Efficient Emergency Pharmaceutical Service Via Cloud Server

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Server Virtualization using Grid Service Infrastructure

The core services in cloud computing environment are SaaS (Software as a Service), Paas (Platform as a Service) and IaaS (Infrastructure as a Service). Among these three core services server virtualization belongs to IaaS and is a service technology to reduce the server maintenance expenses. Normally, the primary purpose of sever virtualization is building and maintaining a new well functioning...

متن کامل

FINITE POPULATION SINGLE SERVER BATCH SERVICE QUEUE WITH COMPULSORY SERVER VACATION

A single server finite population queueing model with compulsory server vacation and with fixed batch service has been considered. For this model the system steady state probabilities are obtained. Some performance measures are calculated and numerical examples are also given.  

متن کامل

Ontology based Comprehensive Architecture for Service Discovery in Emergency Cloud

Disasters such as Tsunami, Landslides, and cyclones occur frequently and a strong emergency management system is required to manage such situations. These kinds of crisis circumstances are expected to increase in future. The role of Information and communication technology can largely aid in handling calamities and provide first aid support. The characteristics of Cloud computing such as sharin...

متن کامل

Energy Efficient Heterogeneous Multicore Cloud Server for Independent Real Time Tasks in Cloud Environment

Article history: Received 25 April 2014 Received in revised form 8 May 2014 Accepted 20 May 2014 Available online 17 June 2014

متن کامل

Authentication via Multi-Service Tickets in the Kuperee Server

The subject of this paper is the authentication services as found in the Kuperee3 server. The authentication protocol is based on the Zheng-Seberry public key cryptosystem, and makes use of the distinct features of the cryptosystem. Although couched in the terminology of Kerberos, the protocol has subtle features, such as the binding together of two entities by a third entity, leading to the ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology

سال: 2019

ISSN: 2321-9653

DOI: 10.22214/ijraset.2019.5349