Essays about: "cloud techniques blekinge"

Showing result 11 - 15 of 22 essays containing the words cloud techniques blekinge.

  1. 11. Energy-aware adaptation in Cloud datacenters

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Srivasthav Mahadevamangalam; [2018]
    Keywords : Cloud Computing; Virtualization; CloudSim; Energy-efficient; and VM Consolidation.;

    Abstract : Context: Cloud computing is providing services and resources to customers based on pay-per-use. As the services increasing, Cloud computing using a vast number of data centers like thousands of data centers which consumes high energy. The power consumption for cooling the data centers is very high. READ MORE

  2. 12. Identification and Masking Method of Clouds in Satellite Images

    University essay from Blekinge Tekniska Högskola/Institutionen för tillämpad signalbehandling

    Author : Harsha Yashaskar Emani; [2018]
    Keywords : ;

    Abstract : Identification of the cloud in an image is essential in order to remove the noise in the image and improve the quality of the image. Further the masking of cloud in a satellite image is important in order to obtain a clear image taken from a remote sensing satellite. READ MORE

  3. 13. Homomorphic Encryption: Working and Analytical Assessment : DGHV, HElib, Paillier, FHEW and HE in cloud security

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Srinivas Divya Papisetty; [2017]
    Keywords : Homomorphic encryption; Homomorphic Encryption Schemes; Cloud security; Cryptography;

    Abstract : Context: Secrecy has kept researchers spanning over centuries engaged in the creation of data protection techniques. With the growing rate of data breach and intervention of adversaries in confidential data storage and communication, efficient data protection has found to be a challenge. READ MORE

  4. 14. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Avinash Kiran Ivvala; [2017]
    Keywords : Intrusion Prevention Systems; cloud computing; snort; source mode; destination mode.;

    Abstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE

  5. 15. AUTOMATION OF A CLOUD HOSTED APPLICATION : Performance, Automated Testing, Cloud Computing

    University essay from Blekinge Tekniska Högskola/Institutionen för kommunikationssystem

    Author : Jyothi Spandana Penmetsa; [2016]
    Keywords : Software Testing; Automation; Agile Software Development Process; Cloud Computing;

    Abstract : Context: Software testing is the process of assessing quality of a software product to determine whether it matches with the existing requirements of the customer or not. Software testing is one of the “Verification and Validation,” or V&V, software practices. READ MORE