Enhanced User Interest Level Preprocessing Technique for Efficient Web Page Recommendation
Research Paper | Journal Paper
Vol.4 , Issue.7 , pp.66-71, Jul-2016
Abstract
Web based applications play a major role in people day to day activities. Monitoring the users actions are really an interesting and necessary job of the website forecaster to familiarize about their performance, classify the likeminded users, understand the website visitor’s browsing history, reconstruct the website, web recommendation and web personalization. Web logs are the main source to provide sufficient information about the users and achieve the above requirements. Pattern discovery algorithms are applied to the web logs to extract the desirable information. It is mandatory for website analyst to understand the user behavior and interest for many analytical purposes. Web logs take an important role to know about the user behavior. Several pattern mining techniques were developed to understand the user behavior. But, there are no special preprocessing techniques to identify the user interest level and understand their browsing patterns. A special kind of preprocessing technique is needed to improve the quality and efficiency of the pattern mining algorithms. The proposed preprocessing technique performs the preprocessing activities on web logs and also identifies the similar kind of users. The user similarity helps for efficient web page recommendation technique.
Key-Words / Index Term
Web logs; Preprocessing; Data Cleaning; User Identification; Session Identification; Web page recommendation
References
[1] Chhavi, R, 2012, “A Study of Web Usage Mining Research Tool”, International Journal of Advanced Networking and Applications, vol. 3, no. 6, pp. (1422-1429), 2012.
[2] Raju, GT & Sathyanarayana, PS, “Knowledge Discovery from Web Usage Data: Complete Preprocessing Methodology”, International Journal of Computer Science and Network Security, vol. 8, no.1, pp.(179-186), 2008.
[3] Sanjay, BT & Sangram, ZG, “An Effective and Complete Preprocessing for Web Usage Mining”, International Journal on Computer Science and Engineering, vol. 2, no. 3, pp. (848-851), 2010.
[4] Srivastava, J, Desikan, P & Kumar, V, “Web Mining - Concepts, Applications and Research Directions”, AHPCRC Technical Report, pp. (51-70), 2003.
[5] Ramya, C & Shreedhara, KS, “Clustering of Web Users using ART1 NN based Clustering Approach with a Complete Preprocessing Methodology”, International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 1, pp. (71-77), 2012.
[6] Sheetal, AR & Shailendra, J, “Efficient Preprocessing Technique using Web Log Mining”, International Journal of Advancements in Research & Technology, vol. 1, no. 6, pp.(418-422), 2012.
[7] Malarvizhi, M & Sahaaya, AM, “Preprocessing of Educational Institution Web Log Data for Finding Frequent Patterns using Weighted Association Rule Mining Technique”, European Journal of Scientific Research, vol. 74, no. 4, pp. (617-633), 2012.
[8] Cooley, R, “Web Usage Mining: Discovery and Application of Interesting Patterns from Web Data”, Ph.D. thesis, University of Minnesota, 2000.
[9] Chitraa, V & Antony, SD, “A Novel Technique for Sessions Identification in Web Usage Mining Preprocessing”, International Journal of Computer Applications, vol. 34, no. 9, pp. (78-83), 2011.
[10] Tasawar, H, Sohail, A & Nayyer, M, “Web Usage Mining: A Survey on Preprocessing of Web Log File”, IEEE Conference on Information and Emerging Technologies, pp. (1-6), 2010.
[11] Mohd, HW, Mohd, NM, Hafizul, FH, Mohamad, F & Mohamad, M , “Data Pre-processing on Web Server Logs for Generalized Association Rules Mining Algorithm”, Proceedings of World Academy of Science, Engineering and Technology, vol. 36, pp. (970-977), 2010.
[12] Vijayashri, L & Madhuri, J, “Data Preprocessing in Web Usage Mining”, Proceeding in International Conference on Artificial Intelligence and Embedded Systems, pp. (1-5), 2012.
[13] Suguna, R & Sharmila, D, “User Interest Level based Preprocessing Algorithms using Web Usage Mining”, International Journal of Computer Science and Engineering (IJCSE), vol. 5, no. 9, pp. (815-822), 2013.
Citation
R. Suguna, "Enhanced User Interest Level Preprocessing Technique for Efficient Web Page Recommendation," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.66-71, 2016.
A Result Base Various Approaches of Data Security in Cloud Computing
Research Paper | Journal Paper
Vol.4 , Issue.7 , pp.72-75, Jul-2016
Abstract
In this paper we are studied cloud computing techniques. The Homomorphic property of various cryptosystems can be used to create secure voting systems, collision-resistant hash functions, and private information retrieval schemes and enable widespread use of cloud computing by ensuring the confidentiality of processed data.
Key-Words / Index Term
Encryptions, security, compression, validate data integrity
References
[1] Ahmed DheyaaBasha, Irfan Naufal Umar, and Merza Abbas, Member, IACSIT “Mobile Applications as Cloud Computing: Implementation and Challenge”, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, pp 467 – 471, 2013.
[2] Alabbadi, M.M “Cloud computing for education and learning: Education and learning as a service (ELaaS)”, IEEE Conf. on Interactive Collaborative Learning (ICL), vol.134 , PP 589 – 594, 2011.
[3] Cong Wang, Qian Wang, Kui Ren and Wenjing Lou “Ensuring Data Storage Security in Cloud Computing”, IEEE conf. on Parallel Distributed and Grid Computing (PDGC), pp.1-9, 2009.
[4] Farzad Sabahi, “Cloud Computing Security Threats and Responses”, IEEE Trans. on Cloud Computing., vol. 11, no. 6, pp. 670 - 684, 2002.
[5] Gaurav Raj, Dheerendra Singh, Abhay Bansal, “Load balancing for resource provisioning using Batch Mode Heuristic Priority in Round Robin (PBRR) Scheduling”, Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), pp. 308 – 314, 2012.
[6] Jianfeng Yang, Zhibin Chen “Cloud Computing Research and Security Issues” Computational Intelligence and Software Engineering (CiSE), Vol. 978-1-4244-5392, pp 1 – 3, 2010.
[7] Jaber, A.N. “Use of cryptography in cloud computing”, IEEE Control System, Computing and Engineering (ICCSCE), PP 179 – 184, 2013.
[8] Kalagiakos, P. Karampelas, P “Cloud computing learning” IEEE Application of Information and Communication Technologies (AICT), pp. 1 – 4, 2011.
[9] Mehmet Yildiz, Jemal Abawajy, Tuncay Ercan and Andrew Bernoth “A Layered Security Approach for Cloud Computing Infrastructure” 2009 10th International Symposium on Pervasive Systems, pp 763 – 767, 2009.
[10] Md. Imrul Kayeset al. “Test Case Prioritization for Regression Testing Based on Fault Dependency” 2009 10th International Symposium on Pervasive Systems,pp.3-11, 2013
[11] Mohammed Achemlal, Saıd Gharoutand Chrystel Gabber “Trusted Platform Module as an Enabler for Security in Cloud Computing” Network and Information Systems Security (SAR-SSI),, Vol. 978-1-4577-0737, pp.7-11, 2011.
[12] Sravan Kumar R, AshutoshSaxena “Data Integrity Proofs in Cloud Storage”, 2011 Third International Conference on Communication Systems and Networks, Vol. 978-0-7695-4355,pp.03/11, 2011.
[13] Qiang Guan, Chi-Chen Chiu, Song Fu “A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures”IEEE International Conference on Dependable Computing, pp. 11 – 20, 2012.
[14] RuWei Huang, Si Yu, Wei Zhuang and Xiao Lin Gui, “Design of Privacy-Preserving Cloud Storage Framework" IEEE Ninth International Conference on Grid and Cloud Computing, pp. 128 – 132,2010,
[15] RuWei Huang, Si Yu, Wei Zhuang and Xiao Lin Gui, “Research on Privacy-Preserving Cloud Storage Framework Supporting Cipher text Retrieval"IEEE Ninth International Conference on Grid and Cloud Computing,pp.6-10,2011.
[16] Ranjita Mishra, Sanjit Kumar Dash “A Privacy Preserving Repository for Securing Data across the Cloud” IEEE International Conference, Vol 978-1-4244-8679, pp.6-10, 2011.
[17] Ryan K. L. Ko, Markus Kirch berg, Bu Sung Lee “From System-centric to Data-centric Logging –Accountability, Trust & Security in Cloud Computing” IEEE International Conference on Computer Society,pp. 1 – 4, 2011.
[18] Sang-Ho Na, Jun-Young Park, Eui-Nam Huh “Personal Cloud Computing Security Framework” IEEE Asia-Pacific Services Computing Conference,pp. 671 - 675 ,2010.
[19] Shucheng Yu, CongWang, Kui Ren and Wenjing Lou “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing” at IEEE INFOCOM ,pp. 1 - 9 ,2010.
[20] Sravan Kumar R, AshutoshSaxena “Data Integrity Proofs in Cloud Storage” IEEE International Conference on Communication Systems and Networks,Vol. 978-0-7695-4355,pp. 1 – 4, 2011.
[21] Sheikh, F.B., Haider, S., “Security threats in cloud computing”, IEEE International Conference Internet Technology and Secured Transactions, pp.214 – 219, 2011.
[22] Sabahi, F., Shahrekord, “Cloud computing security threats and responses”, IEEE International Conference on Communication Software and Networks, pp.245 – 249, 2011.
[23] Uma Somani, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing," IEEE 1st International Conference on Parallel, Distributed and Grid Computing,pp.234-238 ,2010.
[24] Victor Echeverr´ıa, Lorie M. Liebrock, and Dongwan Shin “Permission Management System: Permission as a Service in Cloud Computing” IEEE Computer Software and Applications Conference Workshops,pp. 371 – 375, 2010.
[25] Wang En Dong “Oriented Monitoring Model of Cloud Computing Resources Availability”, IEEE International Conference on Computational and Information Sciences, vol. 13874396, pp.1537 – 1540, 2013.
[26] Wentao Liu, Wuhan Poly tech., “Research on cloud computing security problem and strategy”, IEEE International Conference on Consumer Electronics, Communications and Networks, pp.1216 – 1219, 2012.
[27] Xiao Zhang, Hong-tao Du ,Jian-quan Chen, Yi Lin, Lei-jie Zeng “Ensure Data Security in Cloud Storage” IEEE International Conference on Network Computing and Information Security vol.978-0-7695-4355pp.284-287,2011.
Citation
Gurbachan Singh, Khushboo Bansal, "A Result Base Various Approaches of Data Security in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.72-75, 2016.
Review of Various VANET Protocols Using NS-2 Simulator
Review Paper | Journal Paper
Vol.4 , Issue.7 , pp.76-80, Jul-2016
Abstract
Vehicular Ad-Hoc Networks are growing field of research. In this network most promising task is provide safety or other application to driver and passenger. It became key component of transportation. In this paper different routing protocol like AODV, DSR and M-DART are studied. At the end of paper outcomes of these protocols are discussed.
Key-Words / Index Term
AODV; VANET; DSR RREQ; RREP.; M-DART
References
[1] Chaoyi Bian, Tong Zhao, Xiaoming Li, Wei Yan, “Boosting Named Data Networking For Data Dissemination In Urban VANET Scenarios”, Elsevier Vehicular Communications 2 (2015) 195-207.
[1] Rawa Adla, Nizar Al-Holou, Mohannad Murad, Youssef A. Bazzi, “Automotive Collision Avoidance Methodologies”, 978-1-4799-0792-2/13 IEEE, 2013.
[2] Moez Jerbi, Sidi-Mohammed Senouci, Rabah Meraihi and Yacine Ghamri-Doudane, “An Improved Vehicular Ad Hoc Routing Protocol for City Environments”, IEEE ICC 2007.
[3] Tajinder Kaur, A.K Verma, “Simulation and Analysis of AODV routing protocol in VANETs”, IJSCE International Journal of Soft Computing and Engineering ISSN: 2231-2307, vol-2, Issue-3, July 2012.
[4] Evjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Vladi Kolici and Makoto Takizawa, “Sixth International Conference on Complex, Intelligent and Software Intensive Systems”, 2012.
[5] Narendra Mohan Mittal, Dr. Prem Chand Vashist, “Performance Evaluation of AODV and DSR Routing Protocols for Vehicular Ad-hoc Networks (VANETs)”, International Journal of Emerging Technology and Advanced Engineering, vol-4, Issue-6, June 2014.
[6] Rohit Jain, Ramprasad Kumawat, Sandeep Mandliya, Mukesh Patidar, “Performance evaluation of table driven multipath routing protocols in MANET under varying nodes, Traffic load & Pause time”, International journal of innovative research in electrical, electronics, instrumentations and controlengineering, vol-2, issue-2, February 2014.
[7] Avinash Giri, Jitendra Prithviraj and Ashol Verma, “Analysis of unipath amd multipath routing protocols in MANETs”, nternational journal of smart sensord and adhoc networks(IJSSAN), ISSN NO. 2248-9738, vol-2, Issue-1,2, 2012.
Citation
Vaishali Jain, Rajendra Singh Kushwah, "Review of Various VANET Protocols Using NS-2 Simulator," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.76-80, 2016.
An Approach for Data Hiding Technique Based on Reversible Texture Synthesis
Research Paper | Journal Paper
Vol.4 , Issue.7 , pp.81-85, Jul-2016
Abstract
This paper proposes an improved method for steganography using reversible texture synthesis. Texture synthesis mechanism is the construction of large texture by using the input texture which is smaller in size. Combination of texture synthesis and steganography can provide better security and high embedding capacity than the existing method. Proposed method use location patch or header block to store the location of the embedded data. In the existing method the secret data was placed in source patches where as in the improved method the secret data is kept in blocks. Length of the embedding message is calculated which determines the required number of blocks needed for placing the message securely.
Key-Words / Index Term
Texture synthesis, Steganography, patch, Synthetic image, Header block, Data block
References
[1] A. A. Efros and T. K. Leung, Texture synthesis by non-parametric sampling, in Proc. 7th IEEE Int. Conf. Comput.Vis, pp. 1033–1038.
[2] Fang, C-W. & Lien, J. J , Fast Image Replacement Using Multi- resolution Approach, Springer, pp. 509- 520, 2006.
[3] H. Otori and S. Kuriyama , Data- embeddable texture synthesis, in Proc. 8th Int. Symp. Smart Graph, Kyoto, Japan, 2007, pp. 146–157.
[4] K. xoe Feature-aligned shape texturing, ACM Trans. Graph.,vol. 28, no. 5, 2009, Art. ID.
[5] M. F. Cohen, J. Shade, S. Hiller, and O. Deussen, Wang tiles for image and texture generation, ACM Trans. Graph., vol. 22, no. 3, pp. 287–294.
[6] C. Han, E. Risser, R. Ramamoorthi, and E. Grinspun, Multiscale texture synthesis, ACM Trans. Graph., vol. 27, no. 3, 2008, Art. ID 51.
[7] Lexing Ying, Aaron Hertzmann, Henning Biermann, Denis Zorin, Texture and Shape Synthesis on Surfaces, Springer-Verlag London .
[8] L. Liang, C. Liu,Y.-Q. Xu, B. Guo and H.-Y. Shum, Real-time texture synthesis by patch-based sampling, ACM Trans. Graph, vol. 20.
[9] A. A. Efros and W. T. Freeman, Image quilting for texture synthesis and transfer, in Proc. 28th Annu. Conf. Comput. Graph Interact. Techn.2001, pp. 341–346.
[10] A. S. Sonawane, M. L. Dhore , S. N. Mali Information Hiding and Recovery using Reversible Embedding , International Journal of Computer Applications Volume 24– No.5, June 2011.
[11] ] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362.
[12] X. Li, B. Li, B. Yang, and T. Zeng, General framework to histogram shifting-based reversible data hiding, IEEE Trans. Image Process., vol. 22, no. 6, pp. 2181–2191, Jun. 2013 .
[13] Kuo-Chen Wu and Chung-Ming Wang, Member, IEEE,S Steganography Using Reversible Texture Synthesis IEEE Transactions on Image processing Volume 24,January 2015.
Citation
Akhila Sreenivas K. and Pretty Babu , "An Approach for Data Hiding Technique Based on Reversible Texture Synthesis," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.81-85, 2016.
A Survey on Dynamic Resource Allocation in Cognitive Radio Networks
Survey Paper | Journal Paper
Vol.4 , Issue.7 , pp.86-93, Jul-2016
Abstract
In cognitive radio networks (CRN) an efficient spectrum allocation is a very big issues because of its lack of spectrum demand. Resources in CRN should be allocated based on dynamic access methods with respected to sensed radio atmosphere. A primary research challenge is that how should be allocated or assigned available unused spectrum to unlicensed users. The fitting portion of unmoving recurrence range existing together intellectual radios while amplifying all out transmission capacity utilization what's more, minimizing impedance is required for the productive range use in CRN. The technique for settled range portion came about to less range usage over the whole range. In this article we study the different fitting algorithms and present comprehensive analysis of each method used to improve the effective utilization of unused spectrum in CRN.
Key-Words / Index Term
Cognitive Radio; Energy; OFDM; Resource Allocation; Spectrum sensing
References
[1]. Tevfik Y¨ucek and Huseyin Arslan, “A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications”, IEEE Communications Surveys & Tutorials, Vol. 11, NO. 1, First Quarter 2009, PP: 116-130.
[2]. Pinki Yadav, Subhajit Chatterjee, Partha Pratim Bhattacharya, “A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio”, International Journal of Next-Generation Networks (IJNGN) Vol.4, No.4, December 2012, PP: 27-46
[3]. Anita Garhwal, and Partha Pratim Bhattacharya, “A Survey On Dynamic Spectrum Access Techniques For Cognitive Radio”, International Journal of Next-Generation Networks (IJNGN) Vol.3, No.4, December 2011, PP: 15-32.
[4]. Khattab, Ahmed, Perkins, Dmitri, Bayoumi, Magdy, “Cognitive Radio Networks – From Theory to Practice”, Springer Series: Analog Circuits and Signal Processing, 2009.
[5]. S.Tamilarasan, Dr. P.Kumar, “A Study and Analysis of Dynamic Spectrum Networks Using Cognitive Radio in Wireless Ad-Hoc Networks” IJCST Vol. 6, Issue 2, April - June 2015, PP: 217-221.
[6]. Mohamed Gafar Ahmed Elnourani, “Cognitive Radio and Game Theory: Overview and Simulation”, Blekinge Institute of Technology, December 2008.
[7]. Pinki Yadav, Subhajit Chatterjee,and Partha Pratim Bhattacharya, “International Journal of Next-Generation Networks”, (IJNGN) Vol.4, No.4, December 2012.
[8]. Asma Amraoui, Badr Benmammar, “Dynamic Spectrum Access Techniques Dynamic Spectrum Access Techniques State of the art State”, LTT Laboratory, University of Tlemcen, ALGERIA.
[9]. P. Kolodzy et al., “Next generation communications: Kickoff meeting,” in Proc. DARPA, Oct. 2001.
[10]. Tevfik Yucek and Huseyin Arslan, “A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications”, IEEE Communications Surveys & Tutorials, Vol. 11, No. 1, First Quarter 2009.
[11]. Lu Wang, Zhong Zhou, Wei Wu, “Game theory-based model for maximizing SSP utility in cognitive radio networks” Computer Communications, Volume 86, 15 July 2016, Pages 29-39
[12]. Songlin Sun, Na Chen, Tiantian Ran, Jushi Xiao, Tao Tian, “A Stackelberg game spectrum sharing scheme in cognitive radio-based heterogeneous wireless sensor networks”, Signal Processing, Volume 126, September 2016, Pages 18–26.
[13]. Tanumay Manna, , Iti Saha Misra, “Implementation of relay based collaborative spectrum sensing using coalitional games in wireless cognitive radio networks”, Computers & Electrical Engineering, Volume 45, July 2015, Pages 77–99.
[14]. Biling Zhang, Yan Chen, Chih-Yu Wang, K.J. Ray Liu, “A Chinese restaurant game for learning and decision making in cognitive radio networks”, Computer Networks, Volume 91, 14 November 2015, Pages 117–134.
[15]. Lan-jie ZHAI, sandyzhai.cn, Hong JI, Xi LI, Yi-wen TANG, “Optimal resource allocation scheme for cognitive radio networks with relay selection based on game theory”, The Journal of China Universities of Posts and Telecommunications, Volume 19, Issue 6, December 2012, Pages 25, Pages 62-28
[16]. Xiu Liu, Guoru Ding, Yang Yang, Qihui Wu, Jinlong Wang, “A stochastic game framework for joint frequency and power allocation in dynamic decentralized cognitive radio networks”, AEU - International Journal of Electronics and Communications, Volume 67, Issue 10, October 2013, Pages 817–826.
[17]. Jayaprakash Rajasekharan, , Visa Koivunen, “Cooperative game-theoretic approach to spectrum sharing in cognitive radios”, Signal Processing, Volume 106, January 2015, Pages 15–29
[18]. Feng Zhao, Wen Wang, Hongbin Chen, Qiong Zhang, “Interference alignment and game-theoretic power allocation in MIMO Heterogeneous Sensor Networks communications”, Signal Processing, Volume 126, September 2016, Pages 173–179.
[19]. Sungwook Kim, “A repeated Bayesian auction game for cognitive radio spectrum sharing scheme”, Computer Communications, Volume 36, Issue 8, 1 May 2013, Pages 939–946.
[20]. R. Matheson, “The electrospace model as a frequency management tool,” in Int. Symposium on Advanced Radio Technologies, Boulder, Colorado, USA, Mar. 2003, pp. 126–132.
[21]. A.L.Drozd,I.P.Kasperovich,C.E.Carroll,andA.C.Blackburn, “Computational electromagnetics applied to analyzing the efficient utilization of the RF transmission hyperspace,” in Proc. IEEE/ACES Int. Conf. on Wireless Communications and Applied Computational Electromagnetics, Honolulu, Hawaii, USA, Apr. 2005, pp. 1077–1085
[22]. W. D. Horne, “Adaptive spectrum access: Using the full spectrum space,” in Proc. Annual Telecommunications Policy Research Conf., Arlington, Virginia, Oct. 2003.
[23]. Santi P. Maity, Subhankar Chatterjee, Tamaghna Acharya, “On optimal fuzzy c-means clustering for energy efficient cooperative spectrum sensing in cognitive radio networks”, Digital Signal Processing Volume 49, February 2016, Pages 104–115
[24]. Jaison Jacob, Babita R. Jose, Jimson Mathew, “A Fuzzy Approach to Decision Fusion in Cognitive Radio”, Procedia Computer Science , Volume 46, 2015, Pages 425-431.
[25]. Gyanendra Prasad Joshi, Srijana Acharya , Sung Won Kim, “Fuzzy-logic-based channel selection in IEEE 802.22 WRAN”, Information Systems Volume 48, March 2015, Pages 327–332
[26]. Pyari Mohan Pradhan, Ganapati Panda, “Cooperative spectrum sensing in cognitive radio network using multiobjective evolutionary algorithms and fuzzy decision making”, Ad Hoc Networks Volume 11, Issue 3, May 2013, Pages 1022–1036
[27]. Thuc Kieu-Xuan, Insoo Koo, “A cooperative spectrum sensing scheme using adaptive fuzzy system for cognitive radio networks”, Information Sciences Volume 220, 20 January 2013, Pages 102–109.
[28]. Ammar Abdul-Hamed Khader, Ahmed Hameed Reja, Arkan Ahmed Hussein, M. T. Beg, Mainuddin, “Cooperative Spectrum Sensing Improvement Based on Fuzzy Logic System”, Procedia Computer Science 58 ( 2015 ) 34 – 41. Second International Symposium on Computer Vision and the Internet (VisionNet’15).
[29]. Girish V. Lakhekar, Rupam Gupta Roy, “A fuzzy neural approach for dynamic spectrum allocation in cognitive radio networks,” Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on 20-21 March 2014.
[30]. Archana Sahoo, D. D. Seth, “A fuzzy logic based spectrum allocation technique for cognitive radio network”, Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on 24-25 Jan. 2015.
[31]. Girish V. Lakhekar, Rupam Gupta Roy, “A fuzzy neural approach for dynamic spectrum allocation in cognitive radio networks”, Circuit, Power and Computing Technologies (ICCPCT), 2014 International Conference on 20-21 March 2014.
[32]. Shun-Fang Yang, Jung-Shyr Wu, “A spectrum sharing method based on fuzzy logic in IEEE 802.22 WRAN”, Wireless Communications and Signal Processing (WCSP), 2010 International Conference on 21-23 Oct. 2010
[33]. Peng Cheng, Anjin Guo, Youyun Xu, Xuyu Wang, Xinbo Gao, “A Game Approach for Dynamic Resource Allocation in Cognitive Radio Networks” IEEE - 2010.
[34]. Michael J. Neely, Eytan Modiano, Charles E. Rohrs, “Dynamic Power Allocation and Routing for Time Varying Wireless Networks” IEEE INFOCOM 2003
[35]. Jian Tang, Satyajayant Misra, Guoliang Xue, “Joint spectrum allocation and scheduling for fair spectrum sharing in cognitive radio wireless networks”, Computer Networks 2008.
[36]. Rahul Urgaonkar, Michael J. Neely, “Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks”, PROC. IEEE INFOCOM, PHOENIX, AZ, APRIL 2008
[37]. Przemyslaw Pawelczak, Gerard J. M. Janssen and R. Venkatesha Prasad, “Performance Measures of Dynamic Spectrum Access Networks”, Adaptive Ad-Hoc Free Band Wireless Communications (AAF) project funded by the Freeband program of the Dutch Ministry of Economic Affairs.
[38]. Yan Long, Hongyan Li, Hao Yue, Miao Pan, Yuguang Fang, “Spectrum Utilization Maximization in Energy Limited Cooperative Cognitive Radio Networks”, IEEE ICC 2014 - Cognitive Radio and Networks Symposium
[39]. Yufang Xi, Edmund M., “Throughput Optimal Distributed Power Control of Stochastic Wireless Networks” IEEE/ACM 2009 Transactions on Networking.
[40]. Nicola Baldo, Alfred Asterjadhi, Michele Zorzi, “Dynamic Spectrum Access Using a Network Coded Cognitive Control Channel”, IEEE Workshop 2010.
[41]. Ayman AbdelHamid, Prashant Krishnamurthy, and David Tipper, Resource Scheduling For Heterogeneous Traffic in LTE Virtual Networks”, 2015 16th IEEE International Conference on Mobile Data Management.
[42]. Chao Zou, Tao Jin, Chunxiao Chigan, Zhi Tian, “QoS-aware distributed spectrum sharing for heterogeneous wireless cognitive networks”, Computer Networks 2007.
[43]. Guangchi Zhang, Xueyi Li, Miao Cui, Guangping Li, Yizhi Tan, “Transceiver design for cognitive multi-user MIMO multi- networks using imperfect CSI”, International Journal of Electronics and Communications (AEÜ)-2016
[44]. Abbas Ali Sharifi, Morteza Sharifi, Mir Javad Musevi Niya, “Secure cooperative spectrum sensing under primary user emulation attack in Cognitive radio networks: Attack-aware threshold selection approach”,2015- International Journal of Electronics and Communications (AEÜ)-2016
[45]. Vahid Esmaeelzadeh, Elahe S. Hosseini, Reza Berangi, Ozgur B. Akan, “Modeling of rate-based congestion control schemes in cognitive radio sensor networks”, Ad Hoc Networks-2015.
[46]. C.K.Tan, T.C. Chuah, S.W.Tan, “Resource allocation for OFDMA-based multicast cognitive radio networks using a Stackelberg pricing game”, Computer Communications, Volume 88, August 2016, PP: 57-72.
[47]. Songlin Sun, Na Chen, Tiantian Ran, Junsi Xiao, Tao Tian, “A Stackelberg game spectrum sharing scheme in cognitive radio-based heterogeneous wireless sensor networks”, Signal Processing, Volume 126, Sept 2016, PP: 8-16.
[48]. Sumit J.Darak, Sumedh Dhabu, Christophe Moy, Honggang Zhang Jacques, Palicot, A.P.Vinod, “Low complexity and efficient dynamic spectrum learning and tunable bandwidth access for heterogeneous decentralized cognitive radio networks”, Digital Signal Processing, Volume 37, Feb 2015, PP: 13-23.
[49]. Muhammad aisal Amjad, Mainak Chatterjee, Cliff C.Zou, “Coexistence in heterogeneous spectrum through distributed correlated equilibrium in cognitive radio networks”, Computer Networks, Volume 98, April 2016. PP: 109-122.
[50]. Chenn Jung Huang, Chih Tai Guan, Heng Ming Chen, Yu Wu Wang, Sheng Yuan Chien Jui Jiun, Jia Jian Liao, “A self-adaptive joint bandwidth allocation scheme for heterogeneous wireless networks”, Applied Soft Computing volume 37, Dec 2015, PP: 156-165.
[51]. Xiangbin Yu, Tingting Zhou, Xiaoshuai Liu, Xin Yin, “Cross-layer Design for Space-time coded MIMO Systems over Rice Fading Channel”, 2012 International Conference on Medical Physics and Biomedical Engineering
[52]. C. Salgado, C. Hernandez, V. Molina, Ferney A. Beltran-Molina, “Intelligent algorithm for spectrum mobility in cognitive wireless”, The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016)
[53]. M. G. Gonz´alez-P´erez, J. M. Luna-Rivera and D. U. Campos-Delgado, “Pre-equalization for MIMO Wireless Systems Using Spatial Modulation”, Procedia Technology 3 ( 2012 ) 1 – 8
[54]. Yinglei Teng Yuanyuan Liu Yong Zhang, “An Energy Efficient Resource Allocation in Cognitive Radio Networks with Pairwise NBS Optimization for Multi-Secondary Users”, 2013 IEEE Wireless Communications and Networking Conference (WCNC): MAC.
[55]. Yahia Tachwali, Brandon F. Lo, Ian F. Akyildiz, Ramon Agusti, “Multiuser Resource Allocation Optimization Using Bandwidth-Power Product in Cognitive Radio Networks”, IEEE Journal On Selected Areas In Communications, Vol. 31, No. 3, March 2013,
[56]. Vinesh Kumar, Sonajharia Minz , Vipin Kumar, “Performance analysis of cognitive radio networks under spectrum sharing using queuing approach”, Computers and Electrical Engineering-2016
[57]. Xavier Gelabert, Oriol Sallent, Jordi Pérez-Romero, Ramon Agustí, “Spectrum sharing in cognitive radio networks with imperfect sensing: A discrete-time Markov model”, Computer Networks 54 (2010).
[58]. Ju-yi QIAO, Jia LIU, Wei-dong WANG, Ying-hai ZHANG, “Spectrum-driven sleep scheduling algorithm based on reliable theory in cognitive radio sensor networks”, The Journal of China Universities of Posts and Telecommunications Volume 19, Supplement 2, October 2012, Pages 47, Pages 72-51
[59]. Lei Ding, Tommaso Melodia, Stella N. Batalama, John D. Matyjas, “Distributed resource allocation in cognitive and cooperative ad hoc networks through joint routing, relay selection and spectrum allocation”, Computer Networks Volume 83, 4 June 2015, Pages 315–331.
[60]. Ying He, Hongxi Yin, Nan Zhao, “Multiuser-diversity-based interference alignment in cognitive radio networks”, AEU - International Journal of Electronics and Communications, Volume 70, Issue 5, May 2016, Pages 617–628.
Citation
S.Tamilarasan, P.Kumar, "A Survey on Dynamic Resource Allocation in Cognitive Radio Networks," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.86-93, 2016.
A Process Web Application Testing Using TAO Tool Search Based Genetic Algorithm
Research Paper | Journal Paper
Vol.4 , Issue.7 , pp.94-100, Jul-2016
Abstract
Search-based Software Engineering is use number of software engineering models. In domain Search-Based Software Engineering many application is test data generation. We propose many methods for automating results bottleneck finding using search-based input-sensitive application profiling. Our key idea is to use a genetic algorithm as a search heuristic for obtaining combinations of input functions values that maximizes number of function to represents the elapsed execution time of the application. We present TAO tool is a software testing tool result automated test and oracle generation based on a semantic model. TAO is worked grammar-based test generation with automated semantics evaluation using a denotation semantics framework. The quality of web application is a broad review of recent Web testing advances model and discuss their goals, targets, techniques employed, inputs/outputs and stopping criteria. This research paper presents result testing of web application using reactive-based framework for reducing the cost and increasing efficiency of the performance testing. Finally test case can be generated automatically by solving and modify the problem using evolutionary algorithm. This model is attractive because it take a suite of adaptive automated and semi-automated solutions in situations many large complex problem spaces with multiple competing and conflicting objectives.
Key-Words / Index Term
Search-based Software Engineering, Evolutionary Algorithms, Optimization Problem, Evolutionary Testing, Heuristic Search Techniques. Web applications, World Wide Web, Web testing, Survey, Performance
References
[1] Wasif Afzal, Richard Torkar, and Robert Feldt. A systematic review of search-based testing for non-functional system properties. Inf. Softw. Technol., 51:957–976, June 2009
[2] Mark Harman, “The Current State and Future of SBSE”, Future of Software Engineering (FOSE'07), IEEE Computer Society, 2007, pp. 1-16.
[3] Elbaum, S. Karre,S., Rothermel,G., Improving web application testing with user session data. In International conference of software Engineering, pages 49-59, 2003.
[4] Fujiwara, S.,Bochmann, G.,Khendek, F.,Amalou, M., Ghedasmi, A. , Test selection based on finite state models, IEEE Transactions on Software Engineering 17(6):591-603, June 1991
[5] J. Clark, J. J. Dolado, M. Harman, R. M. Hierons, B. Jones, M. Lumkin, B. Mitchell, S. Mancoridis, K. Rees, M. Roper,and M. Shepperd, “Reformulating Software Engineering as a Search Problem,” IEE Proceedings - Software, vol. 150,no. 3, 2003, pp. 161–175.
[6] Daniel Malcolm Hoffman, David Ly-Gagnon, Paul Strooper & Hong-Yi Wang (2011): Grammar-based test generation with YouGen. Software Practice and Experience 41(4), pp. 427–447, doi:10.1002/spe.1017.
[7] Ralf Lämmel & Wolfram Schulte (2006): Controllable combinatorial coverage in grammar-based testing. In: International conference on Testing of Communicating Systems, pp. 19–38, doi:10.1007/11754008_2.
[8] A. Baars, M. Harman, Y. Hassoun, K. Lakhotia, P. McMinn, P. Tonella, and T. Vos. Symbolic search-based testing. In ASE ’11, pages 53–62, 2011.
[9] L. C. Briand, Y. Labiche, and M. Shousha. Stress testing real-time systems with genetic algorithms. In GECCO ’05, pages 1021–1028, 2005.
[10] J. Burnim, S. Juvekar, and K. Sen. Wise: Automated test generation for worst-case complexity. In ICSE ’09, pages 463–473, 2009.
[11] Y. Cai, J. Grundy, and J. Hosking. Synthesizing client load models for performance engineering via web crawling. In ASE ’07, pages 353–362, 2007
[12] Yuanyuan Zhang, “Multi-Objective Search - based Requirements Selection and Optimisation”, Ph.D Thesis, King’s College, University of London, February 2010, pp. 1-276.
Citation
N.Sudheer, V.Sharma and S.Hrushikesava Raju, "A Process Web Application Testing Using TAO Tool Search Based Genetic Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.94-100, 2016.
Prediction of Diabetes Using Neural Network & Random Forest Tree
Research Paper | Journal Paper
Vol.4 , Issue.7 , pp.101-104, Jul-2016
Abstract
Diabetes Mellitus is one of the real wellbeing challenges everywhere throughout the world. The pervasiveness of diabetes is expanding at a quick pace, falling apart human, financial and social fabric. Aversion and expectation of diabetes mellitus is progressively picking up enthusiasm for social insurance group. Albeit a few clinical choice emotionally supportive networks have been commended that fuse a few information digging methods for diabetes forecast and course of movement. These ordinary frameworks are ordinarily based either just on a solitary classifier or a plain mix thereof. As of late broad attempts are being made for enhancing the exactness of such frameworks utilizing gathering classifiers. This study takes after the procedures utilizing random forest tree as a base learner alongside standalone information mining procedure scaled conjugate gradient to characterize patients with diabetes mellitus utilizing diabetes hazard variables. This characterization is done crosswise over three diverse ordinal grown-ups bunches in PIMA indian dataset. Test result demonstrates that, general execution of adaboost group strategy is superior to anything sacking and in addition standalone random forest tree.
Key-Words / Index Term
Diabetes Mellitus, Random Forest Tree, Classification, Prediction,Scaled Conjugate Gradient
References
[1] D Reby, S Lek, I Dimopoulos, J Joachim, Ja Lauga, S Aulagnier “Artificial neural networks as a classification method in the behavioural sciences” Elsevier Behavioural Processes 40 (1997) 35–43
[2] Dr S kumar N M, Eswari T, Sampath P & Lavanya S “Predictive Methodology for Diabetic Data Analysis in Big Data” ScienceDirect ISBCC’15 Procedia Computer Science 50 ( 2015 ) 203 – 208
[3] Dr.V.Karthikeyani , I.Parvin Begum “Comparison a Performance of Data Mining Algorithms (CPDMA) in Prediction Of Diabetes Disease” International Journal on Computer Science and Engineering (IJCSE) Vol. 5 No. 03 Mar 2013 205-210
[4] D.Senthil Kumar, G.Sathyadevi and S.Sivanesh “Decision Support System for Medical Diagnosis Using Data Mining” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
[5] F Marir, H Saida, and F Al-Obeidata “Mining the Web and Literature to Discover New Knowledge
about Diabetes” ScienceDirect Procedia Computer Science 83 (2016) 1256–1261
[6] G K Grewal, Dr. Amardeep Singh “Molecular Database Generation for Type 2 Diabetes using Computational Science-Bioinformatics’ Tools” International Journal on Computer Science and Engineering (IJCSE), ISSN : 0975-3397 Vol. 3 No. 7 July 2011 2811
[7] Indiramma M, Raghavendra S “Classification and Prediction Model using Hybrid Technique for Medical Datasets” International Journal of Computer Applications (0975 – 8887) Volume 127 – No.5, October 2015
[8] K Polat , S Günes “ An expert system approach based on principal component analysis and adaptive neuro-fuzzy inference system to diagnosis of diabetes disease” ScienceDirect Digital Signal Processing 17 (2007) 702–710
[9] M. Durairaj, V. Ranjani “Data Mining Applications In Healthcare Sector: A Study” International Journal of Scientific & Technology Research Volume 2, Issue 10, October 2013
[10] N Khana, D Gaurava, T Kandl “Performance Evaluation of Levenberg-Marquardt Technique in Error Reduction for Diabetes Condition Classification” SciVerse ScienceDirectProcedia Computer Science 18 ( 2013 ), ICCS 2013,2629 – 2637
[11] N Chandgude, S Pawar “A survey on diagnosis of diabetes using various classification algorithm” International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue: 12 6706 – 6710
[12] S Perveen, M Shahbaz, A Guergachi, K Keshavjee “Performance analysis of data mining classification technique to predict diabetes” ScienceDirect, Procedia Computer Science 82(2016) SDMA 2016, 115-121
[13]Kaur S and Dr. R.K.Bawa “Future Trends of Data Mining in Predicting the Various Diseases in Medical Healthcare System” International Journal of Energy, Information and Communications Vol.6, Issue 4 (2015), pp.17-34
[14] Vijayan V and Aswathy R “Study of Data Mining Algorithms for Prediction and Diagnosis of Diabetes Mellitus” International Journal of Computer Applications (0975 – 8887) Volume 95– No.17, June 2014
[15] Hayashi Y. and Yukita S. “Rule extraction using Recursive-Rule extraction algorithm with J48 graft combined with sampling selection techniques for the diagnosis of type2 diabetes mellitus in the Pima Indian dataset” Elsevier Informatics in Medicine Unlocked 2(2016)92–104
Citation
Neha Shukla, Meena Arora, "Prediction of Diabetes Using Neural Network & Random Forest Tree," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.101-104, 2016.
A Result Base on Various Approaches of Load Balancing in Cloud Computing
Research Paper | Journal Paper
Vol.4 , Issue.7 , pp.105-110, Jul-2016
Abstract
In this paper we are studied cloud computing techniques. The Homomorphic property of various cryptosystems can be used to create secure voting systems, collision-resistant hash functions, and private information retrieval schemes and enable widespread use of cloud computing by ensuring the confidentiality of processed data.
Key-Words / Index Term
job scheduling, Directed Acyclic Graph, implement Min-Min, Shortest Job First.
References
[1] Amir Nahir “Distributed Oblivious Load Balancing Using Prioritized Job Replication”, ISSN 978-3-901882-48-7, IEEE, 2012.
[2] Hong Tao “A dynamic data allocation method with improved load-balancing for cloud storage system”, ISSN 978-1-84919-707-6, PP 220 – 225, IEEE, 2013
[3] Yuqi Zhang “Dynamic load-balanced multicast based on the Eucalyptus open-source cloud-computing system”,ISSN 978-1-61284-158-8, pp. 456 – 460, IEEE,2011.
[4] Magade, Krishnanjali A. “Techniques for load balancing in Wireless LAN's”, ISSN 978-1-4799-3357-0, PP 1831 – 1836, IEEE, 2014.
[5] Yean-Fu Wen “Load balancing job assignment for cluster-based cloud computing”, ISSN 14517061, PP 199 – 204, IEEE, 2014.
[6] De Mello, M.O.M.C “Load balancing routing for path length and overhead controlling in Wireless Mesh Networks”, ISSN 14630778, PP 1-6, IEEE, 2014.
[7] R. Angel Preethima, Margret Johnson, “Survey on Optimization Techniques for Task Scheduling in Cloud Environment”, IJARCSSE, Volume 3, Issue 12, December 2013.
[8] Ahmed DheyaaBasha, Irfan Naufal Umar, and Merza Abbas, Member, IACSIT “Mobile Applications as Cloud Computing: Implementation and Challenge”, 7865-7564, IEEE, 2013.
[9] Alabbadi, M.M“ Cloud computing for education and learning: Education and learning as a service (ELaaS)”, ISSN 978-1-4577-1748-2, PP 589 – 594, IEEE,2011.
[10] Cong Wang, Qian Wang, Kui Ren and Wenjing Lou “Ensuring Data Storage Security in Cloud Computing.” IEEE 2009.
[11] Farzad Sabahi, “Cloud Computing Security Threats and Responses," IEEE Trans. on Cloud Computing., vol. 11, no. 6, pp. 670 { 684, 2002.}
[12] Gaurav Raj, Dheerendra Singh, Abhay Bansal, “Using Batch Mode Heuristic Priority in Round Robin (PBRR) Scheduling”, IEEE, 2012.
[13] Jianfeng Yang, Zhibin Chen “Cloud Computing Research and Security Issues” Vol. 978-1-4244-5392-4/10/$26.00 ©2010 IEEE
[14] Jaber, A.N. “Use of cryptography in cloud computing”, ISSN978-1-4799-1506-4,PP 179 – 184,IEEE,2013.
[15] Kalagiakos, P. Karampelas, P “Cloud computing learning” 978-1-61284-831-0, 1 – 4, IEEE, 2011.
[16] Mehmet Yildiz, Jemal Abawajy, Tuncay Ercan and Andrew Bernoth “A Layered Security Approach for Cloud Computing Infrastructure” 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks. © 2009 IEEE.
[17] Md. Imrul Kayeset al. “Test Case Prioritization for Regression Testing Based on Fault Dependency” ISSN 978-1-4244-8679-3/11, IEEE, 2013
[18] Mohammed Achemlal, Saıd Gharoutand Chrystel Gabber “Trusted Platform Module as an Enabler for Security in Cloud Computing” Vol. 978-1-4577-0737-7/11/$26.00 ©2011 IEEE.
[19] Sravan Kumar R, AshutoshSaxena “Data Integrity Proofs in Cloud Storage” Vol. 978-0-7695-4355-0/11 $26.00 © 2011 IEEE.
[20] Qiang Guan, Chi-Chen Chiu, Song Fu “A Cloud Dependability Analysis Framework for Characterizing System Dependability in Cloud Computing Infrastructures”, ISSN 978-1-4673-4849-2, 11 – 20, IEEE, 2012.
[21] RuWei Huang, Si Yu, Wei Zhuang and Xiao Lin Gui, “Design of Privacy-Preserving Cloud Storage Framework" 2010 Ninth International Conference on Grid and Cloud Computing.
[22] RuWei Huang, Si Yu, Wei Zhuang and Xiao Lin Gui, “Research on Privacy-Preserving Cloud Storage Framework Supporting Cipher text Retrieval" 2011 Ninth International Conference on Grid and Cloud Computing.
[23] Ranjita Mishra, Sanjit Kumar Dash “A Privacy Preserving Repository for Securing Data across the Cloud” Vol 978-1-4244-8679-3/11/$26.00 ©2011 IEEE
[24] Ryan K. L. Ko, Markus Kirch berg, Bu Sung Lee “From System-centric to Data-centric Logging –Accountability, Trust & Security in Cloud Computing” IEEE Computer Society, 2011.
[25] Sang-Ho Na, Jun-Young Park, Eui-Nam Huh “Personal Cloud Computing Security Framework” 2010 IEEE Asia-Pacific Services Computing Conference.
[26] Akhil Goyal, Bharti, “A Study of Load Balancing in Cloud Computing using Soft Computing Techniques ”, International Journal of Computer Applications (0975 – 8887)
Citation
Charanjeet Singh, Khushboo Bansal, "A Result Base on Various Approaches of Load Balancing in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.105-110, 2016.
A Study on Merits and Demerits of SAN Protocols
Survey Paper | Journal Paper
Vol.4 , Issue.7 , pp.111-114, Jul-2016
Abstract
This paper focuses on SAN protocols and their various topologies, protocol layers, addresses. This article gives the description of rules and regulation of SAN that work in networks of storage. This study paper deals with the study of SAN and DAS, how they work in the open industrial network. This paper surveys on protocols and their working in storage. DAS have SATA, SCSI and SAN have uses FC, FCOE protocols.
Key-Words / Index Term
Department of Computer Engineering, Bharati Vidyapeeth University, Pune, India
References
[1] Raval, K.S., Suryawanshi, R.S., Naveenkumar, J. and Thakore, D.M., 2011. The Anatomy of a Small-Scale Document Search Engine Tool: Incorporating a new Ranking Algorithm. International Journal of Engineering Science and Technology, 1(3), pp.5802-5808.
[2] Archana, R.C., Naveenkumar, J. and Patil, S.H., 2011. Iris Image Pre-Processing And Minutiae Points Extraction. International Journal of Computer Science and Information Security, 9(6), p.171.
[3] Jayakumar, M.N., Zaeimfar, M.F., Joshi, M.M. and Joshi, S.D., 2014. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET). Journal Impact Factor, 5(1), pp.46-51.
[4] Naveenkumar, J. and Joshi, S.D., 2015. Evaluation of Active Storage System Realized through MobilityRPC.
[5] Jayakumar, D.T. and Naveenkumar, R., 2012. SDjoshi,“. International Journal of Advanced Research in Computer Science and Software Engineering,” Int. J, 2(9), pp.62-70.
[6] Jayakumar, N., Singh, S., Patil, S.H. and Joshi, S.D., Evaluation Parameters of Infrastructure Resources Required for Integrating Parallel Computing Algorithm and Distributed File System.
[7] Jayakumar, N., Bhardwaj, T., Pant, K., Joshi, S.D. and Patil, S.H., A Holistic Approach for Performance Analysis of Embedded Storage Array.
[8] Naveenkumar, J., Makwana, R., Joshi, S.D. and Thakore, D.M., 2015. OFFLOADING COMPRESSION AND DECOMPRESSION LOGIC CLOSER TO VIDEO FILES USING REMOTE PROCEDURE CALL. Journal Impact Factor, 6(3), pp.37-45.
[9] Naveenkumar, J., Makwana, R., Joshi, S.D. and Thakore, D.M., 2015. Performance Impact Analysis of Application Implemented on Active Storage Framework. International Journal, 5(2).
[10] Salunkhe, R., Kadam, A.D., Jayakumar, N. and Thakore, D., In Search of a Scalable File System State-of-the-art File Systems Review and Map view of new Scalable File system.
[11] Salunkhe, R., Kadam, A.D., Jayakumar, N. and Joshi, S., Luster A Scalable Architecture File System: A Research Implementation on Active Storage Array Framework with Luster file System.
[12] Jayakumar, N., Reducts and Discretization Concepts, tools for Predicting Student’s Performance.
[13] Jayakumar, M.N., Zaeimfar, M.F., Joshi, M.M. and Joshi, S.D., 2014. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET). Journal Impact Factor, 5(1), pp.46-51.
[14] Kumar, N., Angral, S. and Sharma, R., 2014. Integrating Intrusion Detection System with Network Monitoring. International Journal of Scientific and Research Publications, 4, pp.1-4.
[15] Namdeo, J. and Jayakumar, N., 2014. Predicting Students Performance Using Data Mining Technique with Rough Set Theory Concepts. International Journal, 2(2).
[16] Naveenkumar, J., Keyword Extraction through Applying Rules of Association and Threshold Values. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), ISSN, pp.2278-1021.
[17] Kakamanshadi, G., Naveenkumar, J. and Patil, S.H., 2011. A Method to Find Shortest Reliable Path by Hardware Testing and Software Implementation. International Journal of Engineering Science and Technology (IJEST), ISSN, pp.0975-5462.
[18] Naveenkumar, J. and Raval, K.S., Clouds Explained Using Use-Case Scenarios.
[19] Naveenkumar J, S.D.J., 2015. Evaluation of Active Storage System Realized Through Hadoop. International Journal of Computer Science and Mobile Computing, 4(12), pp.67–73.
[20] Rishikesh Salunkhe, N.J., 2016. Query Bound Application Offloading: Approach Towards Increase Performance of Big Data Computing. Journal of Emerging Technologies and Innovative Research, 3(6), pp.188–191.
[21] Sagar S lad s d joshi, N.J., 2015. Comparison study on Hadoop’s HDFS with Lustre File System. International Journal of Scientific Engineering and Applied Science, 1(8), pp.491–494.
[22] Salunkhe, R. et al., 2015. In Search of a Scalable File System State-of-the-art File Systems Review and Map view of new Scalable File system. In nternational Conference on electrical, Electronics, and Optimization Techni ques (ICEEOT) - 2016. pp. 1–8.
[23] BVDUCOE, B.B., 2011. Iris Image Pre-Processing and Minutiae Points Extraction. International Journal of Computer Science & Information Security.
[24] P. D. S. D. J. Naveenkumar J, “Evaluation of Active Storage System Realized through MobilityRPC,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 3, no. 11, pp. 11329–11335, 2015
[25] N. Jayakumar, S. Singh, S. H. Patil, and S. D. Joshi, “Evaluation Parameters of Infrastructure Resources Required for Integrating Parallel Computing Algorithm and Distributed File System,” IJSTE, vol. 1, no. 12, pp. 251–254, 2015.
[26] N. Jayakumar, T. Bhardwaj, K. Pant, S. D. Joshi, and S. H. Patil, “A Holistic Approach for Performance Analysis of Embedded Storage Array,” Int. J. Sci. Technol. Eng., vol. 1, no. 12, pp. 247–250, 2015.
[27] J. Naveenkumar, R. Makwana, S. D. Joshi, and D. M. Thakore, “Performance Impact Analysis of Application Implemented on Active Storage Framework,” Int. J., vol. 5, no. 2, 2015.
[28] N. Jayakumar, “Reducts and Discretization Concepts, tools for Predicting Student’s Performance,” Int. J. Eng. Sci. Innov. Technol., vol. 3, no. 2, pp. 7–15, 2014.
[29] J. Namdeo and N. Jayakumar, “Predicting Students Performance Using Data Mining Technique with Rough Set Theory Concepts,” Int. J. Adv. Res. Comput. Sci. Manag. Stud., vol. 2, no. 2, 2014.
[30] R. Salunkhe, A. D. Kadam, N. Jayakumar, and S. Joshi, “Luster A Scalable Architecture File System: A Research Implementation on Active Storage Array Framework with Luster File System.,” in ICEEOT, 2015.
[31] V. Franco, “EMC Proven TM Professional Knowledge Sharing Serial ATA Drives in CLARiiON ® Arrays EMC Proven Professional TM Knowledge Sharing EMC Proven TM Professional Knowledge Sharing,” pp. 1–8, 2007.
[32] D. Anderson, J. Dykes, and E. Riedel, “More than an interface - SCSI vs. ATA,” Proc. FAST ’03 2nd USENIX Conf. File Storage Technol., no. March, pp. 245–257, 2003.
[33] M. R. Batchanaboyina, N. P. Babu, D. Anandam, and R. Thalluri, “Recent Trends on DAS and SAN Protocols,” vol. 5, no. 4, pp. 563–567, 2015.
[34] S. Terms, S. N. Applications, S. N. Topologies, and F. Channel, “STORAGE AREA NETWORKING PROTOCOLS AND ARCHITECTURE Associated Sessions,” 2004.
[35] VMware, “Storage Protocol Comparison White Paper,” pp. 1–10.
[36] D. Reinsel, “WHITE P APER Evolution in Hard Disk Drive Technology: S AS and S AT A,” 2005.
[37] Anjali Nigam and Vineet Singh, “Securing Data Transmission in Cloud using Encryption Algorithms”, International Journal of Computer Sciences and Engineering Research Volume 4, Issue 6, June 2016.
[38] Pritika Goel, “An Improved Load Balancing Technique in Weighted Clustering Algorithm”, International Journal of Computer Sciences and Engineering Research Volume 4, Issue 6, June 2016.
Citation
Ashutosh Kumar Singh, "A Study on Merits and Demerits of SAN Protocols," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.111-114, 2016.
A Survey on Storage Virtualization and its Levels along with the Benefits and Limitations
Survey Paper | Journal Paper
Vol.4 , Issue.7 , pp.115-121, Jul-2016
Abstract
This study paper revolves around the impact of virtualization at the various layers of storage stack. There is a rapid growth in the storage capacity, and hence the processing power in the respective enterprises storage appliances coupled with the requirements for high availability and it needs a Storage Area Network (SAN) architecture for providing the storage and performance elements here. The Storage Virtualization provides us with a combination and management of storage resources for Storage Area Network with multiple servers as well as the storage devices. The main aim for storage virtualization is its necessity to be inexpensive and not affect the performance. Currently, the storage virtualization is displayed at three different architectural levels: (1) the storage device, (2) the host and (3) the SAN fabric hardware as a central management unit. This paper further provides us with more information on the storage virtualization levels that are part of its architecture. Each of these levels that we will see grants us with particular advantages and benefits but is also limited in their capabilities gets considered as their drawbacks or limitations.
Key-Words / Index Term
Storage, Performance, Virtualization, Network, Storage Virtualization, Storage Area Network (SAN), Network, Attached Storage (NAS), Server, Storage Device (Sub-System), Host, SAN Fabric, Virtual Machine Monitor/ Hypervisor
References
[1] Jun-wei Ge, Yong-long Deng, Yi-qiu Fang, “Research on Storage Virtualization Structure in Cloud Storage Environment” , Multimedia Technology (ICMT), International Conference, IEEE, 2010.
[2] Aameek Singh, Madhukar Korupolu and Dushmanta Mohapatra, “Server-Storage Virtualization: Integration and Load Balancing in Data Centers”, IEEE, 2008.
[3] Sandeep Kumar and Syam Kumar P, “Secure and efficient design and implementation of out-of-band storage virtualization”, IEEE, 2015.
[4] S. D. Joshi, Naveenkumar Jayakumar, Farid Zeimfar, “Workload Characteristics Impacts on File System Benchmarking”, Int. J. Adv. Res. Computer Sci. Software Eng., vol. 4, no. 2, pp. 39–44, 2014.
[5] N. Jayakumar, S. Singh, S. H. Patil, and S. D. Joshi, “Evaluation Parameters of Infrastructure Resources Required for Integrating Parallel Computing Algorithm and Distributed File System,” IJSTE - Int. J. Sci. Technol. Eng., vol. 1, no. 12, pp. 251–254, 2015.
[6] N. Jayakumar, T. Bhardwaj, K. Pant, S. D. Joshi, and S. H. Patil, “A Holistic Approach for Performance Analysis of Embedded Storage Array.”
[7] D. T. Jayakumar and R. Naveenkumar, “Active Storage,” Int. J. Adv. Res. Computer Sci. Software Eng. Int. J, vol. 2, no. 9, pp. 62–70, 2012.
[8] M. G. Kakamanshadi, M. J. Naveenkumar and S. H. Patil, “A Method to Find Shortest Reliable Path by Hardware Testing and Software Implementation,” Int. J. Eng. Sci., 2011.
[9] N. Kumar, S. Angral and R. Sharma, “Integrating Intrusion Detection System with Network monitoring,” Int. J. Sci. Res. Publ., vol. 4, no. 5, pp. 1–4, 2014.
[10] P. D. S. D. J. Naveenkumar J, “Evaluation of Active Storage System Realized through Mobility RPC,” Int. J. Innov. Res. Computer Commun. Eng., vol. 3, no. 11, pp. 11329–11335, 2015.
[11] S. D. Joshi, Naveenkumar J, “Evaluation of Active Storage System Realized Through Hadoop,” Int. J. Computer Sci. Mob. Computer, vol. 4, no. 12, pp. 67–73, 2015.
[12] J. Naveenkumar, R. Makwana, S. D. Joshi, and D. M. Thakore, “Offloading Compression and Decompression Logic Closer to Video Files Using Remote Procedure Call,” J. Impact Factor, vol. 6, no. 3, pp. 37–45, 2015.
[13] N. J. Rishikesh Salunkhe, “Query Bound Application Offloading: Approach Towards Increase Performance of Big Data Computing,” J. Emerg. Technol. Innov. Res., vol. 3, no. 6, pp. 188–191, 2016.
[14] R. Salunkhe, A. D. Kadam, N. Jayakumar, and S. Joshi, “Luster A Scalable Architecture File System: A Research Implementation on Active Storage Array Framework with Luster File System.” in ICEEOT, 2015.
[15] R. Salunkhe, A. D. Kadam, N. Jayakumar, and D. Thakore, “In Search of a Scalable File System State-of-the-art File Systems Review and Map view of new Scalable File system.,” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016, pp. 1–8.
[16] Naveenkumar J, Sagar S Lad, S. D. Joshi, “Comparison study on Hadoop’s HDFS with Lustre File System,” Int. J. Sci. Eng. Appl. Sci., vol. 1, no. 8, pp. 491–494, 2015.
[17] G. Sullivan, “Virtualization for Storage Efficiency and Centralized Management.”
[18] T. A. Faculty, S. Sivathanu, and I. P. Fulfillment, “Enhancing Storage Performance in Virtualized Environments Enhancing Storage Performance in Virtualized” no. August, 2011.
[19] G. Praveen, “Analysis of Performance in the Virtual Machines Environment,” International J. Adv. Sci. Technol., vol. 32, no. pp. 53–64, 2011.
[20] Press, “Virtualization.” Summary, “How Processor Core Count Impacts Virtualization Performance and Scalability.
[21] Salunkhe R, Kadam A.D, Jayakumar N and Thakore D, In Search of a Scalable File System State-of-the-art File Systems Review and Map view of new Scalable File system.
[22] Raval K.S, Suryawanshi R.S, Naveenkumar J and Thakore D.M, The Anatomy of a Small-Scale Document Search Engine Tool: Incorporating a new Ranking Algorithm. International Journal of Engineering Science and Technology, 1(3), pp.5802-5808, 2011.
[23] Archana R.C, Naveenkumar J and Patil, S.H, Iris Image Pre-Processing and Minutiae Points Extraction. International Journal of Computer Science and Information Security, 9(6), p.171, 2011.
[24] BVDUCOE, B.B, Iris Image Pre-Processing and Minutiae Points Extraction. International Journal of Computer Science & Information Security, 2011.
[25] Jayakumar M.N, Zaeimfar M.F, Joshi, M.M and Joshi S.D, 2014. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET). Journal Impact Factor, 5(1), pp.46-51.
[26] Naveenkumar J and Joshi S.D, 2015. Evaluation of Active Storage System Realized through Mobility RPC.
[27] Jayakumar D.T and Naveen Kumar, S.D Joshi, “International Journal of Advanced Research in Computer Science and Software Engineering”, Int. J, 2(9), pp.62-70, 2012.
[28] Jayakumar N, Singh S, Patil S.H and Joshi S.D, Evaluation Parameters of Infrastructure Resources Required for Integrating Parallel Computing Algorithm and Distributed File System.
[29] Jayakumar N, Bhardwaj T, Pant K., Joshi S.D and Patil S.H, A Holistic Approach for Performance Analysis of Embedded Storage Array.
[30] Naveenkumar J, Makwana R, Joshi S.D and Thakore D.M, Offloading Compression and Decompression Logic Closer to Video Files Using Remote Procedure Call, Journal Impact Factor, 6(3), pp.37-45, 2015.
[31] Naveenkumar J, Makwana R, Joshi S.D and Thakore D.M, Performance Impact Analysis of Application Implemented on Active Storage Framework. International Journal, 5(2), 2015.
[32] Salunkhe R, Kadam A.D, Jayakumar N and Thakore D, In Search of a Scalable File System State-of-the-art File Systems Review and Map view of new Scalable File system.
[33] Salunkhe R, Kadam A.D, Jayakumar N and Joshi S.D, Luster A Scalable Architecture File System: A Research Implementation on Active Storage Array Framework with Luster File System.
[34] Jayakumar N, Reducts and Discretization Concepts, tools for Predicting Student’s Performance.
[35] Jayakumar M.N, Zaeimfar M.F, Joshi M.M and Joshi S.D, International Journal of Computer Engineering & Technology (IJCET), Journal Impact Factor, 5(1), pp.46-51, 2014.
[36] Kumar N, Angral S and Sharma R, Integrating Intrusion Detection System with Network Monitoring. International Journal of Scientific and Research Publications, 4, pp.1-4, 2014.
[37] Namdeo J and Jayakumar N, Predicting Students Performance Using Data Mining Technique with Rough Set Theory Concepts. International Journal, 2(2), 2014.
[38] Naveenkumar J, Keyword Extraction through Applying Rules of Association and Threshold Values. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), ISSN, pp.2278-1021.
[39] Kakamanshadi G, Naveenkumar J and Patil S.H, 2011. A Method to Find Shortest Reliable Path by Hardware Testing and Software Implementation. International Journal of Engineering Science and Technology (IJEST), ISSN, pp.0975-5462.
[40] Naveenkumar J and Raval K.S, Clouds Explained Using Use-Case Scenarios.
[41] Naveenkumar J, S.D Joshi, Evaluation of Active Storage System Realized Through Hadoop. International Journal of Computer Science and Mobile Computing, 4(12), pp.67–73, 2015.
[42] Rishikesh Salunkhe, N.J, Query Bound Application Offloading: Approach Towards Increase Performance of Big Data Computing. Journal of Emerging Technologies and Innovative Research, 3(6), pp.188–191, 2016.
[43] Sagar S Lad, S.D Joshi, N.J, Comparison study on Hadoop’s HDFS with Lustre File System. International Journal of Scientific Engineering and Applied Science, 1(8), pp.491–494, 2015.
[44] Angel, S. et al., End-to-end performance isolation through virtual datacenters. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), (Vdc), pp.233–248. Available at: http://dl.acm.org/citation.cfm?id=2685048.2685067, 2014.
[45] Cherkasova L & Gardner R, Measuring CPU overhead for I/O processing in the Xen virtual machine monitor. Proceedings of the USENIX annual …, pp.387–390. Available at: http://static.usenix.org/events/usenix05/tech/general/full_papers/short_papers/cherkasova/cherkasova.pdf.
2005.
[46] Paper W, Storage Intelligence in the Network : EMC’s Perspective, 2003.
[47] VMware, Virtualizing Performance-Critical Database Applications in VMware vSphere. VMware, p.8, 2009.
[48] https://www.cs.uic.edu/~jbell/CourseNotes/OperatingSystems/13_IOSystems.html
[49] Durairaj M and Kannan P, A Study On Virtualization Techniques and Challenges in Cloud Computing, International Journal Of Scientific & Technology Research Volume 3, Issue 11, November 2014.
[50] Anjali Nigam and Vineet Singh, “Securing Data Transmission in Cloud using Encryption Algorithms”, International Journal of Computer Sciences and Engineering Research Volume 4, Issue 6, June 2016.
[51] Pritika Goel, “An Improved Load Balancing Technique in Weighted Clustering Algorithm”, International Journal of Computer Sciences and Engineering Research Volume 4, Issue 6, June 2016.
Citation
Pratik Rajan Bhore , "A Survey on Storage Virtualization and its Levels along with the Benefits and Limitations," International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.115-121, 2016.