NIT6130 - Assignment Result Analysis

NIT6130 – Assignment Result Analysis

Introduction

This report will create for getting the information about cloud computing and services of the cloud computing. For that purpose, numbers of the survey will do and get the response of the users and companies. This report will describe the information which is used for collecting information about cloud computing. Then, the best suitable data or information sources will be selected and started to resolve the problems which are identified from these sources. Data or information will be converted or saved in the files and these files will be saved in the computer. So, all the problems can be resolved

1.     Data Collection

In this first task, first of all, data or information will be collected or gathered by the information collector these data or information will use during the experiments. For that purpose, data or information will be collected from the numbers of sources. So, portion 1.2 of this report will describe the information which is used for collecting information about cloud computing. Then, the best suitable data or information sources will be selected and started to resolve the problems which are identified from these sources. So, all the information about the collection of data will be put in the tabular form. After that, in section 1.3, data or information will be converted or saved in the files and these files will be saved in the computer. So, all the problems can be resolved.

1.1 Data SourcesNIT6130 - Assignment Result Analysis

Data sources are part of the data collection which will describe the issues that are coming in the cloud computing. So, for that purpose, research has been done and information or data can be collected or gathered from some resources which are industries, schools, colleges, Government and private sector, IT offices, shoppers, and public persons.

1.2 Data or Information’s Collection

For collecting or gathering the data or information, numbers of resources have been taken and created the table which will contain the data information in the form of text format, fee (for that information), target source of information and description of data or information.

Table 1: Data or Information’s Collection

Storage of data or information

When creation of table (for data resources) is completed then, all the data or information will be kept in another file or table. So, all these files will contain the raw data or information that was collected from the numbers of the company and public users. This table is providing information about the location of saved information, a number of data or information records, the format of the file, the name of saved file and collection’s date.

Table 2: Storage of data or information

Implement and design Experiments

This task will describe the implementation and designing process of the cloud information that was collected from numbers of resources. This task is splitting into numbers of parts which will describe in the below portion such as the data or information pre-processing, selection of a feature, use of methodology and implementation of the experiment.

2.1 Data or information Pre-processing

Data or information pre-processing is keeping the very vital place in the implement and design of the experiment and it will not mandatory that all users and company will contribute in the collection of the data or information for the cloud computing and the users will provide the answer of the questions. So in the pre-processing,

  1. First of all, read all the raw data for cloud computing.
  2. Then, select the useful data by using the filtering
  3. Then, integrate the data or information by using resampling technique.
  4. Then, generate the data information by using transformation (Aggregation, normalization, generalization).
  5. Data compression by using the data reduction technique.

Figure 1: Data or information Pre-processing

2.2 Dimension Reduction or Feature Selection

This portion will describe the information about the feature selection. So, these features will select from the pre-processing result of the file and then, reduce the numbers of data or information from pre-processing. Then, the final file will be generated. So that purpose, a new table is also created that is explaining the reduction of information from the pre-processing file and generate a new file.

Table 3: Reduction and Selection of data or information

3  Experiment Designing

     2.3.1 Designing Steps

Whole research is totally created on basis of techniques that is using in this experiment so this methodology will be Quantitative and Qualitative methodology which is a type of the hybrid methodology. First of all, the information or data was collected about the cloud computing form the company and users. Then, analysis all the information and check that how the cloud services are secure, compare all the information, and analysis results on the basis of the survey. For creating a survey, six-question was prepared and conducted the survey with the 200 company and users.

So starting the survey, first of all, some features or criteria was created for generating the information graph such as private sector adoption of cloud computing, cloud services used by public users, and cloud computing used by the organization.

So, these questions will use in the survey therefore, these questions will ask the company and users to get the information about cloud’s using and cloud’s services or safety of cloud-computing. Then, this information will collect on the basis of the numbers of factors that are already explained in above table 4.

2.4 Implementation

2.4.1 Tools and Software used

The next process of this portion is the implementation. For that purpose, each and every information will be saved and recorded in the proper file which is also given in the tabular form. So, this information can be used in future for evaluating the issues and using of cloud computing and services of cloud computing in the companies and by the public users.

Table 6: Percentage view of Resource’s Factors

3.4.2 Experiment Results

This portion will describe the information about the response percentage or using of cloud computing and services of cloud computing.

 Result Analysis
     3.1 Estimation of Results

According to the current scenario, all most companies and users are using the cloud computing and cloud’s services. So cloud is keeping a very vital part in the current time. Because by using the cloud computing, users and companies can easily share the information over the cloud which can be accessed by the numbers of users of the company and can also use the services via the cloud. Cloud computing is providing 68% security for the services of cloud computing. Cloud computing is used by the public and private sector. The particular methodology is using to resolve the problems which are a pre-processing technique.

3.2 Summary of Results

The survey was conducted for getting the views of the users and companies about cloud’s using and cloud’s services. Therefore, results of research numbers of factors are using such as security’s factors, public acceptance of cloud-computing’s factors, and private acceptance of cloud-computing’s factors. For survey, 200 companies and users were taken for taking the response of these peoples. I am also analyzing the security factors of the cloud computing that is 68% users and companies are saying that cloud computing is secure and 13% users and companies are saying that cloud computing is not secure and 19% users and companies are saying that cloud computing can be secure.

So the basis of these results, I will resolve all the issues which are facing by the companies and users and enhance the security of the cloud computing.

 Outline for the Result Analysis and Experiment

  1. Cloud Computing
    • Information Gathering
      • Information Sources

Information’s Collection

  • Storage of data or Information
  • Implement and design Experiment
    • Information Pre-processing
    • Measurement Reduction or Feature Choice
  • Research Scheming
    • Designing Steps
    • Experimental Results
  • Execution
    • Tools and Software used
    • Experiment Results
  • Analysis of Result
    • Approximation of Results
    • Result’s Summary

Conclusion

Cloud computing is playing a very vital role in the current time. Because by using the cloud computing, users and companies can easily share the information over the cloud which can be accessed by the numbers of users of the company and can also use the services via the cloud. Cloud computing is providing 68% security for the services of cloud computing.

References

Digitalistmag, 2018, Neediest Industry Adopting Cloud Computing, viewed 15 Oct. 2018 <https://www.digitalistmag.com/industries/public-sector/2012/10/12/neediest-industry-adopting-cloud-computing-018790>.

Rightscale, 2018, cloud-computing-trends-2016-private-yoy.png, viewed 15 Oct. 2018, <https://www.rightscale.com/blog/file/843>.

Blogs.systweak, 2017, 36 Fascinating Facts about Cloud Computing, viewed 15 Oct. 2018, <https://blogs.systweak.com/2017/02/36-fascinating-facts-about-cloud-computing/>.

4mation, 2018, Cloud Services Sydney | Managed Cloud Hosting | 4mation. viewed 15 Oct. 2018, <https://www.4mation.com.au/service/cloud-services/>.

Taylor, S., Young, A., Kumar, N. and Macaulay, J., 2011. A “Marriage Made in Heaven”: Mobile Devices Meet the Mobile Cloud.

Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I. and Zaharia, M., 2010. A view of cloud computing. Communications of the ACM53(4), pp.50-58.

Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J. and Brandic, I., 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems25(6), pp.599-616.

Carlin, S. and Curran, K., 2013. Cloud computing security. In Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI Global.

Brodkin, J., 2008. Gartner: Seven cloud-computing security risks. Infoworld2008, pp.1-3.

Feng, D.G., Zhang, M., Zhang, Y. and Xu, Z., 2011. Study on cloud computing security. Journal of software22(1), pp.71-83.

Popović, K. and Hocenski, Ž., 2010, May. Cloud computing security issues and challenges. In MIPRO, 2010 proceedings of the 33rd international convention (pp. 344-349). IEEE.

Links For US 

Maddox Smith

Hey,
Greetings for the day !
Hope that you’re well !

We want to introduce ourselves as a team of professionals who are into academic writing for the last 10+ years. We can provide assignment assistance in all subjects. Our experts can provide solutions across all the topics right from Management, HR, Marketing, Finance & Accounts, Statistics, IT, childcare, nursing, law, and general writing. We provide plagiarism free work and also send a ‘Turnitin’ report along with completed work. Our services are available at reasonable cost; we entertain amendment requests from clients without any extra charges.

Our Feature Included

Ø Every assignment includes graphical representation like pie chart, bar graph, smart art and all.
Ø Free 0% plagiarism report
Ø Expert team for technical work as well.
Ø On time delivery
Ø Multiple rework facility
Ø Huge team of expert in each subject
Ø Referencing like: Harvard, APA, MLA, Oscola, automatic referencing all are familiar to our experts.

Subject we cover: Math , finance, economics, accounts, civil engineering, mechanical engineering, IT, Computer science, electrical and electronics engineering, history, geography, political science, sociology, physiology, philosophy, biology, microbiology, biotechnology, biotechnology, B-school assignments, project report, psychology, nursing assignments, medical assignments, Tourists and travelling assignments all kinds of dissertation and so on

Best Regards:
Oz Paper Help
WhatsApp:+91-9519066910
Email:ozpaperhelp@gmail.com
www.ozpaperhelp.com
www.cheapassignmenthelp.co.uk
www.freeassignmenthelp.com

https://www.ozpaperhelp.com/
1 Step 1
GET INSTANT ASSIGNMENT HELP BY PHD EXPERTS FROM UNITED KINGDOM
keyboard_arrow_leftPrevious
Nextkeyboard_arrow_right