scispace - formally typeset
Search or ask a question
Author

Zeshan Ahmed

Bio: Zeshan Ahmed is an academic researcher. The author has contributed to research in topics: Quality of service & Grid computing. The author has an hindex of 1, co-authored 1 publications receiving 6 citations.

Papers
More filters
Journal ArticleDOI
22 May 2020
TL;DR: This paper provides a review of cloud computing technology, cloud models, deployment and cloud applications such as types of applications, reliability, and security, and open research issues are provided for future research development.
Abstract: In recent years, cloud computing is an emergent field in the Internet era. There is rapid development in high-performance computing and technology extended from grid computing to cloud computing to provide computing resources on pay per basis. Cloud service providers developed applications for users to easily access cloud services with quality of service (QoS) because cloud application plays an important role in service delivery of cloud organization. This paper provides a review of cloud computing technology, cloud models, deployment and cloud applications such as types of applications, reliability, and security. Finally, open research issues are provided for future research development.

11 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The utilization of IoT in the cloud, fog, IoT technologies with applications and security is described and IoT architecture for design and development with sensors in 6G is provided.
Abstract: The Internet of Things (IoT) is basically like a system for connecting computer devices, mechanical and digital machines, objects, or individuals provided with the unique system (UIDs) and without transfer to transmit data over an ability human-to-human or computer-to-human relation. Another thing on the internet is that the items in the IoT are like a connected manner with humans and computers to which internet protocol addresses can be assigned and which can transfer data over the network or another man-made object. In this paper, we describe the utilization of IoT in the cloud, fog, IoT technologies with applications and security. Specifically, we provide IoT architecture for design and development with sensors in 6G. Finally, we discuss the current research, solutions, and present open issues of future research in IoT.

125 citations

Journal ArticleDOI
TL;DR: The architectures and protocols of wireless communication, security issues, and type of threats used to launch an attack as well as their solutions are reviewed and open research for future development to make a secure wireless network and safe for data transfer is discussed.
Abstract: A wireless network is used to connect various wired organizational structures and provide connectivity within the organization for employees to move freely by avoiding the hurdle of a physical network. Maintenance of WLAN security is crucial to an organization because WLANs are directly linked to the core organization’s network. In this paper, we reviewed the architectures and protocols of wireless communication, security issues, and type of threats used to launch an attack as well as their solutions. Finally, we discuss open research for future development to make a secure wireless network and safe for data transfer.

10 citations

Journal ArticleDOI
13 Jul 2018
TL;DR: The paper concluded that the successful curriculum implementation in the twenty first century will require a blend of technology innovation and enterprise platform adaptability as potential leverages in achieving the global educational sustainability.
Abstract: The enterprise educational environment will involve big data technology, cloud computing, Internet of Things (IoT) and artificial intelligence (AI), which will characterize the current society extreme automation and enterprise productivity through reinventing the new world educational reform. This current paper captured the manageability issues in electronic learning environments and explored ways through which the managerial performances could be improved in the perspective of electronic learning investments through incorporation of context-awareness and self-reconfiguration adaptive systems. The aim is to allow the open source electronic learning system to provide educators, administrators, and learners with a single robust and integrated system for creating a personalized and autonomous learning accomplishments. The paper reviewed the contemporary development in electronic learning system in internet of things and cloud computing and established the prospect for the continued educational investment. A survey of four tertiary institution in the south eastern Nigeria provided a justification for the adoption of cloud computing technology as the best alternative approach for organizational data warehousing in the ongoing society automation. The result of the paper indicated that technology implementation in schools are fundamental to students’ academic accomplishment, which made it obviously imperative that teachers in the 21st century should adjust digitally and technologically and prepare students for the opportunities in the emerging digital new world. The paper concluded that the successful curriculum implementation in the twenty first century will require a blend of technology innovation and enterprise platform adaptability as potential leverages in achieving the global educational sustainability.

9 citations

Journal ArticleDOI
TL;DR: A model to achieve the objective of reduced energy consumption and CO2 emission in a cloud environment is proposed and shall be implemented in MATLAB and would be assessed on various parameters like makespan, execution time, resource utilization, QoS, Energy utilization, etc.
Abstract: Energy efficiency is a key goal in cloud datacentre since it saves money and complies with green computing standards. When energy efficiency is taken into account, task scheduling becomes much more complicated and crucial. Execution overhead and scalability are major concerns in current research on energy-efficient task scheduling. Machine learning has been widely utilized to solve the problem of energy-efficient task scheduling, however, it is usually used to anticipate resource usage rather than selecting the schedule. The bulk of machine learning approaches are used to anticipate resource consumption, and heuristic or metaheuristic algorithms utilize these predictions to choose which computer resource should be assigned to a certain activity. As per the knowledge and research, none of the algorithms have independently used machine learning to make an energy-efficient scheduling decision. Heuristic or meta-heuristic approaches, as well as approximation algorithms, are frequently used to solve NP-complete problems. In this paper, we discuss various studies that have been used to solve the problem of task scheduling which belongs to a class of NP-hard. We have proposed a model to achieve the objective of reduced energy consumption and CO2 emission in a cloud environment. In the future, the model shall be implemented in MATLAB and would be assessed on various parameters like makespan, execution time, resource utilization, QoS, Energy utilization, etc.

4 citations

Peer ReviewDOI
TL;DR: The basic concept, history of quantum computing and development in network and cryptography, and future game design based on quantum are described, and the latest development in quantum networking and cryptography is presented.
Abstract: Over the last decade, there has been an exponential growth in high-performance computing. Computing such as cloud and fog computing is gaining popularity, whereas, Cloud computing is a computing organization where a large number of systems are connected to the internet for application, data, and storage services. Quantum computing is the use of quantum-mechanical phenomena such as superposition and entanglement to perform computation. In this paper, we describe the basic concept, history of quantum computing and development in network and cryptography, and future game design based on quantum. Specifically, we present the latest development in quantum networking and cryptography. Finally, we discuss the current research solutions and open issues for future research in quantum computing.

2 citations