A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Subramanian, C.
- Economic Resource Provisioning Techniques Using OCRP Algorithm In Cloud
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 6 (2013), Pagination:Abstract
The cloud computing provides users an efficient way to allocate the computing resources to the cloud consumers by providing them two resource provisioning plan namely, reservation and on-demand plan. The resource provisioned by reservation plan is cheaper than that of the on-demand plan but it is difficult to achieve the best advance reservation of resource due to uncertainty of consumer’s future demand and provider’s resource prices. To solve this problem an Enhanced optimal cloud resource Provisioning algorithm is proposed by formulating a stochastic programming model. The Enhanced Optimal Cloud Resource Provisioning algorithm can provide Computing resources for being used in multiple provisioning stages as well as a long-term plan. The demand and price uncertainty is considered in Enhanced Optimal Cloud Resource Provisioning. Here, different approaches are considered to obtain the solution of the Optimal Cloud Resource Provisioning algorithm namely, deterministic equivalent formulation, sample-average approximation and Benders decomposition.
Keywords
Cloud computing, computing resources, resource provisioning, virtual machine, provisioning stages, provisioning plans, stochastic programming.- Discrete Wavelet Transform Based Watermarking Using Modified Matrix Encoding
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 5 (2013), Pagination:Abstract
Conventional Robust Reversible Watermarking methods have limited robustness in extracting watermarks from the watermarked images destroyed by different unintentional attacks and some of them suffer from extremely poor invisibility for water marked images. It is necessary to have a framework to address these three problems and further improve its performance. It presents a novel practical structure, wavelet-area arithmetical quantity histogram shifting and cluster (WSQH-SC). Compared with conservative methods, WSQH-SC resourcefully constructs new watermark in addition to removal procedures by histogram shifting and clustering, which are important for civilizing robustness and reducing run-time difficulty in addition, WSQH-SC includes the property-inspired pixel adjustment to effectively handle overflow and underflow of pixels. This results in acceptable reversibility and invisibility. To increase its practical applicability WSQH-SC designs an enhanced pixel-wise masking to balance robustness and invisibility. It perform extensive experiments over normal, medicinal and artificial opening radar imagery to show the effectiveness of WSQH-SC by comparing with the histogram rotation-based and histogram distribution constrained methods.
Keywords
Discrete wavelet transform, k means clustering, Quantization, Robust reversible watermarking.- Identifying Misbehaving Nodes Using Evidence Calculation IDs In MANETs
Authors
Source
International Journal of Innovative Research and Development, Vol 2, No 5 (2013), Pagination:Abstract
A Mobile Ad Hoc Network (MANET) is a dynamic wireless network, in which each node communicate with each other without the use of pre-existing infrastructure or centralized administration. Many other applications like law enforcement, public meeting, virtual class room and some military applications has been using MANETs. It has been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Here Routing Attacks have caused the most devastating damage to Manet. Earlier system typically attempt to isolate malicious nodes based on naive and binary fuzzy response decisions which may results in the unexpected network partition and could lead to uncertainty in countering routing attacks. In this paper, we propose risk-aware response mechanism with evidence calculation intrusion detection system to systematically cope with the identified routing attacks in Manet, which is based on the extended Dempster-Shafer Mathematical Theory of Evidence and articulate expected properties for Dempster’s rule of combination with important factors (DRCIF), to measure the risk of attacks and countermeasures.