Cloud Computing is a paradigm of large scale distributed computing which is a repackaging of vari... more Cloud Computing is a paradigm of large scale distributed computing which is a repackaging of various existing concepts/ technologies such as utility computing, grid computing, autonomic computing, virtualization and Internet technologies. Cloud computing uses the Internet technologies for delivery of resources as a service to users on demand. As it is a developing technology, various issues such as resource provisioning, security, energy management and reliability need to be addressed. This work focuses on resource provisioning issue in the context of scheduling schemes adapted by cloud environment. Job scheduling is a very challenging task in cloud computing because of its complex distributed architecture. Many algorithms have been proposed using different scheduling techniques. In this paper a cost-efficient dynamic batch mode scheduling approach has been proposed based on assignment rule. The proposed work is compared with other popular scheduling approaches such as round robin, ...
2013 Fifth International Conference on Advanced Computing (ICoAC), 2013
Cloud computing is nowadays replacing the office based computing. As cloud computing becomes more... more Cloud computing is nowadays replacing the office based computing. As cloud computing becomes more widespread, the allocation of network and computing resources will be an issue. While data center energy use has received much attention recently, there has been less attention paid to the resource (CPU processing time and bandwidth) estimation in the cloud networks, which helps to connecting users to the cloud. This paper presents a formal analysis of modeling resource (CPU time) estimation in cloud computing, considering private cloud. The estimation model is based on Linear Least Square Regression (LLSR) method. The performance is measured for different applications in a cloud environment, which is setup and tested for resource estimation of user's frequent applications to be processed in the cloud. The estimation times given by LLSR are compared with other allocation algorithms like WFQ and SWFQ. Though the performances of WFQ and SWFQ are initially matching with the actual CPU time, they are not giving better estimates for the later applications. LLSR gives better estimates which match almost with the actual allocation for all applications.
Cloud computing system offers reliable services to the users based on their service requests. The... more Cloud computing system offers reliable services to the users based on their service requests. The users should pay for the amount of resources availed by them. The main goal of the cloud computing system is to minimize the capital and maintenance cost by eliminating the process of the owning the resources. It supports the users by providing the equipment and programming resources required for them. The cloud data centers comprise a group of configurable resources including networks, applications and servers. The data center of the cloud computing system should satisfy the demands of the user to gain reputation and profit. A Service Level Agreement (SLA) should be signed between the cloud users and service providers to enter into an agreed upon business environment. The requirements of the users will be clearly specified in the SLA, which must be strictly followed (Ghosh, 2012). The SLA is necessary to attain the Quality of Service (QoS) and to validate whether the QoS is met. The Qo...
International Journal of Innovative Technology and Exploring Engineering, 2020
Facial Expression Recognition (FER) has gained significant importance in the research field of Af... more Facial Expression Recognition (FER) has gained significant importance in the research field of Affective Computing in different extents. As a part of the different dimensional thinking, aiming at improving the accuracy of the recognition system and reducing the computational load, region based FER is proposed in this paper. The system is an emotion identifying system among the basic emotions, through subject independent template matching based on gradient directions. The model designed is tested on the Enhanced Cohn-Kanade (CK+) dataset. Another important contribution of the work is using only eye (including eyebrows and the nose portion near eyes) and mouth regions in the emotion recognition. The emotion classification result is 94.3% (CK+ dataset) for 6-class FER.
Active networks provide a programmable user-network interface that supports dynamic modification ... more Active networks provide a programmable user-network interface that supports dynamic modification of the network's behavior. Network nodes, in addition to forwarding packets, perform customized computation on the messages flowing through them. Individual packets carry executable code, or references to executable code. Active networks are changing considerably the scenery of computer networks and consequently, affect the way network management is conducted. Performance management is strongly related to quality of service (QoS) provisioning. In a heterogeneous networking environment, each node must understand the varying resource demands associated with specific network traffic. This paper describes and evaluates an approach to control the CPU utilization of malicious packets and to estimate the CPU demand for good packets in a heterogeneous active network environment. The network management systems can allocate the capacity better by anticipating varying demands and the network operators can better estimate the quality of service (QoS) that customers can expect
This paper proposes a mutual authentication technique for use in the wireless mobile network. Aut... more This paper proposes a mutual authentication technique for use in the wireless mobile network. Authentication of mobile subscribers is a challenging issue due to increasing security threats as it acts as the first defence against attackers. We come up with a novel authentication mechanism, called Group Registration, which reduces the huge bandwidth consumption between Visitor Location Register (VLR) and HLR; and overloaded Home Location Register (HLR) makes it suitable for low-power mobile devices. An efficient and secured channel is developed in the cryptosystems implementing the encryption function and keyed one-way function by cryptographic library JCE (Java Cryptography Extension) API in Java. Encryption function is implemented by symmetry-based AES encryption algorithm. The Keyed one-way function which follows HMAC standard (RFC 2104) is implemented by secure hash function SHA-2.
Active networks provide a programmable user-network interface that supports dynamic modification ... more Active networks provide a programmable user-network interface that supports dynamic modification of the network's behavior. Network nodes, in addition to forwarding packets, perform customized computation on the messages flowing through them. Resources in an active network mainly comprise of CPU and bandwidth. An efficient allocation is required for the optimal utilization of the resources. In this paper, the resources are estimated using a smoothing technique and compared against the actual requirements. An algorithm is designed for the fair allocation of resources. A policy-based approach is also designed based on constraints related to resource requirements, which will ensure the overall QoS
Active networks provide a programmable user-network interface that supports dynamic modification ... more Active networks provide a programmable user-network interface that supports dynamic modification of the networkpsilas behavior. Network nodes, in addition to forwarding packets, perform customized computation on the messages flowing through them. Individual packets carry executable code, or references to executable code. Resources in an active network mainly comprise of CPU and bandwidth. The inherent unpredictability of processing times of active packet poses a significant challenge in CPU scheduling. An efficient allocation is required for the optimal utilization of the resources. This paper describes and evaluates an approach to CPU allocation in active sensor networks. An algorithm is also designed for the fair allocation of resources using max-min fairness. The effectiveness of the algorithm is measured through simulation. The results show that the fair rate is maintained close to the admission threshold.
Cloud Computing is a paradigm of large scale distributed computing which is a repackaging of vari... more Cloud Computing is a paradigm of large scale distributed computing which is a repackaging of various existing concepts/ technologies such as utility computing, grid computing, autonomic computing, virtualization and Internet technologies. Cloud computing uses the Internet technologies for delivery of resources as a service to users on demand. As it is a developing technology, various issues such as resource provisioning, security, energy management and reliability need to be addressed. This work focuses on resource provisioning issue in the context of scheduling schemes adapted by cloud environment. Job scheduling is a very challenging task in cloud computing because of its complex distributed architecture. Many algorithms have been proposed using different scheduling techniques. In this paper a cost-efficient dynamic batch mode scheduling approach has been proposed based on assignment rule. The proposed work is compared with other popular scheduling approaches such as round robin, ...
2013 Fifth International Conference on Advanced Computing (ICoAC), 2013
Cloud computing is nowadays replacing the office based computing. As cloud computing becomes more... more Cloud computing is nowadays replacing the office based computing. As cloud computing becomes more widespread, the allocation of network and computing resources will be an issue. While data center energy use has received much attention recently, there has been less attention paid to the resource (CPU processing time and bandwidth) estimation in the cloud networks, which helps to connecting users to the cloud. This paper presents a formal analysis of modeling resource (CPU time) estimation in cloud computing, considering private cloud. The estimation model is based on Linear Least Square Regression (LLSR) method. The performance is measured for different applications in a cloud environment, which is setup and tested for resource estimation of user's frequent applications to be processed in the cloud. The estimation times given by LLSR are compared with other allocation algorithms like WFQ and SWFQ. Though the performances of WFQ and SWFQ are initially matching with the actual CPU time, they are not giving better estimates for the later applications. LLSR gives better estimates which match almost with the actual allocation for all applications.
Cloud computing system offers reliable services to the users based on their service requests. The... more Cloud computing system offers reliable services to the users based on their service requests. The users should pay for the amount of resources availed by them. The main goal of the cloud computing system is to minimize the capital and maintenance cost by eliminating the process of the owning the resources. It supports the users by providing the equipment and programming resources required for them. The cloud data centers comprise a group of configurable resources including networks, applications and servers. The data center of the cloud computing system should satisfy the demands of the user to gain reputation and profit. A Service Level Agreement (SLA) should be signed between the cloud users and service providers to enter into an agreed upon business environment. The requirements of the users will be clearly specified in the SLA, which must be strictly followed (Ghosh, 2012). The SLA is necessary to attain the Quality of Service (QoS) and to validate whether the QoS is met. The Qo...
International Journal of Innovative Technology and Exploring Engineering, 2020
Facial Expression Recognition (FER) has gained significant importance in the research field of Af... more Facial Expression Recognition (FER) has gained significant importance in the research field of Affective Computing in different extents. As a part of the different dimensional thinking, aiming at improving the accuracy of the recognition system and reducing the computational load, region based FER is proposed in this paper. The system is an emotion identifying system among the basic emotions, through subject independent template matching based on gradient directions. The model designed is tested on the Enhanced Cohn-Kanade (CK+) dataset. Another important contribution of the work is using only eye (including eyebrows and the nose portion near eyes) and mouth regions in the emotion recognition. The emotion classification result is 94.3% (CK+ dataset) for 6-class FER.
Active networks provide a programmable user-network interface that supports dynamic modification ... more Active networks provide a programmable user-network interface that supports dynamic modification of the network's behavior. Network nodes, in addition to forwarding packets, perform customized computation on the messages flowing through them. Individual packets carry executable code, or references to executable code. Active networks are changing considerably the scenery of computer networks and consequently, affect the way network management is conducted. Performance management is strongly related to quality of service (QoS) provisioning. In a heterogeneous networking environment, each node must understand the varying resource demands associated with specific network traffic. This paper describes and evaluates an approach to control the CPU utilization of malicious packets and to estimate the CPU demand for good packets in a heterogeneous active network environment. The network management systems can allocate the capacity better by anticipating varying demands and the network operators can better estimate the quality of service (QoS) that customers can expect
This paper proposes a mutual authentication technique for use in the wireless mobile network. Aut... more This paper proposes a mutual authentication technique for use in the wireless mobile network. Authentication of mobile subscribers is a challenging issue due to increasing security threats as it acts as the first defence against attackers. We come up with a novel authentication mechanism, called Group Registration, which reduces the huge bandwidth consumption between Visitor Location Register (VLR) and HLR; and overloaded Home Location Register (HLR) makes it suitable for low-power mobile devices. An efficient and secured channel is developed in the cryptosystems implementing the encryption function and keyed one-way function by cryptographic library JCE (Java Cryptography Extension) API in Java. Encryption function is implemented by symmetry-based AES encryption algorithm. The Keyed one-way function which follows HMAC standard (RFC 2104) is implemented by secure hash function SHA-2.
Active networks provide a programmable user-network interface that supports dynamic modification ... more Active networks provide a programmable user-network interface that supports dynamic modification of the network's behavior. Network nodes, in addition to forwarding packets, perform customized computation on the messages flowing through them. Resources in an active network mainly comprise of CPU and bandwidth. An efficient allocation is required for the optimal utilization of the resources. In this paper, the resources are estimated using a smoothing technique and compared against the actual requirements. An algorithm is designed for the fair allocation of resources. A policy-based approach is also designed based on constraints related to resource requirements, which will ensure the overall QoS
Active networks provide a programmable user-network interface that supports dynamic modification ... more Active networks provide a programmable user-network interface that supports dynamic modification of the networkpsilas behavior. Network nodes, in addition to forwarding packets, perform customized computation on the messages flowing through them. Individual packets carry executable code, or references to executable code. Resources in an active network mainly comprise of CPU and bandwidth. The inherent unpredictability of processing times of active packet poses a significant challenge in CPU scheduling. An efficient allocation is required for the optimal utilization of the resources. This paper describes and evaluates an approach to CPU allocation in active sensor networks. An algorithm is also designed for the fair allocation of resources using max-min fairness. The effectiveness of the algorithm is measured through simulation. The results show that the fair rate is maintained close to the admission threshold.
Uploads