Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
ul Islam Khan, Burhan
- Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review
Abstract Views :222 |
PDF Views:0
Authors
Rashidah F. Olanrewaju
1,
Burhan ul Islam Khan
1,
M.Mueen Ul Islam Mattoo
1,
Farhat Anwar
1,
Anis Nurashikin Bt. Nordin
1,
Roohie Naaz Mir
2,
Zainab Noor
3
Affiliations
1 Department of ECE Kulliyyah of Engineering IIUM, MY
2 Department of CSE National Institute of Technology Srinagar - 190006, Jammu and Kashmir, IN
3 ASET (Amity School of Engineering and Technology), Amity University, Noida - 201313, Uttar Pradesh, IN
1 Department of ECE Kulliyyah of Engineering IIUM, MY
2 Department of CSE National Institute of Technology Srinagar - 190006, Jammu and Kashmir, IN
3 ASET (Amity School of Engineering and Technology), Amity University, Noida - 201313, Uttar Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 10, No 36 (2017), Pagination:Abstract
Objectives: The goal of this paper is to comprehend the significance of adopting Cloud Computing (CC) in establishments of higher learning. This paper plots a portion of the advantages that can be conveyed to advanced education by means of cloud computing, analyzes probably the most imperative difficulties that can be faced by the academia due to its adoption, and proposes some early strides towards its adoption while alleviating the risks involved. Methods/Statistical Analysis: This paper recognizes an expansiveness of institutional variables and CC appropriation procedures by including the diverse perspectives of sources from various backgrounds and contexts on a single phenomenon. The different aids and contributions in this paper are based on the consolidation of research works available in different papers. Findings: The discoveries from this analysis demonstrate that the adoption of CC in establishments of higher learning can be comprehended through a few factors that have an essential impact on CC adoption methodologies like administrative bodies and governments, internal stakeholders, cloud suppliers, firm attributes, socio-political changes, IT framework, and so on. Applications/Improvements: This investigation offers open doors for future research besides giving an understanding into how cloud suppliers, advisors, governments, and scholastics see diverse market requests, and how they react to these requests while advancing services offered by CC in higher learning institutions. The consequences for practice can help decision makers in adopting services offered by CC legitimately.Keywords
Cloud Based Education, Cloud Computing, Cloud Computing Adoption, Cloud Pedagogy- Snort-Based Smart and Swift Intrusion Detection System
Abstract Views :169 |
PDF Views:0
Authors
Rashidah Funke Olanrewaju
1,
Burhan Ul Islam Khan
1,
Athaur Rahman Najeeb
1,
Ku Nor Afiza Ku Zahir
1,
Sabahat Hussain
1
Affiliations
1 Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Selangor, MY
1 Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Selangor, MY
Source
Indian Journal of Science and Technology, Vol 11, No 4 (2018), Pagination:Abstract
Objectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network attacks in less time after monitoring incoming traffic thus maintaining better performance. Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. Then, only these relevant features are trained with the help of multi-layer perceptron supervised neural network. The simulation is performed using MATLAB. Findings: The proposed system has been verified to have high accuracy rate, high sensitivity as well as a reduction in false positive rate. Besides, the intrusions have been classified into four categories as Denial-of-Service (DoS), User-to-ischolar_main (U2R), Remote-to-Local (R2L) and Probe attacks; and the alerts are stored and shared via a central log. Thus, the unknown attacks detected by other Intrusion Detection Systems can be sensed by any IDS in the network thereby reducing computational cost as well as enhancing the overall detection rate. Applications/Improvements: The proposed system does not waste time by considering and analysing all the features but takes into consideration only relevant ones for the specific attack and supervised learning neural network is used for intrusion detection. By the application of Snort before backpropagation algorithm, the latter has only one function to perform – detection of unknown attacks. In this way, the time for attack detection is reduced.Keywords
Back-Propagation, Intrusion Detection System, Multi-Layer Feed-Forward Neural Network, Snort- Secure Annihilation of Out-of-Band Authorization for Online Transactions
Abstract Views :184 |
PDF Views:0
Authors
Affiliations
1 Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Gombak, Kuala Lumpur, MY
1 Department of Electrical and Computer Engineering, Kulliyyah of Engineering, International Islamic University Malaysia, Gombak, Kuala Lumpur, MY