Cloud Computing: Its Advantages and Security Issues
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 9
Abstract
Cloud computing is the technology which getting attention in these days due is low-cost, flexibility and independence of the hardware and software. There are lots activities and advantages in this area but still there are many concerns about cloud computing that its speeds down the momentum of this technology as a new future. In the paper we will characterize whereas concerns, effects on the clients adopting the technology, how its adoption advantageous to whereas concerns,effects on the clients adoptingthe technology, how its adoption advantageous to whereas enterprise and users by providing an isolation from the software. Also we will discuss the legal issue regarding the same.
Authors and Affiliations
Mandisha Sharma, Manish Sharma, Mansi Kakkar
Brain Computer Interface
A BRAIN COMPUTER INTERFACE (BCI) is a direct communication pathway between the brain and an external device. The concept of BCI had coined in 1970s at the University of California Los Angeles (UCLA). Growth in neurosci...
A Review of Water Absorption, Porosity and Sorptivity of Cement Mortar made with metakaolin and flyash partially replaced in cement cured in seawater
In this present study the effects of flyash, metakaolin and their combinations has been evaluated for optimal level of replacement as blending component in cement. The results showed that the water absorption, porosity...
A Scheme to Improve Network Lifetime for Wireless Adhoc Networks
Transmission game plan for perfect essentialness utilization, despite topology control, coordinating, and MAC traditions, can accept a key part in creating framework lifetime.Numerical results show liberal changes simil...
Energy Efficient Routing Protocol Considering Residual Energy in Wireless Adhoc Networks
Wireless networks adapt easily to changes and offers flexibility in the configuration of the network. In MANET, each node will change its location dynamically and configure itself according to the environment. An effect...
slugAnalysis of Artificial Neural Networks Based Intrusion Detection Systems for Mobile Ad Hoc Networks
In mobile ad hoc networks, Intrusion detection system is known as the second line of defense because prevention based techniques are not a good solution for ad hoc networks due to its complex characteristics. For the se...