Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Singh, Yashwant
- A general class of multivariate distribution involving H̅ -function
Abstract Views :446 |
PDF Views:96
Authors
Affiliations
1 Department of Mathema tics, Jubail University College, SA
1 Department of Mathema tics, Jubail University College, SA
Source
Indian Journal of Science and Technology, Vol 1, No 6 (2008), Pagination: 1-3Abstract
In this paper an attempt has been made to present unified theory of the classical statistical distribution associated with the multivariate generalized Dirichlet distribution involving H̅- function with general arguments. In particular, Mathematical expectation of a general class of polynomials, characteristic function and the distribution function are investigated.Keywords
Probability Density Function, Dirichlet Distribution, General Class of Polynomials, H̅-functionclassification: 33c99)References
- Buschman RG and Srivastava HM (1990) The H -function associated with a certain class of Feynman integrals. J. Maths. Gen. 23, 4707- 4710.
- Carlson BC (1977) Special Function of Applied Mathematics, Academic Press, New York.
- Exton H (1978) Multiple Hypergeometric Function and Application, Halsted Press (Ellis Horwood Ltd., Chichester), John Willey & Sons Chichester ,New York.
- Fox C (1961) The G and H–function as symmetric Fourier kernels. Trans. Amer. Math. Soc. 98, 395-429.
- Goyal SP and Audich Sunil (1991) A general class of multivariate distributions involving Fox’s H-functions. Indian J.Pure & Appl. Math. 22(1), 77-82.
- Gupta KC, Jain Rashmi and Sharma Arti (2003) A study of unified finite integral transform with applications, J. Raj. Acd. Phys. Sci. 2 (4), 269-282.
- Inayat-Hussian AA (1987) New properties of hypergeometric series derivable from Feynman integral II.A generalization of the H – function. J. Phys. A: Math. 20, 4119-4128.
- Mathai AM and Sexena RK (1978) The Hfunction with Applications in Statistics and Other Disciplines, Willy Eastern Ltd., New Delhi.
- Srivastava HM and Karlsson PW (1985) Multiple Gaussian Hypergeometric Series, Halsted Press (Ellis-Harwood Ltd.Chichester), John Willey & Sons, New York.
- Srivastava HM, Gupta KC and Goyal SP (1982) The H-Function of One and Two Variables with Applications, South Asian Publishers, New Delhi.
- Srivastva HM (1972) A contour integral involving Fox’s H-function. Indian J. Math. 14, 1-6.
- Some Unified Presentations of Bicomplex Speces and Functions
Abstract Views :372 |
PDF Views:61
Authors
Affiliations
1 Department of Mathematics, Jubail University College, SA
1 Department of Mathematics, Jubail University College, SA
Source
Indian Journal of Science and Technology, Vol 1, No 7 (2008), Pagination: 1-7Abstract
The aim of this paper is presenting a unified study of bicomplex speces and functions. We discuss the bicomplex number, bicomplex algebra, differentiability of a bicomplex function, bicomplex integration idempotent basis, bicoplex Gamma function, bicomplex Beta function, Gauss multiplication theorem, bicomplex Binomial theorem and some Properties of Gamma function. Various properties of Gamma and Beta functions are established. These functions which are believed to be new will provide a fundamental tool to the theory of bicomplex special functions.Keywords
Bicomplex Number, Idempotent Basis, Gamma And Beta Functions, Bicomplex Binomial TheoremReferences
- Goyal SP and Goyal Ritu (2006) The bicomplex Hurwitz Zeta function,South East Asian J.Math. & Math. Sci. (in press).
- Goyal SP, MathurT and Goyal Ritu 2006) Bicomplex Gamma and Beta function. J.Raj. Acad. Phy. Sci. 5(1), 131-142.
- Price GB (1991) An Introduction to Multicomplex Spaces and Functions, Marcel Dekker, New York.
- Rainville ED (1960) A Special Function. Chelsea Publications, New York.
- Rochon D (2004) A bicomplex Riemann Zeta function, Tokyo J. Math. 27(2), 357-369.
- Ron S (2000) Bicomplex Algebra and Function Theory. Preprint: http://ar xiv.org/abs/math/ 0101200vi.
- Serge C (1892) Le representazioni reali delle forme complesse e gli enti iperalgebrici, Math. Ann. 40, 413-467.
- Intelligent Transport System: A Progressive Review
Abstract Views :193 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Jaypee University of Information Technology (JUIT), Waknaghat, Solan, Himachal Pradesh, IN
1 Department of Computer Science and Engineering, Jaypee University of Information Technology (JUIT), Waknaghat, Solan, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Increase in traffic density in the world results in more and more congestion, air pollution and accidents. Hence Intelligent Transport System (ITS) has been emerged as a solution to various transport related issues. The aim of this research paper is to conduct systematic analysis on ITS. Methods/Statistical Analysis: ITS is defined as the set of applications which are advance and aim to apply intelligent information and communication technologies in order to provide services for transport and traffic management. ITS have combined various technologies such as Data collection, Communication, Data Mining, Machine Learning, Artificial Intelligence and Database Management. By combining these information technologies ITS have provided various applications such as Traffic control, Fault detection systems, In-vehicle information and navigation systems and driver assistance systems. Findings: We have considered the most relevant published work from 2008 onward relative to our objective from different popular digital libraries. We have summarized this work into issues in ITS and techniques used to solve them. Application/Improvements: It has been found that by combining various new technologies such as agent based computing, cloud computing, VANETS etc. ITS have become very efficient to solving transport related issues in smart cities.Keywords
Agent Based Computing, Intelligent Transport System, Parallel Transportation and Management System, Vehicular Ad-hoc Networks, Vehicular Cloud Computing.- A Methodical Review on Issues of Medical Image Management System with Watermarking Approach
Abstract Views :221 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Jaypee University of Information Technology, Wakhnaghat, Solan - 173234, Himachal Pradesh, IN
1 Department of CSE, Jaypee University of Information Technology, Wakhnaghat, Solan - 173234, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objective: The main objective of this research article is to study how watermarking has solved issues evolved in medical management system through various techniques. Method/Analysis: With the advent of technology, medical management system has improved to great extent by sharing medical data for clinical diagnosis, treatment, education, research and other applications. The common uses of watermarking in medical image management system are safe archiving, memory storage, captioning, authentication, controlled access retrieval and effective distribution of information. . In order to conduct the survey, various digital libraries have been explored and research work of last five years is taken into consideration for analysis. Findings: Based on the analysis, the identified techniques have been classified into three main broad categories and few subcategories. The three main categories are: 1. Tamper Detection and authentication/Integrity/Security 2. EPR hiding 3. Hybrid/ all-in-one solution. Novelty/improvement: Later on for further analysis and understanding we have presented the findings in Table 1.Keywords
EPR, DICOM, Spatial and Transform Domain Techniques, Watermarking.- An Energy Efficient Opportunistic Routing Metric for Wireless Sensor Networks
Abstract Views :171 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan - 173234, Himachal Pradesh, IN
1 Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan - 173234, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Opportunistic Routing (OR) algorithms depends on metric design applied to the forwarder selection and prioritization. The objective is to define new OR metric, which reduces energy consumption in WSN. Methods/Statistical Analysis: In Wireless Sensor Network (WSN), sensor nodes have been supplied with a small amount of energy, using small size battery. Opportunistic Routing (OR) can minimize energy consumption by reducing delay and providing real time data delivery. OR reduces number of retransmissions in network by increasing the number of tentative forwarders. But most of the OR algorithms depends on metric design applied to the forwarder candidate selection and prioritization. Findings: In this paper, a new energy aware opportunistic routing metric called as Energy Depletion Factor (EDF) is proposed for WSN. This metric takes into consideration energy as well as delay. This metric can directly be used with existing opportunistic routing protocols. This metric extends the lifetime of the network by distributing energy consumption load equally in the network. It tells the routing algorithm that which forwarder node is having what impact on its battery life. EDF is local opportunistic routing metric, which reduces end-to-end delay in the network and also increases the network lifetime. To calculate EDF, the concept of residual energy of each node has been used. Application/Improvements: This metric can directly be used with existing opportunistic routing protocols. Simulation results presented the improvement of network lifetime and throughput by using EDF as a routing metric in WSN.Keywords
Energy Depletion Factor, End-To-End Delay, Energy Efficiency, Network Lifetime, Opportunistic Routing Metric, Routing Algorithm.- Energy Consumption Pattern at Household Level: A Micro Level Study of Himachal Pradesh
Abstract Views :168 |
PDF Views:0
Authors
Affiliations
1 Department of Humanities and Social Sciences, Jaypee University of Information Technology, Waknaghat, Solan, IN
2 Department of CSE, Jaypee University of Information Technology, Waknaghat, Solan, IN
1 Department of Humanities and Social Sciences, Jaypee University of Information Technology, Waknaghat, Solan, IN
2 Department of CSE, Jaypee University of Information Technology, Waknaghat, Solan, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Household energy composition is generally looked upon as a concept associated with the income level of the household. Current study is an attempt to understand various factors that influence the phenomenon of fuel switching in rural India in general and Himalayan state of Himachal Pradesh in particular. Methods/Statistical Analysis: For the purpose of the study primary data was collected to look upon the energy use pattern at household level with respect to the household size, income level of household, availability of various energy sources, prices of the alternate fuels sources, time taken to utilise different fuel sources, and household's accessibility to fuels. Findings: Study finds that despite major differentials in income at household level, the energy mix across income strata doesn't show any significant difference. Clean energy sources availability, affordability and cultural preferences are three major factors that still influence the household energy mix in Himalayan transact. Application/Improvements: Fuel switching approach needs a major rethinking and income based top down approach is highly desired.Keywords
Energy Consumption, Fuel Switching, Household Energy, Income, Socio-Economic.- Efficient Approach for Securing Message Communication in Wireless Sensor Networks from Node Clone Attack
Abstract Views :146 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Jaypee University of Information, Technology, Waknaghat 173234, Solan, IN
1 Department of Computer Science and Engineering, Jaypee University of Information, Technology, Waknaghat 173234, Solan, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Security is a very decisive factor for Wireless Sensor Networks because of ever growing popularity in the tangible world. These types of resource constrained network suffers from physical attack, i.e. Node clone attack. Methods/Statistical Analysis: In Node clone attack an attacker capture a node, modify it and replicate clone node in WSNs. The main motive of these clone nodes to obtain mastery over the whole network and to aggravate various inside attacks against sensor networks. The message during communication from the one legitimate node to another legitimate node is also not secure thus altered by the attacker. Findings: In this paper, we propose an efficient algorithm for securing message communication in Wireless Sensor Networks (WSNs) from node clone attack. This algorithm makes use of the hybrid cryptography technique which consist of Advanced Encryption Standard (AES) and Elliptical Curve Cryptography (ECC) and lightweight hash function. In this algorithm, AES algorithm encrypts the message and digital signature whereas ECC algorithm encrypts the private key and generates digital signature. The lightweight hash function produces small and fixed size hash digest from the message. The analysis of the proposed algorithm is performed on the ground of parameters like computational overhead, communication overhead, storage overhead and high security level. Application/Improvements: The proposed algorithm authenticate message during communication with confidentiality. The analysis indicates that the suggested algorithm is suited for energy constrained sensor networks.Keywords
Wireless Sensor Network, Node Clone Attack, AES, ECC, Hybrid Cryptography- On Botnet Detection in Networks, based on Traffic Monitoring
Abstract Views :157 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, 181143, IN
1 Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, 181143, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 61-68Abstract
One of the serious and widespread attacks in cyber security is Botnet. Using command and control infrastructure or peer-to-peer communication between bots, botmasters can perform a variety of attacks on internet system-users. To mitigate this, multiple techniques have been developed for botnet detection over the past two decades. In this paper we have discussed various botnet structures and the different techniques of botnet detection proposed in literature. We evaluated these techniques based on their distinctive features and presented their detailed comparative analysis. We also proposed a method for botnet detection using network traffic monitoring. Our approach is based on combining signature and anomaly detection systems that complement each other. Our proposed hybrid detection system may decrease false positive rate in anomaly detection by finding the well-known bots using signature detection and thereby may increase overall detection efficiency.Keywords
Botnet, Malicious Activities, P2P, Anomaly Detection.References
- H. Choi, H. Lee, H. Lee, and H. Kim, “Botnet detection by monitoring group activities in DNS traffic,” CIT 2007 7th IEEE Int. Conf. Comput. Inf. Technol., pp. 715–720, 2007.
- “64 BotMiner_ Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.” .
- A. K. Tyagi and G. Aghila, “A Wide Scale Survey on Botnet,” Int. J. Comput. Appl., vol. 34, no. 9, pp. 975–8887, 2011.
- D. Geer, “Malicious bots threaten network security,” Computer (Long. Beach. Calif)., vol. 38, no. 1, pp. 18–20, 2005.
- W. Lu, G. Rammidi, and A. A. Ghorbani, “Clustering botnet communication traffic based on n-gram feature selection,” Comput. Commun., vol. 34, no. 3, pp. 502–514, 2011.
- G. Gu, J. Zhang, and W. Lee, “BotSniffer : Detecting Botnet Command and Control Channels in Network Traffic Georgia Institute of Technology Roadmap • BotSniffer Experimental Evaluation,” pp. 1–27, 2008.
- I. Technology, H. R. Zeidanloo, A. B. Manaf, P. Vahdani, F. Tabatabaei, and M. Zamani, “Botnet Detection Based on Traffic Monitoring,” pp. 97–101, 2010.
- A. Karim, R. Bin Salleh, M. Shiraz, S. A. A. Shah, I. Awan, and N. B. Anuar, “Botnet detection techniques: review, future trends, and issues,” J. Zhejiang Univ. Sci. C, vol. 15, no. 11, pp. 943–983, 2014.
- S. Khattak, N. R. Ramay, K. R. Khan, A. A. Syed, and S. A. Khayam, “A Taxonomy of botnet behavior, detection, and defense,” IEEE Commun. Surv. Tutorials, vol. 16, no. 2, pp. 898–924, 2014.
- P. V. Amoli, “A Taxonomy of Botnet Detection Techniques Hossein Rouhani Zeidanloo , Moh amm ad Jorjor Zadeh M . Safari , Mazdak Zamani B . Intrusion Detection System ( IDS ),” Ind. Eng., pp. 158–162, 2010.
- A. R. Baker et al., Snort 2.1 Intrusion Detection. 2004.
- V. Krmicek, “Inspecting DNS Flow Traffic for Purposes of Botnet Detection,” GEANT3 JRA2 T4 Intern. Deliv., pp. 1–9, 2011.
- D. Hutchison and J. C. Mitchell, Detection of Intrusions and Malware , and Vulnerability Assessment. 1973.
- “62 29BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation.” .
- “62 28BotMiner Clustering Analysis of Network Traffic for.” .
- “77 37Adaptive pattern mining model for early detection of botnet-propagation scale.” .
- A. Karasaridis, B. Rexroad, and D. Hoeflin, “Wide-scale Botnet Detection and Characterization.”
- J. Goebel and T. Holz, “Rishi : Identify Bot Contaminated Hosts by IRC Nickname Evaluation.”
- T. Strayer and R. Walsh, “Botnet Detection,” vol. 36, no. June 2014, pp. 0–29, 2008.
- U. Snort and M. Tcp, “n s t i t u t e u t h o r r e t a i n s f u l l r i g h t s.”
- D. Dagon, “Botnet Detection and Response The Network is the Infection,” 2005.
- “Revealing Botnet Membership Using DNSBL Counter-Intelligence.”.
- Comparative Analysis of Medical Diagnostic Techniques Using ANN
Abstract Views :128 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science & Technology, Central University of Jammu, Jammu & Kashmir, IN
1 Department of Computer Science & Technology, Central University of Jammu, Jammu & Kashmir, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 104-114Abstract
An immense and immeasurable amount of data is available to medical experts, extending from points of interest of clinical manifestations to different sorts of biochemical information and yields of imaging gadgets. Each kind of information yields data that must be assessed and relegated to a specific pathology amid the diagnostic process. To rationalize the diagnosis in every day routine and maintain a strategic distance from misdiagnosis, methods of machine learning (particularly ANNs) may be utilized. The versatile learning algorithms of machine learning may deal with several kinds of restorative heterogeneous information and classify them into various class outputs. In this paper, we concisely survey and examine the logic, capacities, and performance of ANNs in medical diagnosis of various diseases by making comparative analysis and focusing more on the medical diagnosis of Diabetes. The use of PID dataset for diagnosis is also demonstrated.Keywords
Multi-Layer Perceptron Neural Networks (MLPNN), PID (Pima Indian Diabetes Dataset), MLFFN (Multilayer Feedforward Network), BPN (Backpropagation Network), General regression neural network (GRNN), Radial basis function (RBF).References
- Yusuke Sugomori, Bostjan Kaluza, Fabio M. Soares, Alan M.F Souza: Deep Learning Practical Neural Networks with Java, 2017
- O. Er, N. Yumusak and F. Temurtas, "Chest disease diagnosis using artificial neural networks", Expert Systems with Applications, Vol.37, No.12, 2010, pp. 7648-7655.
- R. Das, I. Turkoglu and A. Sengur, "Effective diagnosis of heart disease through neural networks ensembles", Expert Systems with Applications, Vol.36, No.4, 2009, pp. 7675-7680.
- D. Gil, M. Johnsson, J. M. Garicia Chemizo, A. S. Paya and D. R. Fernandez, "Application of Artificial Neural Networks in the Diagnosis of Urological Dysfunctions", Expert Systems with Applications, Vol.36, No.3, 2009, pp. 5754-5760.
- S. Altunay, Z. Telatar, O. Erogul and E. Aydur, "A New Approach to urinary system dynamics problems: Evaluation and classification of uroflowmeter signals using artificial neural networks", Expert Systems with Applications, Vol.36, No.3, 2009, pp. 4891-4895.
- Filippo Amato, Alberto López, Eladia María Peña-Méndez, Petr Vaňhara, Aleš Hamp, Josef Havel1: “Artificial neural networks in medical diagnosis”
- P. S. Heckerling, G. Canaris, S. D. Flach, T. G. Tape, R. S. Wigton and B. S. Gerber, "Predictors of urinary tract infection based on artificial neural networks and genetic algorithms", International Journal of Medical Informatics; Vol.76, No.4, 2007, pp. 289-296.
- M. P. Francisco, G. C. Juan Manuel, S. P. Antonio and R. F. Daniel, "A robust model of the neuronal regulator of the lower urinary tract based on artificial neural networks", Neurocomputing, Vol.71, No.4-6, 2008, pp. 743-754.
- S. A. Monadjemi and P. Moallem, "Automatic Diagnosis of Particular Diseases Using a Fuzzy-Neural Approach", International Review on Computers & Software, Vol.3, No.4, 2008, pp. 406-411.
- R. Lin, "An intelligent model for liver disease diagnosis", Artificial Intelligence in Medicine, Vol.47, No.1, 2009, pp. 53-62.
- N. Kumar and S. Khatri, “Implementing WEKA for medical data classification and early kidney disease prediction,” 2017 3rd Int. Conf. Comput. Intell. Commun. Technol., pp. 1–6, 2017.
- M. A. Mazurowski, P. A. Habas, J. M. Zurada, J. Y. Lo, J. A. Baker and G. D. Tourassi, "Training Neural Network Classifiers for Medical Decision Making: The Effects of Imbalanced Datasets on Classification Performance", Special Issue on Advances in Neural Networks Research: IJCNN ’07, 2007 International Joint Conference on Neural Networks IJCNN’07 Orlando, Florida, USA, April, 2008, Vol.21, No.3, pp. 427-436, http://ci.louisville.edu/zurada/publications/mazurowski.nn2008.pdf.
- Y. Xing, J. Wang, Z. Zhao, and andYonghong Gao, “Combination Data Mining Methods with New Medical Data to Predicting Outcome of Coronary Heart Disease,” 2007 Int. Conf. Converg. Inf. Technol. (ICCIT 2007), pp. 868–872, 2007.
- G. Zhang, P. Yan, H. Zhao and X. Zhang, "A Computer Aided Diagnosis System in Mammography Using Artificial Neural Networks", 2008 International Conference on BioMedical Engineering and Informatics, 2008, Vol.2, pp. 823-826.
- K. Higuchi, K. Sato, H. Makuuchi, A. Furuse, S. Takamoto and H. Takeda, "Automated diagnosis of heart disease in patients with heart murmurs: application of a neural network technique", Journal of Medical Engineering & Technology, Vol.30, No.2, 2006, pp. 61- 68
- K. Viswanath and R. Gunasundari, “Design and analysis performance of kidney stone detection from ultrasound image by level set segmentation and ANN classification,” Proc.
- F. Xie, H. Fan, Y. Li, Z. Jiang, R. Meng, and A. Bovik, “Melanoma classification on dermoscopy images using a neural network ensemble model,” IEEE Trans. Med. Imaging, vol. 36, no. 3, pp. 849–858, 2017.
- N. Ganesan, “Application of Neural Networks in Diagnosing Cancer Disease Using Demographic Data,” Int. J. Comput. Appl. (0975, vol. 1, no. 26, pp. 76–85, 2010.
- R. Dey and V. Bajpai, “Application of Artificial Neural Network ( ANN ) technique for Diagnosing Diabetes Mellitus,” IEEEexplorer, no. 155, pp. 8–11, 2008.
- Smith, J. W., Everhart, J. E., Dickson, W. C., Knowler, W. C., Johannes, R. S., “Using the ADAP learning algorithm to forecast the onset of diabetes mellitus”, Proc. Symp. on Computer Applications and Medical Care (Piscataway, NJ: IEEE Computer Society Press), pp. 261–5, 1988.
- Kamer Kayaer and Tulay Yildirim, “Medical Diagnosis on Pima Indian Diabetes Using General Regression Neural Networks
- Carpenter, G.A., Markuzon, N., “ARTMAP-IC and medical diagnosis: Instance counting and inconsistent cases”, Neural Networks, 11:323-336, 1998.
- A Fairness Framework for Resource Allocation in Cloud Computing
Abstract Views :212 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science & Information Technology, Central University of Jammu, Jammu and Kashmir, IN
1 Department of Computer Science & Information Technology, Central University of Jammu, Jammu and Kashmir, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 27, No 1 (2018), Pagination: 115-121Abstract
Cloud computing is a model for empowering request to arrange access to a common pool of configurable registering resource. In distributed computing frameworks the resource pool is built from an extensive number of heterogeneous servers. The multi-resource distribution component, called DRFH is a Predominant Resource Reasonableness (DRF) from a solitary server to various heterogeneous servers. The DRFH has various profoundly attractive properties. With DRFH, no client lean towards the allotment of another client; nobody can enhance its portion without diminishing that of the others; and all the more imperatively, no client has an impetus to lie about its resource request. As a direct application, we outline a straightforward heuristic that actualizes DRFH in true frameworks. Expansive scale reenactments driven by Google group follows demonstrate that DRFH altogether outflanks the conventional opening based scheduler, prompting substantially higher asset/resource use with considerably shorter occupation finish times.References
- E. J. Qaisar, “Introduction to cloud computing for developers: Key concepts, the players and their offerings,” 2012 IEEE TCF Inf. Technol. Prof. Conf. TCF Pro IT 2012, 2012.
- L. Popa et al., “FairCloud: Sharing the Network in Cloud Computing,” Sigcomm’12, vol. 42, pp. 187–198, 2012.
- S. Gong, B. Yin, W. Zhu, and K.-Y. Cai, “Adaptive Resource Allocation of Multiple Servers for Service-Based Systems in Cloud Computing,” 2017 IEEE 41st Annu. Comput. Softw. Appl. Conf., no. 61402027, pp. 603–608, 2017.
- S. Mneimneh, “Computer Networks Fairness,” vol. 2.
- V. Jeyakumar, M. Alizadeh, S. Narayana, R. Gopalakrishnan, and A. Kabbani, “Fairness and Efficiency in Network Performance Isolation.”
- M. S. Ahuja, R. Kaur, and D. Kumar, “Trend Towards the Use of Complex Networks in Cloud Computing Environment,” Int. J. Hybrid Inf. Technol., vol. 8, no. 3, pp. 297–306, 2015.
- R. Chang, “Network Virtualization for Cloud Computing p g,” pp. 1–41, 2010.
- A. K. Jain, S. C. Dass, and K. Nandakumar, “Soft Biometric Traits for Personal Recognition Systems,” no. July, pp. 731–738, 2004.
- P. Cloud and S. Options, “Cloud Storage,” Nonprofit Technology Collab., pp. 3–6, 2013.
- D. Sarddar, P. Sen, and M. K. Sanyal, “Central controller framework for mobile cloud computing,” Int. J. Grid Distrib. Comput., vol. 9, no. 4, pp. 233–240, 2016.
- R. Patel and S. Patel, “Survey on Resource Allocation Strategies in Cloud Computing,” Int. J. Eng. Res. Technol. IJERT, vol. 2, no. 2, pp. 1–5, 2013.
- Y. Ito, H. Koga, and K. Iida, “A Bandwidth Allocation Scheme to Improve Fairness in Data Center Networks,” Proc. 2014 Conex. Student Work. - Conex. Student Work. ’14, pp. 7–8, 2014.
- S. Akintoye, A. Bagula, Y. Djemaiel, and N. Bouriga, “A Survey on Storage Techniques in Cloud Computing,” Int. J. Comput. Appl., vol. 163, no. 2, pp. 22–30, 2017.
- K. Choi, Y. Chun, S. Park, and Y. Shin, “Method for Calculation of Cloud Computing Server Capacity Hardware Capacity Calculation for Cloud Computing,” vol. 87, no. 11, pp. 38–41, 2015.