120 research outputs found

    Cloud Computing Adoption Factors Affecting Academic Performance in UAE Public Universities

    Get PDF
    Cloud computing helps in reducing costs and providing accessibility, reliability, and flexibility especially in educational sector. This able to provide the best educational resources and facilities to all level of students effectively and efficiently. It also seen as a creative technological innovation that provides stable and on-demand access to the available network. Hence, this study aimed to measure the cloud computing adoption factors affecting the academic performance in UAE university. The factors are clustered into five groups namely, knowledge sharing; knowledge application; learnability; perceived self-efficacy; and perceived enjoyment. A questionnaire survey was conducted with the university students to gauge their opinions on the level of significant of each factor affecting the academic performance using 5-points Likert scale. Out of 400 questionnaire sets distributed using random sampling, 382 valid responses were extracted as the collected data. This data was analysed descriptively. The results of the analysis found that that cloud computing adoption factors in perceived self-efficacy group are ranked first in term of its significance in affecting academic performance. The second rank is factors in learnability group; the third is perceived enjoyment; the fourth rank is knowledge application and finally, the fifth rank is knowledge sharing. The impact of this research will be felt simultaneously in the IT and education sectors, particularly through assisting students in utilising cloud computing to store and exchange information for both their academic and personal lives

    Data Safety Contact Control Model of Cloud Computing

    Get PDF
    The progress of cloud computing are facing by many difficulties, which one of the most important challenge is data security problem. Everyone wants to use cloud computing due to cost saving and new agile business model which resulted by its dynamic, sharing, openness and highly centralized data. There complex data security challenges in cloud computing. From the view of users the research about data security focused on methodologies that ensuring the safety of data and storage. This paper provides a control model of a secured data access by on MAC access control. This is origin experience from the government cloud platform construction. This model provides the most important technical and management techniques with the security of data accessing. In shortly, the practical applications test showed that the model with corresponding control mechanism cloud meet the necessaries for reliable applications of government cloud. Keywords: Control Model of Access Control, Security of Cloud Computing, Access Control of Secured Data

    The Impact of Cloud Computing on Academic Libraries

    Get PDF
    With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university libraries. The article claims that cloud providers\u27 high quality of service, the expansion of Internet bandwidth, and the rapid transfer of information should all contribute to improving academic library services in the future. Cloud computing is essential for today\u27s information innovation, and it is vital for university libraries

    Cloud Computing in the Global South: Drivers, Effects and Policy Measures

    Get PDF
    Cloud computing has started to transform economic activities in the global South. Many businesses are taking advantage of the pay-as-you-go model of the technology, and its scalability and flexibility features, and government agencies in the South have been investing in cloud-related mega-projects. Cloud-based mobile applications are becoming increasingly popular and the pervasiveness of cellphones means that the cloud may transform the way these devices are used. However, findings and conclusions drawn from surveys, studies and experiences of companies on the potential and impact of cloud computing in the developing world are inconsistent. This article reviews cloud diffusion in developing economies and examines some firms in the cloud's supply side in these economies to present a framework for evaluating the attractiveness of this technology in the context of evolving needs, capabilities and competitive positions. It examines how various determinants related to the development and structure of related industries, externality mechanisms and institutional legitimacy affect cloud-related performances and impacts

    Cloud Computing in Developing Economies

    Get PDF
    The developing world must exploit the opportunities afforded by cloud computing while minimizing the associated risks to allow access to advanced IT infrastructure, data centers, and applications and protect sensitive information

    The myth of the Digital Earth between fragmentation and wholeness

    Get PDF
    Daring predictions of the proximate future can establish shared discursive frameworks, mobilize capital, and steer complex processes. Among the prophetic visions that encouraged and accompanied the development of new communication technologies was the “Digital Earth,” described in a 1998 speech by Al Gore as a high-resolution representation of the planet to share and analyze detailed information about its state. This article traces a genealogy of the Digital Earth as a techno-scientific myth, locating it in a constellation of media futures, arguing that a common subtext of these envisionments consists of a dream of wholeness, an afflatus to overcome perceived fragmentation among humans, and between humans and the Earth

    Opportunities and obligations for physical computing systems

    Get PDF
    The recent confluence of embedded and real-time systems with wireless, sensor, and networking technologies is creating a nascent infrastructure for a technical, economic, and social revolution. Based on the seamless integration of computing with the physical world via sensors and actuators, this revolution will accrue many benefits. Potentially, its impact could be similar to that of the current Internet. We believe developers must focus on the physical, real-time, and embedded aspects of pervasive computing. We refer to this domain as physical computing systems. For pervasive computing to achieve its promise, developers must create not only high-level system software and application solutions, but also low-level embedded systems solutions. To better understand physical computing\u27s advantages, we consider three application areas: assisted living, emergency response systems for natural or man-made disasters, and protecting critical infrastructures at the national level

    A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

    Get PDF
    Cloud computing (CC) is among the most rapidly evolving computer technologies. That is the required accessibility of network assets, mainly information storage with processing authority without the requirement for particular and direct user administration. CC is a collection of public and private data centers that provide a single platform for clients throughout the Internet. The growing volume of personal and sensitive information acquired through supervisory authorities demands the usage of the cloud not just for information storage and for data processing at cloud assets. Nevertheless, due to safety issues raised by recent data leaks, it is recommended that unprotected sensitive data not be sent to public clouds. This document provides a detailed appraisal of the research regarding data protection and privacy problems, data encrypting, and data obfuscation, including remedies for cloud data storage. The most up-to-date technologies and approaches for cloud data security are examined. This research also examines several current strategies for addressing cloud security concerns. The performance of each approach is then compared based on its characteristics, benefits, and shortcomings. Finally, go at a few active cloud storage data security study fields

    Low-Power Computer Vision: Improve the Efficiency of Artificial Intelligence

    Get PDF
    Energy efficiency is critical for running computer vision on battery-powered systems, such as mobile phones or UAVs (unmanned aerial vehicles, or drones). This book collects the methods that have won the annual IEEE Low-Power Computer Vision Challenges since 2015. The winners share their solutions and provide insight on how to improve the efficiency of machine learning systems
    corecore