نتایج جستجو برای: computing methodologies
تعداد نتایج: 466250 فیلتر نتایج به سال:
The paper emphasis on the concepts of cloud computing and its related methodologies with respect to the security aspects of cloud data. Main aim of this paper is to present the survey of cloud computing techniques, to study about Security issues and the need and importance of digital watermarking in securing cloud data. The work gives an overview of the literature survey for secure cloud comput...
Cloud computing is ideal for places where the data remain in a fixed environment, which are unavailable. Today imparting of data with security places is a major issue in cloud computing. For security issues key aggregate place a vital role to offer secured data transfer. This paper provides the various techniques and methodologies that can be used for security in revocation process and also new...
This workshop introduces the foundations of data mining in the context of granular and rough computing. Unlike conventional data mining research, this workshop focuses on deep reflection into the meaning of patterns obtained from data. Since patterns are embedded in sets of real world objects, algebraic or geometric views on sets may play important roles. For this purpose, granular and rough co...
Distributed Computing Infrastructures (DCIs) are widely utilised by scientists to support computation and data intensive application scenarios. The European EDGI project is working on connecting two distinctive types of DCIs, Service and Desktop Grid systems. The infrastructure is operated at production level and supports a large variety of applications. Porting and deploying an application on ...
This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level. This study is concluded with a discussion of current problems and the future direction of cloud computing. Big data analysis can also be classified into memory level analysis, business intelligence (BI) level analysis, and massive level analysis. This research paper ...
Usually, cloud infrastructure is used individually by businesses, whereas the hybrid would be a blend of two or many kinds clouds. Because as clouds become increasingly common, safety issues also expanding. such cybersecurity threats, numerous experts suggested procedures well ways to assure internet confidentiality. Providers cloud-based services were accountable for complete information. Neve...
desertification is the consequence of series of processes in which climate change and human activities are more important factors than others. arid and semi-arid areas have occupied most parts of iran. sistan region is one of arid areas of iran where wind erosion is an important factor of land degradation and soil deterioration. for classification of desertification intensity, several methods h...
in order to improve the level of intelligence, availability, being on demand, convenience, information and humanization of rural public transportation systems, they are more willing to use modern information and communicative technologies. in addition to management services, intelligent transportation systems can provide passengers, drivers, travel agencies and other institutions with other ser...
Soft computing (SC) is an evolving collection of methodologies, which aims to exploit tolerance for imprecision, uncertainty, and partial truth to achieve robustness, tractability, and low cost. SC provides an attractive opportunity to represent the ambiguity in human thinking with real life uncertainty. Fuzzy logic (FL), neural networks (NN), and evolutionary computation (EC) are the core meth...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید