Proposed Technique for Efficient Cloud Computing Model in Effective Digital Training Towards Sustainable Livelihoods for Unemployed Youths

2020 ◽  
Vol 10 (4) ◽  
pp. 13-27
Author(s):  
Ritu Bansal ◽  
Vikash Kumar Singh

This research work seeks to suggest the development of an efficient cloud computing system to show that the various forms of effective online learning for sustainable livelihoods for unemployed youth are accountable for and lead to a number of factors. In the scope of sustainable livelihoods for unemployed people, it also aims to recognize certain fields of data analysis and their interrelationship. One question seems to bubble to the surface more than any other in the authors' discussions with clients, friends, and peers: How does successful online learning for sustainable living for unemployed youth explain switching to the cloud? Cloud computing could allow more adequate performance of its own efficient distributed tools through the SaaS system; therefore, both design the cloud computing SaaS distribution framework for unemployed youth talent learning. This article proposes an efficient cloud computing system strategy for active online learning for unemployed youth sustainable livelihoods.

The new and efficient method determinedly concentrates on the data processing, store and access the information which will be intended to make sure the users for legal powers should get equivalent information and also will confine the normal and unofficial legal users get admittance of the information which make suitable for those mobile cloud computing. There are various parameters with assess those execution of the active Attribute-Based encryption (ABE) method over cloud computing as takes after: cipher text measure (communication cost), private key span (storage cost), public key size (“Required storage on store public key in about powers in the ABE method”), re-keying extent (the size of the rekeying message that could make used to identify the user revocation for every attributes in the ABE system), calculation expense on the information manager (required time to encrypt the information by owner), calculation cost on the user (required run time to decrypt the information by a user). Our research work effort likewise analyses the vitality of the information security in the cloud. Purpose behind picking symmetric encryption algorithms are proficient to handle encryption and decryption to substantial measure about information and powerful speed about storing information and gaining access to those information in the cloud system.


2010 ◽  
Vol 20 (5) ◽  
pp. 1337-1348 ◽  
Author(s):  
Kang CHEN ◽  
Wei-Min ZHENG

2016 ◽  
Vol 11 (1) ◽  
pp. 72-80
Author(s):  
O.V. Darintsev ◽  
A.B. Migranov

In article one of possible approaches to synthezis of group control of mobile robots which is based on use of cloud computing is considered. Distinctive feature of the offered techniques is adequate reflection of specifics of a scope and the robots of tasks solved by group in architecture of control-information systems, methods of the organization of information exchange, etc. The approach offered by authors allows to increase reliability and robustness of collectives of robots, to lower requirements to airborne computers when saving summary high performance in general.


Sign in / Sign up

Export Citation Format

Share Document