Cloud Computing: A Key to It Development in West African Sub Region
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: There is no gainsaying the fact that information technology (IT) development in West Africa has met a lot of challenges ranging from cyber threat to inadequate IT infrastructure. Cloud computing is a revolution. It is creating a fundamental change in computer architecture, software and tools development and of course, in the way we store, process, distribute and consume information. This paper, therefore explores the basic concepts of cloud computing and how cloud computing could be harnessed to improve IT and economic development in West African sub-region.
Authors and Affiliations
Odach Gabriel Nwabuonu , Nwosu John Nwachukwu
A review of the existing state of Personality prediction of Twitterusers with Machine Learning Algorithms
Abstract: Twitter is a popular social media platform with millions of users. The tweets shared by these usershave recently attracted the attention of researchers from diverse fields. In this paper, we focus primarily onp...
Decision Making and Autonomic Computing
Autonomic Computing refers to the self-managing characteristics of distributed computing resources, adapting to unpredictable changes while hiding intrinsic complexity to operators and users. An autonomic system...
Implementation of English-Text to Marathi-Speech (ETMS)Synthesizer
Abstract: This paper describes the Implementation of Natural Sounding Speech Synthesizer for MarathiLanguage using English Script. The natural synthesizer is developed using unit selection on the basis ofconcatenat...
Efficient Cluster Head Selection Strategy With All Pair Shortest Routing In Networks
Abstract: Clustering is an effective way for prolonging the lifetime of a wireless sensor network. Clustering in the network consumes much time in organizing the nodes and they hardly consider the energy consumptio...
Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx
Abstract: As the Internet is growing – so is the vulnerability of the network. Companies now days are spending huge amount of money to protect their sensitive data from different attacks that they face. DoS or Deni...