A Study of metrics for evaluation of Machine translation
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.1-4, Jun-2018
Abstract
Machine Translation has gained popularity over the years and has become one of the promising areas of research in computer science. Due to a consistent growth of internet users across the world information is now more versatile and dynamic available in almost all popular spoken languages throughout the world. From Indian perspective importance of machine translation become very obvious because Hindi is a language that is widely used across India and whole world. Many initiatives have been taken to facilitate Indian users so that information may be accessed in Hindi by converting it from one language to other. In this paper we have studied various available automatic metrics that evaluate the quality of translation correlation with human judgments.
Key-Words / Index Term
Machine Translation, Corpus, bleu, Nist, Meteor, wer, ter, gtm
References
[1] Philipp Koehn, Christof Monz ,”Manual and Automatic Evaluation of Machine Translation between European Languages” School of Informatics University of Edinburgh ,Department of Computer Science Queen Mary, University of London. Proceeding StatMT `06 Proceedings of the Workshop on Statistical Machine Translation Pages 102-121
[2] Michael Denkowski and Alon Lavie Language ,”Choosing the Right Evaluation for Machine Translation: an Examination of Annotator and Automatic Metric Performance on Human Judgment Tasks” Proceedings of the Ninth Biennial Conference of the Association for Machine Translation in the Americas https://www.cs.cmu.edu/~mdenkows/pdf/mteval-amta-2010.pdf
[3] Matthew Snover Bonnie Dorr Richard Schwartz, Linnea Micciulla, and John Makhoul, “A Study of Translation Edit Rate with Targeted Human Annotation” Proceedings of association for machine translation in the Americas, pp 223-231.
[4] Aditi Kalyani, Hemant Kumud Shashi Pal Singh Ajai Kumar,” Assessing the Quality of MT Systems for Hindi to English Translation” International Journal of Computer Applications (0975 – 8887) Volume 89 – No 15, March 2014
[5] Klakow, Dietrich; Jochen Peters (September 2002). "Testing the correlation of word error rate and perplexity". Speech Communication. 38 (1-2): 19–28. doi:10.1016/S0167-6393(01)00041-3. ISSN 0167-6393
[6] Kishore Papineni, Salim Roukos, Todd Ward, and Wei-Jing Zhu,” BLEU: a Method for Automatic Evaluation of Machine Translation “. Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL), Philadelphia, July 2002, pp. 311-318
[7] Jason Brownlee “A Gentle Introduction to Calculating the BLEU Score for Text in Python “.November 20, 2017 in Natural Language Processing” Online https://machinelearningmastery.com/calculate-bleu-score-for-text-python/
[8] Xingyi Song and Trevor Cohn and Lucia Specia,” BLEU deconstructed: Designing a Better MT Evaluation Metric” University of Sheffield Department of Computer Science Proceedings of the 14th International Conference on Intelligent Text Processing and Computational Linguistics (CICLING)
[9] Doddington, George. (2002),”Automatic evaluation of machine translation quality using n-gram co-occurrence statistics”.138-145. 10.3115/1289189.1289273
[10] Satanjeev Banerjee Alon Lavie ,”METEOR: An Automatic Metric for MT Evaluation with Improved Correlation with Human Judgments” Institute Language Technologies Institute Carnegie Mellon University. Proceedings of Workshop on Intrinsic and Extrinsic Evaluation Measures for MT and/or Summarization at the 43rd Annual Meeting of the Association of Computational Linguistics (ACL-2005), Ann Arbor, Michigan, June 2005.
[11] Ankush Gupta and Sriram Venkatapathy and Rajeev Sangal ,” METEOR-Hindi : Automatic MT Evaluation Metric for Hindi as a Target Language”. Language Technologies Research Centre, IIIT-Hyderabad, Hyderabad, India. Proceedings of ICON-2010:8th International conference on Natural language processing, Macmillan Publishers, India.
[12] Xinlei Chen, Hao Fang, Tsung-Yi Lin, Ramakrishna Vedantam Saurabh Gupta, Piotr Dollar, C. Lawrence Zitnick ,”Microsoft COCO Captions: Data Collection and Evaluation Server”. CoRR 2015 Vol: abs/1504.00325
Citation
K. Sourabh, S. M Aaqib, V. Mansotra, "A Study of metrics for evaluation of Machine translation", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.1-4, 2018.
Biometric Based on Fingerprint
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.5-13, Jun-2018
Abstract
Security has always been a major concern for authentication over networking. Fingerprints are one of the biometrics which plays an important role in identifying a person based on some minutiae features. This is one of the most commonly used algorithms for extracting features that characterizes a fingerprint. This biometrics has several applications like e-governance, commercial and forensic. The fingerprint biometric offers a higher degree of security and personal privacy. Emerging privacy concerns with the database acquisition and lack of availability of large scale fingerprint databases have posed challenges in exploring this technology for large scale applications. Fingerprint recognition looks for the unique patterns of ridges and valleys that are present in an individual’s fingerprint. These patterns are unique to every individual and thus help to identify individuals from an entire population. Verification and identification are the two ways in which an individual’s identity can be determined using biometric technology. This research also developed user-friendly software to synthesize fingerprint databases, which could help to advance further research in fingerprint biometrics.
Key-Words / Index Term
Biometric, Authentication System, Fingerprint recognition, Minutiae Based, Biometric security system, Identification access control
References
[1] The Biometric Consortium, “Introduction to Biometrics”,
(http://www.biometrics.org), 2006.
[2] D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, “Handbook of
Fingerprint Recognition”, Springer, London, 2009.
[3] Samir Nanavati, Michael Thieme, and Raj Nanavati, “Biometrics: Identity Verification in a Networked World”, John Wiley & Sons, 2002.
[4] Julian Ashbourn, “Biometrics: Advanced Identity Verification”, Springer-Verlag, London, 2002.
[5] Edmund Spinella, “Biometric Scanning Technologies: Finger, Facial and Retinal Scanning”, SANS Institute, San Francisco, CA, 2003.
[6] Peatman, John B., “Design with PIC Microcontrollers”, Pearson Education, India, 1998.
[7] “Biometrics Overview.” National Science and Technology Council. http://www.biometricscatalog.org/ NSTCSubcommittee/Documents/Biometrics%20Overview.pdf.
[8] “Doubt cast on fingerprint security.” BBC News, May 17, 2002. [3] Jain, Anil K. and Sharathchandra Pankanti. “A Touch of Money.” IEEE Spectrum, July 2006. p. 22-27.
[9] “Biometrics Standards.” National Science and Technology Council. http://www.biometricscatalog.org/ NSTCSubcommittee/Documents/biometrics%20standards.pdf.
[10] Prabhakar, S.; Pankanti, S.; Jain, A.K. “Biometric recognition: security and privacy concerns.” Security & Privacy Magazine, IEEE Volume 1, Issue 2, Mar-Apr 2003, p. 33-42.
[11] F. Alonso-Fernandez, J. Fierrez, and J. Ortega-Garcia, “Quality measures in biometric systems,” vol. 10, no. 6. IEEE, 2012, pp. 52–62.
[12] L. Coetzee and E. C. Botha, “Fingerprint recognition in low quality images,” vol. 26, no. 10. Elsevier, 1993, pp. 1441–1460.
[13] K. Karu and A. K. Jain, “Fingerprint classification,” vol. 29, no. 3. Elsevier, 1996, pp. 389–404.
[14] L. Hong, Y. Wan, and A. Jain, “Fingerprint image enhancement: algorithm and performance evaluation,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 20, no. 8, pp. 777–789, 1998.
[15] C. I. Watson, M. D. Garris, E. Tabassi, C. L. Wilson, R. M. Mccabe, S. Janet, and K. Ko, “User’s guide to nist biometric image software (nbis),” 2007.
[16] P. Grother and E. Tabassi, “Performance of biometric quality measures,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 29, no. 4, pp. 531–543, 2007.
[17] A. J. Willis and L. Myers, “A cost-effective fingerprint recognition system for use with low-quality prints and damaged fingertips,” vol. 34, no. 2. Elsevier, 2001, pp. 255–270.
[18] K. Ito, A. Morita, T. Aoki, T. Higuchi, H. Nakajima, and K. Kobayashi, “A fingerprint recognition algorithm using phase-based image matching for low-quality fingerprints,” in Image Processing, 2005. ICIP 2005. IEEE International Conference on, vol. 2. IEEE, 2005, pp. II–33.
[19] D. Zhang, F. Liu, Q. Zhao, G. Lu, and N. Luo, “Selecting a reference high resolution for fingerprint recognition using minutiae and pores,” vol. 60, no. 3. IEEE, 2011, pp. 863–871.
[20] Q. Zhao, F. Liu, and D. Zhang, “A comparative study on quality assessment of high resolution fingerprint images,” in Image Processing (ICIP), 2010 17th IEEE International Conference on. IEEE, 2010, pp. 3089–3092.
[21] R. M. Bolle, S. U. Pankanti, and Y.-S. Yao, “System and method for determining the quality of fingerprint images,” Oct. 5 1999, uS Patent 5,963,656.
[22] J. Fierrez-Aguilar, J. Ortega-Garcia, J. Gonzalez-Rodriguez, and J. Bigun, “Kernel-based multimodal biometric verification using quality signals,” in Defense and Security. International Society for Optics and Photonics, 2004, pp. 544–554. ,29794-1:2009, “Information technology – biometric sample quality – part 1: Framework,” October 2009.
[23] A. K. Jain and S. Z. Li, Encyclopedia of Biometrics: I-Z. Springer, 2009, vol. 1. [23] E. Tabassi, C. Wilson, and C. Watson, “Nist fingerprint image quality,” NIST Res. Rep. NISTIR7151, 2004.
[24] G. Li, B. Yang, and C. Busch, “Autocorrelation and dct based quality metrics for fingerprint samples generated by smartphones,” in Digital Signal Processing (DSP), 2013 18th International Conference on. IEEE, 2013, pp. 1–5.
[25] Z. YAO, C. Charrier, and C. Rosenberger, “Utility validation of a new fingerprint quality metric,” in International Biometric Performance Conference 2014. National Insititure of Standard and Technology (NIST), April 2014.
[26] F. Alonso-Fernandez, J. Fierrez, J. Ortega-Garcia, J. Gonzalez-Rodriguez, H. Fronthaler, K. Kollreider, and J. Bigun, “A comparative study of fingerprint image-quality estimation methods,” Information Forensics and Security, IEEE Transactions on, vol. 2, no. 4, pp. 734–743, 2007.
[27] L. Shen, A. Kot, and W. Koo, “Quality measures of fingerprint images,” in IN: PROC. AVBPA, SPRINGER LNCS-2091, 2001, pp. 266–271.
[28] B. Lee, J. Moon, and H. Kim, “A novel measure of fingerprint image quality using the Fourier spectrum,” in Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, ser. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, A. K. Jain and N. K. Ratha, Eds., vol. 5779, Mar. 2005, pp. 105–112.
[29] Z. Yao, J. Le Bars, C. Charrier, and C. Rosenberger, “Quality assessment of fingerprints with minutiae delaunay triangulation,” in International Conference on Information Systems Security and Privacy (ICISSP), Feb 2015.
[30] N. K. Ratha and R. Bolle, Fingerprint image quality estimation. IBM TJ Watson Research Center, 1999.
[31] H. Fronthaler, K. Kollreider, and J. Bigun, “Automatic image quality assessment with application in biometrics,” in Computer Vision and Pattern Recognition Workshop, 2006. CVPRW’06. Conference on. IEEE, 2006, pp. 30–30.
Citation
Samiksha Suri, "Biometric Based on Fingerprint", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.5-13, 2018.
Credit Risk Management through Big Data Analytics
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.14-18, Jun-2018
Abstract
Credit risk remains till date one of the biggest and most challenging issue in the lending financial institutions. Credit risk refers to the probability of default which may occur if the liabilities are not fulfilled under the terms of the contract, resulting into the loss of the financial institution or banks (the creditor). Difficulties in credit risk management arise because the credit default occurs mostly, unexpectedly. The databases of the banks around the world have accumulated large quantities of information about clients and their financial and credit history. These databases can be used for the credit risk assessment, but they are generally high dimensional and traditional data analytics may not be able to handle such large volume of high dimensional data. How to develop a high-performance platform to efficiently analyze the Big Data Analytics (BDA) that can lead to better and more informed credit decisions? This study seeks to answer this question by discussing a macroscopic view of emerging Big Data techniques for addressing the vital issues of credit risk across the various sectors of finance and aim to identify the suitable BDA tools for the purpose of managing Credit Risk.
Key-Words / Index Term
Credit, Big, Risk, Hadoop, Finance
References
[1] Baliga, J., Ayre, R.W., Hinton, K. and Tucker, R.S., 2011. Green cloud computing: Balancing energy in processing, storage, and transport. Proceedings of the IEEE, 99(1), pp.149-167.
[2] Begoli, E., & Horey, J. (2012). Design principles for effective knowledge discovery from big data. Software architecture (WICSA) and european conference on software architecture (ECSA), 2012 joint working IEEE/IFIP conference on (pp. 215-218). IEEE.
[3] Begoli, E., & Horey, J. (2012). Design principles for effective knowledge discovery from big data. Software architecture (WICSA) and european conference on software architecture (ECSA), 2012 joint working IEEE/IFIP conference on (pp. 215-218). IEEE..
[4] Chen, Y., Chen, H., Gorkhali, A., Lu, Y., Ma, Y. and Li, L., 2016. Big data analytics and big data science: a survey. Journal of Management Analytics, 3(1), pp.1-42.
[5] Dragosavac,(2015)”Big Data Analytics for LendersandCreditors” https://www.kdnuggets.com/2015/10/big-data-analytics-lenders-creditors.
[6] Eccles, R., Herz, R., Keegan, M. and Phillips, D. (2001), “The risk of risk”, Balance Sheet, Vol. 9No. 3, pp. 28-33.energy in processing, storage, and transport, Proc. IEEE 99 (1) (2011) 149–167.
[7] Fatemi, A. and Fooladi, I. (2006), “Credit risk management: a survey of practices”, Managerial Finance, Vol. 32 No. 3, pp. 227-233.
[8] Flood, M.D., Jagadish, H.V. and Raschid, L., 2016. Big data challenges and opportunities in financial stability monitoring. Banque de France, Financial Stability Review, 20.
[9] Katal, A., Wazid, M. and Goudar, R.H., 2013, August. Big data: issues, challenges, tools and good practices. In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp. 404-409). IEEE.
[10] Klieštik, T. and Cúg, J., 2015. Comparison of selected models of credit risk. Procedia Economics and Finance, 23, pp.356-361.
[11] Lee, T.S., Chiu, C.C., Lu, C.J. and Chen, I.F., 2002. Credit scoring using the hybrid neural discriminant technique. Expert Systems with applications, 23(3), pp.245-254.
[12] Li, Y., Chen, W., Wang, Y., & Zhang, Z. L. (2013). Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In Proceedings of the sixth ACM international conference on Web search and data mining (pp. 657–666). ACM.
[13] Lin Z, Whinston AB, Fan S (2015) Harnessing Internet finance with innovative cyber credit management. Financial Innovation, 1(1), p.5.
[14] Lin, J. and Dyer, C., 2010. Data-intensive text processing with MapReduce. Synthesis Lectures on Human Language Technologies, 3(1), pp.1-177.
[15] Mashanovich,(2017)”Using Big Data and Predictive Analytics for Credit Scoring” https://dzone.com/articles/using-big-data-and-predictive-analytics-for-credit.
[16] Najafabadi, M.M., Villanustre, F., Khoshgoftaar, T.M., Seliya, N., Wald R.,Muharemagic, E., 2015a. Deep learning applications and challenges in big data analytics. Journal of Big Data, 2(1), p.1.
[17] Oreski, S., Oreski, D. and Oreski, G., 2012. Hybrid system with genetic algorithm and artificial neural networks and its application to retail credit risk assessment. Expert systems with applications, 39(16), pp.12605-12617.
[18] Oussous, A., Benjelloun, F.Z., Lahcen, A.A. and Belfkih, S., 2017. Big Data technologies: A survey. Journal of King Saud University-Computer and Information Sciences.
[19] Prekopcsak, Z., Makrai, G., Henk, T. and Gaspar-Papanek, C., 2011, June. Radoop: Analyzing big data with rapidminer and hadoop. In Proceedings of the 2nd RapidMiner community meeting and conference (RCOMM 2011) (pp. 1-12).
[20] Shvachko, K., Kuang, H., Radia, S. and Chansler, R., 2010, May. The hadoop distributed file system. In Mass storage systems and technologies (MSST), 2010 IEEE 26th symposium on (pp. 1-10). IEEE.
[21] Siddiqa, A., Hashem, I.A.T., Yaqoob, I., Marjani, M., Shamshirband, S., Gani, A. and Nasaruddin, F., 2016. A survey of big data management: Taxonomy and state-of-the-art. Journal of Network and Computer Applications, 71, pp.151-166.
[22] Singh, D. and Reddy, C.K., 2015. A survey on platforms for big data analytics. Journal of Big Data, 2(1), p.8.
[23] Spuchľaková, E., & Cúg, J. (2014). Lost Given Default and the Credit Risk. Proceedings of ICMEBIS 2014 International Conference on Management, Education, Business, and Information Science, Shanghai, China, EDUGait Press, Canada (pp. 12-15).
[24] Srinivasan, S. and Kamalakannan, T., 2017. Multi Criteria Decision Making in Financial Risk Management with a Multi-objective Genetic Algorithm. Computational Economics, pp.1-15.
[25] Terzi, D.S., Terzi, R. and Sagiroglu, S., 2015, December. A survey on security and privacy issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 202-207). IEEE.
[26] Thusoo, A., Sarma, J. S., Jain, N., Shao, Z., Chakka, P., Anthony, S., et al. (2009). Hive:a warehousing solution over a map-reduce framework. Proceedings of the VLDBEndowment, 2(2), 1626–1629.
[27] Uddin, M.F. and Gupta, N., 2014, April. Seven V`s of Big Data understanding Big Data to extract value. In American Society for Engineering Education (ASEE Zone 1), 2014 Zone 1 Conference of the (pp. 1-5). IEEE .Vol. 25 Issue: 4, pp.422-434.
[28] White, T., 2009. Hadoop: the definitive guide: the definitive guide:“O’Reilly Media, Inc.”.
Citation
Deepika Sharma , "Credit Risk Management through Big Data Analytics", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.14-18, 2018.
A Study of Internet Gratification among Youth
Review Paper | Journal Paper
Vol.06 , Issue.05 , pp.19-24, Jun-2018
Abstract
The present research was conducted to assess Internet Gratification among youth in the domains of Cognitive, Affective, Personal Integration, Social Integration and Escape. A sample of 400 youth (200 females and 200 males) in the age group of 20-25 years, seeking higher education, was selected from four Tehsils of Jammu District namely Bhalwal, Nagrota, Jourian, and Arnia. Multistage sampling technique was used to select the sample for the study. The tools used for the study were Self Devised Screening Device and Internet Gratification Questionnaire developed by Joorabchi et al (2013). The results of the study show that the mean age of the sample was 22.5 years. Results further revealed that most of the respondents showed High Level of Internet Gratification. Females show ‘High’ level, whereas males show ‘Moderate’ Level of Internet Gratification. Significant sex differences were observed on Cognitive, Affective, Escape and Overall Score of Internet Gratification.
Key-Words / Index Term
Youth, Internet Gratification, Cognitive, Affective, Escape, Personal Integration, Social-Integration, Gratification
References
[1]. Dhaha, I.S.Y., & Igale, A.B.(2013). Facebook usage among Somali Youth: A Test of Uses and Gratification Approach. International Journal of Humanities and social science, 3(3), 299-313
[2]. Ferguson, D. A., & Perse, E. M. (2000). The World Wide Web as a functional alternative to television. Journal of Broadcasting and Electronic Media, 44.
[3]. Hong, K.S., Ridzuan., A.A., & Kuek, M.K.(2003).Students attitude towards the use of the internet for learning: A study at a University in Malaysia. Journal of Educational Technology and Society, 6 (2), 45-49
[4]. Katz, E., Blumler, J.G., & Gurevitch, M.(1974).Utilization of Mass Communication by the individual. In J.G Blumler & E. (Eds.), The Uses of Mass Communications: Current Perspectives on Gratification research (19-32). Beverly Hills, CA: Sage.
[5]. Katz, E., Gurevitch, M., & Haas, H. On the Use of the Media for Important Things. American Sociological Review. 1973; 38(2):164-181
[6]. Park, N., Kee, K.F., & Valenzuela, S. (2009). Being immersed in a social networking environment: Facebook groups, uses and gratifications, and social outcomes. Journal of CyberPsychology and Behavior, 12(6), 729-733. DOI: 10.1089=cpb.2009.0003
[7]. Roy, S. K. (2009). Internet Uses and Gratifications: A survey in the Indian context. Journal of Computers in Human Behavior, 25(4), 878–886.
[8]. Rubin, A.M. (1994) Media uses and effects A uses and gratifications Perspective. In J. Brayant and D. Zillman (Eds.), Media Effects: Advances in theory and Research. Hillsdale, NJ: Erlbaum, 417-436.
[9]. Severin, W. J., & Tankard, J. W. (2001). Uses of the media. In Communication Theories. New York: Longman, 293-303.
[10]. 10. Sharma, S., & Sharma, N. (2017). Assessment of internet gratification among youth (20-25years) of Jammu district. International Journal of Advanced Scientific Research, 2(2)44-48
[11]. Joorabchi, T. N., Hassan, S.H., & Osman, M. N. (2013). Usage of Internet and its Effect on Youth Development. The Journal of the South- East Asia Research Centre for Communications and Humanities, 17(5), 43-82.
[12]. Valentine, A. (2011). Uses and gratifications of Facebook members 35 years and older. Master theses. Accessed August 15, 2018, from Pro Quest dissertations and theses database.
[13]. Whitening, A., & Williams, D.(2013) Why People Use Social Media: A Uses and Gratification Approach,’ Qualitative Market Research: An International Journal 16,(4), 362-369
Websites-
[14]. (www.shareyouressays.com)
[15]. (www.youthpolicy.org).
[16]. (https://en.wikipedia.org/wiki/usesand_gratification_theory)
[17]. (https://sustainabledevelopment.un.org)
[18]. (www.mospi.nic.in.reports/Youth_in_India-2017).
Citation
Sunali Sharma, Neeru Sharma, "A Study of Internet Gratification among Youth", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.19-24, 2018.
Least Migration Load Based Virtual Machine Selection Policy for Migration Process in Clouds
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.25-31, Jun-2018
Abstract
Migration of Virtual Machines is one of the efficient ways to manage resources in a Cloud Data Centre, dynamically, and reduce various runtime costs. But, sometimes, rigorous movement of virtual machines from over-utilized or under-utilized physical machines, results in performance degradation and service level agreement violation. Hence, it must be done carefully. A new virtual machine selection policy has been proposed in this paper which uses the concept of least deviation and resource satisfaction aspect for selection of a virtual machine which need to be migrated from overloaded servers in a cloud data centre. The proposed policy has been evaluated via extensive simulations by performing experiments on real workload traces from PlanetLab. The performance of proposed policy has been compared with already existing traditional policies for selection of virtual machine from over-utilized or under-utilized machines like Minimum Migration Time (MMT), Minimum Utilization (MU) and Random Selection (RS) available in CloudSim toolkit. The results show that the proposed policy outperforms the above mentioned policies on the basis of parameters like Power Consumption, SLA violation, No. of migrations, Energy Violation Metric.
Key-Words / Index Term
Cloud Data Centre, VM Selection, Energy Efficiency, Resource Satisfaction Aspect, QoS, SLAs, VM Consolidation and Redistribution
References
1. Mastroianni, C., Meo, M., & Papuzzo, G. (2013). Probabilistic consolidation of virtual machines in self-organizing cloud data centers. IEEE Transactions on Cloud Computing, 1(2), 215-228.
2. Kim, K. H., Beloglazov, A., & Buyya, R. (2009, November). Power-aware provisioning of cloud resources for real-time services. In Proceedings of the 7th International Workshop on Middleware for Grids, Clouds and e-Science (p. 1). ACM.
3. Jiang, J., Feng, Y., Parmar, M., & Li, K. (2016). FP-ABC. Scientific Programming, 2016, 13.
4. Sharifi, M., Salimi, H., & Najafzadeh, M. (2012). Power-efficient distributed scheduling of virtual machines using workload-aware consolidation techniques. The Journal of Supercomputing, 61(1), 46-66.
5. Akiyama, S., Hirofuchi, T., Takano, R., & Honiden, S. (2012, June). Miyakodori: A memory reusing mechanism for dynamic vm consolidation. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on (pp. 606-613). IEEE.
6. Fu, X., & Zhou, C. (2015). Virtual machine selection and placement for dynamic consolidation in Cloud computing environment. Frontiers of Computer Science, 9(2), 322-330.
7. Gao, Y., Guan, H., Qi, Z., Hou, Y., & Liu, L. (2013). A multi-objective ant colony system algorithm for virtual machine placement in cloud computing. Journal of Computer and System Sciences, 79(8), 1230-1242.
8. Li, K., Zheng, H., & Wu, J. (2013, November). Migration-based virtual machine placement in cloud systems. In Cloud Networking (CloudNet), 2013 IEEE 2nd International Conference on (pp. 83-90). IEEE.
9. R. N. Calheiros, R. Ranjan, A. Beloglazov, C.A. F. De Rose, and R. Buyya, “CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, ”Software: Practice and Experience, vol. 41, no.1, pp.23–50,2011.
10. A. Boglazov, Energy-Efficient Management of Virtual Machines in Data Centres for Cloud Computing, The University of Melbourne, Victoria, Australia, 2013.
11. PlanetLab,http://planet-lab.org/.
12. Beloglazov, A., & Buyya, R. (2010, May). Energy efficient resource management in virtualized cloud data centers. In Proceedings of the 2010 10th IEEE/ACM international conference on cluster, cloud and grid computing (pp. 826-831). IEEE Computer Society.
13. Bala, M., & Padha, D. (2017). An Adaptive Overload Detection Policy Based on the Estimator Sn in Cloud Environment. International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 8(3), 93-107.
Citation
Minu Bala, "Least Migration Load Based Virtual Machine Selection Policy for Migration Process in Clouds", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.25-31, 2018.
Gaze Direction and Estimation Model Based on Iris Center Coordinates
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.32-37, Jun-2018
Abstract
An appearance cum feature based iris center gaze detection model viz. Iris Center Based Gaze Estimation (ICGE) is proposed to detect the direction of gaze quadrants to overcome certain limitations like dependency on light sources, multiple glint formation, no formation of glint etc, observed in glint based gaze quadrant detection models. The model works on the adaptive thresholding technique for the detection of the iris center coordinates using more than two hundred images from an indigenous database of different subjects on a five quadrants map screen. The model works with the Circular Hough Transform (CHT) for localising circles in the eye images and then center coordinates on the iris edge for further detection of gaze quadrants. Gaze directions of five different positions of iris are estimated on a mapped screen within the eye region. The model generates almost ninety percent accurate results for correct iris and gaze quadrant detection. The distinguishing features of the low cost, non intrusive proposed model include non IR and affordable ubiquitous hardware designing, large subject-camera distance and screen dimensions, no glint dependency etc. The proposed model also shows significantly better results in the lower periphery corners of the quadrant map. The proposed model may be more suitable for interactive applications for healthy users who cannot use head and hands freely while doing other tasks or disabled users who have no movement in their hands and head etc.
Key-Words / Index Term
Iris Center Based Gaze Estimation (ICGE) model, adaptive thresholding, iris center, gaze quadrant detection
References
[1] D.W. Hansen and Q. Ji, “In the eye of the beholder: A survey of models for eyes and gaze”, IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol. 32, No. 3, pp. 478-500, 2010.
[2] C. Djeraba, A. Labelak, and Y. Benabbas, “Estimation of visual gaze, In Multi-Modal User Interactions in Controlled Environments”, chap. 4, pp. 99-141, Springer Science + Business Media, New York, 2010.
[3] M. Ohtani and Y. Ebisawa, “Eye gaze detection based on the pupil detection technique using two light sources and the image difference method”, IEEE-EMBC and CMBEC, Theme 7: Instrumentation, pp. 1623-1624,1995.
[4] D. Kaur et al., “Various image segmentation techniques: A review”, International Journal of Computer Science and Mobile Computing, Vol. 3, No. 5, pp. 809-814, 2014.
[5] L. Świrski, A. Bulling, and N. Dodgson, “Robust real-time pupil tracking in highly off-axis images”, In the Proceedings of the Symposium on Eye Tracking Research and Applications, pp. 173-176, 2012.
[6] J. Sigut and S. Sidha, “Iris center corneal reflection method for gaze tracking using visible light”, IEEE Trans. on Biomed. Eng., Vol 58, Issue 2, pp. 411-419, 2010, [doi: 10.1109/ TBME.2010.2087330].
[7] D. Kimmel, D. Mammo, and W. Newsome, “Tracking the eye non-invasively: simultaneous comparison of the scleral search coil and optical tracking techniques in the macaque monkey”, Frontiers in Behavioural Neuroscience, Vol. 6, No. 49, pp. 312-331, 2012.
[8] P. D. Prasad, “Iris recognition”, Department of Computer Science & Engineering, National Institute of Technology, Thesis for Bachelor of Technology, 2005.
[9] A. Sharma and P. Abrol, “Direction estimation model for gaze controlled systems”, Journal of Eye Movement Research, Vol. 9, Issue 6, No. 5, pp. 1-12, 2016, [doi: 10.16/910//jemr.9.6.5].
[10] J. W. Ryan et al., “Adapting starburst for elliptical iris segmentation”, In the Proceedings of IEEE Second International Conference on Biometrics: Theory, Applications and Systems, 2008.
[11] S. Shah and A. Ross, “Iris segmentation using geodesic active contours,” IEEE Trans. on information forensic and security, Vol 4, Issue 4, 2009.
[12] "Adaptive thresholding," (Accessed on 15 Dec 2016). [http://www.123HelpMe.com/view.asp?Id= 50915]
[13] A. Sharma and P. Abrol, “Comparative analysis of edge detection operators for better glint detection”, In the Proceedings of 9th INDIACOM in 2nd International Conference on Computing for Sustainable Global Development, IEEExplore digital library. ISBN 978-9-3805-4415-1, pp. 973-977, 2015.
[14] T. Moravcik, “An approach to iris and pupil detection in eye image”, XII International PhD Workshop OWD, pp. 239-242, 2010.
[15] W.M Khairosfaizal and.A.J. Noraini, “Eyes detection in facial images using Circular Hough Transform”, In the Proceedings of 5th International Colloquium on Signal Processing & Its Applications, CSPA, pp. 238-242, 2009.
[16] N. Avazpour and M. Emadi, “Iris recognition methods: A Review” International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 11, pp. 527-534, 2016.
[17] S. M. Zadeh and A. Harimi, “Iris localization by means of adaptive thresholding and Circular Hough Transform ”, Journal of Artificial Intelligence and Data Mining, Vol. 5, No. 1, pp. 21-28, 2017, [doi: 10.22044/jadm.2016.731]
[18] M. Abdullah, S. Dlay, W. Woo and J. Chambers, “Robust iris segmentation method based on a new active contour force with a non-ideal normalization”, IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 99, pp. 1-14, 2016, [doi: 10.1109/ TSMC.2016.2562500].
[19] Y. Mingxin et al., “An easy iris center detection method for eye gaze tracking system,” Journal of Eye Movement Research, Vol. 8, issue 3, No. 5, pp. 1-20, 2015, [doi: 10.16910/jemr.8.3.5].
[20] A. Sharma and P. Abrol, “Evaluating Interactivity with respect to Distance and Orientation Variables of GDE Model,” In the Proceedings of the Springer International Congress on Information and Communication Technology (Advances in Intelligent Systems and Computing), 438, Springer Singapore, pp. 177-187, 2015, [doi: 10.1007/978-981-10-0767-5_20].
[21] D. Bradley and G. Roth, “Adaptive thresholding using the integral image,” Carleton University, Canada, Journal of Graphics Tools, NRC 48816, Vol. 12, issue 2, pp. 13-21, 2007.
Citation
Anjana Sharma, Pawanesh Abrol, "Gaze Direction and Estimation Model Based on Iris Center Coordinates", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.32-37, 2018.
Biometric Feature Template Security Schemes: An Overview
Review Paper | Journal Paper
Vol.06 , Issue.05 , pp.38-42, Jun-2018
Abstract
Biometric systems are contemporary tools for human recognition, where the identity of the user is established by using his/her biological, behavioral or chemical characteristics. Biometric based systems are used to overcome many challenges of the traditional based systems. The important information of the biological traits of a user is stored into a database. In the recent past, it has been observed that the security of such biometric systems may be breached in many ways. In this paper, a brief review of various feature template security schemes has been presented. The presented study shows that template security scheme for a particular biometric system may not be suitable for its counterparts. Furthermore, it is revealed that the design of an efficient and accurate template security schemes for a biometric-based application satisfying all the ideal characteristics is still a challenge for the research community.
Key-Words / Index Term
Biometrics, Security, Feature Template, Biometric-based applications, Biometric Cryptosystems
References
[1] A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A tool for information security,” IEEE Trans. Inf. Forensics Secur., vol. 1, no. 2, pp. 125–143, 2006.
[2] N. K. Ratha, J. H. Connell, and R. M. Bolle, “An Analysis of Minutiae Matching Strength,” Audio- Video-Based Biometric Pers. Authentication, vol. 2091, pp. 223–228, 2001.
[3] K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP J. Adv. Signal Process., vol. 2008, 2008.
[4] K.-Y. Chee et al., “Cancellable Speech Template via Random Binary Orthogonal Matrices Projection Hashing,” Pattern Recognit., 2017.
[5] D. Sadhya and S. K. Singh, “Providing robust security measures to Bloom filter based biometric template protection schemes,” Comput. Secur., vol. 67, pp. 59–72, 2017.
[6] M. Gomez-Barrero, E. Maiorana, J. Galbally, P. Campisi, and J. Fierrez, “Multi-biometric template protection based on Homomorphic Encryption,” Pattern Recognit., vol. 67, pp. 149–163, 2017.
[7] A. Selwal, S. K. Gupta, and Surender, “Low overhead octet indexed template security scheme for the multi-modal biometric system,” J. Intell. Fuzzy Syst., vol. 32, no. 5, pp. 3325–3337, 2017.
[8] M. H. Lim, S. Verma, G. Mai, and P. C. Yuen, “Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection,” Pattern Recognit., vol. 60, pp. 706–719, 2016.
[9] A. Selwal, S. K. Gupta, Surender, and Anubhuti, “Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry,” Perspect. Sci., vol. 8, pp. 705–708, 2016.
[10] F. S. Assaad and G. Serpen, “Transformation-based Score Fusion Algorithm for Multi-modal Biometric User Authentication through Ensemble Classification,” Procedia Comput. Sci., vol. 61, pp. 410–415, 2015.
[11] L. Lu and P. J., “Finger multi-biometric cryptosystem using feature-level fusion,” Int. J. Signal Process. Image Process. Pattern Recognit., vol. 7, no. 3, pp. 223–236, 2014.
[12] M. V. N. K. Prasad and C. Santhosh Kumar, “Fingerprint template protection using multiline neighboring relation,” Expert Syst. Appl., vol. 41, no. 14, pp. 6114–6122, 2014.
[13] Z. Jin, A. B. Jin Teoh, T. S. Ong, and C. Tee, “Fingerprint template protection with minutiae-based bit-string for security and privacy-preserving,” Expert Syst. Appl., vol. 39, no. 6, pp. 6157–6167, 2012.
[14] A.GHANY Kareem Kamal, A.Moneim Mahmood, Ghali Neveen I., Hassanien Aboul Ella, and Hefny Heshfile, “A Symmetric Bio-Hash Function Based On Fingerprint Minutiae And Principal Curves Approach,” 3rd Int. Conf. Mech. Electr. Technol. ( ICMET2011), no. February 2014, 2011.
[15] B. J. Kang and K. R. Park, “Multimodal biometric method based on vein and geometry of a single finger,” IET Comput. Vis., vol. 4, no. 3, p. 209, 2010.
Citation
Sheikh Imroza Manzoor, Arvind Selwal, "Biometric Feature Template Security Schemes: An Overview", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.38-42, 2018.
Pragmatic Aspects of Token-based Technique in Detecting Source Code Duplicates
Research Paper | Journal Paper
Vol.06 , Issue.05 , pp.43-49, Jun-2018
Abstract
Clone research community has described several techniques to detect code duplicates present in the code base, mainly categorized into four classes viz. textual or text-based techniques, lexical or token-based techniques, syntactic techniques (including tree-based and metrics-based approaches) and semantic techniques. Literature lists various clone detector tools based on each category capable of detecting clones in batch mode as well as in real-time development environment. But, most of the tools use tokens as their intermediate representation of the source code upon which clone detection algorithms are applied. Thus, this paper will focus on this token-based intermediate representation and its pragmatic aspects towards code duplication detection. By discussing the practical process of converting source code into tokens as an intermediate code representation and how code duplicates are detected, authors will put light on the obscured pros and cons of this token-based approach that will help researchers to select as well as implement, or reject this approach as an intermediate representation for their duplication detection algorithms.
Key-Words / Index Term
Code Clone Detection, Clone Detection Techniques, Token-based Clone Detection Technique
References
[1] Ira D. Baxter, Andrew Yahin, Leonardo Moura, Marcelo Sant` Anna, and Lorraine Bier, "Clone Detection Using Abstract Syntax Tree," in Proceedings of 14th International Conference on Software Maintenance(ICSM`98), Bethesda, Mayland, 1998, pp. 368 - 377.
[2] Stefan Bellon, Rainer Koschke, Giuliano Antoniol, Jens Krinke, and Ettore Merlo, "Comparision and Evaluation of Clone Detection Tools," IEEE Transaction on Software Engineering, vol. 33, no. 9, pp. 577 - 591, 2007.
[3] Chanchal K. Roy and James R. Cordy, "A Survey on Software Clone Detection Research," Queen`s University, Kingston, Technical Report 2007-541, 2007.
[4] Miryung Kim, Lawrence Bergman, Tessa Lau, and David Notkin, "An Ethnographic Study of Copy and Paste Programming Practices in OOPL," in Proceedings of the 2004 International Symposium on Empirical Software Engineering (ISESE’04), Redondo Beach, CA, USA, USA, 2004.
[5] Minhaz F. Zibran, Ripon K. Saha, Muhammad Asaduzzaman, and Chanchal K. Roy, "Analysing and Forecasting Near-miss Clones in Evolving Software: An Empirical Study," in Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, Las Vegas, USA, 2011, pp. 295-304.
[6] M. F. Zibran and Chanchal Kumar Roy, "The Road to Software Clone Management: A Survey," Department of Computer Science, University of Saskatchewan, Canada, Technical Report 2012.
[7] Toshihiro Kamiya, Shinji Kusumoto, and Katsuro Inoue, "CCFinder: A Multilinguistic Token-Based Code Clone Detection System For Large Scale Source Code," IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 654-670, July 2002.
[8] Brenda Baker, "On Finding Duplication and Near Duplication in Large Software Systems," in Proceedings of the 2nd Working Conference on Reverse Engineering (WCRE`95), 1995, pp. 86 - 95.
[9] Zhenmin Li, Shan mar, Yuanyuan ZohuLu, and Suvda Myag, "CP-Miner: Finding Copy Paste and Related Bugs in Large Scale Software Code," IEEE Transaction on Software Engineering, vol. 32, no. 3, pp. 176 - 192, March 2006.
[10] Wikipedia.[Online]. https://en.wikipedia.org/wiki/Lexical_analysis
[11] Alfred V. Aho, Monica S. Lam, and Jeffrey D. Ullman Ravi Sethi, Compilers: Principles, Techniques, and Tools, 2nd ed.: Pearson.
[12] Raimer Falke, Pierre Frenzel, and Rainer Koschke, "Empirical Evaluation of Clone Detection using Syntax Suffix Trees," Empirical Software Engineering, vol. 13, no. 6, pp. 601 - 643, July 2008.
[13] Elizabeth Burd and John Bailey, "Evaluating Clone Detection Tools for Use during Preventative Maintenance," in Proceedings of the Second IEEE International Workshop on Source Code Analysis and Manipulation (SCAM `02), Montreal, Canada, 2002, pp. 36-43.
[14] M. Rieger, "Effective Clone Detection without Language Barriers," University of Bern, Switzerland, Dissertation 2005.
[15] Chanchal Kumar Roy, James Cordy, and Rainer Koschke, "Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Quantitative Approach," Science of Computer Programming, vol. 74, no. 7, pp. 470 - 495, March 2009.
Citation
S. Bharti, H. Singh, "Pragmatic Aspects of Token-based Technique in Detecting Source Code Duplicates", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.43-49, 2018.
Live Virtual Machine Migration Techniques, Survey and Research Challenges
Survey Paper | Journal Paper
Vol.06 , Issue.05 , pp.50-53, Jun-2018
Abstract
Cloud computing is a vibrant technology in today’s world. It delivers a platform independent service which is reliable, scalable, on demand etc. Cloud computing rely on allocating resources to achieve reliability and economy of extent similar to utility, Virtualization is key concept of cloud computing, it is a technique which allow multiple operating system run simultaneously on single physical server, it is used for balancing the loads on servers, managing the fault occurred and uses comprehensive strategy for energy consumption and system maintenance. There are two type of techniques used in migration i.e., pre copy and post copy, this research paper discusses study of various types of VM live migration, their classifications and relative scrutinizing of these methodologies and challenges in migrating virtual machine.
Key-Words / Index Term
Pre-copy, virtualization, post-copy, cloud computing
References
[1] C. Clark et al., “Live migration of virtual machines,” NSDI’05 Proc. 2nd Conf. Symp. Networked Syst. Des. Implement., no. Vmm, pp. 273–286, 2005.
[2] M. M. R. Hines, U. Deshpande, and K. Gopalan, “Post-copy live migration of virtual machines,” ACM SIGOPS Oper. Syst., vol. 43, no. 3, p. 14, 2009.
[3] M. S. Lain, “Optimizing the Migration of Virtual Computers,” pp. 377–390.
[4] W. Huang, Q. Gao, J. Liu, and D. K. Panda, “High Performance Virtual Machine Migration with RDMA over Modern Interconnects,” pp. 11–20, 2015.
[5] Y. Luo, B. Zhang, X. Wang, Z. Wang, Y. Sun, and H. Chen, “Live and Incremental Whole-System Migration of Virtual Machines Using Block-Bitmap,” pp. 99–106, 2008.
[6] R. Bradford, E. Kotsovinos, A. Feldmann, and H. Schi, “Live Wide-Area Migration of Virtual Machines Including Local Persistent State,” pp. 169–179, 2007.
[7] W. Voorsluys, J. Broberg, and S. Venugopal, “Cost of Virtual Machine Live Migration in Clouds : A Performance Evaluation,” pp. 1–12.
[8] M. R. Desai and H. B. Patel, “Efficient virtual machine migration in cloud computing,” Proc. - 2015 5th Int. Conf. Commun. Syst. Netw. Technol. CSNT 2015, no. Vm, pp. 1015–1019, 2015.
[9] Z. Liu, W. Qu, T. Yan, H. Li, and K. Li, “Hierarchical Copy Algorithm for Xen live migration,” Proc. - 2010 Int. Conf. Cyber-Enabled Distrib. Comput. Knowl. Discov. CyberC 2010, pp. 361–364, 2010.
[10] H. Jin, L. Deng, S. Wu, X. Shi, and X. Pan, “Live Virtual Machine Migration with Adaptive Memory Compression,” 2009.
[11] F. Ma, F. Liu, and Z. Liu, “Live Virtual Machine Migration based on Improved Pre-copy Approach,” pp. 230–233, 2010.
Citation
Sheetal Kumar, Deepti Malhotra, "Live Virtual Machine Migration Techniques, Survey and Research Challenges", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.50-53, 2018.
Study of Various Reactive Fault Tolerance Techniques in Cloud Computing
Review Paper | Journal Paper
Vol.06 , Issue.05 , pp.54-58, Jun-2018
Abstract
Cloud is large, complex and distributed in nature. It has many features like availability, Reliability and performance of the cloud. Due to its large size and complex nature it is prone to various types of fault and failure like data unavailable, data deletion or corruption etc. Cloud are made as fault tolerant system that tolerate any imminent fault or failure, but still sometime fault happens that disrupts the normal service of cloud. Many researchers gave different technique like replication, checkpointing , Retry ,resubmission etc. to tolerate the failure. In this paper, study of various reactive fault tolerance techniques has been done and after analysis conclusion is presented with some future scope.
Key-Words / Index Term
Replication, Checkpointing, Resubmission, Reliability
References
[1] S. Prathiba and S. Sowvarnica, “Survey of failures and fault tolerance in cloud,” in 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), 2017, pp. 169–172.
[2] G. R. Kalanirnika and V. M. Sivagami, “Fault
Tolerance in Cloud Using Reactive and Proactive
Techniques,” Int. J. Comput. Sci. Eng. Commun., vol. 3, no. 3, pp. 1159–1164, 2015.
[3] S. Kadekodi, “A Compression in Checkpointing and Fault Tolerance Systems,” ACM Ref. Format Saurabh Kadekodi ACM Trans. Em-bedd. Comput. Syst. V, N, Artic. A, vol. 8, 2013.
[4] A. Rajalakshmi, D. Vijayakumar, and K. G.
Srinivasagan, “An improved dynamic data replica selection and placement in cloud,” 2014 Int. Conf.
Recent Trends Inf. Technol. ICRTIT 2014, vol. 3, no.
3, 2014.
[5] A. M. Saleh and J. H. Patel, “Transient-Fault Analysis for Retry Techniques,” IEEE Trans. Reliab., vol. 37, no. 3, pp. 323–330, 1988.
[6] Y. Kwon, M. Balazinska, and A. Greenberg, “Fault-tolerant Stream Processing using a Distributed,
Replicated File System.”
[7] T. Nadu, “Fault tolerant workflow scheduling based on replication and resubmission of tasks in Cloud
Computing,” Int. J. Comput. Sci. Eng., vol. 4, no. 6,
pp. 996–1006, 2012.
[8] L. M. M. Visuwasam, “Checkpoint-based Intelligent
Fault tolerance For Cloud Service Providers,” no. 2,
pp. 59–64, 2012.
[9] Q. Wei, B. Veeravalli, B. Gong, L. Zeng, and D. Feng, “CDRM: A Cost-Effective Dynamic Replication Management Scheme for Cloud Storage
Cluster,” in 2010 IEEE International Conference on Cluster Computing, 2010, pp. 188–196.
[10] G. Yao, Y. Ding, and K. Hao, “Using Imbalance
CharacteristicforFault-TolerantWorkflow
[11] Scheduling in Cloud Systems,” IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 12, pp. 3671–3683, Dec. 2017.
[12] E. AbdElfattah, M. Elkawkagy, and A. El-Sisi, “A reactive fault tolerance approach for cloud computing,” in 2017 13th International Computer Engineering Conference (ICENCO), 2017, pp. 190– 194.
[13] M. K. Gokhroo, M. C. Govil, and E. S. Pilli,“Detecting and mitigating faults in cloud computing environment,” 3rd IEEE Int. Conf. , 2017.
[14] V. B. Souza, X. Masip-Bruin, E. Marin-Tordera, W.Ramirez, and S. Sanchez-Lopez, “Proactive vs reactive failure recovery assessment in combined Fog-to-Cloud (F2C) systems,” in 2017 IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2017, pp. 1–5.
[15] P. Padmakumari, A. Umamakeswari, and M.Akshaya, “Hybrid Fault Tolerant Scheme to Manage VM Failure in the Cloud,” Indian J. Sci. Technol. ISSN, no. 948, pp. 974–6846, 2016.
[16] O. Subasi, G. Yalcin, F. Zyulkyarov, O. Unsal, and J.Labarta, “Designing and Modelling Selective Replication for Fault-Tolerant HPC Applications,” Proc. - 2017 17th IEEE/ACM Int. Symp. Clust. Cloud Grid Comput. CCGRID 2017, pp. 452–457, 2017.
Citation
Atul Kumar, Deepti Malhotra, "Study of Various Reactive Fault Tolerance Techniques in Cloud Computing", International Journal of Computer Sciences and Engineering, Vol.06, Issue.05, pp.54-58, 2018.