The study aims to improve student retention rate and maintain student engagement level by exploring the student motivation factors within a learning analytics context. This research is an exploratory case study within...
详细信息
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and *** proposed Virtual Cloud Storage Archi-...
详细信息
The sensitive data stored in the public cloud by privileged users,such as corporate companies and government agencies are highly vulnerable in the hands of cloud providers and *** proposed Virtual Cloud Storage Archi-tecture is primarily concerned with data integrity and confidentiality,as well as *** provide confidentiality and availability,thefile to be stored in cloud storage should be encrypted using an auto-generated key and then encoded into distinct *** the encoded chunks ensured thefile integrity,and a newly proposed Circular Shift Chunk Allocation technique was used to determine the order of chunk ***file could be retrieved by performing the opera-tions in *** the regenerating code,the model could regenerate the missing and corrupted chunks from the *** proposed architecture adds an extra layer of security while maintaining a reasonable response time and sto-rage *** results analysis show that the proposed model has been tested with storage space and response time for storage and *** VCSA model consumes 1.5x(150%)storage *** was found that total storage required for the VCSA model is very low when compared with 2x Replication and completely satisfies the CIA *** response time VCSA model was tested with different sizedfiles starting from 2 to 16 *** response time for storing and retrieving a 2 MBfile is 4.96 and 3.77 s respectively,and for a 16 MBfile,the response times are 11.06 s for storage and 5.6 s for retrieval.
A program or piece of computer software is often built using serial computing techniques. In simple terms, a problem's solution is created by breaking it down into smaller instructions, which are then each individ...
详细信息
For this leaf disease study, apple and sugarcane plants are identified and classified using a mix of character features and in-depth automated coding. Farm sugar cane leaves were copied for the online apple Plant Vill...
详细信息
Cloud computing has been considered the most reliable and safe technology among many cloud users. Virtual machine migration is a crucial component of cloud computing technology. A Virtual machine is transferred from o...
详细信息
The Distributed Denial-of-Service (DDoS) attacks are one of the most critical threats to the stability and security of the Internet. With the increasing number of devices connected to the Internet, the frequency and s...
详细信息
We have witnessed the widespread adoption of online teaching and learning platforms in recent years. Teachers employ a variety of learning activities and techniques to follow their students' learning progress, inc...
详细信息
Water is vital for all life, serving as the foundation for plants and aquatic creatures and promoting abundance among all living beings. This study introduces an innovative approach by combining the Internet of Things...
详细信息
Unmanned aerial vehicles (UAVs) have garnered significant attention from the research community during the last decade, due to their diverse capabilities and potential applications. One of the most critical functions ...
详细信息
The acoustic variability of noisy and reverberant speech mixtures is influenced by multiple factors, such as the spectro-temporal characteristics of the target speaker and the interfering noise, the signal-to-noise ra...
详细信息
暂无评论