• No results found

Program In The Cloud

A Study on the Role of Cloud Offerings in the Success of Digital India Program

A Study on the Role of Cloud Offerings in the Success of Digital India Program

... India Program with a vision to transform India into a digitally empowered society and knowledge economy as well as to change the entire ecosystem of public services through the use of information ...exploring ...

6

Data Deduplication To Increment The Ability Of Elementary Cache Program In The Cloud

Data Deduplication To Increment The Ability Of Elementary Cache Program In The Cloud

... samesubstance a plenitude of times. Regardless of these weighty favorable circumstances in safeguarding assets, customer information deduplication brings numerous security issues, impressively due to the multi-proprietor ...

6

Anti-Collusion Security Data Sharing Program In The Cloud

Anti-Collusion Security Data Sharing Program In The Cloud

... the cloud service to store and share data files with ...the cloud The revoked user can use his private key to decrypt the encrypted data file and get the secret data after his revocation by conspiring with ...

8

The Queensland cloud seeding research program

The Queensland cloud seeding research program

... F or much of the last decade, most of eastern and southern Australia was under severe drought conditions due to mounting rain- fall deficiencies. The Bureau of Meteorology (2011) reported that the lack of late winter and ...

16

Protected And Effective Keyword Arranged Search Program On Cypher Cloud

Protected And Effective Keyword Arranged Search Program On Cypher Cloud

... information to the cloud and execute watchword look over ciphertext area. Up until now, plenteous works have been proposed under various risk models to accomplish sundry hunt usefulness, for example, single ...

7

ANTI-COLLUSION SECURITY INFORMATION SHARING PROGRAM WITHIN THE CLOUD

ANTI-COLLUSION SECURITY INFORMATION SHARING PROGRAM WITHIN THE CLOUD

... the cloud The revoked user can use his private key to decrypt the encrypted data file and get the secret data after his revocation by conspiring with the ...the cloud, then the cloud responds the ...

7

An Improved Genetic Algorithm For Scheduling Resources In A Hetero-Gene Cloud: Iaas

An Improved Genetic Algorithm For Scheduling Resources In A Hetero-Gene Cloud: Iaas

... for cloud platforms and as thus embody heuristics that attempt to introduce the platform’s ...algorithmic program for programming one advancement instance on AN IaaS ...algorithmic program is ...

6

Vol 19, No 2 (2020)

Vol 19, No 2 (2020)

... training program was English-taught and was based on the use of MS Office 365 cloud services – OneDrive, OneNote – for organizing and managing the project work of students studying Economics in their ...

14

Implementing SAAS: Cloud Computing and Android Based Application Framework for .NET Programming

Implementing SAAS: Cloud Computing and Android Based Application Framework for .NET Programming

... the cloud based application for .net program creation, compilation and execution on lean mobile computing ...the cloud to test it across the range of different ...

6

Comparative Study of Different Cloud Computing Techniques

Comparative Study of Different Cloud Computing Techniques

... years, cloud computing gained rapid development on a worldwide ...Azure" program, IBM launched "Blue Cloud" program, and Amazon has launched Amazon Elastic Compute Cloud ...

8

Reconstruction of Earth Extreme Topography from UAV Structure from Motion Photogrammetry

Reconstruction of Earth Extreme Topography from UAV Structure from Motion Photogrammetry

... point cloud obtained from photogrammetric process were referred to as UTM Zone 30N (European Terrestrial Reference System 1989, ETRS89) and the elevation as the mean sea level using the EGM08 geoid ...point ...

17

Cloud Vaas Framework For Cross-Platform Mobile Devices

Cloud Vaas Framework For Cross-Platform Mobile Devices

... API program was synchronized with an Android mobile phone which served as a client program to access our deployed services from cloud ...client program has been written. An Axis2 SOAP client ...

5

Enhanced Integrity Preserving Homomorphic Scheme for Cloud Using Diffie Hellman

Enhanced Integrity Preserving Homomorphic Scheme for Cloud Using Diffie Hellman

... We counsel a safeguard data integrity checking decentralized erasure program cloud storage arrangement established on the Elative allocate scheme. Our storage arrangement that consists of storage servers ...

9

The Impact of the Unified Vehicular Volume Reduction Program (UVVRP) in Reducing Air Pollution

The Impact of the Unified Vehicular Volume Reduction Program (UVVRP) in Reducing Air Pollution

... The researchers gathered their quantitative data from government institutions and an international institution. For the UVVRP, the researchers used the number of violators for the Unified Vehicular Volume Reduction ...

9

The Use of Program MATHEMATICA In the Finite Element Method for Thin Planet Analysis

The Use of Program MATHEMATICA In the Finite Element Method for Thin Planet Analysis

... The article presents the use of the program MATHEMATICA in the finite element method. The entire computation of the stiffness matrix and load vector was computed with the program. Such an element has 9 node ...

8

Leg regeneration in Drosophila abridges the normal developmental program

Leg regeneration in Drosophila abridges the normal developmental program

... BoschCouso3010 4 pm Leg regeneration in Drosophila abridges the normal developmental program MANEL BOSCH1,2,3, SARAH ANNE BISHOP1, JAUME BAGU?A2 and JUAN PABLO COUSO1,* 1School of Life Sciences, Unive[.] ...

11

The Impact of Triple Bottom Line Based CSR Program in the Local Community Food Processing Industry

The Impact of Triple Bottom Line Based CSR Program in the Local Community Food Processing Industry

... development agenda. From this Collaborative Loca l Economic Development FGD, an integrated regional economic development agenda will be produced in the short, medium and long term. In the FDG it was also agreed to form a ...

11

Enhance the Security in Cloud Computing  Using Diffie-Hellman Algorithm

Enhance the Security in Cloud Computing Using Diffie-Hellman Algorithm

... in cloud computing. Cloud Computing consists the architecture of IT ...The cloud computing has the many advantages in the information technology field: on demand self-service, ubiquitous network ...

5

SECURITY ISSUES AND ALGORITHMS IN CLOUD COMPUTING

SECURITY ISSUES AND ALGORITHMS IN CLOUD COMPUTING

... operations. Cloud computing is rapidly emerging as a viable means to create dynamic, rapidly provisioned resources for operating platforms, applications, development environments, storage and backup capabilities, ...

6

Cloud–Computing Based Accounting for Small to Medium Sized Business

Cloud–Computing Based Accounting for Small to Medium Sized Business

... the cloud computing impact on the country economic analysis and forecasts for the next few years in Lithuania should build from 460 to 2,378 new small and medium businesses, as well as from 6118 up to 30,806 new ...

8

Show all 10000 documents...

Related subjects