Association Rule Mining
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.153-158, May-2014
Abstract
Today, Association Rules are considered to be one of the more studied fields under Data Mining. It recently has come under a lot of notice by the data base warehouses. Its main use is to extract interesting associations, co-relations and frequent patterns among the groups of items recorded of the transactional databases or some different form of data storages. In this paper, a categorization and comparison of the different association rule algorithms that are present today is provided.
Key-Words / Index Term
Data Mining, Association Rules, AssociationRule Algorithms, Database, Data Analysis
References
[Agrwl93] RakeshAgrawal, Tomasz_Imielinski and Arun N. Swami, Mining_Association_RulesBetweenSets of Items in Large_Databases.
[Agrwl98] Charu C. Aggarwal and Philip_S. Yu, A New Framework for Itemset_Generation.
[Chn96] Ming-Syan Chen, Jiawei Han and Philip_S. Yu, Data Mining: An Overview from a Database_Perspective.
[Fayyd96] Usama M. Fayyad, Gregory_Piatetsky-Shapiro, and Padhraic Smyth, From Data Mining to knowledge Discovery: An Overview, Advances in Knowledge Discovery and Data Mining, pp 1-34.
[Chng96c] David Wai-Lok Cheung, Ada Wai-Chee Fu, Vincent T. Ng, and Yongjian Fu, Efficient Mining of Association_Rules in Distributed_Databases, Vol. 8, No. 6, pp. 911-922.
NOTATIONS
[1] I: Set of data items
[2] n: No. of data items
[3] D: Transactional database
[4] s: Support
[5] α: Confidence
[6] T: Tuples in database
[7] X,Y: Itemsets
[8] X ⇒ Y: Association rule
[9] Lk: Set of large itemsets of size `k`
[10] Li: Set of large itemsets for partition Di
[11] L: Set of large itemsets
[12] l :Large itemset
Citation
P. Saxena, R. Jain, "Association Rule Mining," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.153-158, 2014.
Social Networking Analysis
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.159-163, May-2014
Abstract
In today�s day and age, a rapid proliferation of technology has enabled efficient global communication. As a result, the last decade has seen social networking emerge as the backbone of global interactions. At the kernel of this advent, lies the concept of networks. Networks are arrangements of interconnections among a variety of entities. From this we can deduce that social networks are social structures comprising individuals and the interactions they have with each other. The computational analysis of these networks is known as social network analysis.
Key-Words / Index Term
Social Network Analysis, Directed Acyclic Graph, Statistical Relational Learning
References
[1] Hierarchical structure and the prediction of missing links in networks by Aaron Clauset, Christopher Moore, M. E. J. Newman3.
[2] Predicting Hierarchical Structure in Small World Social Networks by Hussain, Dil Muhammed Akbar.
[3] Link Prediction In Social Networks by Prof. William H. Hsu.
[4] Networks, Crowds, and Markets: Reasoning about a Highly Connected World by David Easley and Jon Kleinberg. Cambridge University Press, 2010.
[5] The Link-Prediction Problem for Social Networks by David Liben-Nowell and Jon Kleinberg.
[6] Adamic, L.A., & Adar, E. (2003). Friends and neighbours on the Web. Social Networks, 25(3), 211�230.
[7] Statistical Relational Learning: A Tutorial by Lise Getoor University of Maryland, College Park ECML/PKDD 2007 Tutorial.
[8] Link prediction problem for soc net by David Liben-Nowell n Jon Kleinberg.
[9] Clauset, A., Moore, C., and Newman, M. E. J. Hierarchical structure and the prediction of missing links in networks.
[10] Citation: Social Network Analytics by Elena Pupazan.
[11] Emergence of global status hierarchy in social networks by Yue Chen, Jia Ji, Yizheng Liao.
[12] Ahmed, Elmagarmid, and Ipeirotis, Panagiotis G., and Verykios, Vassilios. (2007) Duplicate Record Detection: A Survey.
[13] Link prediction in social network by Muhammad Al Hassan n Muhammad J Zaki.
Citation
S. Chahar, "Social Networking Analysis," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.159-163, 2014.
E-tourism-Paradigm Shift
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.164-167, May-2014
Abstract
Tourism is travel for recreational, leisure, or business purposes, usually of a limited duration. Tourism is commonly associated with trans-national travel, but may also refer to travel to another location within the same country.. E-tourism is the digitization of all the processes and value chains in the tourism, travel, hospitality and catering industries that enable organizations to maximize their efficiency and effectiveness. Journey of tourism to e-tourism start at year 1962 with Central reservation system followed by Airline Computer Reservations Systems, e-ticketing ,Graphical information system and cloud technology service in tourism.
Key-Words / Index Term
Central Reservation System, Global Distribution Systems, E-Ticketing, Global Distribution Systems, Cloud Technology
References
[1] "UNWTO technical manual: Collection of Tourism Expenditure Statistics". World Tourism Organization. 1995. p. 10. Retrieved 26 March 2009.
[2] Buhalis, Dr Dimitrios. 1120/1/fulltext.pdf. http://epubs.surrey.ac.uk. [Online] august 6, 2003. [Cited: april 21, 2014.] http://epubs.surrey.ac.uk/1120/1/fulltext.pdf.
[3] Njegus, Angelina. Angelinalesson-3-from-computer-reservation-systems-to-global-distribution-systems. http://www.slideshare.net. [Online] Jul 16, 2013. [Cited: april 21, 2014.] http://www.slideshare.net/AngelinaNjegus/lesson-3-from-computer-reservation-systems-to-global-distribution-systems.
[4] The four Global Distribution Systems in the travel and tourism industry. Karcher, K. 1996, Electronic Markets, pp. 20-24.
[5] Report. about/pressroom/whitepapers/history_outlook.pdf. http://www.orbitz.com/. [Online] 2001.
[6] Noakes, G. A. Coulter, BA says more changes are on their way. Travel Trade Gazette. 2002, pp. 14-16.
[7] E-Ticketing as a New Way of Buying Tickets:Malaysian Perceptions. Ainin Sulaiman, Josephine Ng and Suhana Mohezar. 2008, J. Soc. Sci, pp. 149-157.
[8] ONLINE TOURISM MARKETING. MALRA, DR. RENU. 2013, Asia Pacific Journal of Marketing & Management Review, pp. 150-153.
[9] A STUDY ON THE ADOPTION OF CLOUD TECHNOLOGY SERVICE. Shu-Ping Lin, Shou-Yen Lin. phuket : s.n., 2013. Procedding of 2013 international conference on technology enovations and industrial management. pp. s-318 to s-320.
[10] Nyerges. �Computing Approach to GIS�. s.l. : GNC Publications, 1992.
[11] AN OVERVIEW OF INFORMATION TECHNOLOGY IN TOURISM INDUSTRY. Gupta, Anju. Vol 1, No 1 (2012), International Journal of Applied Services Marketing Perspectives.
[12] Using the Internet as a Pleasure Travel Planning Tool: an Examination of the Sociodemographic and Behavioral Characteristics Among Internet Users and Nonusers. Bonn, M.A. and Furr, H.L., and Susskind , A.M. 1998, Journal of Hospitality & Tourism Research, pp. 303- 317.
[13] A 3D Geo-Spatial Virtual Reality System for Virtual Tourism. V.F. Balogun, A.F. Thompson, O.A. Sarum. 2010, The Pacific Journal of Science and Technology Volume 11. Number 2., pp. 601-605.
Citation
V.V. Pawar, S.D. Mundhe , "E-tourism-Paradigm Shift," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.164-167, 2014.
A Comprehensive Review of Improvement of Image Contrast in Case of Poor Light
Review Paper | Journal Paper
Vol.2 , Issue.5 , pp.168-175, May-2014
Abstract
In this paper, we are reviewing several research papers regarding study and analysis towards improvement of image contrast in case of poor light. In this paper we most focus on many algorithms that has been designed for enhancement of image, At the end, a study has been made by comparing all the proposed parameters that with certain advantages and having limitations too, that have been conducted a relevant experimental analysis to evaluate both their robustness and their performance. Our review work involves a comparative study of Improvement of Image Contrast for image enrichment with respect to the following parameter Performance, Scalability, Image enhancement, Image Acquisition, Applying Morphological operators, Detecting and extracting the background, Applying contrast enhancement operators:- block analysis and opening by reconstruction, Applying image enhancement techniques like image sharpening etc.
Key-Words / Index Term
: Digital Image Processing, Denoiser, Morphological Operators, Filters, Image contrast, Image segmentation
References
[1] E. Peli, �Contrast in complex images�, Optical Engineering, Volume 7, No.10, Page No (2032�2040), 1990.
[2] C. R. Gonz�lez, E.Woods, �Digital Image Processing�, Englewood Cliffs, National Journal: Prentice Hall, Page No 197-199, 1992.
[3] G. M. Matheron. �Random sets and integral in Geometry�, Wiley, New York, 288 pages, 1975.
[4] J. Serra. �Image Analysis Using Mathematical Morphology�, Conference Automatic Face and Gesture Recognition, 1982.
[5] R. H. Sherrier and G. A. Johnson, �Regionally Adaptive Histogram Equalization of the Chest,� IEEE Transaction on Medical Imaging, Volume Medical Imaging - 6, Page No.1�7, 1987.
[6] Lixu Gu, Toyohisa Kaneko, �Morphological Segmentation Applied to Character Extraction from Color Cover Images�, Fourth International Symposium on Mathematical, Page No. 367-374,1998.
[7] A. Toet, �Multiscale Contrast Enhancement with Applications to Image Fusion,� Optical Engineering, Volume 31, No. 5, 1992.
[8] P. Salembier and J. Serra, �Flat Zones Filtering, Connected Operators and Filters by Reconstruction,� IEEE Transaction Image Process, Volume 3, No.8, Page No. 1153�1160, Aug. 1995.
[9] N.J. B. McFarlane, C.P. Schofield, �Segmentation And Tracking Of Piglets In Images�, Machine Vision and Applications, Volume 8, No. 3, Page No 187�193, 1995.
[10] S. Mukhopadhyay, B. Chanda, �A Multiscale Morphological Approach to Local Contrast Enhancement,� Signal Process, Volume 80, No. 4, Page No 685�696, 2000.
[11] I.R. Terol-Villalobos, �Morphological Image Enhancement and Segmentation,� in Advances in Imaging and Electron Physics, Page No. 207�273, 2001.
[12] J. Kasperek, �Real Time Morphological Image Contrast Enhancement in Virtex FPGA,� in Lecture Notes in Computer Science Volume 2147, Page No 430-440, 2001.
[13] J. Short, J. Kittler, and K. Messer, �A Comparison of Photometric Normalization Algorithms for Face Verification,� presented at the IEEE International Conference Automatic Face and Gesture Recognition, 2004.
[14] I.R.Terol-Villalobos, �Morphological Connected Contrast Mappings Based on Top-Hat Criteria: A Multiscale Contrast Approach,� Optical Engineering, Volume 43, No. 7, Page No 1577�1595, 2004.
[15] Hee-Won Lee and Byung-Uk Lee, �Improving Brightness for a Multi-projector Display Considering Image Content,� in Lecture Notes in Computer Science, Volume 4292, Page No 70 � 78, 2006.
[16] S. Calderara, R. Melli, A. Prati, R. Cucchiara, �Reliable Back Ground Suppression For Complex Scenes�, in: ACM International Workshop on Video Surveillance and Sensor Networks, 2006.
[17] Mannan S.M., Aamir Saeed Malik, Humaira Nisar, and Tae-Sun Choi, �Rectification of Illumination in Images used for Shape�, in Lecture Notes in Computer Science, Volume 4292, Page No 166 � 175, 2006.
[18] Dongil Han and Byoungmoo Lee, �Development of Early Tunnel Fire Detection Algorithm Using the Image Processing�, in Lecture Notes in Computer Science 4292, Page No 39 � 48, 2006.
[19] Michael A. Webster, Kyle McDermott, and George Bebis, �Fitting the World to the Mind: Transforming Images to Mimic Perceptual Adaptation�, in Lecture Notes in Computer Science 4841, Page No 757�768, 2007.
[20] J. Yao, J. marc Odobez, �Multi-Layer Background Subtraction Based on Color and Texture�, In IEEE The Computer Vision and Pattern Recognition Conference Visual Surveillance Workshop, 2007.
[21] Ehsan Adeli Mosabbeb, Maryam Sadeghi, Mahmoud Fathy , �A New Approach for Vehicle Detection in Congested Traffic Scenes Based on Strong Shadow Segmentation�, in Lecture Notes in Computer Science Volume 4842, pp. 427�436, 2007.
[22] Charles Kervrann, J�r�me Boulanger, �Local Adaptivity to Variable Smoothness for Exemplar-Based Image Regularization and Representation�, International Journal of Computer Vision-Liquid-Liquid Chromatography, pp. 45�69, 2008.
[23] Ang�lica R. Jim�nez-S�nchez, Jorge D. Mendiola- Santiba�ez, �Morphological Background Detection and Enhancement of Images With Poor Lighting�, IEEE transactions on image processing, Volume 18, No. 3, March 2009.
[24] Yu-Tung Kuol, Wen-Hsiang Tsai1, �A New 3D Imaging System Using a Portable Two-Camera Omni-Imaging Device for Construction and Browsing of Human-Reachable Environments,� in Lecture Notes in Computer Science Volume 6938, pp. 484�495, 2010.
[25] Yang Chen, Deepak Khosla, et al, �A Neuromorphic Approach to Object Detection and Recognition in Airborne Videos with Stabilization,� in Lecture Notes in Computer Science Volume 6939, pp. 126�135, 2011.
[26] Pablo Arias , Gabriele Facciolo , et al �A Variational Framework for Exemplar-Based Image Inpainting,� Springer Science+Business Media, LLC, International Journal of Computer Vision-Liquid-Liquid Chromatography, Volume 93, pp. 319�347, 2011.
[27] Saibabu Arigela and Vijayan K. Asari, �Adaptive and Nonlinear Techniques for Visibility Improvement of Hazy Images, in Lecture Notes in Computer Science Volume 6939, pp. 75�84, 2011.
[28] Vishnukumar Galigekere, Gutemberg Guerra-Filho, �A Synthesis-and-Analysis Approach to Image Based Lighting�, in Lecture Notes in Computer Science Volume 7431, pp. 292�304, 2012.
[29] M. Hofmann, P. Tiefenbacher, G. Rigoll, �Background Segmentation With Feedback: The Pixel-Based Adaptive Segmenter�, in: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 38�43, 2012.
[30] Norhayati Bakri , Ratnawati Ibrahim, et al, �Linking Mathematics and Image Processing Through Common Terminologies�, Social and Behavioral Sciences Volume 102, pp. 454 � 463, 2013.
[31] Farah Yasmin Abdul Rahman, Aini Hussain, et al, �Enhancement of Background Subtraction Techniques Using a Second Derivative in Gradient Direction Filter�, Journal of Electrical and Computer Engineering, Volume 2013, Article ID 598708, pp. 1-12, 2013.
[32] Laurent Navarro, Guang Deng, Guy Courbebaisse, �The Symmetric Logarithmic Image Processing Model,� Digital Signal Processing, Volume 23, pp. 1337�1343, 2013.
[33] Aur�lien Ducournau, Alain Bretto, �Random Walks In Directed Hypergraphs and Application to Semi-Supervised Image Segmentation,� Computer Vision and Image Understanding, Volume 120, pp. 91�102, 2013.
[34] Vasileios Zografos, Reiner Lenz, Michael Felsberg, �The Weibull Manifold in Low-Level Image Processing: An Application to Automatic Image Focusing,�, Image and Vision Computing, Volume 31, pp. 401�417, 2013.
[35] Weibao Zou, �Improvement of Panchromatic IKONOS Image Classification Based on Structural Neural Network�, in Lecture Notes in Computer Science Volume 7951, pp. 411�420, 2013.
[36] Q. Xu, et al., �A Novel Approach for Enhancing Very Dark Image Sequences�, Signal Processing, Article in Press, 2014.
[37] Andrews Sobral , Antoine Vacavant, �A Comprehensive Review of Background Subtraction Algorithms Evaluated with Synthetic And Real Videos,� in Computer Vision and Image Understanding, Volume 122, pp. 4�21,2014.
[38] Thomas Schr�der, Klaus Kr�ger, Felix K�mmerlen, �Image Processing based Deflagration Detection using Fuzzy Logic Classification�, Fire Safety Journal Volume 65, pp.1�10, 2014.
Citation
P. Mishra, A. Sinhal, D.S. Tomar, "A Comprehensive Review of Improvement of Image Contrast in Case of Poor Light," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.168-175, 2014.
Data Encryption Approach For Security
Review Paper | Journal Paper
Vol.2 , Issue.5 , pp.176-179, May-2014
Abstract
Whenever any new algorithm for data encryption is designed the main concern is upon the security of data. As encryption is done for encrypt data or change data in a secure form, so such encryption techniques should be used which provide the best security to the network. The main goal of any algorithm should be to secure data from any outside attack. In the recent days there are so many security issues regarding exchanging of data through a network. So data has to be encrypted in such a way that there is no threaten to secutiry. A new approach for data encryption is provided in this paper which will be helpful for security of data.
Key-Words / Index Term
DES, Encryption, Decryption, Asymmetric Cryptography, Symmetric Cryptography
References
[1] R. Hauser, A. Przygienda and G. Tsudik, �Reducing the cost of security in link state routing�, In Symposium on Network and Distributed Systems Security (NDSS ‟97), San Diego, California, Internet Society, pp 93�99, February 1997.
[2] A. Kush, �Security Aspects in AD hoc Routing� , Computer Society of India Communications, Vol. 3 No 2 Issue 11, pp 29-33, March 2009.
[3] A. Kush, �Security And Reputation Schemes In Ad-Hoc Networks Routing� International Journal of Information Technology and Knowledge Management, Volume 2, No. 1, pp 185-189, June 2009. [4] T. Karygiannis and L. Owens, �Wireless Network Security�, NIST Special Publication, pp 800-848, November 2002
. [5] Yonguang Zhang and Wenke Lee, �Intrusion detection in wireless ad-hoc networks�, In 6th International Conference on Mobile Computing and Networking (MOBICOM‟00), pp 275� 283, August 2000.
[6] A. Kush, C. Hwang and P. Gupta, �Secured Routing Scheme for Adhoc Networks� International Journal of Computer Theory and Engineering (IJCTE), Volume 3, pp 1793-1799, May 2009.
[7] P. Papadimitratos and Z. J. Haas, �Secure routing for mobile ad hoc networks�, SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002.
[8] Panagiotis Papadimitratos and Zygmunt J. Haas, �Secure message transmission in mobile ad hoc networks�, Elsevier Journal of Adhoc network, Ad Hoc Networks 1, pp 193�209, 2003.
[9] Fei Hu and Neeraj K. Sharma, �Security considerations in ad hoc sensor networks� Elsevier Journal of Ad hoc Networks, Ad Hoc Networks 3, pp 69�89, 2005.
[10] B. Dahill, B. N. Levine, E. Royer and C. Shields, �A secure routing protocol for ad hoc networks�, Technical Report UM-CS-2001-037, University of Massachusetts, Department of Computer Science, August 2001.
Citation
R. Arya, "Data Encryption Approach For Security," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.176-179, 2014.
Daubchies Wavelet transform and Frei-Chen Edge detector for Intention based Image Search Engine
Research Paper | Journal Paper
Vol.2 , Issue.5 , pp.180-186, May-2014
Abstract
Image retrieval is widely used area for number of applications like journalism, medicine, art collections, scientific database .Most of existing image search engines are text query based where retrieval result is ambiguous due to multiple meanings of provided textual query. So proposed system targets at the retrieving relevant images based on user�s search intention. A novel image retrieval approach uses Text query and Visual information of image for retrieval .Main objective of this system is to capture the user�s search intention in just �One Click� query image and to display most similar images to this clicked image based on its content . Firstly user�s intention is captured by asking user to click one image from result of text based image retrieval .After that clusters of images are formed based on their visual content and visual query hence text query is expanded . Finally Expanded keyword and Visual query expansion are used to retrieve more relevant images. In this paper best combination techniques for important features like Color ,Texture, and shape are used to measure visual similarity between images . Mainly Daubechies� wavelet transform for better frequency resolution and Frei-Chen edge detector which is less sensitive to noise and able to detect edges with small gradients is used .Experimental results shows that our system gives good result by using above combination which is tested on multiple queries and it helps in improving the precision of top-ranked images .
Key-Words / Index Term
Image reranking, Image search, Intention, Image pool expansion, Keyword expansion, Precison.,Visual features,Visual query expansion
References
[1] Xiaoou Tang,Ke Liu, Jingyu Cui, �Intent Search: Capturing User Intention for One-Click Internet Image Search�, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 34, NO. 7, JULY 2012
[2] N. Ben-Haim, B. Babenko, and S. Belongie �Improving Web-Based Image Search via Content Based Clustering�, Proc. Intl Workshop Semantic Learning Applications in Multimedia, 2006.
[3] R. Fergus, P. Perona, and A. Zisserman� A Visual Category Filter for Google Images�, Proc. European Conf. Computer Vision,2004.
[4] G. Chechik, V. Sharma, U. Shalit, and S. Bengio "Large Scale Online Learning of Image Similarity through Ranking J. Machine Learning Research�, vol. 11, pp. 1109- 1135, 2010.
[5] J. Deng, A.C. Berg, and L. Fei-Fei �Hierarchical Semantic Indexing for Large Scale Image Retrieval, Proc. IEEE Intl Conf. Computer Vision and Pattern Recognition,2011
[6] K. Tieu and P. Viola, " Boosting Image Retrieval," Intl J. Computer Vision, vol. 56, no. 1, pp. 17-36, 2004.
[7] Y. Rui, T. S. Huang, M. Ortega, and S. Mehrotra, " Pseudo Relevance feedback:A power tool in interactive content-based image retrieval� IEEE Trans. Circuits Syst. Video Technol., vol. 8, no. 5, pp. 644655, Sep. 1998.
[8] O. Chum, J. Philbin, J. Sivic, M. Isard, and A. Zisserman, " Total Recall: Automatic Query Expansion with a Generative Feature Model for Object Retrieval�, Proc. IEEE Intl Conf. Computer Vision,2007.
[9] Z. Zha, L. Yang, T. Mei, M. Wang, and Z. Wang, "Visual Query Expansion�, Proc. 17th ACM Intl Conf. Multimedia, 2009.
[10] A. Frome, Y. Singer, F. Sha, and J. Malik,�Learning Globally-Consistent Local Distance Functions for Shape-Based Image Retrieval and Classification�, Proc. IEEE Intl Conf. Computer Vision, 2007
[11] S. Liu, F. Liu, C. Yu, and W. Meng,�An Effective Approach to Document Retrieval via Utilizing WordNet and Recognizing Phrases�, Proc. 27th Ann. Intl ACM SIGIR Conf. Research and Development in Information Retrieval, 2004.
[12] K. Sparck Jones, " Automatic Keyword Classification for Information Retrieval�, Archon Books, 1971.
Citation
K. Upadhyay, G. Chhajed, "Daubchies Wavelet transform and Frei-Chen Edge detector for Intention based Image Search Engine," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.180-186, 2014.
Recent Advancements in Cloud Computing
Review Paper | Journal Paper
Vol.2 , Issue.5 , pp.187-190, May-2014
Abstract
The delivery of computing services like servers, storage, databases, networking, software, analytics, and intelligence on the Internet is termed as cloud computing. The aim is to provide quick innovation, flexible resources, and economies of scale. The information that the user wants to access is stored in clouds. It is not necessary that the user should be at a specific place for accessing these clouds. Various organizations may find cloud technology affordable as it allows them to reduce the cost associated with management of information. The organizations do not need to keep their own servers and can use capacity rented from third parties. Cloud allows organizations for fast software updation as compared to other technologies.
Key-Words / Index Term
Cloud computing; DaaS; IaaS; PaaS; Storage
References
[1] L. Qian, Z. Luo, Y. Du, L. Guo, “Cloud Computing: An Overview”, In: IEEE international conference on Cloud Computing, CloudCom 2009, Beijing, China, December 1- 4, 2009.
[2] W. Kim, “Cloud Computing: Today and Tomorrow”, Journal of object technology, Volume 8, Issue 1, Pages 65-72, 2009.
[3] L. Wang, G. von Laszewski, A. Younge, et al., “Cloud Computing: A Perspective Study”, New Gener. Comput. Volume 28, 137–146, 2010.
[4] B. Hayes, “Cloud Computing. Communications of the ACM”, Volume 51, Issue 7, Pages 9-11,2008.
[5] R.L. Grossman, 2009, “The Case for Cloud Computing”, In IEEE, IT Professional, Volume 11, Issue 2, Pages 23-27, 2009.
Citation
Ramesh Thakur, "Recent Advancements in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.187-190, 2014.