نتایج جستجو برای: security environment
تعداد نتایج: 678646 فیلتر نتایج به سال:
Fog computing is an innovative way to expand the cloud platform by providing resources. The a that has same data, management, storage and application features, but their origins are different because they deployed locations. system can retrieve large amount, work in field, be fully loaded, mount on variety of hardware devices. With this utility, Framework perfect for applications critical momen...
PhD Thesis
Distributed virtual environments (DVEs) have been an active area of research and engineering for more than 20 years. The most widely deployed DVEs are network games such as Quake, Halo, and World of Warcraft (WoW), with millions of users and billions of dollars in annual revenue. Deployed DVEs remain expensive centralized implementations despite significant research outlining ways to distribute...
In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which...
Rapid population growth, urbanization and rising incomes will present an unprecedented opportunity for growth of commercial agriculture and agribusiness in coming years. The value of food consumed in urban areas is set to expand by four times to 2030, but given evidence of a continuing decline in competitiveness much of this could be sourced from imports even in countries with an apparent compa...
This paper critically examines the literature on the interaction between population, the environment, and development. It posits that population pressure and resource scarcities are unfairly blamed for internal conflicts in Africa, Asia, and Latin America. Internal conflicts are, in fact, affected by underlying economic and political causes (international companies, development assistance age...
Secure electronic communication relies on cryptography. Even with perfect encryption, communication may be compromised without effective security protocols for key exchange, authentication, etc. We are now seeing proliferation of large secure environments characterized by high volume, encrypted traffic between principals, facilitated by Public Key Infrastructures (PKI). PKIs are dependent on se...
Speech scrambling techniques are used to scramble clear speech into unintelligible signal in order to avoid eavesdropping. . Analog scramblers are intended in applications where the degree of security is not too critical and hardware modifications are prohibitive due to its high cost .The residual intelligibility of the speech signal can be reduced by reducing correlation among the speech sampl...
In the last few years the education environment underwent a paradigm shift due to the rapid growth in technology. This growth made it possible for the education environment to utilize electronic services to enhance their education methods. It is, however, vital that all education environments (traditional or new ones) ensure that all resources (lectures, students and information) are properly p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید