نتایج جستجو برای: keywords infrastructure
تعداد نتایج: 2048419 فیلتر نتایج به سال:
Road authorities have confronted problems to maintaining the serviceability of road infrastructure systems by using various traditional methods of contracting. As a solution to these problems, many road authorities have started contracting out road maintenance works to the private sector based on performance measures. This contracting method is named Performance-Based Maintenance Contracting (P...
―Cloud‖ computing – a way to increase the capacity of a network without investing in new infrastructure, training new personnel, or licensing new software. It represents service oriented architecture by offering reduced information technology overheads for the end-user, great flexibility, etc. This paper is a brief survey of cloud computing, various elements of cloud computing security and its ...
Wireless Ad-Hoc networks are a form of peer-topeer network where nodes can communicate with each other without any central infrastructure. In spontaneous network, devices are placed close to each other for accessing services and sharing resources among each other for short period of time and network is formed spontaneously without help of any external or central infrastructure. The proposed pro...
We present a new approach to evaluation of Cyber Security in Power Systems using the method of modeling the power systems Infrastructure using software agents. Interfaces between module and the home smart meter are recognized as the primary points of intrusion. Keywords—Power Systems, Modeling and Simulation, Agent systems.
In this paper a testbed for development and verification of hybrid localization systems is presented. It allows for systematic analysis of hybrid localization methods and speed up the development of new schemes. The proposed testbed platform is composed of subsystem for sequential data collection and testing infrastructure that can be used for investigating the localization mechanisms in contro...
In this paper we address the security problems of systems incorporating JTAG test infrastructure and briefly review the proposed solutions. In the following, we focus on JTAG locking mechanism and indicate some modifications to improve its resistance against possible attacks. Keywords—JTAG; security; locking mechanism;
The paper describes a measurement study of mobile Internet usage in township communities in South Africa. The idea is to understand usage pattern of mobile data that would motivate the provisioning of a localised cloudlet infrastructure with an appropriate set of services. Keywords— cloud computing, wireless, availability, social media integration, synchronization, Internet measurements
Peer-to-Peer (P2P) is a self-organizing resource sharing network with no centralized authority or infrastructure, which makes it unpredictable and vulnerable. In this paper, we propose architecture to make the peer-to-peer network more centralized, predictable, and safer to use by implementing trust and stopping free riding. Keywords— File Share, Free Riding, Peer-to-Peer, Trust.
The development of information and communication technologies depend on several factors like government policy that encourage investors to spend their money in building IT infrastructure and force business or particular institution to adopt the new technologies to bring the price down and many others. This paper investigates the state of Information and Communication Technology in Iran. Keyword...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید