Cloud Computing & Energy Efficiency Cloud as an alternative to Green Computing
Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 11
Abstract
With the growing use of computing and emerging it as transformative trends in business and society, it is necessary to consider its energy efficiency and its effects. Most consumers are already heavy users of cloud-enabled services, including email, social media, online gaming, and many mobile applications. But with growing use of clouds should we really consider it as an alternate to conventional computing. The efficiency model gives the wastage of energy in conventional systems and how it can be avoided by using clod computing.
Integrated Approach to Detect Vulnerabilities in Source Code
Nowadays, security breaches are greatly increasing in number. This is one of the major threats that are being faced by most organisations which usually lead to a massive loss. The major cause for these breaches could pot...
Solving a Multi Objective Fuzzy Variable Linear Programming Problem using Ranking Functions
A new method for solving fuzzy variable linear programming problems directly using linear ranking functions is described and is applied for Simplex method in [3]. In this paper, we extend the concept for solving a Multi...
Application of Remote Sensing Techniques in Forest Cover Mapping
Forest cover is an important natural resource which should be conserved on priority basis for sustainable environmental management; however, escalating levels of anthropogenic disturbances have exhorted tremendous pressu...
Development of Wireless RGB LED PWM Controller on Low Cost CPLD
Abstract: This article aims at development of Wireless RGB LED based on PWM controller by means of low cost CPLD. As the proficiency & light output of LEDs continues to obtain superior, application for color and white hi...
Security Measures in SCADA Systems
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been widely investigated, and many security mechanisms have been proposed from research communities. The inter...