EAI Endorsed Transactions on Cloud Systems https://publications.eai.eu/index.php/cs <p>The EAI Endorsed Transactions on Cloud System (ToCS) is an international venue for publishing innovative and cutting edge results on the convergence of next-generation technologies and methodologies reshaping our way of living. The emerging converged platform for growth and innovation is built on four technology pillars: mobile computing, cloud services, big data and analytics, and social networking.</p> <p>Researchers and practitioners involved in cloud systems can publish information on theory, engineering principles, enabling technologies, and practical experiences related to cloud systems.</p> <p>ToCS will offer an end-to-end view on the challenges and technologies in cloud systems, foster research that addresses the interaction between and across the different technology pillars, and ultimately help shape the future of cloud systems as they transform business and society.</p> en-US <p>This is an open access article distributed under the terms of the <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/">CC BY-NC-SA 4.0</a>, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.</p> publications@eai.eu (EAI Publications Department) publications@eai.eu (EAI Support) Tue, 09 Aug 2022 08:19:58 +0000 OJS 3.3.0.11 http://blogs.law.harvard.edu/tech/rss 60 A Review on Quantum Computing Trends & Future Perspectives https://publications.eai.eu/index.php/cs/article/view/2435 <p>Over the last decade, there has been an exponential growth in high-performance computing. Computing such as cloud and fog computing is gaining popularity, whereas, Cloud computing is a computing organization where a large number of systems are connected to the internet for application, data, and storage services. Quantum computing is the use of quantum-mechanical phenomena such as superposition and entanglement to perform computation. In this paper, we describe the basic concept, history of quantum computing and development in network and cryptography, and future game design based on quantum. Specifically, we present the latest development in quantum networking and cryptography. Finally, we discuss the current research solutions and open issues for future research in quantum computing.</p> A.A. Laghari, H. Shah, R.A. Laghari, K. Kumar, A.A. Waqan, A.K. Jumani Copyright (c) 2022 EAI Endorsed Transactions on Cloud Systems https://publications.eai.eu/index.php/cs/article/view/2435 Tue, 17 May 2022 00:00:00 +0000 Investigation of Security Breaches Due to Resource Sharing in Virtual Machine Migration Using Hybrid Ant Colony Optimization with ANN https://publications.eai.eu/index.php/cs/article/view/2436 <p>Cloud computing is one of the active research areas in High Performance Computing. It helps to share the resources globally in a distributed manner. In this paper, hybrid ACO with ANN is designed to ensure the best and the secured VM consolidation process. Initially, the objectives constraints for power consumption, resource deterioration and the SLA parameters are modelled for the Physical Machines and Virtual Machines. The selection of VMs is explored by the concept of Ant Colony Optimization that select the best VMs by the predefined SLA parameters. Also, the eavesdropping attack is also modulated in the cloud shared environment. The proposed hybrid ACO with ANN is implemented in CloudSim and it’s compared with the honeybee with GA and PSO with GA. The simulation results have proved the efficiency of the VMs consolidation process with the security constraints in terms of time-related on uptime and downtime of the servers.</p> Chanchal Antony, Manu A P Copyright (c) 2022 EAI Endorsed Transactions on Cloud Systems https://publications.eai.eu/index.php/cs/article/view/2436 Tue, 07 Jun 2022 00:00:00 +0000 COVID-19 Fake News Detection Using Machine Learning Techniques: A Comparative Study https://publications.eai.eu/index.php/cs/article/view/2437 <p>Fake news has become one of the most serious issues in recent years, especially on social media. For example, during the covid-19 pandemic, a great deal of false information about the virus spread easily and quickly through the internet. In this area, researchers have given substantial answers to this problem utilizing various machine learning techniques. However, there are some gaps that need to be clarified. In the context of COVID-19 fake news detection, in this study, we present a comparison of four major machine learning algorithms: SVM, Nave Bayes, Logistic Regression, and Random Forest. We proposed four new machine learning models by combining these algorithms with two feature extraction techniques (TF-IDF and CountVectorizer). On three datasets, we tested the suggested models and analyzed their performance. According to the obtained results, we concluded that some properties of the used datasets can affect the obtained results. In addition, we find the best model overall.</p> Amor Ben El Khettab Lalmi, Abderrahim Djaballah, Mohamed Gharzouli Copyright (c) 2022 EAI Endorsed Transactions on Cloud Systems https://publications.eai.eu/index.php/cs/article/view/2437 Fri, 24 Jun 2022 00:00:00 +0000 Service Level Agreement (SLA) Chains Supported by Cloud in a Complex Port Ecosystem with Competing Stakeholder Goals: Editorial https://publications.eai.eu/index.php/cs/article/view/2438 <p>-</p> C. Peoples, A. Moore, N. Georgalas Copyright (c) 2022 EAI Endorsed Transactions on Cloud Systems https://publications.eai.eu/index.php/cs/article/view/2438 Tue, 26 Jul 2022 00:00:00 +0000 Investigating the IoT Security and Privacy Challenges: Summary and Recommendations https://publications.eai.eu/index.php/cs/article/view/2652 <p>With the development of innovative technology transformation like cloud and Internet of Things (IoT), more technology companies are pursuing research in employing such innovations. Smart homes and cities are just two examples of the many systems and technologies that the IoT can endorse. IoT - based smart objects communicate with other parts, such as proxies, portable devices, as well as data collectors. Although these components help to tackle a number of societal issues and offer users new, cutting-edge services, their confined processing power makes them susceptible to well-known privacy and security attacks. This in turn highlights the demand for a strong technical as well as legislative foundation and asserts the significance of validity and reliability in IoT. This paper provides an insight of the IoT, security, as well as privacy challenges, and also discusses the recommendations for IoT solutions. Further we also highlighting some unresolved problems that require further study.</p> Premlata Chauhan, Shafeeq Ahmad, Pervez Rauf Khan, Naseem Ahmad Khan Copyright (c) 2022 Premlata Chauhan, Shafeeq Ahmad, Pervez Rauf Khan, Naseem Ahmad Khan https://creativecommons.org/licenses/by-nc-sa/4.0 https://publications.eai.eu/index.php/cs/article/view/2652 Wed, 31 Aug 2022 00:00:00 +0000 The application of a optimal controller for the flexible joint robot https://publications.eai.eu/index.php/cs/article/view/2681 <p>This paper describes the operation of a single Degree of Freedom (DOF) flexible robotic arm by the optimal controller. The derived model is based on Euler- Lagrange approach, while the first and second-order (super twisting) Sliding Mode Control (SMC) is proposed as a nonlinear control strategy. Exploration of a flexible robotic arm with using state-of-the-art controllers is essential for practical applications. This is even more refreshing when these arms have joints that work independently of each other to create a smooth connection between the joints, but it still ensures the natural properties like a real human arm. This system has many similarities with the flexible link system of the MIMO model in its operational state analysis. Control laws must be followed by logical rules in a coherent whole. The next step is to design a controller to fit the structure of the system. The author also compared the use of the above controller with a system without using any controller to determine the effectiveness of using the above controller.</p> Nguyen Cong Danh Copyright (c) 2022 Nguyen Cong Danh https://creativecommons.org/licenses/by-nc-sa/4.0 https://publications.eai.eu/index.php/cs/article/view/2681 Fri, 09 Sep 2022 00:00:00 +0000