Comparison of several cloud computing providers
An important transition in IT service delivery today is buzzword Cloud Computing. The tools, building blocks and best practices are evolving for cloud computing which in turn increases challenges to deploy the best suited cloud solutions. Initially the big players like Google, Microsoft, Amazon set the stage for how to deploy web applications & pay for their use on the web. Thus with number of platforms and services available to for a cloud it is hard to make a reasonable choice for at least a novice who has just entered into cloud. The paper is intended to provide an insight into few cloud providers’ services with respect to their features and scenarios. This comparison may help in the selection of a platform and may leverage as a starting point for a researcher.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Distributed virtual machine allocation using DRR algorithm in cloud computing
In private cloud during FFCS registration large amount of students are trying to register their subject at same time from different places so heavy load is departing to server due to this heavy load to resources the server unable to give where response to students which lead to the problem student can’t register properly within given time or wait for long time until server recover from this problem. This problem can be solved by allocating the resources properly to server this comes under the infrastructure as a service (IaaS) we can use and allocate a various kind of resources. This paper proposed solved this problem efficiently according virtual machine is distributed in hierarchical architecture using dynamic round robin algorithm[DRR] , resources will be allocate efficiently so the load will be distributed to various virtual machine then student need not to wait for long time and they can register properly within a given time. Finally implemented on Simulator Cloudsim 3.0. Experiment result show DRR can achieved resource allocation efficiently in cloud computing.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Do the sentiments on the net really matter?
Our information-gathering behavior has always been to find out what other people think. Opinion-rich resources such as online review sites and personal blogs are growing rapidly which provide new opportunities and challenges, as people can actively use information technologies to seek out and understand the opinions of others. People share their experiences on-line, express their opinions, frustrations about anything. The huge amount of available data creates opportunities for automatic mining and analysis. It can be considered as a classification task: their feelings can be positive, negative or neutral. People don’t directly express sentiment, They can also use a diverse range of other methods to express their emotions. Authors may mix objective and subjective information about a topic, or write down psots about other topics than the one we are investigating. And also there is a lot of noise in the data gathered from the Web pages. Due to this the task of automatic recognition of the sentiment in on-line text becomes more difficult. The content we are interested in this paper is, what is sentiment analysis, how the sentiment analysis was useful for a bank, how can it be applied in market intelligence and what are the challenges that could be faced in Indian scenario.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Energy Saving Scheme for Wormhole Detection & Prevention in MANET & Sensor Networks
In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threats because of its open entrusted environment, with little security arrangement, security over MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of the prominent security threats wormhole attack is considered to be a very serious security threat over MANET. In wormhole two selfish node which is geographically very far away to each other makes tunnel between each other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count method.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Phishing URL Detecting Using ANN Classification In Online Social Network
Phishing is considered a form of web threats that is defined as the art of mimicking a website of an honest enterprise aiming to obtain user’s confidential credentials such as usernames, passwords and social security numbers. Social engineering and technical tricks are commonly combined together in order to start a phishing attack. The phishing attack starts by uploading the post on social network site which contain fraud URL that seems authentic to potential victims advising them to meet site and update or validate their information by following a URL link. The fraud user posts their comment on social network service that contains URL which are malicious. These malicious URL some time it contains malware or virus. When user clicks on these fraud URL Then viruses enter into user system and system gets affected. The proposed system Extraction of feature set for detecting fraud URL using ANN in social networking services effectively detect fraud URL with high accuracy.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Novel Nanometric Efficient Reversible Low Power Parity Preserving Full Adder/Subtractor
In this paper, a new 5×5 reversible parity preserving gate is proposed and employed to realize 1-bit reversible parity preserving full adder/subtractor. The proposed 1-bit full adder/subtractor is implemented using VHDL and compared to previously presented designs in the literature. The results show that the proposed design is more efficient in terms of number of DC inputs/outputs, delay and quantum cost. Also two reversible parity preserving four-bit parallel adder/subtractor and carry skip adder/subtractor are designed applying the proposed scheme and compared to the former designs.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An empirical study on secure and multiple web service collaborations
The objective of this study is to investigate the factors affecting secure and multiple web service collaborations. Online shopping is one such area where the need arises to perform secure communications with several other trading partners. In this study we have chosen a popular Chinese internet E-commerce company that offers online shopping and other internet related services. We have compared the current model which they have adopted to perform those collaborations and also proposed the benefits they would obtain if changes are made in their communication patterns.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A comparative survey of routing protocols in mobile ad hoc networks
A "Mobile Ad hoc Network" (MANET) is an independent system where mobile hosts are connected by wireless links without any of the preexisting administration. Each node acts as a host and sometimes as a router to forward packets to other nodes. So Routing protocol plays an important role in MANETs because it is designed with self-motivated topology, mobile host, distributed environment and limited battery power. In previous researches, a lot of routing protocols were developed for MANETs such as CGSR, DSR and ZRP. This paper evaluates these protocols by on their uniqueness, functionalities, pros and cons. This paper also emphasizes on enhancement of different protocol’s performance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A concept graph for rough set theory
Conceptual graphs (CGs) are a system of logic based on the existential graphs of Charles Sanders Peirce and the semantic networks of artificial intelligence. They express meaning in a form that is logically precise, humanly readable, and computationally tractable. With a direct mapping to language, conceptual graphs serve as an intermediate language for translating computer-oriented formalisms to and from natural languages. With their graphic representation, they serve as a readable, but formal design and specification language. CGs have been implemented in a variety of projects for information retrieval, database design, expert systems, and natural language processing. The rough set philosophy is founded on the assumption that with every object of the universe of discourse we associate some information (data, knowledge). For example if objects are patients suffering from a certain disease symptoms of the disease form information about patients- Objects characterized by the same information are indiscernible similar in view of the available information about them. The indiscernibility relation generated in this way is the mathematical basis of rough set theory.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Overview on Different Techniques used in Intrusion Detection
In today’s modern and digital world countless milestones have been achieved by the human. Technology has completely enveloped us in some way or the other. Hence if there is not complete dependency but most it is on the use of technology. For example, communicating with someone using a device is technology. Today, there are endless organizations that are maneuvering in recent advancements in technology. Among these the one which concerns us is to secure information or data on the network. Network security is the most functional requirement of any system. So the question arises that how to secure the data on the network from the intruder. There are innumerable intrusion detection techniques to detect the intrusion in the system. This paper deals with some handful of the techniques with which we can secure our data on the network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]