پارس فایل

مرکز دانلود انواع فایل های دانشجویی و دانش آموزی(تحقیق,پاورپوینت,پروژه,مقاله,فایل فلش و ...)

پارس فایل

مرکز دانلود انواع فایل های دانشجویی و دانش آموزی(تحقیق,پاورپوینت,پروژه,مقاله,فایل فلش و ...)

مقاله, ترجمه مقاله Social Cloud Computing Using Social Network

Abstract A level of trust can be developed by online relationships in social network which are based on real world relationships. To form a dynamic Social Cloud and to enable users to share heterogeneous resources within the context of a social network we have proposed leveraging of the social relationships. We believe that combining trust relationships with suitable incentive mechanisms could provide much more sustainable resource sharing mechanisms. We have introduced a business applicatio ...

Open-source simulators for Cloud computing: Comparative study and challenging issues

Open-source simulators for Cloud computing: Comparative study and challenging issuesژورنال:Simulation Modelling Practice and Theory سال: November 2015 قیمت اصلی:35.95 AbstractResource scheduling in infrastructure as a service (IaaS) is one of the keys for large-scale Cloud applications. Extensive research on all issues in real environment is extremely difficult because it requires developers to consider network infrastructure and the environment, which may be beyond the control. In addition, t ...

دانلود ترجمه سیستمهای ترکیبی Soft Computing

Hybrid Soft Computing Systems: Where Are We Going? Piero P. Bonissone 1 Soft computing is an association of computing methodologies that includes fuzzy logic, neuro-computing, evolutionary computing,and probabilistic computing. After a brief overview of Soft Computing components, we will analyze some of its most synergistic combinations. We will emphasize the development of smart algorithm-controllers, such as the use of fuzzy logic to control the parameters of evolutionary computing and, co ...

ترجمه بخش Quantum Computing از کتاب Post-Quantum Cryptography

ترجمه بخش Quantum Computing از کتاب Post-Quantum Cryptography Daniel J. Bernstein · Johannes BuchmannErik DahmenEditors قسمتی از متن در اینجا آورده شده است : رایانش کوانتومی در این فصل توضیح می ­دهیم که چگونه الگوریتم های کوانتومی کار می کنند و می توانند برای حمله به سیستم های امنیتی استفاده شوند. یک نمای کلی از وضعیت صنعت تکنیک های الگوریتم کوانتومی موجود یا مواردی که به سیستم های امنیتی مربوط می شوند را بیان می کنیم. اشاره ای نیز به پیشرفت های ممکن در آینده می شود. رمزنگاری کلاسیک و ...

دانلود تحقیق کامل در مورد محاسبات شبکه ای Grid Computing (تعداد صفحات 124 ) مرجع کامل و جامع

 محاسبات شبکه ای روشی است برای پردازش پردازه های بزرگ که حتی ابر کامپیوتر ها نیز از انجام آنها عاجزاند. در این روش سیستم می تواند پردازش های عظیم خود را توسط کامپیوترهای شخصی در سراسر جهان که به این شبکه پیوسته است انجام دهد. این شبکه از منابع کامپیوتر در زمانهای بیکاری آنها  استفاده می کند بنا بر این از تجمع کامپیوترهای کوچک پردازشگری بزرگ پدید می آید که می توان رقبای قدرتمندی برای ابر کامپیوتر ها باشند. گرید کامپیوتینگ تکنولوژی تقسیم کردن منابع شبکه های دامنه های مختلف و نا همگون مبت ...

کتاب Computing Radiation Dosimetry CRD زبان اصلی

کتاب Computing Radiation Dosimetry  CRD زبان اصلی   Establishing reliable computational methods and tools for radiation dosimetry is of great importance today because of the increased use of radiation in a number of areas of science, technology and medical applications. Fields concerned include radiation protection, radiation shielding, radiation diagnostics and therapy, radiobiology, biophysics and radiation detection. This series of lectures delivered by experts provides the co ...

دانلود پایان نامه انگلیسی: Cloud Computing Models

              ABSTRACT Information Technology has always been considered a major pain point of enterprise organizations, from the perspectives of both cost and management. However, the information technology industry has experienced a dramatic shift in the past decade – factors such as hardware commoditization, open-source software, virtualization, workforce globalization, and agile IT processes have supported the development of new technology and busines ...

دانلود مقاله Cloud Computing Risk and Audit Issues - انتشار 2015

Computer Standards & Interfaces Available online 20 June 2015   AbstractCloud computing has gained a mass popularity in the business environment. However, thistechnology also imposes some risk concerns, such as weak protection to security and privacy.Since its nature of distant and remote connectivity, the auditing process to this technologybecomes challengeable. This paper focuses on issues related to cloud computing risk and audittasks. Keywords: Cloud computing, auditing, risk facto ...

دانلود مقاله Cloud-aware data intensive workflow scheduling on volunteer computing systems - انتشار 2015

Future Generation Computer Systems Volume 51, October 2015, Pages 87–97   AbstractVolunteer computing systems offer high computing power to the scientific communities to run large data intensive scientific workflows. However, these computing environments provide the best effort infrastructure to execute high performance jobs. This work aims to schedule scientific and data intensive workflows on hybrid of the volunteer computing system and Cloud resources to enhance the utilization of ...

امنیت محاسبات ابری : خدمات وب سایت آمازون.(CLOUD COMPUTING SECURITY: AMAZON WEB SERVICE) (2015)

       شامل 25 درصد تخفیف عنوان انگلیسی مقاله: CLOUD COMPUTING SECURITY: AMAZON WEB SERVICE Abstract Cloud Computing is a recently emerged model which is becoming popular among almost all enterprises. It involves the concept of on demand services which means using the cloud resources on demand and we can scale the resources as per demand. Cloud computing undoubtedly provides unending benefits and is a cost effective model. The major concern in this model is Securi ...