by Harleen Kaur
Call for paper : IJET
Submit Your Article to editorIJETjournal@gmail.com Call for paper October 2017 IJET- International Journal of Engineering and Techniques invited all areas of Science, Engineering and Technology , Previously Published Papers in Conferences, Scholarly Journal , Original Research Papers, Survey Papers, Case Studies and Academic or Scholarly Articles are cordially invited to submit papers for the upcoming Edition October – 2017 Click here to download the Copyrights Form and Paper Template ...
Read More
Mobile Computing vs Green Computing
Computing means any goal-oriented activity requiring, benefiting from, or creating computers. Thus, computing includes designing and building hardware and software systems for a wide range of purposes; processing, structuring, and managing various kinds of information; doing scientific studies using computers; making computer systems behave intelligently; creating and using communications and entertainment media; finding and gathering information relevant to any particular purpose. GREEN COMPUTING Green computing...
Read More
Data Mining Tools
Data mining has a wide number of applications ranging from marketing and advertising of goods, services or products, artificial intelligence research, biological sciences, crime investigations to high-level government intelligence. Due to its widespread use and complexity involved in building data mining applications, a large number of Data mining tools have been developed over decades. Every tool has its own advantages and disadvantages. Within data mining,...
Read More
CLOUD COMPUTING SECURITY ISSUES, CHALLENGES AND SOLUTION
THREATS IN CLOUD COMPUTING Threats Cloud computing faces just as much security threats that are currently found in the existing computing platforms, networks, intranets, internets in enterprises. These threats, risk vulnerabilities come in various forms. The Cloud Security Alliance (Cloud Computing Alliance, 2010) did a research on the threats facing cloud computing and it identified the flowing major threats: Failures in Provider Security Attacks by...
Read More
by Gurpreet
Technical Report Writing
A technical report is a formal report designed to convey technical information in a clear and easily accessible format. It is divided into sections which allow different readers to access different levels of information. This guide explains the commonly accepted format for a technical report; explains the purposes of the individual sections; and gives hints on how to go about drafting and refining a report...
Read More
by Harleen Kaur
The Secret To Being an Articulate Speaker
The Secret To Being Well-Spoken I think we can all recognize the value of being well-spoken. Whether you’re speaking to a group of prospective high school students on a college campus tour… Or you’re speaking to a hiring manager for your dream job… The way you speak plays a huge role in the impression you make on others, and thus your potential influence on them. It’s quite possible that the...
Read More
Eucalyptus Cloud Computing Architecture
Eucalyptus is an open source software platform for implementing Infrastructure as a Service (IaaS) in a private or hybrid cloud computing environment. Eucalyptus cloud computing architecture is highly scalable because of its distributed nature. The Cloud level of the computing architecture is comprised of only two components and while used by many users, the transactions at each component are typically small. The Node level may have many...
Read More
by Harleen Kaur
Research Basics
The research process deals with the ways and strategies used by researchers to understand the world around us. This is a guide to basic elements of scientific research. Research Methodology Key Concepts of the Scientific Method There are several important aspects to research methodology. This is a summary of the key concepts in scientific research and an attempt to erase some common misconceptions in science....
Read More