• Nenhum resultado encontrado

[PDF] Top 20 Scada in a cloud-based architecture

Has 10000 "Scada in a cloud-based architecture" found on our website. Below are the top 20 most common "Scada in a cloud-based architecture".

Scada in a cloud-based architecture

Scada in a cloud-based architecture

... consumers. In addition, Smart Grid enables a two-way flow of electricity and informa- tion between the end-points and the ...managing. In this scenario, clouds com- puting will provide substantial cost ... See full document

93

Cloud Computing: A study of cloud architecture and its patterns

Cloud Computing: A study of cloud architecture and its patterns

... used, will understand and interoperate multiple identity schemes. OpenID is an open and decentralized standard for user authentication and access control, by allowing users to logon to multiple services with the same ... See full document

6

A collaborative architecture against DDOS attacks for cloud computing systems.

A collaborative architecture against DDOS attacks for cloud computing systems.

... as in S2F4, since the volume of traffic at S2F2 is higher; after all, in S2F4, τ runs only on packets that have not been filtered by S2F3’s tasks, whereas S2F2 sees the full load of packets to which τ must ... See full document

85

ART 2 - Cloud Computing for Higher Education Institutes Architecture

ART 2 - Cloud Computing for Higher Education Institutes Architecture

... the cloud. This presents a major shift in approach and provides a major opportunity to increase organizational efficiency, improve agility, and stimulate ...comprehensive cloud- computing strategy ... See full document

11

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage

Bio-Cryptography Based Secured Data Replication Management in Cloud Storage

... fixed cloud provider, try to have access to the client’s ...a cloud provider. Thus single data mart storage architecture is the biggest security threat concerning data mining on cloud, so ... See full document

2

A Framework for Predicate Based Access Control Policies in Infrastructure as a Service Cloud

A Framework for Predicate Based Access Control Policies in Infrastructure as a Service Cloud

... of cloud further makes it flexible so as to meet the requirements of ...same, Cloud Service Provider (CSP) needs a flexible architecture to accommodate the varied requirements of customers with ... See full document

9

Scheduling in cloud and fog architecture: identification of limitations and suggestion of improvement perspectives

Scheduling in cloud and fog architecture: identification of limitations and suggestion of improvement perspectives

... workflow. In fog architecture, there is a demand for more sophisticated task scheduling algorithms because the data needs to flow between client devices, fog nodes and cloud servers (Swaroop, ...be ... See full document

12

Framework for E-business design based on enterprise architecture

Framework for E-business design based on enterprise architecture

... literacy in Mozambican is low, mostly 80% of urban mobile network subscribers have access to ...keep in contact with regular customers via social networking platforms ...Computers in the office ... See full document

89

A User-Centered and Autonomic Multi-Cloud Architecture for High Performance Computing Applications

A User-Centered and Autonomic Multi-Cloud Architecture for High Performance Computing Applications

... time in 22.55% over the best single cloud execution. In addition, this thesis presents a cloud architecture called Excalibur to auto-scale cloud-unaware ...multi-cloud ... See full document

282

A fault - and intrusion - tolerant architecture for EDP Distribuição SCADA system

A fault - and intrusion - tolerant architecture for EDP Distribuição SCADA system

... conventional SCADA platform with an application ...redundant SCADA servers were solely responsible for the monitoring and control of the power grid, which made it the only critical server whose operation  ... See full document

116

Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud Architecture

Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud Architecture

... broker based federated architecture is shown in Figure ...by cloud service providers through broker learn ing algorith ...the cloud provider‟s resources, collect its information and ... See full document

5

Secure Cloud Architecture

Secure Cloud Architecture

... example in cloud virtualization providers uses virtualization software to partition servers into images that are provided to the users as on-demand services ...into cloud providers' data centres ... See full document

14

SLA for E-Learning System Based on Cloud Computing

SLA for E-Learning System Based on Cloud Computing

... the cloud service can be ...So in this paper, the SLA parameters are specified only for the E-Learning applications ...confused in defining the important ... See full document

6

Representing organizational structures in enterprise architecture : an ontology-based approach

Representing organizational structures in enterprise architecture : an ontology-based approach

... Defense Architecture Framework (DoDAF) (US DEPARTMENT OF DEFENSE, 2010) is an approach for development of Enterprise Architecture created and maintained by the US Department of ...traditional ... See full document

162

Software architecture based on XMLmessages in a project for secondary loan trading

Software architecture based on XMLmessages in a project for secondary loan trading

... participating in the ...established in credit agreement spread plus a base rate and floating rate loans that accrue interest with a rate that includes spread but is also base rate linked to a currency index  ... See full document

33

APOSTILA DE ELIPSE SCADA

APOSTILA DE ELIPSE SCADA

... Set Point estará desabilitado.Isso é um problema e acontece porque o Scada mantém o estado dos objetos da última execução do aplicativo.Para solucionar esse problema, seráhabilitado esse objeto Set point. Podemos ... See full document

69

Desenvolvimento de uma aplicação scada

Desenvolvimento de uma aplicação scada

... No primeiro semestre tive a oportunidade de desenvolver um pequeno sistema de SCADA com o software Lookout, para o controlo de uma habitação virtual no âmbito da disciplina de Computação Industrial do MIEM. O ... See full document

70

Automatic coverage based neighbour estimation system: a cloud-based implementation

Automatic coverage based neighbour estimation system: a cloud-based implementation

... data in temporary storage (required for file processing), only allocated between 128 and 3008 MB of memory and a function was limited to a maximum processing time limit of up to 15 minutes, though a custom timeout ... See full document

12

QoS Based Resource Management for Cloud Environment

QoS Based Resource Management for Cloud Environment

... Problem in the Cloud proposed CG starts with the cheapest assignment as an initial least-cost schedules which schedule all tasks to the resource with minimum cost ...values in IaaS multi-cloud ... See full document

58

Euronet Lab : a Cloud Based Laboratory Environment

Euronet Lab : a Cloud Based Laboratory Environment

... Another problem is the parallel job processing that is allowed by the grid computing system, in laboratory applications. This is not applicable because each connection can belong to different instances, and very ... See full document

9

Show all 10000 documents...