Pub Date : 2021-01-01DOI: 10.1504/IJGUC.2021.10032066
Reddy SaiSindhuTheja, G. Shyam
{"title":"A survey on resolving security issues in SaaS through software defined networks","authors":"Reddy SaiSindhuTheja, G. Shyam","doi":"10.1504/IJGUC.2021.10032066","DOIUrl":"https://doi.org/10.1504/IJGUC.2021.10032066","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"104 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.1504/ijguc.2021.10043788
Mehdi Dehghan Takht Rooladi, S. Ghasemi, M. Meybodi, Amir Masoud Rahmani
{"title":"A competition-based pricing strategy in Cloud markets using regret minimisation techniques","authors":"Mehdi Dehghan Takht Rooladi, S. Ghasemi, M. Meybodi, Amir Masoud Rahmani","doi":"10.1504/ijguc.2021.10043788","DOIUrl":"https://doi.org/10.1504/ijguc.2021.10043788","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"100 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78743852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-14DOI: 10.1504/ijguc.2020.10032065
Muddasar Ghani Khwaja, Saqib Mahmood, A. Jusoh
Social media networks have increased Electronic Word of Mouth (eWOM) conversations which have created numerous opportunities for online businesses. People using social media networks have been able to discuss, evaluate and argue on different products and services with their friends, family and peers. The study aimed to determine the influence of these social media conversations on the consumer purchase intentions. In this regard, Erkan and Evans' (2016) study was extended as an integrated framework of Theory of Reasoned Action (TRA) and Information Adoption Model (IAM). The proposed framework was estimated using Structural Equation Modelling (SEM) on AMOS. Survey method was deployed in which data from 342 respondents were taken who have been involved in online purchasing due to social media influence. The results attained affirmed the established theoretical foundations.
{"title":"Online information bombardment! How does eWOM on social media lead to consumer purchase intentions","authors":"Muddasar Ghani Khwaja, Saqib Mahmood, A. Jusoh","doi":"10.1504/ijguc.2020.10032065","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10032065","url":null,"abstract":"Social media networks have increased Electronic Word of Mouth (eWOM) conversations which have created numerous opportunities for online businesses. People using social media networks have been able to discuss, evaluate and argue on different products and services with their friends, family and peers. The study aimed to determine the influence of these social media conversations on the consumer purchase intentions. In this regard, Erkan and Evans' (2016) study was extended as an integrated framework of Theory of Reasoned Action (TRA) and Information Adoption Model (IAM). The proposed framework was estimated using Structural Equation Modelling (SEM) on AMOS. Survey method was deployed in which data from 342 respondents were taken who have been involved in online purchasing due to social media influence. The results attained affirmed the established theoretical foundations.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"11 1","pages":"857-867"},"PeriodicalIF":0.5,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48434453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/ijguc.2020.10030943
Guto Leoni Santos, D. Gomes, D. Sadok, J. Kelner, É. Rocha, P. Endo
{"title":"How do checkpoint mechanisms and power infrastructure failures impact on cloud applications","authors":"Guto Leoni Santos, D. Gomes, D. Sadok, J. Kelner, É. Rocha, P. Endo","doi":"10.1504/ijguc.2020.10030943","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10030943","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"11 1","pages":"615-628"},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/ijguc.2019.10022982
S. Angeloni
The paper explains and discusses an innovative agricultural appliance, based on vertical farming and hydroponics. The innovative and smart model was launched by a brilliant woman, winner of several awards. Applying her engineering skills, the female entrepreneur has set up a modern company, where technology and agriculture are perfectly integrated in a sustainable way to prevent environmental negative and damaging effects. Recently, the company has developed an automatic hydroponic greenhouse appliance for empowering individuals to grow crops at home. The household hydroponic appliance is based on sensors and smart technologies. The environmental and economic benefits and potentiality of the innovative appliance are highlighted.
{"title":"Domo Farm 4.0","authors":"S. Angeloni","doi":"10.1504/ijguc.2019.10022982","DOIUrl":"https://doi.org/10.1504/ijguc.2019.10022982","url":null,"abstract":"The paper explains and discusses an innovative agricultural appliance, based on vertical farming and hydroponics. The innovative and smart model was launched by a brilliant woman, winner of several awards. Applying her engineering skills, the female entrepreneur has set up a modern company, where technology and agriculture are perfectly integrated in a sustainable way to prevent environmental negative and damaging effects. Recently, the company has developed an automatic hydroponic greenhouse appliance for empowering individuals to grow crops at home. The household hydroponic appliance is based on sensors and smart technologies. The environmental and economic benefits and potentiality of the innovative appliance are highlighted.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"11 1","pages":"135-142"},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/ijguc.2020.10027929
Qiaoge Xu
{"title":"Data access control algorithm based on fine-grained cloud storage","authors":"Qiaoge Xu","doi":"10.1504/ijguc.2020.10027929","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10027929","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"27 1","pages":"1"},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66888467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-09DOI: 10.1504/IJGUC.2019.10023121
D. Gomes, G. Gonçalves, P. Endo, Moisés Rodrigues, J. Kelner, D. Sadok, C. Curescu
Users pay for running their applications on cloud infrastructure, and in return they expect high availability, and minimal data loss in case of failure. From a cloud provider perspective, any hardware or software failure must be detected and recovered as quickly as possible to maintain users' trust and avoid financial losses. From a user's perspective, failures must be transparent and should not impact application performance. In order to recover a failed application, cloud providers must perform checkpoints, and periodically save application data, which can then be recovered following a failover. Currently, a checkpoint service can be implemented in many ways, each presenting different performance results. The main research question to be answered is: what is the best checkpoint strategy to use given some users' requirements? In this paper, we performed experiments with different checkpoint service strategies to understand how these are affected by the computing resources. We also provide a discussion about the relationship between service availability and the checkpoint service.
{"title":"Don't lose the point, check it: Is your cloud application using the right strategy","authors":"D. Gomes, G. Gonçalves, P. Endo, Moisés Rodrigues, J. Kelner, D. Sadok, C. Curescu","doi":"10.1504/IJGUC.2019.10023121","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10023121","url":null,"abstract":"Users pay for running their applications on cloud infrastructure, and in return they expect high availability, and minimal data loss in case of failure. From a cloud provider perspective, any hardware or software failure must be detected and recovered as quickly as possible to maintain users' trust and avoid financial losses. From a user's perspective, failures must be transparent and should not impact application performance. In order to recover a failed application, cloud providers must perform checkpoints, and periodically save application data, which can then be recovered following a failover. Currently, a checkpoint service can be implemented in many ways, each presenting different performance results. The main research question to be answered is: what is the best checkpoint strategy to use given some users' requirements? In this paper, we performed experiments with different checkpoint service strategies to understand how these are affected by the computing resources. We also provide a discussion about the relationship between service availability and the checkpoint service.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2019-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43159846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-18DOI: 10.1504/IJGUC.2019.10020511
Samaher Al-Janabi, M. A. Mahdi
Intelligent analysis of prediction data mining techniques is widely used to support optimising future decision-making in many different fields including healthcare and medical diagnoses. These techniques include Chi-squared Automatic Interaction Detection (CHAID), Exchange Chi-squared Automatic Interaction Detection (ECHAID), Random Forest Regression and Classification (RFRC), Multivariate Adaptive Regression Splines (MARS), and Boosted Tree Classifiers and Regression (BTCR). This paper presents the general properties, summary, advantages, and disadvantages of each one. Most importantly, the analysis depends upon the parameters that have been used for building a prediction model for each one. Besides, classifying those techniques according to their main and secondary parameters is another task. Furthermore, the presence and absence of parameters are also compared in order to identify the better sharing of those parameters among the techniques. As a result, the techniques with no randomness and mathematical basis are the most powerful and fast compared with the others.
{"title":"Evaluation prediction techniques to achieve optimal biomedical analysis","authors":"Samaher Al-Janabi, M. A. Mahdi","doi":"10.1504/IJGUC.2019.10020511","DOIUrl":"https://doi.org/10.1504/IJGUC.2019.10020511","url":null,"abstract":"Intelligent analysis of prediction data mining techniques is widely used to support optimising future decision-making in many different fields including healthcare and medical diagnoses. These techniques include Chi-squared Automatic Interaction Detection (CHAID), Exchange Chi-squared Automatic Interaction Detection (ECHAID), Random Forest Regression and Classification (RFRC), Multivariate Adaptive Regression Splines (MARS), and Boosted Tree Classifiers and Regression (BTCR). This paper presents the general properties, summary, advantages, and disadvantages of each one. Most importantly, the analysis depends upon the parameters that have been used for building a prediction model for each one. Besides, classifying those techniques according to their main and secondary parameters is another task. Furthermore, the presence and absence of parameters are also compared in order to identify the better sharing of those parameters among the techniques. As a result, the techniques with no randomness and mathematical basis are the most powerful and fast compared with the others.","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44268399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-12-07DOI: 10.1007/978-3-540-24679-4_65
Jiannong Cao, Oscar M. K. Kwong, Xianbing Wang, Wentong Cai
{"title":"A peer-to-peer approach to task scheduling in computation grid","authors":"Jiannong Cao, Oscar M. K. Kwong, Xianbing Wang, Wentong Cai","doi":"10.1007/978-3-540-24679-4_65","DOIUrl":"https://doi.org/10.1007/978-3-540-24679-4_65","url":null,"abstract":"","PeriodicalId":44878,"journal":{"name":"International Journal of Grid and Utility Computing","volume":"10 1","pages":"316-323"},"PeriodicalIF":0.5,"publicationDate":"2003-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88112954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}