Author - NareshIT_Hr

DevOps Interview Questions

1.What is DevOps? DevOps is a Combination of two words i.e.Development and Operations, where both teams work together to deliver project effectively with in less time. 2.Stages involved in DevOps? Development Build Test QA Deploy Monitor 3.What are the tools that we use in DevOps? Git Maven Selenium Jenkins Chef Ansible Puppet Docker Kubernetes Nagios Attend Free Demo and Learn DevOps Online Training by Real-Time Expert 4.What is Git? Git is a Repository where we store our source code. Also we call Git as a SCM(Source Code Management) because we manage source code. We also call Git as version control system where [...]

Read more...

Python IEEE Projects

TechnologyProject TitleYEARDomainAbstractEnroll! PythonACHIEVING GENUINE DATA USING HOLOMORPHIC ENCRYPTION ALGORITHM2018Machine LearningDownloadReg.Now PythonBRAIN TUMOR DIAGNOSYS USING CONVOLUTIONAL NEURAL NETWORKS2018Machine LearningDownloadReg.Now PythonDIAGNOSE THE BREST CANCER WITH THE COMPARISION OF CNN & LR MACHINE LEARNING ALGORITHM2018Machine LearningDownloadReg.Now PythonMULTI-TRAFFICSCENCE PERCEPTION BASED ON SUPERVISED LEARNING 2018Machine LearningDownloadReg.Now PythonNonintrusive Smartphone User Verification Using Anonymzed Multimodal Data2018Machine LearningDownloadReg.Now PythonDEFECT DETECTION IN NETWORKS USING MACHINE LEARNING ALGORITHMS2018Machine LearningDownloadReg.Now PythonRECOMMENDATION SYSTEM FOR ECOMMERCE USING MACHINE LEARNING ALGORITHMS2018Machine LearningDownloadReg.Now PythonDISTINGUISH RECOLORED IMAGES FROM NATURAL IMAGES USING MACHINE LEARNING2018Machine LearningDownloadReg.Now PythonSECURING FROM CYBER ATTACKS2018Machine LearningDownloadReg.Now PythonSHORT CONVERSATION PLATFORM USING MECHINE LEARNING2018Machine LearningDownloadReg.Now

Read more...

.NET IEEE Projects

TechnologyProject TitleYEARDomainAbstractEnroll! .NETA New Lightweight Symmetric Searchable Encryption Scheme for String Identification2018Cloud ComputingDownloadReg.Now .NETEnabling Efficient and Geometric Range Query with Access Control over Encrypted Spatial Data2018Cloud ComputingDownloadReg.Now .NETHedonic Pricing of Cloud Computing Services2018Cloud ComputingDownloadReg.Now .NETKarma: Cost-effective Geo-replicated Cloud Storage with Dynamic Enforcement of Causal Consistency.2018Cloud ComputingDownloadReg.Now .NETOn the efficiency of cloud providers: A DEA approach incorporating categorical variables2018Cloud ComputingDownloadReg.Now .NETSEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage.2018Cloud ComputingDownloadReg.Now .NETAn SLA-Aware Cloud Coalition Formation Approach for Virtualized Networks2018Cloud ComputingDownloadReg.Now .NETSeSPHR: A Methodology for Secure [...]

Read more...

Java IEEE Projects

TechnologyProject TitleYEARDomainAbstractEnroll! JAVADetecting Performance Anomalies in Cloud Platform Applications2018Cloud ComputingDownloadReg.Now JAVAEfficient Retrieval over Documents Encrypted by Attributes in Cloud Computing2018Cloud ComputingDownloadReg.Now JAVAEfficient Traceable Authorization Search System for Secure Cloud Storage2018Cloud ComputingDownloadReg.Now JAVAA Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage2018Cloud ComputingDownloadReg.Now JAVAProfit Maximization for Cloud Brokers in Cloud Computing2018Cloud ComputingDownloadReg.Now JAVAProvably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment2018Cloud ComputingDownloadReg.Now JAVARRect: A Novel Server-Centric Data Center Network with High Power Efficiency and Availability2018Cloud ComputingDownloadReg.Now JAVATowards Shared Ownership in the Cloud2018Cloud ComputingDownloadReg.Now JAVAVirtual [...]

Read more...