Cloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optimisation for web-based services. This study could aid in identification and generation of cloud-based services that use multi-tenant and load-balancing methodologies for the best quality of service.
Neuro-ophthalmology, bridging neurology and ophthalmology, highlights the nervous system’s crucial role in vision, encompassing afferent and efferent pathways. The evolution of this field has emphasized the importance of neuroanatomy for precise surgical interventions, presenting educational challenges in blending complex anatomical knowledge with surgical skills. This review examines the interplay between neuroanatomy and surgical practices in neuro-ophthalmology, aiming to identify educational gaps and suggest improvements.
A literature search across databases such as PubMed, Scopus, and W
Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq
... Show MoreThis research raised the strategic selection factors and dimensions of the quality of higher education and what the nature of their relationship and has been collecting a sample search from the technological University of president scientific departments and administrative and scientific associates and chiefs of branches This research aims at studying factors affecting the strategic selection effects these factors in the quality of higher education and the combination of these factors has been identified as a group of selected dimensions of quality of higher education and study link relationships and affecting factors and strategic selection of (risk, previous strategies, resources, time, considerations and internal trends) and d
... Show More The vast majority of EC applications are the web-based deployed in 3-tire Server-Client environment, the data within such application often resides within several heterogeneous data sources. Building a single application that can access each data sources can be a matter of challenging; this paper concerns with developing a software program that runs transparently against heterogeneous environment for an EC-application.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
Smart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreMulti-document summarization is an optimization problem demanding optimization of more than one objective function simultaneously. The proposed work regards balancing of the two significant objectives: content coverage and diversity when generating summaries from a collection of text documents.
Any automatic text summarization system has the challenge of producing high quality summary. Despite the existing efforts on designing and evaluating the performance of many text summarization techniques, their formulations lack the introduction of any model that can give an explicit representation of – coverage and diversity – the two contradictory semantics of any summary. In this work, the design of
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreThe unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show More