Telecommunications System & Management

ISSN: 2167-0919

Open Access

Current Issue

Volume 9, Issue 1 (2020)

    Editorial Note Pages: 1 - 1

    Editor Note on Journal of Telecommunication System and Management

    Dr.Kalyan Raman

    DOI: 0

    Share this article

    Special Issue on Artificial Intelligence & Robotics (2020)

      Value Added Abstracts Pages: 2 - 2

      The Foundations of Robosociology: Values and The Aggregate Behaviors of Synthetic Intelligences

      Adam Alonzi

      DOI: 10.37421jtsm.2020.S6.001

      Outcomes on the macro level often cannot be accurately extrapolated from the microbehaviors of individual agents. The interdependence of complex system’s components makes simulation a viable option for exploring cause and effect relationships within it (Miller and Page, 2009). Chaos theory emphasizes the sensitivity of such networks to starting conditions (Boccaletti, 2000), which strongly suggests thought should be put into the architecture of an AGI “society” before it begins to take shape. Protocols for emergency interventions should certainly be in place, but the network itself should be robust enough from the beginning to handle sudden deviations from basic ethical precepts by one or more of its members.  Outside of its context, and without any information about the parts to which it is connected, a cell or leaf or animal can be studied, but not understood in a meaningful way (Mitchell, 2009). Creating moral agents in a hyperconnected world will involve modeling their interactions with entities like and unlike themselves in the face of both predictable and unforeseen events. This will be helpful as groups can behave differently than their individual parts (Schelling, 1969) Keeping AI friendly does not end with giving each AI a set of maxims before letting them loose, but satisfactorily explicating upon the emergent phenomena that arise from the interactions of similarly or differently “educated” machines. Because of the near certainty that synthetic intelligences will communicate rapidly and regularly, it is imperative that thought leaders in AI safety begin thinking about how groups of artificially intelligent agents will behave.

      Editorial Pages: 1 - 1

      Conference Announcement on Webinar on Artificial Intelligence & Robotics


      DOI: 10.37421jtsm.2020.S6.003

      We are satisfied to invite you to the " Webinar on Artificial Intelligence & Robotics "after the fruitful culmination of the arrangement of Artificial Intelligence Congress. The congress is planned to occur August 23, 2020.

      This Artificial Intelligence gathering will give you an excellent research understanding and tremendous thoughts. Artificial Intelligence will concentrate on the subject Innovations and headways in Artificial Intelligence. We are certain that you will appreciate the Scientific Program of this up and coming Conference. The point of view of the Artificial Intelligence Conference is to set up cutting edge research to assist individuals with seeing how procedures have progressed and how the field has created as of late.

      Artificial Intelligence is an area of programming building that underscores the creation of canny machines that work and react like individuals. Artificial Intelligence is master in examining how human cerebrum thinks, learn, choose, and work while attempting to take care of an issue, and afterward utilizing the results of this investigation as In the reality, the information has some unfortunate properties. In the advanced world, Artificial Intelligence can be utilized from multiple points of view to control robots, Sensors, actuators and so forth. A robotization framework is a framework that controls and shows building association. These frameworks can be set up in a couple of commonplace ways.  In this portion, a general development outline work for a structure with complex prerequisites because of the activity, for example, a counselling room will be depicted.

      Real plan often has a portion of the highlights and segments portrayed here yet not every one of them. The computerization level comprises of every single dynamic control that direct the field level gadgets in real time. This is perhaps the best case of robotization.  In web based shopping the imbursement and checkout are through online discussion framework.

      The most other designing majors work with Artificial Intelligence, however the core of Artificial Intelligence is Automation and Automation Engineering over every one of the supporters.  Artificial Intelligence gathering is likewise involved Best Post Awards, Best Oral Presentation Awards, Young Researchers Forums (YRF) and furthermore Video Presentation by specialists.

      We are happy to invite all of you to join and enrol for the "Webinar on Artificial Intelligence & Robotics" which will be held during August 23, 2020. Individuals who have missed going to the past gathering are generally free to show your examination thoughts at the 2020 Artificial Intelligence meeting. This meeting will assist you with improving systems administration with famous individuals in the field of transplantation.

      Value Added Abstracts Pages: 4 - 4

      Research Based on COVID 19

      Marandure Elisha

      DOI: 10.37421jtsm.2020.S6.004

      In my research I discovered that corona virus it is a virus that was discovered way back. Corona virus has MERS, SARS etc. My main aim for this research is based on covid- 19

      COVID- 19

      A lot of people around the world have different views and beliefs on the source of the virus. Even up to now the source of the virus is still under debate, thus resulting in less confidence enough for scientists to come up with a better solution to save humanity, as Scientists have been trying to understand the origin of COVID-19 and the virus that course it SARS-cov-2...(Why?).Original scientists believed that the virus may have developed in bats and later pangolins.... (Why bats and why later pangolins if it has been bats?).

      Well then genomic comparisons suggest that the SARS cov 2 virus is a result of a recombination between two different viruses, meaning the exact origin of the virus is still unclear. (Unclear? Meaning to be clear enough, bats and pangolins, or group family of such kind of animals may help come up with the clear and that's possible). Let's look at MERS a bit Health officials first reported the disease in Saudi Arabia in September 2012(places to look at Saudi Arabia). Through retrospective (backward-looking) investigations, they later identified that the first known cases of MERS occurred in Jordan in April 2012(first case of MERS in Jordan). All cases of MERS have been linked through travel to, or residence in, countries in and near the Arabian Peninsula. The largest known outbreak of MERS outside the Arabian Peninsula occurred in the Republic of Korea in 2015(MERs could also help us come up with the clear view if we trace back to the places it occurs, if it occured in Saudi Arabia,then let's look at the places like Ethiopia,Somalia, Egypt and Suda as well as some places in Africa which does trade in pangolins and other animals including poachers the type of animals they were interested in hanting as well type of meat hunt they eat during the process of poaching. If we are to look at Korea both both and south on the other hand ,what type of food bat or pangolins or snake related,shipping animals as well the travel through water infected fish and so on,so let's look dip in to areas like Korea, Zibo,Dalian,Qingdao,Yangzho,Nanzhing as well how good the relationship of food supplies and movement of people from other location it was to Wuhan?). The outbreak was associated with a traveler returning from the Arabian Peninsula.People with MERS can spread it to others......

       The other way I personally view and under my search goes like. Under normal circumstances the courses of the virus is usually authenticated of such venom threats apart from the figurative sauces to which the identification is malicious pertaining to other deadly viral diseases that has been figured out as global pandemic in about years back. Currently I may say covid 19 is an acute airborne diseases that affects the body with an immediate air crafted response (physical connection distance). Although I may not refer to any source or book because of its causes due to the current diligence researches

      So I vividly consider the research to be part of the animal scientist’s task to take part of the identification so as to approach either soil environmental creature because basically we would have to imagine if it an animal based disease it won’t be possible for us to toss the whole world since we have some animals that are not even found within our locality, like African countries as I heard from one of the medical expert and I argue with them as not true fact of convincing the world,so for us to toss the world will be only due to search of how Corona has been to existence. So I now confident enough that covid 19 it’s a man-made virus that is air crafted with a travelling motivation and reactivate motion that influence our social wellbeing. I know this might sounds crazy but one thing I’m sure about is since we are now chewed with the susceptible society and hypocritical world.

      So from the above I may say it's just a few of what I have and due to lack of enough apparatus to use for the whole search I just have to give a written document so my little idea might help scientists help save humanity

      So for now in my research I think can be done is to go over and over some experiments

      What is a Bat? How do a bat survive? What type of food a bat eat? Looking in to a system of a bat, as well as some type of snakes expected to be the ones to the course, as well as the pangolins.

      Herbs like Zumbani, lemons, Tsine, in shona, Baobabarous type of alovera (gavakava), Ginger, garlic supposed some I've mentioned are not yet tested to be use but alovera have 21 nutrient elements which may help human system (specific baobabarous type)

      Value Added Abstracts Pages: 5 - 5

      The SP Theory of Intelligence and its potential in robotics

      J Gerard Wolff

      DOI: 10.37421jtsm.2020.S6.005

      The SP System, meaning the SP Theory of Intelligence and its realisation in the SP Computer Model, is the product of a lengthy programme of research, which now provides solutions or potential solutions to several problems in AI research [1]. There is an extended overview of the SP System in [2], and there is a much more comprehensive description in [3]. Details of related publications, with download links, are on www.cognitionresearch.org/sp.htm. This presentation is about how the SP System may prove useful in the development of intelligence in robots. A peer-reviewed, published, paper about this is in [4]. The main theme of this presentation is generality, as described in the following subsections. Generality needed for AI in robots Where some degree of autonomy and intelligence are required in robots, it seems fair to say that capabilities that have been developed so far are quite narrowly specialised, such as vacuum cleaning an apartment or a house, navigating a factory floor, walking over rough ground, and so on. It seems fair to say that there is a pressing need to provide robots with human-like generality and adaptability in intelligence.

      Value Added Abstracts Pages: 3 - 3

      Representing and Reasoning about Viewpoint within the context of Computer Vision, Computer Graphics and Robotics

      Mr. Andrew Ritz

      DOI: 10.37421jtsm.2020.S6.004

      The concept of Viewpoint Reasoning was proposed a number of years ago within the context of 3D Model-Based Vision for representing viewpoint information about a scene and the objects therein. This concept is based on a representation that stores feature visibility in terms of 3D surfaces or solids that encapsulate individual objects or the whole scene, much in the same way as property spheres and the aspect graph. When the visibility of objects and their features are represented in this way, answers to questions about the joint visibility of features from viewpoints within a scene are at hand. With respect to computer graphics, viewpoint reasoning requires semantics to be routinely associated with 3D objects and the scenes they are placed in. Once this is done a large number of options become available for interacting with a scene and individual objects in a task-oriented way and not just in terms of geometry. Viewpoint Reasoning can be applied within the areas of Computer Graphics and Robotics to problems such as Good Viewpoint Selection, Sensor Placement, Motion Planning, and Object Exploration. This talk describes a system, written in the programming language Python, which demonstrates how such tasks can be performed even when complex objects are involved.

      Value Added Abstracts Pages: 6 - 6

      AI the single most important tool humanity has conceived

      Kelvin Ogba Dafiaghor

      DOI: 10.37421jtsm.2020.S6.006

      Artificial Intelligence is the development of computer systems to be able to perform task normally requiring human intelligence. Examples are visual perception, speech recognition, decision-making and translation between languages e.t.c. According to techopedia.com Artificial intelligence is an area of computer science that emphasizes the creation of intelligent machines that work and react like humans. Artificial intelligence is the technology that drive most modern technology from self driving cars to even our snap chart filter. According to Andrew Ng, an authority in the field of artificial intelligence, he said just as electricity transformed almost everything 100 years ago, we have seen so far that AI will transform our industry in the next several years. AI already powers our home i.e. smart homes, our phone cameras, driverless cars like in Tesla cars. Fictional movies are becoming a reality with artificial intelligence. we now see company trying to create neural machine interface to bridge the gap between humans and AI because of the rate of advancement of AI. It is estimated that trade involving AI will hit $13 trillion by the year 2030. An easy way to build the skills necessary for the machine-learning and AI field is continuing education, in addition to formal strong data science programs, there are also many viable, free options. Importance of Artificial Intelligence. Artificial intelligence as the best tool to solve global poverty. Artificial intelligence can be used to bridge the gap between the have and the have not between the develop and the underdeveloped world. Artificial intelligence can bring same kind of quality education obtainable in Harvard to FUPRE.

      Value Added Abstracts Pages: 7 - 7

      Human and Multi-Agent collaboration in a human-AI teaming framework

      Neda Navidi

      DOI: 10.37421jtsm.2020.S6.007

      Summary: The main focus of this talk is "human-AI teaming", specifically the mode of "human-AI collaboration" where humans and AIRL-based agents accomplish tasks together in a multi-agent system. Therefore, the objective cannot be achieved by just a lone human or agent, and the responsibilities in the environment are partitioned and/or shared between humans and agents.


      Collaborative multi-agent reinforcement learning (MARL) as a specific category of reinforcement learning (RL) provides effective results with agents learning from their observations, received rewards, and internal interactions between agents. However, centralized learning methods with a joint global policy in a highly dynamic environment present unique challenges in dealing with large amounts of information. This study proposes two innovative solutions to address the complexities of a collaboration between human and multiple RL-based agents (referred to hereafter as “Human-MARL teaming”) where the goals pursued cannot be achieved by a human alone or agents alone. The first innovation is the introduction of a new open-source MARL framework, called COGMENT, to unite humans and agents in real-time complex dynamic systems and efficiently leverage their interactions as a source of learning. The second innovation is our proposal of a new hybrid MARL method, named Dueling Double Deep Q learning MADDPG (D3-MADDPG) to allow agents to train decentralized policies parallelly in a joint centralized policy. This method can solve the overestimation problem in Q-learning methods of value-based MARL. We demonstrate these innovations by using a designed real-time environment with unmanned aerial vehicles driven by RL agents, collaborating with a human to fight fires. The team of RL agent drones autonomously looks for fire seats and the human pilot douses the fires. The results of this study show that the proposed collaborative paradigm and the open-source framework leads to significant reductions in both human effort and exploration costs. Also, the results of the proposed hybrid MARL method shows that it effectively improves the learning process to achieve more reliable Q-values for each action, by decoupling the estimation between state value and advantage value.

      Value Added Abstracts Pages: 8 - 8

      Making Money Out of Data

      Mr. Shailendra Kumar

      DOI: 10.37421jtsm.2020.S6.008

      Though a lot has been talked about emerging technologies, there are still a lot of unknowns on the concepts. To bring it to life, Shailendra will take a use case approach to showcase how large organizations are becoming Intelligent Enterprises to Make Money out of Data. Shailendra will also talk about how data can bring business value to an organization through data-driven analytics strategies for revenue growth, cost reduction, marketing, and customer behavior management to drive business outcomes driving a huge return on investment. It will give an opportunity for students to ask direct questions to Shailendra, understanding the basic concepts of Data Science.

      Special Issue on Cloud Computing (2020)

        Value Added Abstracts Pages: 1 - 1

        Framework of Database Auditing: Steps to Ensure Security and Reliability

        Bernard Igoche

        DOI: 10.37421/Jtsm.2020.S2.001

        In this paper, we present a framework of database auditing by ensuring the security and reliability of database activities through analyzing network traffic, execute audit analysis through event correlation and generate alarms if an anomaly or a violation of security regulations is detected. This area encompasses a huge range of application problems ranging from who can gain access, when access was achieved and what operation was performed. Despite these trends in technology, there is an increasing number of database hacking occurrences and sensitive data loss. Database auditing can help strengthen the security of database. It is therefore imperative to say that security is enhanced and complimented with the use of auditing. There is no security without auditing, therefore security and auditing should be implemented in an integrated fashion. 

        Value Added Abstracts Pages: 2 - 2

        The Illiterate of the 21st century: Are you prepared for the future, or will you lose your job? A discuss about IA, Automation and Education.

        Jefferson Ribeiro

        DOI: 10.37421/Jtsm.2020.S2.002

        On Future Shock (1970) Alvin Toffler said: “The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn and relearn.”. Homo sapiens (wise man in Latin) would have appeared in Africa about 200,000 years ago. From 1760 to 1860, we had the first industrial revolution here in England, in the fabric industries. The second stage took place from 1860 to 1900 but has already involved countries such as Germany, France, Russia and Italy. Some historians have regarded the technological advances of the twentieth and twenty-first centuries as the third stage of the Industrial Revolution. The computer, the fax, the genetic engineering, the cell phone would be some of the innovations of this era. Today we are living the fourth stage of this revolution, with Automation and Artificial Intelligence. According to studies from the University of Oxford, in the next 25-30 years, the unemployment rate in the United Kingdom could reach 35%, in the USA 47%, in Brazil approximately 57% and in intensely industrialised countries like China (77%) and Ethiopia (85%), the number is higher. Stopping Automation and Artificial Intelligence is not a viable option, as it generates savings for organisations and, consequently, more wealth for countries. We cannot stop our society from evolving, but what is the real cost of Automation and Artificial Intelligence for humanity? Are we prepared for the future? We have two certainties: the first is that we don’t know what kind the jobs of the future will be, 65% of our children will work on jobs there isn’t yet. The second is that with Automation and Artificial Intelligence, we will have more time to be human again, skills like originality and social intelligence are difficult features to automate. How we can prepare us for the future? Enabled the life-long learning, a changing world of work means that learning new skills will need to be a continual part of each employee’s lives.  Which skills I need to improve? Pearson published The Future of Skills: Employment in 2030, in collaboration with Nesta and Oxford Martin. By combining a wider understanding 
        of the trends that impact the future of work with expert human judgment and machine learning, a clearer understanding emerged of the skills more likely to be future-proof skills. The World Economic Forum given us the report with the 10 Skills you’ll need to survive the rise of automation. We need to change how we’re learning and how the teachers are teaching. Technology and education are the keys to help us to improve these new skills for the future and keep our society in economic life-balance.

        Value Added Abstracts Pages: 3 - 3

        Enabling inclusion and citizenship with Cloud Computing Technologies, Cognitive Chatbots and Artificial Intelligence

        Lucio Adolfo Meurer

        DOI: 10.37421/Jtsm.2020.S2.003

        The state of São Paulo is the most populous in Brazil, with 46 million inhabitants and generating one third of the total wealth produced in the country. Among the services provided to the population by the State Government, the issuance and renewal of documents of Identity and Driver License are the most required. Given the number of citizens who require them every day, scheduling interviews for issuing and renewing these documents is a considerable logistical challenge. The Government has a network of Citizen Service Centers where these documents are issued, and over the past few years, the need to automate and ensure prerequisite compliance at the first interview has become a major goal for the government. To address this situation, a chatbot-automated attendance system, delivered through cloud technologies, based on cognitive services has been developed, allowing citizens not only to schedule interview for document issuance but also to ensure that all required fees and certificates are met. This chatbot system showed a historic record of 505,372 interviews scheduled in a single day. The system in question allowed over 90% of assertiveness, preventing a second interview from being necessary due to lack of information or absence of required certificates. Considering that the lower income population in the

        state needs to take about four bus or train reides to attend interview, the assertiveness and guarantee of having your document issued in the first interview is no longer just an indicator of government effectiveness but, an inclusion factor for all sections of population.

        Value Added Abstracts Pages: 4 - 4


        Mohammad ShuaibKhan

        DOI: 10.37421/Jtsm.2020.S2.004

        TThe research work which is presented here is basically an effort which is being made to analyze the significance of knowledge reuse in an academic environment. To achieve the object we will have to appreciate the role of knowledge sharing and the knowledge management as well as the best utilization of reusable tacit and explicit knowledge. Issues of knowledge quality and reusability in contemporary age have also been analyzed. For comprehend the above undertakings in greater details by applying the management of knowledge, we present discussion on the software reusability and its academic applications in an academic environment

        Value Added Abstracts Pages: 5 - 5

        BRA2Cloud ??? A Brand new Resilient Agent-based Architecture to Cloud Computing

        José Pergentino de Araujo Neto

        DOI: 10.37421/Jtsm.2020.S2.005

        Cloud data centers, realizing that the amount of unused resources is significant, have started offering them as transient resources with unpredictable, irreversible revocation. The use of transient resources indicates many relevant issues still pose critical challenges, including security, strong and reliable connectivity and fault-tolerance approaches. To effectively use transient cloud servers to fulfill user requests, it is necessary to define an appropriate fault-tolerant mechanism and its respective parameters to avoid data loss if an unexpected failure occurs. We present an agent-based framework, namely BRA2Cloud, for integrating bag-of-tasks enabled systems using unreliable transient resources. To guarantee application execution and better use of idle resources, it is necessary to create an execution plan through fault tolerance definitions to increase reliability. To do this, BRA2Cloud agents combine features to predict failures in a multi-agent architecture that dynamically creates fault-tolerant multi-strategies, considering the current availability scenario and providing a resilient environment according to users’ application needs. Our approach was validated using real data retrieved between 2017 and 2019 from Amazon Spot Instances. Exhaustive experiments achieved high accuracy levels, reaching a 91% survival prediction success rate, which indicates the model is effective under realistic working conditions. We consider the results promising, decreasing up to 74.48% in total execution time when compared to other approaches in the literature. As the main requirements of our proposal, we have defined a series of features that BRA2Cloud should have in order to address the impact of these definitions on resiliency provision, application execution time reduction, and monetary cost reduction.

        Value Added Abstracts Pages: 6 - 6

        TCO and performance optimization for large scale public and Hybrid cloud environment.

        Prashant Mishra

        DOI: 10.37421/Jtsm.2020.S2.006

        Saving money and to increase the performance is one of the main reasons for moving workloads to the cloud. With the Click2Cloud multi cloud management platform, the cloud infrastructure can reduce total cost of ownership (TCO) as compared to on-premise infrastructure. Cloud brain helps to choose the best hybrid cloud solution that involves careful consideration of how each cloud implementation option would meet the needs of the overall organization and its specific workloads. A hybrid cloud approach offers the best path to the cloud, and a way to optimize your existing assets offers the best path to the cloud, and a way to optimize your existing assets. Using on demand resources in the cloud, you can leverage the power of the cloud and provide services that complement your existing on-premises datacentre. Cloud brain platform also provides consistency across the key areas like; identity; management, security, infra automation, and DevOps. It also simplifies complexities as user can comfortably choose instance sizes, operating systems, database, application framework among other applications as per their business needs and usage.

        Value Added Abstracts Pages: 7 - 7

        Blockchain for MedTech Manufacturing

        Roberto Magnani

        DOI: 10.37421/Jtsm.2020.S2.007

        A project just terminated and reported back to the FDA in the US. In IBM, Watson Health aims to build a smarter health in several areas, government health and human services, payer and providers, enterprise imaging,  ¬oncology. Here we illustrate a specific solution in the area of Life Science where our blockchain expertise has been fused with expertise in the sector. IBM utilizes an open source technology with Linux, called Hyperledger Fabric. On top of it we are building several solutions and use cases. This pilot with other major companies creates a blockchain solution to respond to the FDA request of traceability of drugs and/or medical devices. Blockchain was specifically geared to create a system that would test a rapid alert system among business partners alongside  supply chain in case of medication recall. The results of the pilot can be summarized in 4 main points, Provenance and data privacy are guaranted, so only specific partners are notified in case of provenance enquiries,. Reports of recalls is generated and competent autorithies are notified properly. Patient safety is guaranteed by elimintating only the specific lot impacted by the reason of the recall and therefore no hijacking of falsified products or sumministration of bad drugs would be done. This process, which would usually takes 3 days, took only 10 seconds.. In Europe a similar regulation will be released middle 2021. Unique Device Identification (UDI) System under the EU Medical Device Regulations 2017/745 and 2017/746 will facilitathe to an easy traceability to enhance post market analysis and overall better monitoring by audit agencies and competent authorities. This will

        prevent falsified and malfunctioning and reduce medical wast, guaranteeing higher standards of safety and we can take advantage of the experience already made in USA.

        Value Added Abstracts Pages: 8 - 8

        Now and then, the true impact of AI on healthcare

        Roberto Magnani

        DOI: 10.37421/Jtsm.2020.S2.008

        We ‘ll cover here the effect of AI in some application for  Life Science industry. We are in the 4th industrial revolution: new technologies like AI, IOT, data and cloud are fundamentally altering the way we live, work and relate to each other. Specifically in healthcare now, with a better ability to integrate and harness the data from wearables, electronic health records, patient reported outcomes, genomics data, we can drive better actionable insights, with more efficient processes, faster decision making, smarter business,  ending ultimately bringing new and more personalized medicines to patients sooner. The Life Science industry is still facing the challenges of the past.  Clinical Trials, 80% of trials in the US fail to meet recruitment deadlines and more than 80% experience delays. It takes a lot of time and cost a lot to deliver a drug to the market, which inevitably affects the number of treatments we do get to the market. In addition Siloed and unstructured data collection across disparate systems makes it difficult and time consuming. It’s not about collecting or finding data anymore, its actually what do we do with the data. With AI we’ can analyze the data to derive actionable insights. The AI can process enormous amounts of structured and unstructured data, can understand natural language, including clinical text, to surface insights, reach conclusions and anticipate problems with human – level expertise. Industry real cases( i.e. project with Majo Clinic in Minnesota for edical coding improvement) show how training  Watson and infuse it’s capability we have a significant improvement in rpecison and reduction of costs and time. With case we will arrive to show that. The pace of change will vary across industries but if we adopt these emerging, advanced technologies in the Life Science space we have a chance to bridge to the needs of yesterday and tomorrow and drive value and scalability to our patients and organizations.

        Value Added Abstracts Pages: 9 - 9

        How Hybrid Cloud Accelerates Enterprise Cloud Transformation?

        Rupal Shirpurkar

        DOI: 10.37421/Jtsm.2020.S2.009

        A Enterprises are increasingly adopting a hybrid cloud approach that includes one or more cloud providers along with on-premises infrastructure. A hybrid cloud approach offers the best path to the cloud, and a way to optimize your existing assets. Click2Cloud Multi cloud management platform makes cloud adoption fast and easy, allowing you to optimize the value of existing on-premises infrastructure, while confidently leveraging the same tools, technologies and skills in the cloud. Choosing the right hybrid cloud solution is an important step in your digital transformation. The hybrid platform is a strategic choice for forward-leaning organizations that are looking for a long-term, powerful solution to innovation, flexibility, and control across their on-premises and cloud environments. Ready to start your cloud journey? Easily migrate your workloads to the AWS, Alibaba, Huawei, GCP, Telefonica Cloud with two months free. Gain rapid scalability, deployment in 60+ global data centers and access to industry-leading disaster recovery, backup, security and compliance solutions from an array of ecosystem partners. Cloud adoption continues to accelerate, as the cloud is increasingly seen as the key to business technology transformation. ***GO FURTHER, FASTER WITH HYBRID CLOUD*

        Value Added Abstracts Pages: 10 - 10

        Using GPU based Edge Computing for Federated Machine Learning

        Sanjay Basu

        DOI: 10.37421/Jtsm.2020.S2.010

        A Today availability of data for machine learning model training is challenging due to data sovereignty restrictions. There are added issues like scaling, cost, latency, etc. when transferring data from the filed or remote regions to core cloud regions for processing and training purposes. This paper focuses on the role of GPU shapes at the edge of the cloud for federated machine learning (ML) training. Federated ML training is recommended to address customer requirement around data sovereignty and other restrictions surrounding streaming or real time data transfer back to a central cloud region. Customers like to use centralized cloud regions to address impacts due to increased latency and associated link costs and lack of data diversity. This paper proposes a solution to implement federated machine learning at the Cloud’s edge point of presences using GPU based computing nodes. In addition depending on industry segments or regional requirements, the inference can also place at the edge. The training data or the inference data are aggregated at the core regions. We will discuss some new developments targeted at this space.

        Value Added Abstracts Pages: 11 - 11

        Holistic Resource Management for Sustainable and Reliable Cloud Computing: An Innovative Solution to Global Challenge

        Sukhpal Singh Gill

        DOI: 10.37421/Jtsm.2020.S2.011

        AMinimizing the energy consumption of servers within cloud computing systems is of utmost importance to cloud providers towards reducing operational costs and enhancing service sustainability by consolidating services onto fewer active servers. Moreover, providers must also provision high levels of availability and reliability, hence cloud services are frequently replicated across servers that subsequently increases server energy consumption and resource overhead. These two objectives can present a potential conflict within cloud resource management decision making that must balance between service consolidation and replication to minimize energy consumption whilst maximizing server availability and reliability, respectively. In this keynote talk, I shall discuss a energy-reliability aware resource scheduling approach for holistic management of cloud computing resources including servers, networks, storage, and cooling systems. This technique clusters and executes heterogeneous workloads on provisioned cloud resources and enhances the energy-efficiency and reduces the carbon footprint in datacenters without adversely affecting cloud service reliability.

        Value Added Abstracts Pages: 12 - 12

        Birth Information as a tool for CyberCrime

        Adebayo Adedapo Emmanuel

        DOI: 10.37421/jtsm.2020.S2.012

        Privacy is a major concern for governments, corporate organizations and individuals and emergence of digitized methods for the storage of information has pushed mankind into the 21st Century and also has brought about the need for data privacy and confidentiality. Cyber crime began to take off in early 2000’s when social media came to life and usage of internet resources allows for a user to disclose information in certain contexts, while the information remains protected and it’s uses remains limited by an obligation to maintain confidentiality. Researchers and other controllers and processors of personal data have to protect the personal information from unauthorized access as the date of birth collected as part of personal information can pose a great risk to the privacy rights of a user and increase the rate of Identity theft. This research is based on collection of personal information from 300 users (age 22-60), using numerological approach. The information collected from every user was analyzed by reducing the date of birth of each user to a numerical value which in turn gives a life path number and the life path number revealed who the user is, their deepest values and some of their life challenges. From the analysis of the data, 258 users confirmed that the result was very accurate,23 users said it’s somewhat accurate, 12 users are not sure(50/50), 3 user said its inaccurate and there are 4 void result. The results of the analysis carried out on the user data provides proof that the provision of a users birth information posses a great threat to the privacy and safety of a user and also instrumental in cyber crime and social engineering process.

        Value Added Abstracts Pages: 13 - 13

        A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT

        Tinashe Magara

        DOI: 10.37421/jtsm.2020.S2.013

        User authentication for the Internet of Things (IoT) is a vital measure as it consists of numerous unattended connected devices and sensors. For security, only the user authenticated by the gateway node can access the real-time data gathered by sensor nodes. We present an efficient privacy-preserving authentication and key agreement scheme for IoT, which enables the user, the gateway node and sensor nodes to authenticate with each other. Only the trusted gateway node can determine the real identity of the user; however, no other entities can get information about user’ identity by just intercepting all exchanged Cyber threats are a global risk that governments, the private sector, non-governmental organizations – and the global community as a whole – must deal with. Chatham House focuses on building cyber capacity and expertise among policymakers, investigating key issues through publishing in-depth policy research, conducting cyber simulation exercises, and convening high-level meetings with a wide group of stakeholders. messages during authentication phase. The gateway cannot prove the received messages from the sender to a third party, and thus preserving the privacy of the sender. The correctness of the proposed scheme is proved to be feasible by using BAN logic, and its security is proved under the random oracle model. The execution time of the proposed scheme is evaluated and compared with existing similar schemes, and the results demonstrate that our proposed scheme is more efficient and applicable for IoT applications. The economic and social benefits of digital technology have transformed the world as we know it, but have introduced high risks through its malicious use by both state and non-state actors. These risks affecting economies, societies and livelihoods, and are threatening international peace and security.

        Value Added Abstracts Pages: 14 - 14

        Security as a Service (SecaaS)

        Adelegbe Lawrence Gbenga

        DOI: 10.37421/jtsm.2020.S2.014

        Security is freedom from, or resilience against, potential harm caused by others Enterprises need to protect their assets, but they also need to be profitable to stay in business. Protecting information assets has become a priority for enterprises that need to meet compliance requirements or need to protect sensitive data. The challenge for these enterprises is implementing robust security practices while keeping investment and operational costs contained. Security as service offers a way for enterprises to access security services that are robust, scalable and cost effective. When An enterprise chooses SECaaS, they are essentially choosing to relinquish control over their security to a third-party specialist. As a result, the enterprise’s overall security posture improves because security systems are maintained and administered by security specialists. SECaaS is typically delivered on the basis of a subscription, which for many companies means replacing the one-time licensing costs of security software with a reoccurring subscription. With reward comes risk, and enterprises should consider benefits and risk when evaluating Security as service products and providers. And also, enterprises need to understand that they can outsource responsibility but they cannot outsource accountability; therefore, enterprises should implement an assurance plan that includes assessing the services obtained from SecaaS providers. Security as a service enables enterprises that do not have the security expertise in-house, or the ability to recruit the required expertise, to license a professionally managed service.

        Value Added Abstracts Pages: 15 - 15

        Known Unknowns

        Phil Cracknell

        DOI: 10.37421/jtsm.2020.S2.015

        TCybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative. Security can only be accurately assessed, if ways of managing ‘non-knowledge’ are taken into account. Anyone attempting to measure an organisation’s security posture finds that metrics are difficult to collect and don’t show the full picture. We also tend to protect against what we know and what we think we know. Knowledge does not come in volumes offering certainty to security decisions. Instead it is an incremental process in which the data reflects but never quite captures the changing security landscape. A steady conversion of unknowns to knowns! Anticipating Blind-Spots! Organisations face complex and uncertain situations every day, but the most challenging circumstances are often completely unexpected, because we never even knew to look for them. Organisations should make efforts to anticipate blind spots. We can never completely eliminate our blind spots, but they can be reduced to improve performance and prevent the mistakes that in hindsight should have been obvious

        Past Conference Report Pages: 16 - 16

        Conference Announcement on International Conference on Cloud Computing and Virtualization London, UK | May 21-22, 2020


        DOI: DOI: 10.37421/Jtsm.2020.S2.016

        We are satisfied to invite you to the "International Conference on Cloud Computing and Virtualization". after the fruitful culmination of the arrangement of Artificial Intelligence Congress. The congress is planned to occur in the excellent city of London, UK, on May 21-22, 2020.
        This Cloud Computing 2020 gathering will give you an excellent research understanding and tremendous thoughts. This conference will also present the advanced research, advanced techniques for Cloud Computing and its related fields.
        Cloud Computing 2020 will concentrate on the subject Innovations and headways in Artificial Intelligence. We are certain that you will appreciate the Scientific Program of this up and coming Conference. The point of view of the Cloud Computing Conference is to set up cutting edge research to assist individuals with seeing how procedures have progressed and how the field has created as of late.
        Cloud Computing and Virtualization is an area of programming building that underscores the creation of canny machines that work and react like individuals. Man-made brainpower is master in examining how human cerebrum thinks, learn, choose, and work while attempting to take care of an issue, and afterward utilizing the results of this investigation as in the reality, the information has some unfortunate properties. In the advanced world, Cloud Computing and Virtualization can be utilized from multiple points of view to control robots, Sensors, actuators and so forth. A robotization framework is a framework that controls and shows building association. These frameworks can be set up in a couple of commonplace ways. In this portion, a general development outline work for a structure with complex prerequisites because of the activity, for example, a counselling room will be depicted.
        Conference will encourage Young Researcher’s Forum, scientists and the researchers in their early stage of career graph to widely discuss their outcome so as to enrich and develop the idea. The ‘Best Poster Award’ is meant to encourage students in taking active part in the International Science platform to sharpen their skills and knowledgebase.
        According to this research report, the global market Cloud Computing is projected to show a robust growth of 6.5 per cent in the CAGR during 2019-2024.
        Coud Computing is the practice of sharing a network of remote servers which are hosted on the Internet to store, process, and manage data rather than on a local server or a personal computer. It specifically refers to a common storage space through which all the devices in the network can access data simultaneously. The use of Cloud computing technology not only gives cost benefits but also makes applications accessible to all devices in the network at any time and from any location. The global storage market has recorded revenues of $9.12 billion in 2012 with the growth rate of 16.7% as compared to the revenues in 2011. The major driver for the growth of the global cloud computing services market is its cost-effective services.
        Cloud Computing Technology Market Analysis by Services
        Gartner predicts the worldwide public cloud service market will grow from $182.4B in 2018 to $331.2B in 2022, attaining a compound annual growth rate (CAGR) of 12.6%.Spending on Infrastructure-as-a-Service (IaaS) is predicted to increase from $30.5B in 2018 to $38.9B in 2019, growing 27.5% in a year.Platform-as-a-Service (PaaS) spending is predicted to grow from $15.6B in 2018 to $19B in 2019, growing 21.8% in a year.
        Business Intelligence, Supply Chain Management, Project and Portfolio Management and Enterprise Resource Planning (ERP) will see the fastest growth in end-user spending on SaaS applications through 2022.

      Relevant Topics


tempobet giriş

tempobet giriş


tipobet yeni giriş adresi tipobet e yeni giriş tipobet güncel giriş adresi imajbet giriş adresi

mobilbahis giriş

arrow_upward arrow_upward