STUDY ON GREEN CLOUD COMPUTING WITH ITS DIFFERENT BEHAVIOUR AND ARCHITETURE
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 6
Abstract
Cloud computing, as the term indicates, is a style of computing whereas vibrantly scalable and oftentimes visualized resources are supplied as a provider above the net. those offerings could be ate up via each person above a favored HTTP medium. The customer doesn't demand to have the know-how, data, or impact above the creation groundwork inside the "cloud" that helps them. The call cloud computing modified into inspired alongside the assistance of the cloud picture it honestly is oftentimes utilized to signify the internet inflow charts and diagrams. The clouds denote the abstraction of the complex groundwork it conceals. We counsel green Cloud computing edition that achieves not merely green processing and custom of computing groundwork, though additionally cut electricity intake
Authors and Affiliations
Preeti Bhonsle , Rajvir Singh
EXTRACT THE PUNJABI WORD WITH EDGE DETECTOR FROM MACHINE PRINTED DOCUMENT IMAGES
Optical character recognition is the essential area of research in the world. Text segmentation and extraction is an important task under the OCR System. OCR system depends on the quality of the input document and type o...
Metrics for Evaluating the Performance of Software Tester and Testing Team
The major determining factor of software quality is the effectiveness of testing. The reliability of software project delivered depends on the performance of the individuals in charge for testing the software. Individual...
A SURVEY ON SECURING MANETS FROM MALICIOUS BEHAVIOR BY DETECTION MECHANISM
There is a migration from wired network to wireless network in last few years due to the property of mobility and scalability. Mobile Ad hoc network is an infrastructure less network. Each node in Mobile Ad hoc Network a...
USER REQUIREMENTS WEIGHT BASED APPROACH TO IDS SELECTION FOR WLAN
A variety of featured packed Wireless Intrusion Detection System (WIDS) products are available in the market. They include commercial as well as open source products. It is for user to decide which will be the best WIDS...
Database Privacy- Issues and Solutions
Data Mining, fourth and analytical step of Knowledge discovery in database process is a process of discovering new and interesting patterns in the large datasets. For example, data miner can derive different patterns bas...