The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud Computing facilitates delivery of various types of computational services through the internet. These services can be availed according to the user demand. The resource scarcity problems within the Service Providers are met using Virtualization technique, which allows scalability of resources and thereby helps to meet the client requirements. Allocation of resources to client tasks is an issue...
Cloud Computing delivers computational services through the internet. The services availed can vary according to the user requirements. The services are basically provided using virtualization technique. One of the services that are provided is the computational services for the client tasks. The client provides the Service Provider with various sized tasks that need to be executed. The execution...
Cloud computing is the upcoming technology in current day scenario. It has emerged as a solution for providing computing resources as a service to the consumers in the form of infrastructure, platform and software. When multiple users request for services, cloud service provider has to schedule the requests to the available resources appropriately to satisfy each user's request to meet Service Level...
Fluconazole is an efficient antifungal drug used in the treatment and prevention of superficial and systemic fungal infections. The molecular structure, fundamental vibrational wavenumber and intensity of the vibrational bands are interpreted, aided by density functional theory method. The results of the calculations were applied to simulated spectra of the title compound, which show excellent agreement...
The videos are widely used nowadays for different purposes. But due to easily available software tools, it has become very easy to modify the videos. The videos sent from one end to other can be tampered maliciously in between. The frames in the video can be edited or the sequence of the frames can be altered or even some frames can be deleted, any such malicious alteration is possible. Thus it is...
In spite of presence of many classical and modified data analysis techniques, data analysis in the field of software engineering still remains a challenge because of the presence of large number of both continuous and discreet explanatory variables judging the outcome of one and more than one dependant variables. Requirement for an efficient multivariate data analysis technique which fulfils the constraints...
Complete dissolution of the coal sample has been achieved using an integrated approach based on oxidative pyrolysis (OP) and microwave-assisted digestion (MWD) for the quantitative determination of major to ultra-trace elements by inductively coupled plasma (ICP)-based techniques. The coal samples were initially pyrolysed by heating to ∼500°C in the presence of an oxygen stream. Subsequently MWD was...
Workflow has a great impact on several diverse fields of science such as Physics, Bioinformatics, Astronomy etc. The computational requirements of the world is increasing exponentially and so the use of workflows. These requirements are expected to increase by many folds. Thus workflow can be considered as one of the important areas to be explored. Workflow is used extensively by the scientific community...
Cryptographic hash algorithms have gained widespread popularity over its algorithmic complexity and the impossibility of recreation of the original input from the message digest. Embedded systems employ such algorithms for its security after substantial modifications in order to meet the hardware specifications due to the parsimonious capacity of such systems. Efficacious hashing algorithms lucidly...
Use of TSL and certificates in secure applications in the internet is very common today. Certificate authorities are playing the important role of trust anchors. But this means that third party certificate authorities have to be trusted by both domain owners and their clients. Compromises of certificate authorities will put many users under a huge risk. To solve this problem, the DANE protocol was...
Development of distributed storage, cell phones, furthermore, removable hard drives have expanded the versatility of usage of information. On the other hand, there emerges a few issues of how to figure out if information may be so delicate it would be impossible leave a clients gadget, and, how to secure it from unauthorized access. Information Leakage Prevention applications perform this assignment,...
This paper presents a Stackelberg game between the tracker and peer of a torrent in a BitTorrent community which incentivizes cooperation amongst peers. We propose a change in the allocation of peers to a peer by tracker and suggest modifications in the allocation algorithm rather than keeping it completely random. By this change the role of tracker in a BitTorrent community is promoted from just...
The advent of mobile phones and the spread of the internet have caused a substantial increase in the utilization of these technologies for personal communication. A wide range of mobile applications exist, most of which use their own proprietary protocol. Reports of snooping attacks have prompted the parent organizations and users to guarantee that the encrypted data sent over a public network is...
This paper proposes a new approach to locate software components from large component online open source repositories which encompasses the inherent features of context-aware browsing, ranking and semantic tagging. Tagging of individual components helps making search fast and efficient. We are trying to improvise the results of context aware browsing by ranking them on the basis of Hidden Markov Models...
Map Reduce is a widely adopted implementation in many fields like that of scientific analysis for data processing, processing data on web as well as areas like high performance computing.Computing systems with heavy data handling requirements should provide an effective scheduling method so that utilization is enhanced.The major problems encountered in scheduling MapReduce jobs are mostly caused by...
Named Data Networking (NDN) being a potential future technology designed as a distribution network alternative to the present day host oriented IP-based host-oriented Internet architecture. Some arguments against NDN implementation over other candidate architectures are as mentioned. (1) Availability of extensive content which needs to be comprehended in accordance with its relevance and type. (2)...
Big Data is the technology that has changed the world. Its powerful abilities to process the data and generate the valuable data out of that has challenged the saying wisdom can be only possessed by those who have souls. Though the big data analytics is quite successful in mining the value out of the large pool of data but Big Data alone is not enough in case of web-analytics. The existing search...
MapReduce has become a prominent Parallel processing model used for analysing large scale data. MapReduce applications are increasingly being deployed in the cloud along with other applications sharing the same physical resources. In this scenario, efficient scheduling of MapReduce applications is of utmost importance. Also, MapReduce has to consider various other parameters like energy efficiency...
In a peer to peer system, each entity needs some services from other entities in the network, and is capable of providing services to other entities in the network. For the system to work each entity has to contribute at least as much as it is receiving. But for this to happen, since the services requested and offered are different across entities, the relative values of each service have to be determined...
Workflow is one of the important aspects of cloud computing today. Cloud computing is one of the fastest growing technologies in the world. Workflows can be used in cloud as we use them in grid. Many operations in the cloud are based on workflow execution. Workflow systems are now becoming more complex and for such kind of systems efficient workflow management is important. Workflow scheduling is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.