Version-6 (Nov-Dec 2016)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Rule Based Expert System Prototype Application for Crime Against Women Law in Indian Legislation System |
Country | : | India |
Authors | : | Prof. J.S. Jadhav || Dr. K.M. Nalawade || Dr. M.M. Bapat |
Abstract: Law is a system of rules and guidelines which are enforced through social institutions or society to govern behavior.[http://en.wikipedia.org/wiki/Law]Laws can be made by legislatures through legislation, the execution of law through regulations, or judges through binding precedents (normally in common law jurisdictions). Criminal lawis also known as penal law, pertains to crimes and punishment. It thus regulates the definition of and penalties for offences found to have a sufficiently social impact but, it makes no moral judgment on an offender nor imposes restrictions on society that physically prevents people from committing a crime in the first place. The law of criminalprocedure regulated by Investigating............
Keywords: Expert system, Indian penal code (IPC), Artificial intelligence, Expert system shell, Expertise, prototype.
[1] Justice Y V Chandrachud, V R Manohar, The Indian Penal Code (Reprint 2000), Wadhwa and company, Nagar
[2] N.B. Bilgi, R.V. Kulkarni (2008) ―Knowledge based system prototype Application for Transfer of property law in Indian Judicial‖ International journal of Intelligent information processing serials publication, PP 137-144.
[3] Website:―Crime against Women‖ Unit 21, Offence against women under Indian Penal Code.‖
[4] Crime against women, Chapter.5
[5] The Evaluation of Expert System Griffith University, Domain Expert systems Design and Development http//www.cit.gu.edu.qu/ ~ Noran by ovidiusNoran.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | ICT: A Super Highway to Reaching the Unreached Rural Communities of India |
Country | : | India |
Authors | : | Mr. Atul D. Newase || Dr. Jitendra Sheetlani || Dr. Ranjit D. Patil |
Abstract: Since dawn of civilization Information played a catalyst role to transform societies into informationrich and knowledgeable societies. We have seen in the last few years that Information and Communication Technologies (ICTs) played an intrinsic role in overall development of the societies in developed and developing nations. Now ICT completly changes in all aspects of ours life but unfortunately peoples of rural area still suffering to get massive benefits of Information and Communication Technology and hence they can't walk with the modern information-rich and knowledgeable societies..........
Keywords: Digital Divide, ICT, Indian Rural Community, Rural Development
[1] World Bank Report, http://documents.worldbank.org/curated/en/538451468762925037/pdf/278770ICT010mdgs0Complete.pdf ,
2003, accessed on 03 December 2016.
[2] Warner M. F., Adoption of ICT in agricultural management in the United Kingdom: the intra-rural digital divide. Agriculture
Economics, 48(1), 2002, 1- . http://www.agriculturejournals.cz/publicFiles/59184.pdf accessed on 03/12/2016.
[3] Siriginidi Subba Rao, Role of ICTS in India Rural Communities. The Journal of community informatics, http://www.cijournal.
net/index.php/ciej/article/view/313/429 accessed on 18 December 2016.
[4] http://indiafacts.in/india-census-2011/urban-rural-population-o-india/ accessed on 18 December 2016.
[5] https://en.wikipedia.org/wiki/Internet#Access accessed on 04/12/2016.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud |
Country | : | India |
Authors | : | Dr. K. Gangadhara Rao || Dr.B.Basaveswara Rao || Qutaiba Mumtaz Dawood |
Abstract: Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files...........
Keywords: Deduplication, duplication authorized check, hybrid cloud.
[1] Dropbox, a file-storage and sharing service. http://www.dropbox.com/.
[2] Google Drive. http://drive.google.com.
[3] MOZY. Mozy, a file-storage and sharing service. http://mozy.com/.
[4] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou. "A Hybrid Cloud Approach for Secure Authorized Deduplication ". In IEEE Transactions on Parallel and Distributed Systems, 2015.
[5] J. Yuan and S. Yu, "Secure and constant cost public cloud storage auditing with deduplication," in IEEE Conference on Communications and Network Security (CNS), 2013, pp. 145–153.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design Efficient Image Compression Algorithm for Gray Scale Image Using RBF and SOM Neural Network |
Country | : | India |
Authors | : | Shailesh Saxena || Dr. R. P. Singh |
Abstract: Image compression is important phase of computer vision. The compression of image reduces the size of data and increase the efficiency of data transmission over the internet. Now a day's various authors proposed image compression technique based on neural network model. The used neural network model is very efficient for the process of compression, but the rate of compression is very slow. In this paper proposed the hybrid model of image compression using the combination of RBF and SOM neural network model. The RBF neural network model estimates the trained pattern for the compression process of SOM neural network. For the processing of data in neural network model used discreet wavelet transform function. The proposed algorithm simulated in matlab software and measure standard parameter such as PSNR, compression rate and compression ratio. The proposed algorithm gives better result instead of other neural network based image compression technique.
Keywords: Image compression, WT, SOM, RBF.
[1] V. V. Sunil Kumar And M. IndraSena Reddy, "Image Compression Techniques By Using Wavelet Transform", 2012, Journal Of Information Engineering And Applications, Pp.35-40.
[2] S. S. Panda, M.S.R.S Prasad, M.N.M. Prasad and Ch. Skvr Naidu, "Image Compression Using Back Propagation Neural Network", International Journal of Engineering Science & Advanced Technology, 2012, Pp.74-78.
[3] Mohammad H. Asghari and BahramJalali, Discrete Anamorphic Transform for Image Compression, IEEE Signal Processing Letters, 2014, Pp.829-833.
[4] Palle E. T. Jorgensen and Myung-Sin Song, "Analysis of Fractals, Image Compression, Entropy Encoding, Karhunen-Loeve Transforms", ActaApplicandaeMathematicae, 2008, Pp.2-23.
[5] NegarRiazifar and MehranYazdi, Effectiveness of Contourlet Vs Wavelet Transform on Medical Image Compression: A Comparative Study", World Academy of Science, Engineering and Technology, 2009, Pp.837-842.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Management: Improving data Security and Safety of Microcomputer Systems |
Country | : | Nigeria |
Authors | : | Akingbade L.O. |
Abstract: The achievable potentials of data security and protection in microcomputer systems are considered and described in this paper. The overview of the most important threats and attacks on security of microcomputer systems and data is given first. Then, the possibilities and ways for protection of those systems are described. Finally, the paper provides a detailed description of various practical implementations of protection of data on personal computers which represents the combination of hardware and software protection.
Keywords: Microcomputer systems, data security, attacks and protection.
[1] Chwan-Hwa Wu and J. David Irwin (2013), Introduction to Computers and Data Security. Boca Raton: CRC Press
[2] Dave .D. (2010), Network monitoring/Intrusion Detection Systems (IDS), University of Washington.
[3] Gasser, Morrie (2014). Building a Secure Computer System. Van Nostrand Reinhold.
[4] Jannsen, Cory.(2014) Security Architecture. Techopedia. Janalta Interactive Inc.
[5] John Bumgarner (2010). "Computers and Data". IO Journal.
[6] Mark Den (2014)Data Security Awareness". MS-ISAC (Multi-Stat Information Sharing & Analysis Center).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Classification Techniques in Data Mining-Case Study |
Country | : | India |
Authors | : | Swathi Agarwal || G.L.Anand Babu || Dr.K.S.Reddy |
Abstract: Data Mining was a basic technique for examine the data in a choice of perception and categorizes it and finally to compress it. Classification was used to expect cluster relationship for data instances in data mining. Many key types of classification techniques including KNN, Bayesian classification, and Decision tree (DT) induction, C4.5, ID3, SVM, and ANN are used for classification. The major purpose of this assessment was to grant a complete examination of various classification mechanisms in data mining.
Keywords: C4.5, ID3, SVM, Decision Tree, KNN.
[1]. KS Reddy, GPS Varma, MK Reddy, An Effective Methodology for Pattern Discovery in Web Usage Mining - International Journal of Computer Science and Information Technologies, 2012
[2]. Boser, B. E., I. Guyon, and V. Vapnik (1992). A training algorithm for optimal margin classifiers. In Proceedings of the Fifth Annual Workshop on Computational Learning Theory, pages. 144 -152. ACM Press 1992.
[3]. Dr.Sudarson Jena, Santhosh Pasuladi, Karthik Kovuri, G.L.Anand Babu, An Investigation And Evaluation on Précised Decision For Scientific Data Using New Approaches in DMDW, International Journal Of Computer Applications In Engineering, Technology And Sciences (Ij-Ca-Ets), Issn: 0974-3596 | April 2012- September 2012 | Volume 4 : Issue 2) [4]. KS Reddy, GPS Varma, SSS Reddy, Understanding the scope of web usage mining & applications of web data usage patterns, International Conference on Computing, Communication and Applications, 2012
[5]. L. Breiman, L. Friedman, R. Olshen, and C. Stone. Classification and Regression Trees. Wadsworth and Brooks, 1984.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Analysis on Fingerprint Watermarking with its Transform Techniques |
Country | : | India |
Authors | : | Mili Singh || Dr. Jitendra Sheetlani |
Abstract: In this paper discuss about the watermarking of a fingerprinting based to prevent the forgery users and also discuss the concept of a watermarking. In this paper enhancement process of a fingerprint like, binary thinning process, minutiae process etc. Also, discuss the techniques of a watermarking i.e. spatial domain and the frequency domain and also further divided into techniques process like a least significant bit(LSB), discrete wavelet transform etc. and to calculate the result analysis of a DWT based for an embedding and extracting process. To find out the image quality i.e. PSNR is high and the MSE is a low.
Keywords: Least Significant Bit(LSB); Discrete Wavelet Transform(DWT); Peak-signal-to-noise ratio(PSNR); Mean Square Error(MSE)
[1]. Ms.Jalpa M.Pate1, Mr.Prayag Patel, "A brief survey on digital image watermarking techniques". In International Journal for Technological Research in Engineering Volume 1, Issue 7, March-2014 ISSN.
[2]. Dr. Mohammad V. Malakooti, Zahed FerdosPanah, "Image Recognition Method based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD)" In ISBN: 978-0-9853483-3-5, 2013 SDIWC.
[3]. Sisanda Makinana, "Latent Fingerprint Wavelet Transform Image Enhancement Technique for Optical Coherence Tomography", ISBN: 978-1-4673-9187-0 ©2016 IEEE
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Detection And Handling of Denial – of – Service, That Uses Encrypted Protocol Headers |
Country | : | India |
Authors | : | B.Mallikeswari |
Abstract: One type of attack of Denial of service is Reflector attack, which is very difficult to be traced by traditional IP trace back techniques. There are many solutions to these problems, which resolves any one of factors causing the problems. This is because solution is not designed to analyze all the factors. In this context the purpose of this research paper is to detect the attacks and handle the encrypted protocol header of packets by traditional decryption algorithm from reflector.............
Keywords: DoS, Encrypted Header, Reflector attack, Detection filter, Encryption classifier, SSL/TL and Decryption.
[1]. E. Alomari, B.B.Gupta, S.Karuppayah, Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art, Int. J.Comput. Appl. 49(7)(2012)24–32.
[2]. Lau, F., Rubin, S.H., Smith, M.H., and Trajkovic, L,"Distributed denial of service attacks"
[3]. Systems, Man, and Cybernetics, 2000 IEEE International Conference on, Volume:3 , 2000, pp. 2275 -2280 vol.3.
[4]. K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. ACM SIGCOMM '01, pp. 15-26, 2001.
[5]. W. H. Press, B. P. Flannery, S. A. Teukolsky, and W. T. Vetterling, "Numerical Recipes in FORTRAN: The Art of Scientific Computing", Cambridge University Press, 1992, pp.83-84.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Implementation of Lightweight Security Auditing Tool for Android Smart Mobile Phone |
Country | : | Ethiopia |
Authors | : | Fetulhak Abdurahman || Arun Radhakrishnan |
Abstract: Due to the fast growing market in Android smartphone operating systems to date cyber criminals have naturally extended their target towards Google's Android mobile operating system. Threat researchers are reporting an alarming increase of detected malware for Android from 2012 to 2013. Static analysis techniques for malware detection are based on signatures of known malicious applications. It cannot detect new malware applications and the attacker will get window of opportunities until the threat databases are updated for the new malware. Malware detection techniques based on dynamic analysis are mostly designed as a cloud based services where the user must submit the application to know whether the application is malware or not.............
Keywords: Smartphones, Android, Malware Detection, Machine Learning, Classification
[1]. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weisee, Y. (2012)"Andromaly": a behavioral malware detection framework for android devices Journal Intelligent Systems, 2012.
[2]. Over 1 billion Android-based smart phones to ship in 2017. Canalys, http://www.canalys.com/newsroom/over-1-billion-android-based-smart-phones-ship-2017Feb.2013.
[3]. Ramon Llamas, Ryan Reith, and Michael Shirer. Apple Cedes Market Share in Smartphone Operating System Market as Android Surges and Windows Phone Gains, According to IDC. http://www.idc.com/getdoc.jsp?containerId=prUS24257413, Jul. 2013.
[4]. Kindsight Security Labs Malware Report - Q2 2013. Alcatel-Lucent, http://www.alcatel-lucent.com/solutions/kindsight-security.Access date: Jul.2013.
[5]. FortiGuard Midyear Threat Report.Fortinet,http://www.fortinet.com/resource_center/whitepapers/quarterly-threat-landscape-report-q213.html.Access date: Oct. 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Web Content Mining: Tool, Technique & Concept |
Country | : | India |
Authors | : | Anil Kumar Sinha || Nidhi Raj || Shameemul Haque || Alimul Haque || N.K.Singh |
Abstract: Today the evolution of the World Wide Web has brought us enormous and ever growing amounts of data and information.. The web is full of structured or unstructured information which is directly or indirectly influencing society or people in every day life. Due to huge data available with the web it has become a challenge for people with interest in utilizing this information. For mining the huge available data on web in the form of frequently used patterns and log files for meaning use is considered in this paper. The paper presents a preliminary review of Web content mining contributions in the field of web mining and the prominent successful algorithms and some tools.
Keywords: Social Web Mining, Web Content Mining, Web Mining, and Application of Web content Mining.
[1]. Q. Han, X. Gao, and W. Wu, Study on Web Mining Algorithm Based on Usage Mining, 2010.
[2]. O. Etzioni. The world-wide web: Quagmire or gold mine? Communications of the ACM, 39(11), 1996, 65-68,.
[3]. L. Eikvil. Information extraction from world wide web - a survey. Technical Report 945, Norweigan Computing Center, 1999.
[4]. A. J. Ratnakumar, "An Implementation of Web Personalization Using Web Mining Techniques," Journal of and applied information technology, 2005.
[5]. W. Bin and L. Zhijing, "Web Mining Research," in Proceedings of the fifth International Conference on Intelligenceand Multimedia Applications (ICCIMA'03), 2003.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dyf1.0 Software Code: Prediction and Processing data for Design of Yarns |
Country | : | Bulgaria |
Authors | : | Radostina A. Angelova || Lyuben Krumov || Hristina Konova |
Abstract: The paper presents DYF1.0 software code for prediction and processing data for design of yarns. The design of the yarn is an important part of the whole yarns' production process, starting with the purchase of the raw materials and ending with the dispatch of winding yarns. The need for software codes for design of yarns is generated by the high demands on the quality of the yarns, combined with low prices. The stages in the yarn's design are presented. The main features of the DYF1.0 software code are also discussed in details. The application of the software code in designing and education is presented at the end.
Keywords: DYF1.0 software code, design of yarns, design of fabrics, yarns properties, blends
[1] Taylor, M. A., Technology of Textile Properties (3rd edn, Forbes Publications, 1994).
[2] Wilson, J., Handbook of Textile Design: Principles, Processes and Practice, (Cambridge, Woodhead Publishing, 2001).
[3] Georgiev I., Design of Yarns (Проектиране на прежди) (Technical University of Sofia, Sofia, Bulgaria, 2007).
[4] Kellner, M. I., Madachy, R. J., & Raffo, D. M., Software process simulation modeling: why? what? how?. Journal of Systems and Software, 46(2), 1999, 91-105.
[5] Verpoest, I., & Lomov, S. V., Virtual textile composites software WiseTex: Integration with micro-mechanical, permeability and structural analysis. Composites Science and Technology, 65(15), 2005, 2563-2574.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Parallel Algorithm for the Simulation of Geomagnetic Fields Variations along the Equatorial Regions |
Country | : | Nigeria |
Authors | : | Tokula Umaha || Esiefarienrhe Bukohwo Michael || Ale Felix |
Abstract: This work presents the development of a parallel algorithm for the computation of geomagnetic field data for stations 30 degrees North and South of the equator. The parallel computing hardware platform used involved multi-core processing unit. MATLAB 2012a's parallel computing toolbox was used to simulate solar quiet daily (Sq) variations on four(4) Intel Xeon E5410 processors, with clock speed 2.3 GHz and 16378MB RAM. A large geomagnetic dataset obtained from International Real-time Magnetic Observatory Network (INTERMAGNET), corresponding to 25 stations for year 2000 was used. The performances of both algorithm were compared using some indices such as execution time, efficiency, speed and overhead. The result from the parallel algorithm was two times faster than the corresponding sequential algorithm under same platform and workload in all of the indices.
Keywords: Parallel Computing, Multicore Architecture, Geomagnetic Field, Parallel Algorithm.
[1]. Amdahl, G.M., "Validity of the Single-Processor Approach to Achieving Large-Scale
[2]. Ananth, G., Anshul, G., George, K., & Vipin, K. (2005). Introduction to parallel Computing,. Boston: Addison Wesley.
[3]. Campbell,W.H. & Shiffmacher, E.R. (1987), Quiet ionospheric currents and earth conductivity profile computed from quite-time geomagnetic field changes in the region of Australia. Aust. J. Phys. 40, 73-87.
[4]. Campbell,W. & Honore, (1997), Introduction to Geomagnetic Fields, Cambridge University Press.
[5]. Chapman, S., The equatorial electrojet as detected from the abnormal electric current distribution above Huancayo, Peru, and elsewhere, Arch.Meteorol. Geophys. Bioclimatol. A, 4, 368–390, 1951.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | System Support Decision Making in Data Centers |
Country | : | Mexico |
Authors | : | Durán López, Manuel |
Abstract: The purpose of wireless sensor networks is to establish smart environments, which is constantly censusing the environment for automatically operating devices adapt the environment according to the needs of people and equipment present is actuated . It is desirable that in such environments exist autonomous mechanisms that allow constant monitoring of the operation of the sensor network, so that in the event of failure of one of them, mechanisms of self-reconfiguration and synchronization is activated. The purpose of the sensor network is that census data acquisition never stops. In this work, we propose an ontology model in order to help in decision making at site monitoring using environmental sensors.
Keywords: Decision making, ontology, smart environment, wireless sensor network, monitoring.
[1] N. Xu, W. Zhang, H. Yang, X. Zhang, X. Xing, "CACOnt: A Ontology-Based Model for Context Modeling and Reasoning", Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013).
[2] K. Ko, K. Sim, "Development of Context Aware System based on Bayesian Network driven Context Reasoning Method and Ontology Context Modeling", International Conference on Control, Automation and Systems 2008 Oct. 14-17, 2008 in COEX, Seoul, Korea
[3] D. Riboni, C. Bettini, "Context-aware Activity Recognition through a Combination of Ontological and Statistical Reasoning", Università di Milano
[4] M. Bravo, F. Martínez, J. Rodríguez,"Representation of an Academic and Institutional Context Using Ontologies", Research in Computing Science 87 (2014)
[5] J. Reyes, M. Bravo, O.Herrera, A. Gudiño, "Poblado automático de ontologías de perfiles académicos s académicos" Research in Computing Science 95 (2015)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Minimizing Detection Probability in Ad-Hoc Sensor Networks Routing Using Directional Antennas Under Wide and Restricted Network |
Country | : | India |
Authors | : | Dr.Srinivas Ambala |
Abstract: Directional receiving wires can be helpful in altogether expanding hub and system lifetime in remote specially appointed systems. So as to use directional receiving wires, a calculation is required that will empower hubs to indicate their reception apparatuses the ideal place at the opportune time. In this paper we introduce an energy-efficient steering and planning calculation that directions transmission in impromptu systems where every hub has a solitary directional radio wire........
Keywords: Directional antenna, energy, routing, scheduling, matching.
[1]. Y. B. Ko, V. Shankarkumar, and N. H. Vaidya, "Medium access control protocols using directional antennas in ad-hoc networks," Proc. IEEE INFOCOM'2000, March 2000.
[2]. A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto, "A MAC protocol for mobile ad hoc networks using directional antennas," Proc. IEEE Wireless Communications andNetworking Conference (WCNC'2000), 2000.
[3]. A. Nasipuri, J. Mandava, H. Manchala, and R. E. Hiromoto, "Ondemand routing using directional antennas in mobile ad hoc networks," Proc. IEEE Computer Communications and Networks, 2000.
[4]. IEEE Local and Metropolitan Area Network Standards Committee, Wireless LAN medium access control (MAC) andphysical layer (PHY) specifications, IEEE standard 802.11-1999, 1999.
[5]. D. Johnson, D. Maltz, Yih-Chun Hu, and Jorjeta G. Jetcheva, "Dynamic source routing (dsr)," Internet Draft, draft-ietf-manet-dsr- 06.txt, November 2001.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Efficient Load Balancing Approach in a Cloud Computing Platform |
Country | : | India |
Authors | : | Saptarshi Bhowmik || Sudipa Biswas || Karan Vishwakarma || Subhankar Chattoraj |
Abstract: Technology has always played an important role changing human lives and helping to perform faster and easier job. In recent years cloud computing has replaced the traditional method of grid computing, cluster computing and introduced virtualization as the key technology in cloud computing. It has become one of the most demanding services due to its high reliability, efficiency and cost effectiveness. But cloud computing faces certain major issue which involves efficient load balancing and virtual machine (VM) arrangement. In this paper we have proposed a priority based virtual machine (VM) arrangement and load balancing using round robin scheduling. The VM is arranged by comparing the vital parameters which involve bandwidth, RAM, and MIPS (Million instructions per second)........
Keywords: Virtual machine, Cloudsim, load distribution, Resource scheduling, Priority based scheduling
[1]. Oktay Tontaş; Jorge Bernardino "The ethics in cloud computing": 2016 2nd International Conference of the Portuguese Society for Engineering Education (CISPEE)
[2]. Sajay K R; Suvanam Sasidhar Babu " A study of cloud computing environments for High Performance applications" : 2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)
[3]. Ahmadreza Montazerolghaem; Mohammad Hossein Yaghmaee; Alberto Leon-Garcia; Mahmoud Naghibzadeh; Farzad TashtarianA Load-Balanced Call Admission Controller for IMS Cloud Computing
[4]. Xiaolong Xu; Lingling Cao; Xinheng Wang; Xiaolong Xu; Lingling Cao; Xinheng Wang "Resource pre-allocation algorithms for low-energy task scheduling of cloud computing" : Journal of Systems Engineering and ElectronicsYear: 2016, Volume: 27, Issue: 2
[5]. Jia Zhao; Kun Yang; Xiaohui Wei; Yan Ding; Liang Hu; Gaochao Xu " A Heuristic Clustering-Based Task Deployment Approach for LoadBalancing Using Bayes Theorem in Cloud Environment ": IEEE Transactions on Parallel and Distributed SystemsYear: 2016, Volume: 27, Issue: 2
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Convergence Research Journey from Service-Oriented Architecture to Cloud Computing |
Country | : | India |
Authors | : | Pappu sharada || Chinmaya Ranjan Pattanaik |
Abstract: Cloud computing is one of the emerging technology which is used to deploring essential services
without getting the knowledge regarding the infrastructure behind it. It also provides flexibility to releases the
burden of maintaining an adequate environment and quality and focusing on the business competency. Service-
Oriented Architecture (SOA) is a technology that enables various functions of cloud computing. This paper
focuses the main features of SOA. The migration from SOA to cloud computing is discussed. This paper also
represents the main features and characteristics of cloud computing.
Keywords: SOA; cloud computing.
[1]. LonnekeDikmans and Ronald van Luttikhuizen, "SOA made Simple", Packt Publishing, ISBN: 978-1-
849684-16-3, 2012.
[2]. Guido Schmutz, Peter Welkenbach and Daniel Liebhart: "Service Oriented Architecture- An Integeration
Blueprint", Packt Publishing, ISBN: 978- 1-84968-104-9, 2010.
[3]. Mike P. Papazoglou, "Service-oriented Computing- Concepts, Characteristics and Directions",
Proceeding of the Fourth International Conference on Web Information Systems Engineering of IEEE,
2003.
[4]. Xiaolong Yang and Huiming Zhang, "Cloud Computing and SOA convergence Research", Fifth
International Symposium on Computational Intelligence and Design of IEEE 2012.
[5]. Thomas Erl: "SOA- Principles of Service Design", Prentice Hall, ISBN-10: 0-13-234482-3, 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Thermoelectric Air Conditioning System: Applications and Technology |
Country | : | India |
Authors | : | Namrata mishra || Himanshu Sekhar Moharana |
Abstract: Refrigerator and air conditioners are the most energy consuming home appliances and for this reason
many researchers had performed work to enhance performance of the refrigeration systems. Most of the
research work done so far deals with an objective of low energy consumption and refrigeration effect
enhancement. Thermoelectric refrigeration is one of the techniques used for producing refrigeration effect.
Thermoelectric devices are developed based on Peltier and Seebeck effect which has experienced a major
advances and developments in recent years. The coefficient of performance of the thermoelectric refrigeration is
less when it is used alone; hence thermoelectric refrigeration is often used with other methods of refrigeration.
This paper presents a review of some work been done on the thermoelectric refrigeration over the years. Some
of the research and development work carried out by different researchers on TER system has been thoroughly
reviewed in this paper.......
Keywords: Thermoelectric module; Peltier effect; Figure of Merit; Device Design Parameter; Seebeck Coefficient; Coefficient of performance.
[1]. ElCosnierW.,GillesM.,Lingai.,Anexperimentalandnumericalstudyofathermoelectricair-coolingand air-heating system.
international journal of refrigeration, 31,1051 –1062,(2008).
[2]. Sujin., Vora and Seetawan., Analyzing of Thermoelectric Refrigerator Performance. Proceedings of the 2ndInternational Science,
Social-Science, Engineering and Energy Conference, 25,154–159,(2000).
[3]. Wei., Jinzhi., Jingxin & Chen.,Theoretical and experimental investigation on a thermoelectric cooling and heating system driven by
solar. Applied Energy, 107, 89–97,(2013).
[4]. Riffat and Guoquan., Comparitive investigation of thermoelectric air- conditioners versus vapour compression and absorption airconditioners.
Journal of Applied Thermal Engineering, 24,1979-1993,(2004).
[5]. Riffat and Qiu., Design and characterization of a cylindrical water cooled heat sink for thermoelectric air conditioners. International
journal of energy research, 30 , 67-80,(2005).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Development of Condition-based Maintenance Control Systems in Fleet Management activities |
Country | : | India |
Authors | : | Durga Shankar Baggam || Gyhanendra Singh |
Abstract: The advancement in the domain of big-data technologies and machine-to-machine (M2M)
interconnectivity is creating new possibilities for real-time analysis of machine components for identifying and
avoiding breakdowns. Designing of such environment with a high-speed fleet requires special attention to the
design methodologies used in collecting the operating requirements from the users and transforming it into bigdata
parallel architectures is one of the crucial task.This transformation can lead to provide the capability of
exhibiting fault-tolerant behavior and load-balancing features. This paper describes the 3 M2M approach for
the big- data condition-based maintenance system and the requirement specification steps involved in building
such a system, along with the cost-savings benefited from the system.
Keywords: Condition-based maintenance, Fleet-management, M2M Telematics, Predictive Analytics
[1]. Romain Bosquet, Pierre-Olivier Vandanjon, Alex Coiret, and Tristan Lorino, Model of High-Speed Train Energy Consumption, World
Academy of Science, Engineering and Technology, 2013.
[2]. Jui-Sheng Chou, Changwan Kim, Yao-Chen Kuo, Nai-Chi Ou, Deploying effective service strategy in the operations stage of high-speed
rail, Transportation Research Part E: Logistics and Transportation Review, 47(4):507-519, July 2011.
[3]. Gopalakrishna Palem, Condition-Based Maintenance using Sensor Arrays and Telematics, International Journal of Mobile Network
Communications & Telematics, 3(3):19-28, 2013.
[4]. Gopalakrishna Palem, M2M Telematics & Predictive Analytics, Technical Report, Symphony Teleca Corp., 2013
[5]. Dino Citraro, Expanding Real-Time Data Insight at PARC, Big Data, 1(2): 78-81, 2013