Security in cloud computing using firewall
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.1092-1094, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.10921094
Abstract
Cloud computing is more popular these days, and the number of its users is increasing hence the security issues are also increasing. Cloud Computing is a relatively new concept that presents a good number of benefits for its users; however, it also raises some security problems which may slow down its use .The biggest issue in the cloud computing is security. This paper discuss about cloud service model, security issues in cloud computing. There are some security challenges like data security, network security and data transmission. Paper discuss about them and types of firewalls and how to implement firewall in the system that will help in cloud security.
Key-Words / Index Term
Cloud computing, firewall, cloud security
References
[1] Krutika K. Shah Vahida U. Vadiya Rutvij H. Jhaveri journal on A Survey Paper on Security in Cloud Computing: A Bibliographic Analysis
[2] Krishan Kant Lavania,” International Journal on Recent and Innovation Trends in Computing and Communication” Volume: 1 Issue: 3 161 –163
[3] R. H. Sakr, F. Omara, O. Nomir“An Optimized Technique for Secure Data Over Cloud OS” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 3, Issue 3, May-June 2014 ISSN 2278-6856
[4] Rajnish Choubey, Rajshree Dubey , Joy Bhattacharjee “A Survey on Cloud Computing Security, Challenges and Threats International Journal on Computer Science and Engineering” (IJCSE) Vol. 3 No. 3 Mar 2011
Citation
Abhishek Langote, Omkar Dalal, Jyoti Kharade, "Security in cloud computing using firewall," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1092-1094, 2018.
Survey on Energy-Aware Cloud Computing Algorithms: A Review
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.1095-1099, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.10951099
Abstract
Cloud computing is an elastic model which is used to satisfied changing needs of users. It provides pay as you go services (PaaS, SaaS, and IaaS) to the users. The growing trend of cloud computing has raises the concern of energy efficiency in cloud computing because a data center consumes lots of energy and emits carbon-dioxide in the environment. Today, the main focus of researcher has been diverted from cloud resource management to energy management. Various algorithms on VM allocation, migration, task scheduling and load balancing have been developed to ensure minimum energy dissipation in cloud data center. The main focus of this paper is study the existing algorithms and to analysis the best algorithms.
Key-Words / Index Term
energy efficiency, vm-migration, load-balancing, vm-allocation
References
[1] Beloglazov, A., & Buyya, R, “Energy efficient resource management in virtualized cloud data centers,” Proceedings of the IEEE/ACM international conference on cluster, cloud and grid computing, pp. 826-831,2010.
[2] Arroba,P., et.al., “Dynamic Voltage and Frequency Scaling- Aware Dynamic Consolidation of Virtual Machines for Energy Efficient Cloud Data Center”, WILEY, 2016.
[3] ] Chien, N.k., et.al., “An Efficient Virtual Machine Migration Algorithm Based on Minimization of Migration in Cloud Computing”, International Conference on Nature of Computation and Communication ICTCC, Springer, pp. 62-71, 2016.
[4] Tziritas, N et.al, “ Application Aware Workload Consolidations to Minimize both Energy Consumption and Network Load in Cloud Environment”, 42th International conference on Parallel Processing, IEEE, 2013.
[5] Khan, M.A., et.al., “Dynamic Virtual Machine Consolidation Algorithms for Energy-Efficient Cloud Resource Management: A Review”, Springer International Publishing, pp.135-165,2018.
[6] Beloglazov A, Abawajy J, Buyya R. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener Comput Syst. 2012;28(5):755–68.
[7] Selim GEI, El-Rashidy MA, El-Fishawy NA, editors. An efficient resource utilization technique for consolidation of virtual machines in cloud computing environments. In: 2016 33rd national radio science conference (NRSC). 22–25 Feb 2016.
[8] Beloglazov A, Abawajy J, Buyya R. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener Comput Syst. 2012;28(5):755–68.
[9] Beloglazov A, Buyya R. Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurr Comput. 2012;24(13):1397–420.
[10] Abdi H. Multiple correlation coefficient. Richardson: The University of Texas at Dallas; 2007.
[11] Verma A, Dasgupta G, Nayak TK, De P, Kothari R. Server workload analysis for power minimization using
consolidation. Proceedings of the 2009 USENIX Annual Technical Conference, San Diego, CA, USA, 2009; 28–28.
[12] Gao,Y et.al., “A multi-objective ant colony system algorithm for virtual machine placement in cloud
computing”, Journal of Computer and System Sciences, Elsevier, 2013
[13] Dabbagh M, Hamdaoui B, Guizani M, Rayes A. Toward energy-efficient cloud computing: Prediction, consolidation, and overcommitment. IEEE Netw. 2015;29(2):56–61.
[14] Varasteh A, Goudarzi M. Server consolidation techniques in virtualized data centers: a survey. IEEE Syst J. 2015;11(2):772–83.
[15] S. Martello, P. Toth, "Knapsack Problems–Algorithms and Computer Implementations", John Wiley & Sons, 1990
[16] N. Tziritas, C.-Z. Xu, T. Loukopoulos, S. U. Khan, Z. Yu, "Application-aware Workload Consolidation to Minimize both Energy Consumption and Network Load in Cloud Environments", 42nd IEEE International Conference on Parallel Processing (ICPP), 2013
[17] N. Quang-Hung, N. Thoai,, N. Son, "Epobf: Energy efficient allocation of virtual machines in high performance computing", Journal of Science and Technology, Vietnamese Academy of Science and Technology, Special on International Conference on Advanced Computing and Applications (ACOMP2013), Volume 51, pp 173-182, 2013
Citation
R. Garg, "Survey on Energy-Aware Cloud Computing Algorithms: A Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1095-1099, 2018.
Invention and Implementation of NTBS Clustering Protocol for VANET
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.1100-1110, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.11001110
Abstract
Vehicular Ad hoc Networks (VANETs) are the promising approach to provide traffic, safety and other applications to the drivers as well as passengers. It becomes a key component of the intelligent transport system. Communication is not for only reliable data delivery but also the achieving the reliability. In this paper, we present how to obtain best communication in VANET system by using Transitive Trust Relationships concept and thus improving the performance of the authentication procedure of the whole network in a cluster. Proposed NTBS protocol not only adapts the concept of Transitive Trust Relationships but also improves the performance of the authentication procedure and it provides best communication with good security. We implement NTBS protocol in NS2 Simulator. NS2 is open source and discrete event-driven, object-oriented and freely available simulation tool to simulate and analyze dynamic nature of communication networks. it is also a powerful tool to develop new protocols and functions. It provides support for OSI and TCP/IP protocols stack and many standard routing and application protocols for wire and wireless networks. NAM is used to display the process of simulation.
Key-Words / Index Term
VANET, TTR, NS2, NAM, TCL, NTBS, OBU, RSU, AS, Clustering Protocol
References
[1] C. Siva Ram Murthy, and B. S. Manoj, “Ad Hoc Wireless Networks:Architectures and Protocols”, Prentice hall PTR, 2004.
[2] Yousefi. S, Mousavi M. S, and Fathy M, “Vehicular ad hoc networks (VANETs): challenges and perspectives”, In the Proceedings of the 6th international conference on ITS telecommunications, pp.761-766, 2006.
[3] Kosch. T, Scroth. C, Strassberger. M, and Bechler. M, “Automative Internetworking:The Evolution towards Connected and Coperative vehicles”, John & Wesley Sons Ld., USA, 2012.
[4] Rasmeet S Bali, Neeraj Kumar, and Joel JPC Rodrigues, “clustering in vehicular ad hoc networks:taxonomy, challenges and solutions”, Vehicular communications, Vol.1, Issue.3, pp.134-152, 2014.
[5] Wenshuang liang, Zhuorong Li, and Hongyong Zhang, “Vehicular Ad Hoc Networks:Architectures, Research Isses,Methodologies, Challenges and Trends” Sage journals, Vol.11, Issue.8, 2015.
[6] M. Gerlach, A. Festag, T. Leinmller, G. Goldacker, and C. Harsch, “Secure architecture for Vehicular Communications”, 5 th international Workshop on Intellegent Transportation (WIT), March 2007.
[7] M. Raya and J. P. Hubaex, “Securing Vehicular ad hoc networks”, J. Compute. Security, Vol.15, Issue.1, pp.39-68, 2007.
[8] J. P. Hubaux, S. Capkun, and J. Leo, “The Seurity and Privacy of Smart Vehicles”, IEEE Security and Privacy Magazine, Vol. 2, Issue.4, pp.49-55,2004.
[9] M. El Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramaniam, “Security Issues in a future Vehicular network”, In the Proceedings of Europen Wireless’02, 2002.
[10] C. Zhang, X. Lin, R. Lu, and P. H. Ho, “RAISE: An Efficient RSU-aided message authentication scheme in vehicular communication networks”, In the Proceedings of the IEEE Int. Conf. Commun., pp.1451-1457, 2008.
[11] G. Gowtham, E. Samlison, “A Secured Trust Creation in VANET Environment Using Random Password Generator”, International Conference on Comp. Elect. And Elect. Technologies, pp.781-784,2012.
[12] T. Isaac, S. Zeadally, and J. S. Camera, “ Security attacks and solutions for vehicular ad hoc networks”, In IET Communications, pp.894-903, 2009.
[13] Menezes, S. Vnstone, and D. Hankerson, “Guide to elliptic curve cryptography”, Springer Professional Computing, Springer, New York, 2004.
[14] Sirwan A Mohammad and Dr. Sattar, “Design of wireless network based on ns2”, Journal of Global Research in Computer Science, Vol.3, Issue.4, pp.1-8, 2012.
[15] Z. Wang, L. Liu, M. Zhou, N. Ansari, “A position based clustering technique for ad hoc intervehicle communication”, IEEE Trans. Syst. Man Cybern., Part C, Appl.Rev. 38(2), pp.201-208, 2008.
[16] W. Fan, Y. Shi, S. Chen, L. Zou, “A Mobility based dynamic clustering algorithm (DCA) for VANETs”, In the International Conference on Communication Technology and Application, Beijing, pp.752-756, 2011.
[17] Grzegorz Wolny, “Modified DMAC Clustering Algorithm for VANET”, In the Procedings of the 2008 Third International Conference on Systems and Networks Communications, Washington, DC, USA, pp.268-273.
[18] Farhan ahammed, javed Taheri, and Albert Zomaya, “LICA:Robust Localization using cluster Analysis to improve GPS Coordinates”,
[19] Blum J, Eskandan A, Hoffman L, “Challenges of Intervehicle ad hoc networks”, IEEE Transactions on Intelligent Transport System, Vol.5, Issue.4, pp.347-351, 2004.
[20] S. Sivagurunathan, P. Subathra, V. Mohan, N. Ramraj, “Authentic Vehicular Environment Using a cluster based key management”, Eur. J. Sci. Res.36,pp. 299-307, 2009.
[21] Cheng, S.-T., G.-J. Horng, and C.-L. Chou, “using cellular automata to form car soceity in vehicular ad hoc networks”, Intelligent Transport Systems, IEEE Transactions, Vol.12, Issue.4,pp.1374-1384, 2011.
[22] Almalag, M. S., and Weigle, M. C., “Using traffic flow for cluster formation in vehicular ad hoc networks”, In Local Computer Networks (LCN), 35th conference on, IEEE, pp.631-636, 2010.
[23] Souza. E, Nikolaidis. I, and Gburzynski, P. , “A new aggregate local mobility (ALM) clustering algorithm for VANETs” In comm. (ICC), International Conference on, IEEE, pp.1-5, 2010.
[24] Rawshdeh, Z. Y., and Mahmud. S. M, “Toward strongly concerned clustering structure in vehicular a hoc networks”, In Vehicular Technology Conference Fall, IEEE 70th , IEEE, pp.1-5, 2009.
[25] Shea. C, Hassanabadi, and Valaee, S., “ Mobility based clustering in VANETs using affinity propagation”, In Global Telecommuniccations Conference, IEEE, GLOBECOM, pp. 1-6, 2009.
[26] Kayis. O., Acarman. T., “clustering for inter vehicle communication”, In Intelligent Transportation Systems Conference, IEEE, pp.636-641, 2007.
[27] W. Fan, Y. Shi, S.chen, and L. Zou, “A mobility metric based dynamic clustering algorithm (DCA) for VAETS”, in International Conference on Communication Technology and Application, Beijing, pp.752-756, 2011.
[28] Zhenxia Zhang, Azzedine Boukerche, and Richards Pazzi, “A novel multi-hop clustering scheme for vehicular ad hoc networks”, In the Ptoceedings of the 9th ACM international symposium on Mobility management and wireless access, ACM, pp.19-26, 2011.
[29] Mohamed Nidhal Merji, Jalel Ben-Othman, Mohamed Hamdi, “A Survey on VANET security challenges and possible cryptographic solutions”, Vehicular Communications, Vol.1, Issue.2, pp.53-66, 2014.
[30] Jinyuan Sun, Chi Zhang, Yanchao Zhang, and Yaguang Fang, “An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks”, Parallel and Distributed Systems, IEEE Transactions on, Vol.21, Issue.9, pp.1227-1239, 2010.
[31] Azogu. I. K, Ferreira. M. T, and Hong Liu, “A security metric for VANET content delivery”, Global Communications Conference, IEEE, Vol.3, Issue.7, pp.991-996, 2012.
[32] Leinmuller T, Buttyan L et al., “SEVECOM-Secure Vehicle Communication”, in the Proceedings of IST Mob Summit.
[33] Zuowen, Tan , “A Privacy Preserving Mutual Authentication Protocol for Vehiular Ad Hoc Networks”, Journal of Convergence Inf. Technology Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
Citation
Venkatamangarao Nampally, M. Raghavender Sharma, "Invention and Implementation of NTBS Clustering Protocol for VANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1100-1110, 2018.
Analysis of Various Image Preprocessing Techniques for Denoising of Flower Images
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.1111-1117, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.11111117
Abstract
Identification, and classification of flower images is a crucial issue faced by academicians and researchers. The manual process to distinguish different flower images is a complex task and found difficult for novice persons. A process of extraction, analysis, and understanding of useful information from images is accomplished by an automated process using Computer vision. It basically aims to model, replicate and exceed human vision using computer hardware and software. Image processing techniques may help to recognize a flower image for further identification and classification of them in different species. The fundamental step in image processing is image preprocessing that is applied to improve the quality of images and removing the irrelevant noises existed in images. This paper represents a comparative analysis of different image preprocessing techniques implemented on flower images. The performance evaluation of these techniques is based on their potential to remove noise in flower images. For performance evaluation, Peak Signal to Noise Ratio (PSNR) and Root Mean Square Error (RMSE) methods are used.
Key-Words / Index Term
Image processing, Image preprocessing techniques, PSNR, RMSE
References
[1] Nisha, Isha, “A Survey on Different Classification Methods on Agricultural Processing”, Journal of Network Communications and Emerging Technologies (JNCET), Volume 3, Issue 1, pp.68-72, July 2015.
[2] Chomtip Pornpanomchai, Ponrath Sakunreraratsame, Rosita Wongsasirinart, Nuttakan Youngtavichavhart, “Herb Flower Recognition System (HFRS)”, IEEE, Volume 1, pp. V1-123-V1-127, 02 September 2010
[3] Warisara Pardee, Prawaran Yusungnern, Peeraya Sripian, “Flower Identification System by Image Processing”, Researchgate, August 2015
[4] Y H Sharath Kumar, N Vinay Kumar, D S Guru, “Delaunay Triangulation on Skeleton of Flowers for Classification”, International Conference on Advanced Computing Technologies and Applications (ICACTA), Volume 45, Issue, C, pp. 226 – 235, 2015
[5] Fadzilah Siraj, Hawa Mohd Ekhsan, Abdul Nasir Zulkifli, “Flower Image Classification Modeling Using Neural Network”, International Conference on Computer, Control, Informatics and Its Applications, pp. 81-86, 2014.
[6] Janani, R & Gopal, A. (2013). Identification of selected medicinal plant leaves using image features and ANN. Proceedings of the 2013 International Conference on Advanced Electronic Systems, ICAES 2013. 238-242. 10.1109/ICAES.2013.6659400.
[7] I.Kiruba Raji, K.K.Thyagharajan, “An Analysis of Segmentation Techniques to Identify Herbal Leaves from Complex Background”, International Conference on Intelligent Computing Communication and Convergence (ICCC), Science Direct, Volume 48, pp. 589-599, 2015.
[8] Kim, Yeong-Taeg. (1997). Kim, Y.T.: Contrast enhancement using brightness preserving bi-histogram equalization. IEEE Trans. Consum. Electron. 43(1), 1-8. Consumer Electronics, IEEE Transactions on. 43. 1 - 8. 10.1109/30.580378.
[9] Angela. Saibahu, and K. Vijayan Asari. “An Adaptive and Non-Linear Technique for Enhancement of Extremely High Contrast Images.”, In Applied Imagery and Pattern Recognition Workshop, 35th IEEE, pp. 24-24, 2006.
[10] Cheng, H. D., and Yingtao Zhang. “Detecting of contrast over-enhancement’, In Image Processing (ICIP), 19th IEEE International Conference on, pp. 961-964, 2012.
[11] X. Chen and L. Lv, "A Compositive Contrast Enhancement Algorithm of IR Image", International Conference on Information Technology and Applications (ITA), Chengdu, China, IEEE, pp.58-62, 2013.
[12] Sundaram, M., K. Ramar, N. Arumugam, and G. Prabin. "Histogram-based contrast enhancement for mammogram images.", In Signal Processing, Communication, Computing and Networking Technologies (ICSCCN), 2011 International Conference on, pp. 842-846. IEEE, 2011.
[13] Ayushi Jaiswal, Jayprakash Upadhyay, Ajay Somkuwar, “Image denoising and quality measurements by using filtering and wavelet-based techniques”, International Journal of Electronics and Communications (AEU), ScienceDirect, Volume 68, Issue 8, pp. 699-705, August 2014.
[14] Chandrika Saxena, Prof. Deepak Kourav, “Noises and Image Denoising Techniques: A Brief Survey”, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 3, pp.878-885, March 2014.
[15] Meenal Jain, Sumit Sharma, Ravi Mohan Sairam, “Effect of Blur and Noise on Image Denoising based on PDE”, International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-8, pp. 236-241, March-2013.
[16] Meenal Jain, Sumit Sharma, Ravi Mohan Sairam, “Result Analysis of Blur and Noise on Image Denoising based on PDE”, International Journal of Advanced Computer Research (IJACR) Volume-2, Issue-7, pp. 70-77, December-2012.
[17] S.S. Agaian, K.P. Lentz, A.M. Grigoryan,” A New Measure of Image Enhancement”, International Conference on Signal Processing & Communication, pp. 19–22, 2000.
[18] Dr.K.Thangadurai, K.Padmavathi, “Computer Vision image Enhancement for Plant Leaves Disease Detection”, World Congress on Computing and Communication Technologies, IEEE, pp. 173-175, 2014.
[19] C.Ananthi, Azha.Periasamy, S.Muruganand, “Pattern Recognition of Medicinal Leaves Using Image Processing Techniques”, Journal of Nano Science and Nanotechnology, Volume 2, Issue 2, pp.214-218, February 2014.
[20] K. Padmavathi and K. Thangadurai,” Implementation of RGB and Grayscale Images in Plant Leave Disease Detection – Comparative Study”, Indian Journal of Science and Technology, Volume 9(6), pp.1-6, February 2016.
[21] Mr. Salem Saleh Al-Amri, Dr.N.V.Kalyankar, Dr.S.D.Khamitkar, “Linear and Non-linear Contrast Enhancement Image”, International Journal of Computer Science and Network Security (IJCSNS), Volume 10, No.2, pp. 139-143, February 2010.
[22] Pooja and Gurwinder Singh Jatana, “Adaptive histogram equalization technique for enhancement of colored image quality”, International Journal of Latest Trends in Engineering and Technology, Volume 8, Issue 2, pp.010-017, March 2017.
[23] M.Mallika, Dr. J. Jebakumari Beulah Vasanthi, “Image Enhancement Techniques on Plant Leaf and Seed Disease Detection,” International Journal of Innovative Research in Computer and Communication Engineering, Volume 5, Special Issue 1, pp. 109-116, March 2017.
[24] Deepak J. Dange and Prof. M. A. Sayyad, “Computer Vision Image Enhancement and Plant Leaves Disease Detection”, International Journal of Modern Trends in Engineering and Research (IJMTER), Volume 02, Issue 06, pp. 106-110, June 2015.
[25] Mohd. Junedul Haque, “A Brief Review of Image Restoration Techniques”, International Journal of Advanced Computing Research, Volume 01, pp. 42-45, 2014.
[26] Monika Maru, M. C. Parikh, “Image Restoration Techniques: A Survey”, International Journal of Computer Applications, Volume 160, pp. 15-19, February 2017.
[27] H. Salome Hema Chitra, S. Suguna, and S. Naganandini Sujatha, “A Survey on Image Analysis Techniques in Agricultural Product”, Indian Journal of Science and Technology, Volume 9(12), pp. 1-13, March 2016.
[28] Gursharan Kaur, Rakesh Kumar, Kamaljeet Kainth, “A Review Paper on Different Noise Types and Digital Image Processing”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 6, Issue 6, pp. 562-565, June 2016.
[29] Inderpreet Singh, Nirvair Neeru, “Performance Comparison of Various Image Denoising Filters under Spatial Domain”, International Journal of Computer Applications, Volume 96-No.19, pp. 21-30, June 2014.
[30] Govindaraj.V, Sengottaiyan.G, “Survey of Image Denoising using Different Filters”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 2, Issue 2, pp. 344-351, February 2013.
[31] Sandeep Kumar Agarwal and Prateek Kumar, “Denoising of A Mixed Noise Color Image through Special Filter”, International Journal of Signal Processing, Image Processing, and Pattern Recognition, Volume 9, No.1, pp.159-176, 2016.
[32] Sheikh Tania and Raghad Rowaida, “A Comparative Study of Various Image Filtering Techniques for Removing Various Noisy Pixels in Aerial Image”, International Journal of Signal Processing, Image Processing, and Pattern Recognition, Volume 9, No.3, pp.113-124, 2016.
[33] Ms. Shweta Gupta, Ms. Meenakshi, “A Review and Comprehensive Comparison of Image Denoising Techniques”, IEEE, page: 972-976, 2014.
[34] Kumar, Ashok & C. Trivedi, Harsh & Usha Nilkanthan, Mrs. (2015). Development of Salt-and-Pepper Denoising Techniques. 10.1109/ICECCT.2015.7226017.
[35] Arvind Kumar G., Dr. Ashok Kusagur, “Evaluation of Image Denoising Techniques A Performance Perspective”, International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), IEEE, pp. 1836-1839, 2016.
[36] M. C. Motwani, M. C. Gadiya, R. C. Motwani, Jr. Harris,” Survey of Image Denoising Techniques”, Proceedings of GSPX, pp. 27–30, 2004.
[37] A.K. Kanithi,” Study of Spatial and Transform Domain Filters for Efficient Noise Reduction”, Department of Electronics and Communication Engineering, National Institute of Technology, Rourkela, India, 2011.
[38] N.Bhoi,” Spatial-Domain and Transform-Domain Digital Image Filters”, Department of Electronics and Communication Engineering National Institute of Technology, Rourkela, India, 2009.
[39] I. M. El-Henawy, A. E. Amin, Kareem Ahmed, Hadeer Adel, “A Comparative Study On Image Deblurring Techniques”, International Journal of Advances in Computer Science and Technology (IJACST), Volume 3, No.12, pp. 01-08, 22nd December 2014.
[40] Dejee Singh, Mr. R. K. Sahu, “A Survey on Various Image Deblurring Techniques”, International Journal of Advanced Research in Computer and Communication Engineering, Volume 2, Issue 12, pp. 4736-4739, December 2013.
[41] Zohair Al-Ameen, Ghazali Sulong, and Md. Gapar Md. Johar, “A Comprehensive Study on Fast image Deblurring Techniques”, International Journal of Advanced Science and Technology, Volume 44, pp. 1-10, July 2012.
[42] M.Kalpana Devi, R.Ashwini, “An Analysis on Implementation of various Deblurring Techniques in Image Processing”, International Research Journal of Engineering and Technology (IRJET), Volume 03 Issue: 12, pp. 1049-1059, Dec 2016.
[43] Pooja Dhole and Nitin Chopde, “A Comparative Approach for Analysis of Image Restoration using Image Deblurring Techniques”, International Journal of Current Engineering and Technology, Volume 5, No.2, pp. 1046-1049, April 2015.
[44] Kamaldeep Joshi, Rajkumar Yadav, “PSNR and MSE Based Investigation of LSB”, International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), IEEE, pp. 280-285, 2016.
[45] M. Radhika Mani, V. Lalithya, P.Swetha Rekha, “An Innovative Approach for Pattern Based Image Steganography”, IEEE, presented at the Int Conf Signal Processing, Informatics, Communication, and Energy Systems, pp. 1-4, 2015.
[46] Kalpana Chaurasia and Mrs. Nidhi Sharma, “Performance Evaluation and Comparison of Different Noise, apply on PNG Image Format used in DE convolution Wiener filter (FFT) Algorithm”, Evolving Trends in Engineering and Technology, Volume 4, pp 8-14, 2015.
[47] https://in.mathworks.com/help/vision/ref/psnr.html
[48] https://en.wikipedia.org/wiki/Root-mean-square_deviation
[49] Anil Kumar Gupta, Dibya Jyoti Bora, Fayaz Ahmad Khan, “Multispectral Satellite Color Image Segmentation Using Fuzzy Based Innovative Approach”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 3, Issue1, pp. 968-975, January-February-2018.
[50] Gagan Madaan, “Various Approaches of Content Based Image Retrieval Process: A Review”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 3, Issue 1, pp. 711-716, January-February-2018.
Citation
Isha Patel, Sanskruti Patel, Atul Patel, "Analysis of Various Image Preprocessing Techniques for Denoising of Flower Images," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1111-1117, 2018.
A study of X2 and S1 Handover in LTE Networks using MATLAB
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.1118-1122, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.11181122
Abstract
A load balancing method is proposed for the long term evolution networks. Today the traffic on networks is growing because of huge requirement of higher data rates for e.g. for Video streaming, Video conferencing, Online gaming etc. This demand results in excess load on the networks due to which the networks suffer from the heavy load and the quality of networks get degraded. The Load balancing is achieved between the loaded cell and its neighbor cells which are directly connected to each other and one of them have enough available resources so that the load can be shared with the neighbor node. In this work, we have proposed a method for load balancing in LTE networks which shows the simulation of two scenarios in which the handover is done between the LTE to LTE and LTE to Non LTE network nodes done.
Key-Words / Index Term
LTE Networks, Mobility, Handover, Load Balancing
References
[1] R. Divya and A. Huseyin, “3GPP – Long Term Evolution – A technical Study,” Spring 2009’.
[2] A Technical White paper,"Long Term Evolution (LTE): A Technical Overview", Motorola
[3] D. Astely, E. Dahlman, A. Furuskar, Y. Jading, M. Lindstrom, and S.Parkvall, “LTE: The Evolution of Mobile Broadband”, LTE PART11: 3GPP Release, Ericsson Research.
[4] M. Meyer et al., “ARQ Concept for the UMTS Long-Term Evolution,” VTC Fall 2006, Montreal, Canada, Sept. 2006.
[5] Alatishe S. Adeyemi 1 , Dike U. Ike 2, “A Review of Load Balancing Techniques in 3GPP LTE System” , ISSN : 2319-7323, Vol. 2 No.04 July 2013.
[6] Tutorialspoint, online [Available] : https://www.tutorialspoint.com/lte/
[7] 3GPP. TS 36.214, Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Layer; Measurements. V11.1.0, February 2013.
[8] 3GPP. TS 36.331, Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol Specification. 11.8.0, July 2014
[9] L. Luan, M. Wu, X. He and J. Shen, “Optimization of handover Algorithms in LTE High Speed Railway networks”, International Journal of Digital Content Technology and its Applications (JDTCA), 2012.
[10] H. Song, L. Yan and X. Fang, “ Handover Scheme for 5G C/U Plane Split Heterogeneous Network in High Speed Railway”, IEEE Transaction on Vehicular Technology, Vol. 63, No 9, pp. 4633-4646, November 2014.
[11] E. Tuncel, “Tuning of handover parameters in LTE-A heterogeneous networks”, Master Thesis, 2014.
[12] Y. Zhang, L. Luan, S. Ge and M.wu, “Optimization of time-to-trigger parameter on handover performance in LTE high speed railway networks”, 15th International Symposium on Wireless Personal Multi Media Communications (WPMC), pp. 251-255, 2012.
[13] M. Assuyadly, A. Silitonga and A. Suhartomo, “Evaluation of X2-Handover Performance Based on RSRP Measurement with Friis Path Loss using Network Simulator version 3 (NS-3)”, 2nd International Conference on information and communication technology, pp. 436-441, 2014.
Citation
B. Singh, M. Yadav, "A study of X2 and S1 Handover in LTE Networks using MATLAB," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1118-1122, 2018.
Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.1123-1128, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.11231128
Abstract
Cloud computing gives shared pool of assets (computers resources like networks, server and storage) on the demand of the user in ubiquitous and simple way that can be provisioned to the user with a very little management effort. The basic concept of cloud computing can be understood by the following definition according to NIST. It can be concluded from the above discussions that the demands required by the user are fulfilled by the cloud computing. These demands include both hardware and software resources which are present on the internet. A shared pool of resources is provided by the cloud computing provider which can be accessed by the users as per their demands. The users subscribe as per their requirements and access the resources until it wants to. Virtualization is the technique which helps in providing such services and also in reducing the cost of implementation and also adding hardware parts which will help in meeting the requirements of the user. The PDPT and NTBPRET are the techniques which ensure the data integrity.
Key-Words / Index Term
Mobile cloud computing, secure data distribution, data integrity, access control, proxy re-encryption.
References
[1] Shui Han, Jianchuan Xing, “Ensuring Data Storage Through A Novel Third Party Auditor Scheme in Cloud Computing” , 2011, IEEE computer science & Technology, pp 264-268.
[2] Bhavna Makhija, VinitKumar Gupta, “Enhanced Data Security in Cloud Computing with Third Party Auditor”, 2013, International Journal of Advanced Research in Computer Science and Software Engineering, pp 341-345
[3] Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, pp. 485-492, 2016.
[4] Saranya Eswaran, Dr. Sunitha Abburu, “Identifying Data Integrity in the Cloud Storage”, IJCSI International Journal of Computer Science Issues, vol. 9, pp. 403-408, 2012.
[5] Gaurav Pachauri, Subhash Chand Gupta, “ENSURING DATA INTEGRITY IN CLOUD DATA STORAGE”, IJCSNS International Journal of Computer Science and Network Security, vol. 14, pp. 34-38, 2014.
[6] S. P. Jaikar, M. V. Nimbalkar, “Verifying Data Integrity in Cloud”, International Journal of Applied Information Systems (IJAIS), vol. 3, pp. 38-46, 2012.
[7] Anchal Srivastava, Ashutosh sehgal, Vikas Kumar Singh, Nitish Kumar Bose, “Provable data possession for integrity verification”, 2014, International Refereed Journal of Engineering and Science (IRJES), Volume 3, Issue 4
[8] Preeti Siroh and Amit Agarwal, “Cloud Computing Data Storage Security framework relating to Data Integrity, Privacy and Trust”, 2015 1st International Conference on Next Generation Computing Technologies (NGCT-2015)
[9] Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang, “One-tag Checker: Message-locked Integrity Auditing on Encrypted Cloud Deduplication Storage”, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications
[10] Andrey N. Rukavitsyn, Konstantin A. Borisenko, Ivan I. Holod, Andrey V. Shorov, “The Method of Ensuring Confidentiality and Integrity Data in Cloud Computing”, 2017, IEEE
[11] G. Ateniese, R. D. Pietro, L. V. Mancini, G. Tsudik, “Scalable and Efficient Provable Data Possession”, in Proceedings of SecureComm, vol. 2, pp. 23-28, 2008.
[12] Benoˆıt Libert and Damien Vergnaud. Unidirectional chosenciphertext secure proxy re-encryption. Information Theory, IEEE Transactions on, 57(3):1786 –1802, march 2011.
[13] Qiang Tang. Type-based proxy re-encryption and its construction. In DipanwitaRoy Chowdhury, Vincent Rijmen, and Abhijit Das,editors, Progress in Cryptology - INDOCRYPT 2008, volume 5365 of Lecture Notes in Computer Science, pages 130–144. Springer Berlin Heidelberg, 2008.
[14] Parsi, K., & M.Laharika, “A Comparative Study of Different Deployment Models in a Cloud”, 2013, International Journal of Advanced Research in Computer Science and Software Engineering , 3 (5), 512-515.
[15] Srinivas.J, K. Venkata Subba Reddy, Dr. A. Moiz Qyser, “Cloud Computing Basics”, 2012, International journal of advanced research in computer and communication engineering , pp. 343-347
[16] Seyyed Mansur Hosseini and Mostafa Ghobaei Arani,” Fault-Tolerance Techniques in Cloud Storage: A Survey”, 2015, International Journal of Database Theory and Application, Vol.8, No.4 (2015), pp.183-190
[17] SookKyong Choi, KwangSik Chung, Heonchang Yu,” Fault tolerance and QoS scheduling using CAN in mobile social cloud computing”, 2013, Springer Science+Business Media New York
[18] Dr. Lakshmi Prasad Saikia, Yumnam Langlen Devi,” FAULT TOLEREANE TECHNIQUES AND ALGORITHMS IN CLOUD COMPUTING”, International Journal of Computer Science & Communication Networks, Vol 4(1),01-08
[19] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, “Provable Data Possession at Untrusted Stores”, in Proceedings of 14th ACM Conf. Computer and Comm, Security (CCS ’07), vol. 5, pp. 231-238, 2007.
[20] MS. R. K. Pandya, prof. K. K. Sutaria, “Data integrity techniques in cloud: an analysis”, journal of information, knowledge and research in computer engineering”, vol. 2, pp. 413-417, 2012.
[21] Soumya Ray and Ajanta De Sarkar, “Execution Analysis of Load Balancing Algorithm in Cloud computing Environment”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.5, October 2012
[22] Sanjoli Singla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
[23] Tushar Desai, Jignesh Prajapati, “A Survey of Various Load Balancing Techniques and Challenges in Cloud Computing”, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 2, ISSUE 11, NOVEMBER 2013
[24] Vimmi Pandey, “Securing the Cloud Environment Using OTP” International Journal of Scientific Research in Computer Science and Engineering vol-1, Issue-4, 2013
[25] Anandita Singh Thakur, P.K. Gupta, and Punit Gupta, “Handling Data Integrity Issue in SaaS Cloud”, 2014, Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 127– Vol. 2, Advances in Intelligent Systems and Computing
[26] Jiang Zhang, Zhenfeng Zhang, Hui Guo. "Towards Secure Data Distribution Systems in Mobile Cloud Computing", IEEE Transactions on Mobile Computing, 2017
[27] RezaOsamaRandal CurtmolaKhanBurns. "Robust remote data checking", Proceedings of the 4th ACM international workshop on Storage security and survivability - StorageSS 08 StorageSS 08, 2008
[28] ZHU, YAN, SHANBIAO WANG, HONGXIN HU, GAIL-JOON AHN, and DI MA. "SECURE COLLABORATIVE INTEGRITY VERIFICATION FOR HYBRID CLOUD ENVIRONMENTS", International Journal of Cooperative Information Systems, 2012.
Citation
Ankit Chamoli, Anshika Goyal , "Data Integrity and Performance Comparison of New Type- Based Proxy Re-encryption (TB-PRE) and Provable Data Possession (PDP) in Mobile Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1123-1128, 2018.
Smart Home Energy Management Systems: A Literature survey
Survey Paper | Journal Paper
Vol.6 , Issue.5 , pp.1129-1132, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.11291132
Abstract
India being a developing country produces a large amount of CO2, Major portion of which includes Electricity production. This paper aims to bring light to the technologies related to Smart Grid Systems and Smart homes which can be incorporated to reduce energy usage. Smart Grid is a technology to decentralize energy supply and communicate with users to dynamically set prices to reduce load on the power grid. Smart Home Technology automates and controls all electrical devices connected in the network. The combination of these two technologies can help reduce load on Power Grid and thus save energy consumption.
Key-Words / Index Term
Smart homes, smart grid, smart home energy managment system, real-time pricing, Internet of Things
References
[1] Allcot, H.t: “Real time pricing and electricity markets”, Harvard University, 2009.
[2] CEN-CENELEC-ETSI Smart Grid Coordination Group: “Reference Architecture for the Smart Grid” (SG CG/RA Smart Grid Reference Architecture), Brussels, 2012.
[3] Federal Energy Regulatory Commission: “Assessment of demand re- sponse and advanced metering”
http://www.ferc. gov/legal/staff-reports/2010-dr-report.pdf, 2011
[4] Q. Hu, L. Fi., “Hardware Design of Smart Home Energy Management System With Dynamic Price Response”, IEEE Transactions on Smart Grid Vol. 4, pp.1878-1887, 2013.
[5] K.M. Tsui, K., S.C. Chan, “Demand Response Optimization for Smart Home Scheduling Under Real-Time Pricing”, IEEE Transactions on Smart Grid Vol. 3 No. 4, pp.1812-1821, 2012.
[6] M. Cabras, V. Pilloni, A. Luigi, “A Novel Smart Home Energy Management System: Cooperative Neighbourhood and Adaptive Renewable Energy Usage” IEEE International Conference on Communications,India, pp.716 – 721, 2015.
[7] Gov. Of India “CO2 Baseline Database for the Indian Power Sector”, User Guide Version 12.0, May 2017.
[8] Gov. Of India, Ministery of Power Central Authority “Summary for month of Jan 2017”, Jan 2017
[9] G. Song, F. Ding, W. Zhang, A. Song, “A wireless power outlet system for smart homes”. IEEE Trans. Consum. Electron., vol. 54, no.4, pp.1688–1691, 2008.
[10] P. Wang, J. Huang , Y. Ding, , P. Loh , L. Goel, “Demand side load management of smart grids using intelligent trading/metering/billing system”, IEEE Power Energy Soc. Gen. Meet 2010, pp.1–6, 2010.
[11] D. Cook , M. Youngblood , E. Heierman , K. Gopalratnam, S. Rao, A. Litvin, F. Khawaja, “Mavhom: An agent-based smart home”, in Proc. IEEE PerCom 2003, pp.521–524, 2003.
Citation
A. Gupta, T. Garg, S.D. Chaudhary, P. Paygude, "Smart Home Energy Management Systems: A Literature survey," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1129-1132, 2018.
Itinerary and Mobile Code Patterns for Emerging Mobile Agent Systems in Large Scale Distributed Environments
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.1133-1141, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.11331141
Abstract
Patters in mobile agents help to design different applications which have non-permanent connections by adding the mobility code, improved networks, goal sustainability and machine based intelligence. Also the agent patterns mainly provide easy methods of developing the agent-based applications which are used or operated in open and large-scale distributed environments. It can provide various facilities like mobility, working in intermittent connections, autonomous execution, and many more that can allow sustainability of mobile agent based systems amidst of existing technologies like client-server. This paper gives an overview of the patterns of the mobile agents in mobile computing. Also the discussion covers the patterns and their usage, architectures, languages, applications, and the implementation challenges that are likely to be faced. This paper mainly discusses mobile agent which is a new technology that can be used in designing, implementing, and maintaining distributed systems. The discussion covers the patterns for mobile agents in the mobile computing applications.
Key-Words / Index Term
distributed computing, agents patterns, agent oriented programming
References
[1] Ahila, S. Sobitha, and K. L. Shunmuganathan. “Overview of mobile agent security issues—Solutions.” In Information Communication and Embedded Systems (ICICES), International Conference on, pp. 1-6. IEEE, 2014.
[2] Hasan, Ragib, Md Mahmud Hossain, and Rasib Khan. “Aura: An iot based cloud infrastructure for localized mobile computation outsourcing.” In Mobile Cloud Computing, Services, and Engineering (MobileCloud), 3rd IEEE International Conference on, pp. 183-188. IEEE, 2015.
[3] Chowhan R. S., “Mobile Agent based Workflow Management System (MAWFMS) for Information Flow and Business Processes.” Orient.J. Comp. Sci. and Technol;Vol.11(1), 2018
[4] Roman, Rodrigo, Javier Lopez, and Masahiro Mambo. “Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges.” Future Generation Computer Systems 78 pp. 680-698, 2018.
[5] Kogan, Alexander, Ephraim F. Sudit, and Miklos A. Vasarhelyi. “Continuous online auditing: A program of research." In Continuous Auditing: Theory and Application”, pp. 125-148. Emerald Publishing Limited, 2018.
[6] Xu, Yingyue, and Hairong Qi. “Mobile agent migration modeling and design for target tracking in wireless sensor networks.” Ad Hoc Networks Vol.6, no. 1 pp.1-16, 2008.
[7] Cai, Wei, Min Chen, Takahiro Hara, Lei Shu, and Taekyoung Kwon. “A genetic algorithm approach to multi-agent itinerary planning in wireless sensor networks.” Mobile Networks and Applications Vol.16, no. 6, pp.782-793, 2011.
[8] Gavalas, Damianos, Ioannis E. Venetis, Charalampos Konstantopoulos, and Grammati Pantziou. “Mobile agent itinerary planning for WSN data fusion: considering multiple sinks and heterogeneous networks” International Journal of Communication Systems Vol.30, no.8, 2017.
[9] Wang, Xiaofei, Min Chen, Taekyoung Kwon, and Han-Chieh Chao. “Multiple mobile agents` itinerary planning in wireless sensor networks: survey and evaluation.”, IET communications Vol.5, no.12 ,pp.1769-1776, 2011.
[10] Chen, Min, Wei Cai, Sergio Gonzalez, and Victor CM Leung. “Balanced itinerary planning for multiple mobile agents in wireless sensor networks.” In International Conference on Ad Hoc Networks, pp. 416-428. Springer, Berlin, Heidelberg, 2010.
[11] Cai, Wei, Min Chen, Takahiro Hara, and Lei Shu. “GA-MIP: genetic algorithm based multiple mobile agents itinerary planning in wireless sensor networks.” In Wireless Internet Conference (WICON), The 5th Annual ICST, pp.1-8. IEEE, 2010.
[12] Chen, Min, Laurence T. Yang, Taekyoung Kwon, Liang Zhou, and Minho Jo. "Itinerary planning for energy-efficient agent communications in wireless sensor networks." IEEE Transactions on Vehicular Technology Vol.60, no.7, pp.3290-3299, 2011.
[13] Aloui, Imene, Okba Kazar, Laid Kahloul, and Sylvie Servigne. “A new Itinerary planning approach among multiple mobile agents in wireless sensor networks (WSN) to reduce energy consumption.” International Journal of Communication Networks and Information Security Vol.7, no.2, 2015.
[14] Cai, Wei, Min Chen, Takahiro Hara, Lei Shu, and Taekyoung Kwon. “A genetic algorithm approach to multi-agent itinerary planning in wireless sensor networks.” Mobile Networks and Applications Vol.16, no.6, pp.782-793, 2011.
[15] Nestinger, Stephen S., Bo Chen, and Harry H. Cheng. “A mobile agent-based framework for flexible automation systems.” IEEE/Asme Transactions on Mechatronics Vol.15, no.6 pp.942-951, 2010.
[16] Miller, Naomi Liora, Harold Roy Miller, and Warren Stableford. “Translation of user requests into itinerary solutions.” U.S. Patent 9,659,099, issued May 23, 2017.
[17] Rahul Singh Chowhan and Rajesh Purohit, “Study of mobile agent server architectures for homogeneous and heterogeneous distributed systems.” International Journal of Computer Applications Vol.156, no. 4,pp.32-37, 2016.
[18] Rahul Singh Chowhan, Amit Mishra, and Ajay Mathur, “Aglet and kerrighed as a tool for load balancing and scheduling in distributed environment.” In Recent Advances and Innovations in Engineering (ICRAIE), International Conference on, pp.1-6. IEEE, 2016.
[19] Bagga, Pallavi, and Rahul Hans. “Applications of mobile agents in healthcare domain: a literature survey.” International Journal of Grid Distribution Computing Vol.8, no. 5, pp.55-72, 2015.
[20] Dinh, Hoang T., Chonho Lee, Dusit Niyato, and Ping Wang. “A survey of mobile cloud computing: architecture, applications, and approaches.” Wireless communications and mobile computing Vol.13, no.18 pp.1587-1611, 2013.
[21] Jara, Antonio J., Miguel A. Zamora-Izquierdo, and Antonio F. Skarmeta. "Interconnection framework for mHealth and remote monitoring based on the internet of things." IEEE Journal on Selected Areas in Communications Vol.31, no. 9 pp.47-65, 2013.
[22] Shiraz, Muhammad, Abdullah Gani, Rashid Hafeez Khokhar, and Rajkumar Buyya. “A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing.” IEEE Communications Surveys & Tutorials Vol.15, no. 3, pp.1294-1313, 2013.
[23] Baig, Mirza Mansoor, Hamid Gholamhosseini, and Martin J. Connolly. "A comprehensive survey of wearable and wireless ECG monitoring systems for older adults." Medical & biological engineering & computing Vol.51, no. 5, pp. 485-495, 2013.
[24] Iwaya, Leonardo H., Marco AL Gomes, M. A. Simplício, T. C. M. B. Carvalho, Cristina K. Dominicini, Rony RM Sakuragui, Marina S. Rebelo, Marco Antonio Gutierrez, Mats Näslund, and P. Håkansson. “Mobile health in emerging countries: a survey of research initiatives in Brazil.” International journal of medical informatics Vol.82, no 5, pp.283-298, 2013.
[25] Bhaskar, B., Kumar T. Jagadish., Kamal, M.V., “A Security Determination-Reaction Architecture for Heterogeneous Distributed Network.”, IJSRCSE, Vol.5, Issue.5, pp.22-34, 2017.
[26] Singla, Annie., Jain, Kamal., Gairola, Ajay., “Delving into Security of Networks-Time’s Need” IJSRNSC, Vol.2, Issue.3, pp.1-8, 2014.
Citation
R.S. Chowhan, P. Dayya, "Itinerary and Mobile Code Patterns for Emerging Mobile Agent Systems in Large Scale Distributed Environments," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1133-1141, 2018.
Online Database Load Balancer to Collaborating With Existing Database
Review Paper | Journal Paper
Vol.6 , Issue.5 , pp.1142-146, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.1142146
Abstract
According to literature meaning of Cloud Computing is distributed computing, storing, sharing, and accessing data over the internet. Cloud is the platform which provides numerous type of resources where the end user may use the resource for developing own software and even their own cloud and even include a new resource to the existing once. The biggest issue for a cloud datacentre is to tackle with billions of request coming dynamically from the end users to handle their database in efficient and effective manner. To achieve this goal, various load balancing approaches have been proposed in past years. Database load balancing strategies aim at achieving high software developer satisfaction by producing service like auto scale of their data in database, zero-downtime, multiple database choices, multi tenancy support. Load balancing in this environment means equal distribution of workload across instances. End users needs ample space to store their database data to decrease the maintenance cost and buying cost of servers and area required to assemble them this paper focus on the balancing the data in database. This paper, focus on database based load balancing which works well in cloud environment, considers resources specific demands of the tasks and reduces overflow of data overhead by dividing the data on running instances.
Key-Words / Index Term
Auto scalability, Cloud computing, load balancer, Multi tenancy, Snapshot, Zero downtime
References
[1]. Z. Gong, X. Gu, and X. Ma. Siglm: Signature-driven load management for cloud computing infrastructures. In Proc. IEEE International Conference on Quality of Service (IWQoS), Charleston, South Carolina, 2009
[2]. Ha`c and X. Jin. Dynamic load balancing in distributed system using a decentralized algorithm. In Intl. Conf. on Distributed Computing Systems, 1987.
[3]. Mahajan, K., & Dahiya, D., “A Cloud Based Deployment Framework For Load Balancing Policies” IEEE seventh International Conference on Contemporary Computing, pp. 565-570, August 2014.
[4]. Sharma, S., Singh, S., & Sharma, M. “Performance Analysis Of Load Balancing Algorithms” World Academy of Science, Engineering and Technology, 38, pp. 269-272, 2008.
[5]. Rahman, M., Iqbal, S., & Gao, J., “Load Balancer as a Service in Cloud Computing”, IEEE 8th
[6]. Nuaimi, K. A., Mohamed, N., Nuaimi, M. A., & Al-Jaroodi, J., “A Survey of Load Balancing in Cloud Computing: Challenges and Algorithms” IEEE second symposium on Network Cloud Computing, pp.137-142,December2012.
Citation
Shital Pawar, Sadiya Shaikh, Priyanka Wadagave, Megha Chavan, Deepika Tambat, "Online Database Load Balancer to Collaborating With Existing Database," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1142-146, 2018.
Affect of pouring temperature on volume deficit of US 413
Research Paper | Journal Paper
Vol.6 , Issue.5 , pp.1147-1150, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.11471150
Abstract
US 413 (Al-12Si) alloy volume deficit characteristic has been studied in this paper. Influence of pouring temperature on volume deficit is studied and latter is addition of Macro cavities, Internal porosity, Surface sink and Volumetric contraction. The decrease in definite volume of molten metal leads to volume deficit in castings, and it can be envisaged as a casting defect. Volume deficit of a casting depends on casting material and casting conditions. Influence of pouring temperature and casting shape on the volume deficit characteristics are studied in this paper. Increase in pouring temperature lowers the rate of heat extraction by the mould thereby reducing volume deficit.
Key-Words / Index Term
Volume deficit, pouring temperature, Macro cavities, Internal porosity, Surface sinks, Volumetric contraction, Al-Si alloy
References
[1]. ASM Metals Handbook Volume 15, Casting, ASM International, The Materials Information Company, 2004
[2]. Thoguluva Raghavan Vijayaram, “Mechanical property investigation of LM6 alloy castings manufactured with the aid of casting solidification simulation technology”, Indian Foundry Journal, Vol.51, No.11, November 2005, pp. 30-34
[3]. Richard W Heine, Carl R Loper, Jr and Philip C Rosenthal, Principles of Metal Casting, Tata McGraw Hill Publisher Company
[4]. Mollard, F:R, Flemmings M.C., and Nyama E.F.; “Understanding aluminium fluidity: the key to advanced cast products”, AFS Trans (1987), vol. 95, pp. 647-652
[5]. S.Sundarrajan, H.Md. Roshan, E.G. Ramachandran, “Studies on shrinkage characteristics of binary Mg-Al alloys”, Transactions of The Indian Institute of Metals, Vol.37, No.4, August 1984
[6]. P.Kumar, J.L.Gaindhar, “Effect of process variables on surface finish and soundness of Al-11%Si alloy V-Process castings”, AFS transactions, 96-159, pp.1143-1149,1997
[7]. John Campbell and Richard A. Harding, “TALAT Lecture 3206, The Feeding of Castings, IRC in Materials”, The University of Birmingham, EAA - European Aluminium Association,1994
[8]. Feeding mechanisms in casting, Journal of Cast Metals Research, Vol.5, p.1, 1969
[9]. P.Kumar, J.L.Gaindhar, Effect of process variables on surface finish and soundness of Al-11%Si alloy V-Process castings, AFS transactions, 96-159, pp.1143-1149,1997
[10]. Shuyong Dongy, Shoumei Xiong and Baicheng Liu, Numerical Simulation of Microporosity Evolution of Aluminum Alloy Castings, J. Mater. Sci. Technol., Vol.20 No.1, 2004, pp.23-26
[11]. Foseco Non-Ferrous Foundry man’s Handbook, Eleventh edition, Revised and edited by, John R. Brown, Butterworth Heinemann publisher, 2008
[12]. A.S. Bochvar, O.S. Zhadaeva, Theory of shrinkage phenomena in alloys, Liteinsedelo No.5, 1941
Citation
Samavedam Santhi, "Affect of pouring temperature on volume deficit of US 413," International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1147-1150, 2018.