نتایج جستجو برای: index terms cloud computing
تعداد نتایج: 1305033 فیلتر نتایج به سال:
introduction thermal infrared integrated dust index (tiidi) is one of indices that is presented in this direction. the index operates based on four brightness temperature difference including wavelengths 3.7, 8.6, 11 and 12 micrometer. according to the studies, btd (bt12-bt11) is used for cloud detection. btd (bt8.6-bt11) is the index for separation for dust from sandy surface and btd (bt3.7-bt...
Cloud computing is the mass storage area that helps the user to access the data anywhere. There are so many platforms provided by the cloud service provider. They are SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) etc. Though security is not fully provided by the cloud service provider to reshape the advances in information technology, cloud co...
In this modern era the developing countries will be remain mired in poverty unless they preoccupy more on widening the technology and innovation to everywhere throughout the country including urban to small rural areas. The essence of Computer is now swelling in such an extent that we can not think a single moment without Computer; everyone residing in a country now needs to be proficient in di...
Cloud computing is the most integral part of todays world of computing. It provides various advantageous like reliability, economical, pay as you use, on demand service. Cloud hides the ambiguity of different hardware through virtualization technology. Virtualization is the foundation of cloud, it provides Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Servic...
Cloud computing is an internet based computing which enables sharing of services. It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn’t have copy of all stored data, he has to depend on Cloud Service Provider. This work studies the problem of ensuring the i...
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
with the rapid development of the internet, the amount of information and data which are produced, are extremely massive. hence, client will be confused with huge amount of data, and it is difficult to understand which ones are useful. data mining can overcome this problem. while data mining is using on cloud computing, it is reducing time of processing, energy usage and costs. as the speed of ...
in recent years, the banking industry has made significant changes in technology and communications. the expansion of electronic communications and a large number of people around the world access to the internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
The cloud computing platform gives people the ability to share resources, services and information among people from all over the world. In the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data into cloud servers for great convenience and reduced costs in data management. The sensitive data should before the outsourcing of data protection ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید