scholarly journals IoT Based Smart Garage Vehicle Washing Water Nestor

2020 ◽  
Vol 8 (5) ◽  
pp. 3521-3525

Water is critical part of the human life. In most of the developing nation, water pollution is one of the bigger mess. These issues can be handled strictly by the Government organization, by implementing tougher action rules to the industries, were the water are released without any proper treatment. Where each industries (or) smart cities, should take up self-initiative responsibility for proper treatment of the polluted out flow water. In our research paper, we are not focusing on the wider area of the water pollution; our focus is limited within the smart cities vehicle washing garages. In very smart cities, were a regular multiple vehicles washing is done in the garage, our research paper will focus on the out flow of the populated water from these vehicle washing garages. Our design and implantation process is simpler and straightforward approach. Were we will monitor of the water quality; and how much level of the water is populated, and it requires at what level of the treatment. These process can be easily automated using the multiple IOT (internet of things) based sensors, the data can be streamed into the Big Data lake (or) it can be directly pushed into the cloud computing services for generating the real time graphs and analyses report instantly. These data collected in the Big Data lake (or) cloud computing services, can be used for detail analyses for research purpose. We will incorporate the block chain concept to keep track of the smart garage location address and the detail information of the number of garage in the smart cities details in the form of the blocks.

Author(s):  
Marcus Tanque ◽  
Harry J Foxwell

Big data and cloud computing are transforming information technology. These comparable technologies are the result of dramatic developments in computational power, virtualization, network bandwidth, availability, storage capability, and cyber-physical systems. The crossroads of these two areas, involves the use of cloud computing services and infrastructure, to support large-scale data analytics research, providing relevant solutions or future possibilities for supply chain management. This chapter broadens the current posture of cloud computing and big data, as associate with the supply chain solutions. This chapter focuses on areas of significant technology and scientific advancements, which are likely to enhance supply chain systems. This evaluation emphasizes the security challenges and mega-trends affecting cloud computing and big data analytics pertaining to supply chain management.


2018 ◽  
pp. 190-203
Author(s):  
Vanessa Ratten

The design and application of cloud computing services is inherently entrepreneurial as it is constantly evolving as a result of technological innovation. This chapter focuses on providing an entrepreneurial approach to understanding change in the cloud computing context by highlighting the importance of innovative system usage. The chapter discusses how cloud computing services are creating a ecosystem of mobile commerce applications that is changing the way consumers, businesses and the government collects, disseminates and stores information. These changes have given way to entrepreneurial service innovations in the cloud domain that are a result of consumer demand for more current and relevant technological innovations. This chapter addresses the role of entrepreneurship in technological innovations by focusing on marketing and learning applications that are unique to cloud computing services. The future research suggestions from this chapter stress the importance nature of being entrepreneurial to encourage technological innovation in the cloud computing context.


2018 ◽  
Vol 12 (6) ◽  
pp. 143 ◽  
Author(s):  
Osama Harfoushi ◽  
Ruba Obiedat

Cloud computing is the delivery of computing resources over the Internet. Examples include, among others, servers, storage, big data, databases, networking, software, and analytics. Institutes that provide cloud computing services are called providers. Cloud computing services were primarily developed to help IT professionals through application development, big data storage and recovery, website hosting, on-demand software delivery, and analysis of significant data patterns that could compromise a system’s security. Given the widespread availability of cloud computing, many companies have begun to implement the system because it is cost-efficient, reliable, scalable, and can be accessed from anywhere at any time. The most demanding feature of a cloud computing system is its security platform, which uses cryptographic algorithm levels to enhance protection of unauthorized access, modification, and denial of services. For the most part, cloud security uses algorithms to ensure the preservation of big data stored on remote servers. This study proposes a methodology to reduce concerns about data privacy by using cloud computing cryptography algorithms to improve the security of various platforms and to ensure customer satisfaction.


Author(s):  
Godfrey Tsvuura ◽  
Kudzai D Mbawuya ◽  
Patrick Ngulube

This study investigated the challenges and prospects of creating and storing records in the cloud by Zimbabwe Open University in Zimbabwe. Like other universities in Zimbabwe, the university adopted Education 5.0 advocated by the government in 2019. Consequently, the university came up with innovation hubs and industrial parks that became centres for records creation. Keeping all records in the computer without appropriate backups and servers has consequences such as losing vital records. Organisations around the world use cloud computing increasingly to address records storage and disposal. Adoption of cloud computing services carries with it cost implications, and legal and ownership challenges as the virtualised environments are hosted and managed by third parties. The objective of this study was to examine the management, operational, legal and technical issues surrounding the storage of records in the cloud, and the implications for their trustworthiness and authenticity. The study adopted a qualitative research design and drew data from interviews with key participants. Qualitative data were organised into broad themes and the content reported in narrative form. The study found that Zimbabwe Open University is not using cloud computing services effectively and is in the trial phase of cloud computing. It further found that there was a lack of collaboration between the information and communication technology and the records management units as the university decided to move to the cloud on a full-scale basis. The study recommends that the university should first address the management, operational, legal and technical issues surrounding the storage of records in the cloud before implementing the complete use of the cloud. The study deepens the understanding of cloud computing in the management of records at the university, and other state universities in Zimbabwe can use this study to deal with the management of records in the cloud.


Author(s):  
Godfrey Tsvuura ◽  
Kudzai D Mbawuya ◽  
Patrick Ngulube

This study investigated the challenges and prospects of creating and storing records in the cloud by Zimbabwe Open University in Zimbabwe. Like other universities in Zimbabwe, the university adopted Education 5.0 advocated by the government in 2019. Consequently, the university came up with innovation hubs and industrial parks that became centres for records creation. Keeping all records in the computer without appropriate backups and servers has consequences such as losing vital records. Organisations around the world use cloud computing increasingly to address records storage and disposal. Adoption of cloud computing services carries with it cost implications, and legal and ownership challenges as the virtualised environments are hosted and managed by third parties. The objective of this study was to examine the management, operational, legal and technical issues surrounding the storage of records in the cloud, and the implications for their trustworthiness and authenticity. The study adopted a qualitative research design and drew data from interviews with key participants. Qualitative data were organised into broad themes and the content reported in narrative form. The study found that Zimbabwe Open University is not using cloud computing services effectively and is in the trial phase of cloud computing. It further found that there was a lack of collaboration between the information and communication technology and the records management units as the university decided to move to the cloud on a full-scale basis. The study recommends that the university should first address the management, operational, legal and technical issues surrounding the storage of records in the cloud before implementing the complete use of the cloud. The study deepens the understanding of cloud computing in the management of records at the university, and other state universities in Zimbabwe can use this study to deal with the management of records in the cloud.


Author(s):  
Heru Susanto ◽  
Mohammad Nabil Almunawar

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefore, governments need to ensure that inherent security threats can be neutralized to ensure that data or information stored in the cloud are well protected. It is imperative for cloud-based e-government (CB-eGov) to use an information security management system (ISMS) to effectively manage CB-eGov. The purpose of this chapter is to discuss how cloud computing can be incorporated in an e-government implementation to improve its efficiency without compromising information security. As such, the government needs to take special care in ensuring security, privacy, and confidentiality of information stored in the cloud.


2019 ◽  
pp. 1869-1897
Author(s):  
Heru Susanto ◽  
Mohammad Nabil Almunawar

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefore, governments need to ensure that inherent security threats can be neutralized to ensure that data or information stored in the cloud are well protected. It is imperative for cloud-based e-government (CB-eGov) to use an information security management system (ISMS) to effectively manage CB-eGov. The purpose of this chapter is to discuss how cloud computing can be incorporated in an e-government implementation to improve its efficiency without compromising information security. As such, the government needs to take special care in ensuring security, privacy, and confidentiality of information stored in the cloud.


Author(s):  
Vanessa Ratten

The design and application of cloud computing services is inherently entrepreneurial as it is constantly evolving as a result of technological innovation. This chapter focuses on providing an entrepreneurial approach to understanding change in the cloud computing context by highlighting the importance of innovative system usage. The chapter discusses how cloud computing services are creating a ecosystem of mobile commerce applications that is changing the way consumers, businesses and the government collects, disseminates and stores information. These changes have given way to entrepreneurial service innovations in the cloud domain that are a result of consumer demand for more current and relevant technological innovations. This chapter addresses the role of entrepreneurship in technological innovations by focusing on marketing and learning applications that are unique to cloud computing services. The future research suggestions from this chapter stress the importance nature of being entrepreneurial to encourage technological innovation in the cloud computing context.


Sign in / Sign up

Export Citation Format

Share Document