations, performed with CloudSim Plus, we have experimented with scenarios with varying number of lower and higher altitude HAPS and terrestrial base stations. In our experiments we have identified the trade-offs and cases to provide better performance in handling cloud workloads.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127315207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/CSCI54926.2021.00142
A. Delbem, A. Saraiva, J. London, R. Fanucchi
Artificial Intelligence in Complex Networks has contributed to several relevant fields involving energy systems, computer networks, environment, agriculture, health, and social organizations. However, investigations concerning multiple heterogeneous networks have been less frequent. Mixed systems usually require fine-grained data to retain a sufficient amount of details from each network. This type of modeling may enable the investigation of emerging behaviors or synergies. For example, a decision making may require the search for an improved network configuration (involving coarse and fine modifications on devices, procedures, and settings) with the lowest possible cost to soon mitigate effects from climate changes or other types of "attacks" (from economic crises, calamities, and recent pandemics). The generation of robust configurations for heterogeneous networks involves some challenges, pointed out in this paper. Among them, the efficient calculus of load flows has been one of the main challenges. To overcome it, we propose a load flow algorithm with sublinear time complexity for the construction and evaluation of several configurations. The new algorithm scales well and can deal with nonlinear dynamics in evaluations of entire sets of fine-grained network models that it may involve.
{"title":"Sublinear evaluation of complex networks for extensive exploration of configurations for critical scenarios and decision making","authors":"A. Delbem, A. Saraiva, J. London, R. Fanucchi","doi":"10.1109/CSCI54926.2021.00142","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00142","url":null,"abstract":"Artificial Intelligence in Complex Networks has contributed to several relevant fields involving energy systems, computer networks, environment, agriculture, health, and social organizations. However, investigations concerning multiple heterogeneous networks have been less frequent. Mixed systems usually require fine-grained data to retain a sufficient amount of details from each network. This type of modeling may enable the investigation of emerging behaviors or synergies. For example, a decision making may require the search for an improved network configuration (involving coarse and fine modifications on devices, procedures, and settings) with the lowest possible cost to soon mitigate effects from climate changes or other types of \"attacks\" (from economic crises, calamities, and recent pandemics). The generation of robust configurations for heterogeneous networks involves some challenges, pointed out in this paper. Among them, the efficient calculus of load flows has been one of the main challenges. To overcome it, we propose a load flow algorithm with sublinear time complexity for the construction and evaluation of several configurations. The new algorithm scales well and can deal with nonlinear dynamics in evaluations of entire sets of fine-grained network models that it may involve.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"87 46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper will cover the planning and development of cloud applications that are used in the workplace. In addition to researching the feature needs of these applications, we will examine the risks and rewards of using these cloud applications for businesses. For instance, we go into how cloud software could be used in education as well as for small business and dive into the benefits that can be obtained from both. On the other hand, when conducting business on the cloud, there is always a risk that your data can be intercepted by an unwanted party through scripting or injection attacks. With the cloud becoming larger every year, we also dive into the European Union (EU) and the United States (US) privacy regulators and how they act in favor of the consumer, so that their data and rights are protected. Finally, we examine the many different scaling techniques and infrastructure providers can elect to deploy a combination of them, so that service quality does not degrade with an increase of traffic.
{"title":"Engineering Cloud Applications for the Workplace","authors":"Noah Bankston, Sandy Jarkas, Tara Jubran, Noah Pape, Sterling Walker, Terrell Brooks, Mohammed Mahmoud","doi":"10.1109/CSCI54926.2021.00138","DOIUrl":"https://doi.org/10.1109/CSCI54926.2021.00138","url":null,"abstract":"This paper will cover the planning and development of cloud applications that are used in the workplace. In addition to researching the feature needs of these applications, we will examine the risks and rewards of using these cloud applications for businesses. For instance, we go into how cloud software could be used in education as well as for small business and dive into the benefits that can be obtained from both. On the other hand, when conducting business on the cloud, there is always a risk that your data can be intercepted by an unwanted party through scripting or injection attacks. With the cloud becoming larger every year, we also dive into the European Union (EU) and the United States (US) privacy regulators and how they act in favor of the consumer, so that their data and rights are protected. Finally, we examine the many different scaling techniques and infrastructure providers can elect to deploy a combination of them, so that service quality does not degrade with an increase of traffic.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130659157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}