Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 1
Abstract
“Cloud” computing – a relatively recent term, defines the paths ahead in computer science world. Being built on decades of research it utilizes all recent achievements in virtualization, distributed computing, utility computing, and networking. It implies a service oriented architecture through offering software’s and platforms as services, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on demand services and many other things. This paper is a brief survey based of readings on “cloud” computing and it tries to address, and future works. Cloud Computing frequently is taken to be a term that simply renames common technologies and techniques that we have come to know in IT. It may be interpreted to mean data centre hosting and then subsequently dismissed without catching the improvements to hosting called utility computing that permit near real-time, policy-based control of computing resources.
Authors and Affiliations
Ritu Rani
Fast Retrial and Multichannel Random Access in OFDMA Wireless Networks
In telecommunications and computer-networks, a channel access method or multiple access method allows several terminals connected to the same multi-point transmission medium to transmit over it and to share its capacity...
RAAR Processor: The Digital Image Processor
Image processing have wide applications in the day to day life of humans in one or the other applications like Surveillance, multimedia applications, medicine, automobiles, authentication systems etc. The research in th...
Smart Locker System to Crack Shoulder Surfing Techniques
Authentication based on passwords is used largely in applications for computer security and privacy. The password is generated for each and every time a new color code is generated for the user. The user can open the lo...
slugA Semantic Concept Detection for Video Based on Regularized Extreme Learning Machine
This paper explains the concept detection based on the proposed method regularized extreme learning machine. In regularized extreme learning machine deals with the modification of the extreme...
Network Security Attacks Solution and Analysis
Network security is that the composition of the vital policies and managed criteria adopted by an individual for the interference of unauthorized access, modification network-accessible resources network security plays...