IOSR Journal of Computer Engineering (IOSR-JCE)

Jan - Feb 2014Volume 16 ~ Issue 1

Version 1 Version 2 Version 3 Version 4 Version 5 6 7 8 9

Paper Type : Research Paper
Title : Study of Web Crawler and its Different Types
Country : India
Authors : Trupti V. Udapure || Ravindra D. Kale || Rajesh C. Dharmik
: 10.9790/0661-16160105    logo
Abstract: Due to the current size of the Web and its dynamic nature, building an efficient search mechanism is very important. A vast number of web pages are continually being added every day, and information is constantly changing. Search engines are used to extract valuable Information from the internet. Web crawlers are the principal part of search engine, is a computer program or software that browses the World Wide Web in a methodical, automated manner or in an orderly fashion. It is an essential method for collecting data on, and keeping in touch with the rapidly increasing Internet. This Paper briefly reviews the concepts of web crawler, its architecture and its various types.
Keyword: Crawling techniques, Web Crawler, Search engine.
[1] Bharat Bhushan1, Narender Kumar2," Intelligent Crawling On Open Web for Business Prospects", IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.6, June 2012.
[2] Pavalam S. M., S. V. Kasmir Raja, Jawahar M., and Felix K. Akorli, "Web Crawler in Mobile Systems", International Journal of Machine Learning and Computing, Vol. 2, No. 4, August 2012.
[3] S.S. Dhenakaran1 and K. Thirugnana Sambanthan2, "WEB CRAWLER - AN OVERVIEW", International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 265-267.
[4] Ms. Swati Mali, Dr. B.B. Meshram, "Implementation of Multiuser Personal Web Crawler",CSI Sixth International Conference on Software Engineering (CONSEG), IEEE Conference Publications, 2012.
[5] Pooja Gupta and Mrs. Kalpana Johari, "Implementation of Web Crawler", Second International Conference On Emerging Trends In Engineering and Technology, ICETET-09, IEEE Conference Publications,2009.

Paper Type : Research Paper
Title : Design and Developing a Multicast Routing Protocol for Link Failure and Reliable Data Delivery
Country : India
Authors : M. Selvi || Dr. R. Balakrishna
: 10.9790/0661-16160610    logo
Abstract: MANET is a mobile Ad hoc network. It is a wireless and self organized network without infrastructure support. Ad hoc networks systems possess rapid deployment, robustness and flexibility. The problems of Ad hoc network share dynamic network topology and structure. That is, nodes may join or leave the network, causes link failure in the network and also the limitation of radio range defined by transmission power communicating parties are not within the transmission range. Movement of the intermediate node result is path failure. Otherwise links in the networks may share resources such as conducts or ducts and the failure of such shared resources results in failure of multiple links. To avoid the link failure, multicasting protocol (NAMP) will be used in the research. NAMP could overcome the observed problem and improve the performance of data delivery. Special protocol called security protocol for reliable data delivery (SPREAD) is also used in the research.
Keywords: NAMP, SPREAD, LINK FAILURE, DATA DELIVERY.
[1]. AleksiPenttinen," Research Ad hoc network: current activity and future direction",NetworkingLaboratory,Helinski University of Technology,FIN-02015 Hut,Finland 2002.
[2]. ImrichChlamtaca,MarcoContib,Jennifer J-N.Liuc," Mobile Ad hoc network imperatives and challenges",www.elsevier.com/locate/adhoc networks.2003 13-64.
[3]. Umang Singh" Secure routing protocol in mobile Ad hoc network - a survey and taxanomy".International Journal of reviews in Computing Sep 2011 Vol:7 IJRIC and LLS E-ISSN 2076-3336.
[4]. C.Sreedhar,Dr.S.MadhusudhanaVerma,Prof.N.Kasiriswanath" A survey an security issues in wireless Ad hoc network routing protocol"in IJCSE International Journal on Computer Science and Engineering vol 2,No.02,2010,224-232.
[5]. TanuPreetSingh,ShiraniDua,VikrantDas"Energy Efficient Routing Protocols in Mobile Ad hoc Networks",in IJAR CSSE International journal of Advanced research in Computer science and Software Engineering vol 2,Issue 1,January 2012 ISSN:2277 128X.

Paper Type : Research Paper
Title : LEXIMET: A Lexical Analyzer Generator including McCabe's Metrics
Country : Iraq
Authors : Rana khudier Abbass Ahmed
: 10.9790/0661-16161118    logo
Abstract: Due to the complexity of designing a lexical analyzer for programming languages, this paper presents, LEXIMET, a lexical analyzer generator. This generator is designed for any programming language and involves a new feature of using McCabe's cyclomatic complexity metrics to measure the complexity of a program during the scanning operation to maintain the time and effort.
[1]. Biswajit R Bhowmik, "A New Approach of Complier Design in Context of LexicalAnalyzer and Parser Generation for NextGen Languages" International Journal of Computer Applications (0975 –8887) Volume 6 – No.11, September 2010.
[2]. Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ulman, "Compilers: Principles, Techniques, and Tools" 2nd Edition, Prentice Hall, 2007.
[3]. Ayman Madi, Oussama K. Zein and Seifedine Kadry, "On the Improvement of Cyclomatic Complexity Metric" ,International Journal of Software Engineering and Its Applications, Vol. 7, No. 2, March, 2013.
[4]. N Gayatri, S Nickolas, A.V.Reddy, "Performance Analysis and Enhancement of Software Quality Metrics using Decision Tree based Feature Extraction, "International Journal of Recent Trends in Engineering, Vol 2, No. 4, November 2009.
[5]. Reg. Charney, "Programming Tools: Code Complexity Metrics", Linux Journal, 2005.

Paper Type : Research Paper
Title : A Review Paper on Knowledge Map Construction for Monitoring the Health of the Company
Country : India
Authors : Arti Gupta || Prof. N. T. Deotale
: 10.9790/0661-16161925    logo
Abstract: This paper produces the business structure map to understand business performance by analysing the various aspects of the company The business structure map or knowledge map are used to increase the growth of the company by giving some useful measures according to the business criteria. These paper also deals with the different company strategy to mitigate the risk factors. Knowledge Map is helpful for developing such knowledge successfully.
Keywords: business criteria, business structure, knowledge map, process map, strategy.
[1]. B. Kosko, Fuzzy cognitive maps, International Journal of Man- Machine Studies, vol. 24, no. 3, pp.65-75,1986.
[2]. J. Aguilar, A survey about fuzzy cognitive maps papers,International Journal of Computational Cognition, vol. 3, no. 2, pp. 27-33, 2005.
[3]. L. Rodriguez-Repiso, R. Setchi, and J. L. Salmeron,Modelling IT projects success with fuzzy cognitive maps, Expert Systems with Applications, vol. 32, no. 2, pp. 543-559, 2007.
[4]. Z. Peng, B. Yang, C. Liu , Z. Tang, and J. Yang, Research on one fuzzy cognitive map classifier, (in Chinese), Application Research of Computers , vol. 26 , no. 5 , pp.1757-1759, 2009.
[5]. T. Hong and I. Han , Knowledge-based data mining of news information on the Internet using cognitive maps and neural networks, Expert Systems with Applications, vol. 23, no. 1, pp. 1-8, 2002.

Paper Type : Research Paper
Title : Vtalk: Secure Deployment of VoIP over LAN'S
Country : India
Authors : Ms. Sassirekha S. M. || Ms. J. R. Thresphine
: 10.9790/0661-16162628    logo
Abstract: Peer-to-peer VoIP (voice over IP) networks, exemplified by Skype, are becoming increasingly popular due to their significant cost advantage and richer call forwarding features than traditional public switched telephone networks. One of the most important features of a VoIP network is privacy (for VoIP clients). Unfortunately, most peer-to-peer VoIP networks neither provide personalization nor guarantee a quantifiable privacy level. In this paper, we propose novel flow analysis attacks that demonstrate the vulnerabilities of peer-to-peer VoIP networks to privacy attacks. We then address two important challenges in designing privacy-aware VoIP networks: Can we provide personalized privacy guarantees for VoIP clients that allow them to select privacy requirements on a per-call basis? How to design VoIP protocols to support customizable privacy guarantee? This paper proposes practical solutions to address these challenges using a quantifiable k-anonymity metric and a privacy-aware VoIP route setup and route maintenance protocols. We present detailed experimental evaluation that demonstrates the performance and scalability of our protocol, while meeting customizable privacy guarantees.
IndexTerms: VOIP, SSH, QOS, ITU, RSP, AARSP, FCC, PSTN.
[1]. Mudhakar Srivatsa, Arun Iyengar, Ling Liu and Hongbo Jiang, ―Privacy in VoIP Networks : Flow Analysis Attacks and Defense,‖ IEEE Trans.Parallel and distributed systems, pages 621-633, 2011.
[2]. M.J. Freedman and R. Morris, ―Tarzan: A Peer-to-Peer Anonymizing Network Layer,‖ Proc. Ninth ACM Conf. Computer and Comm. Security (CCS), 2002.
[3]. Stoeckigt, K.O. , Vu, H.L. , VoIP Capacity—Analysis, Improvements, and Limits in IEEE 802.11 Wireless LAN,‖ IEEE Transaction,pages 4553 – 4563,2010.
[4]. M. Srivatsa, A. Iyengar, and L. Liu, ―Privacy in VOIP Networks: A k-Anonymity Approach,‖ Technical Report IBM Research RC24625, 2008.
[5]. Chacon, Sergio University of Houston, USA, Benhaddou, Driss ; Gurkan, Deniz ,‖ Secure voice over Internet Protocol (voIP) using virtual private networks (VPN) and Internet Protocol Security (IPSec),‖IEEE conference,2006.

Paper Type : Research Paper
Title : A Novel Approach to Design Time Efficient and Secure encryption Algorithm (T-SEA)
Country : India
Authors : Prachi Saxena || Sini Shibu
: 10.9790/0661-16162934    logo
Abstract: A recent field of study is the security of the information over public network through encryption in efficient way. Even if there are no efficiency gains to be made, there are practical and usability issues. This paper is proposing a new encryption/decryption technique and fulfilling the basic security principle like confidential and authenticity. This paper developed an algorithm with variable key length to improve the security. Presented results are showing the performance of the proposed concept in terms of efficiency and security.
Keywords: Computer Security, Network, Encryption, Decryption, Algorithm, Cryptography, Symmetric.
[1] Ashwak M. AL-Abiachi, Faudziah Ahmad, Ku Ruhana A Competitive Study of Cryptography Techniques over Block Cipher" IEEE UKSim 13th International Conference on Modelling and Simulation 2011.
[2] Akhil Kaushik, Manoj Bamela and AnantKumar "Block Encryption Standard for Transfer of Data" IEEE International Conference on Networking and Information Technology 2010.
[3] G. RAMESH and Prof. Dr. R. UMARANI "UMARAM: A Novel Fast Encryption Algorithm for Data Security in Local Area Network" IEEE ICCCCT'2010
[4] P.P Charles & P.L Shari, "Security in Computing: 4th edition", Prentice-Hall, lnc.,2008.
[5] Neeraj Khanna, Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : "New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm" Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130.

Paper Type : Research Paper
Title : Agent Based Distributed Tutoring System modeling using Extended Tropos approach
Country : India
Authors : Sampathkumar T. T., Venkateswaran V., Peddi Reddy Vishnu
: 10.9790/0661-16163543    logo
Abstract: Due to the availability of enormous amount of resources for the tutoring system, there is a need for the distribution of the resources when developing such tutoring system.There are several users inthe distributed system where there is aconcurrent access of the resources. In such scenario there should be a definite access control policies for the resources. Since the agents are suitable for the distributed system and these access control policies would restrict the agents in accessing the resources. In our work we have extended Tropos which is an agent oriented software development methodology.Our extension would classify the resources based on the types of resources by which it can be accessed by other agents. This extension would also consider the temporal constraints in accessingthe resources. The resources have been classified into four types and the temporal constraints have been classified into three types. Our approach provides a systematic way of development of the distributed systems than the formal UML modeling technique by capturing the security constraints and providing the access control policies in the modeling stage itself.
Keywords: Requirement engineering, Agent based systems, Tropos, Adaptive software environment, Security Requirements.
[1]. Henderson-Sellers, B., Giorgini, P. (eds.): Agent-Oriented Methodologies. Idea Group Inc. (2005)
[2]. Federico Bergenti, M.-P.G., Zambonelli, and F. (eds.): Methodologies and Software Engineering for Agent Systems: The Agent-Oriented Software Engineering Handbook. Springer, Heidelberg (2004)
[3]. P. Bresciani, P. Giorgini, F. Ginuchiglia, J. Mylopoulos, and A. Perini, "TROPOS: An Agent-Oriented Software Development Methodology", In International Journal of Autonomous Agents and Multi Agent Systems, 8(3):203–236, 2004
[4]. JoséM.Pérez,FélixGarcía-Carballeira, "Branch replication scheme: A new model for data replication in large scale data grids", Future Generation Computer Systems vol.26(2010)
[5]. P. Kokkinos, K. Christodoulopoulos, E.Varvarigos, "Efficient data consolidation in grid networks and performance analysis" in FutureGenerationComputerSystems, vol 27, 2011.

Paper Type : Research Paper
Title : Survey on Routing Protocols for Under Water Sensor Networks
Country : Pakistan
Authors : Kifayat Ullah Jan || Zahoor Jan
: 10.9790/0661-16164446    logo
Abstract: There are certain routing protocols in underwater sensor network. Providing efficient protocols for underwater sensor networks is a challenging factor. UNSW often uses acoustic channels instead of Radio channels. This paper surveys some routing protocols, and presents a classification of the various approaches which follow among that location based is the main concept.
Keywords: UNSW, Terrestrial, Acoustic channels.
[1]. Xie P, Cui J-H, Lao L. VBF: vector-based forwarding protocol for Underwater sensor networks. Networking 2006. Networking Technologies, services, and protocols.
[2]. Performance of computer and communication networks; mobile and Wireless communications systems. Berlin/Heidelberg: Springer; 2006a. P. 1216–1221
[3]. Nikolaou N, et al. Improving the robustness of location-based routing for underwater sensor networks. In: Proceedings of the OCEANS. – Europe; 2007.
[4]. I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, Volume: 40 Issue: 8, Pp. 102-114, August 2002.
[5]. J. Heidemann, W. Ye, J. Wills, A. Syed, Y. Li, Research challenges and applications for underwater sensor networking, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC2006), Las Vegas, Nevada, USA, April 3–6, 2006.

Paper Type : Research Paper
Title : A Comparative Study of Facial, Retinal, Iris and Sclera Recognition Techniques
Country : India
Authors : Sugandha Agarwal || Rashmi Dubey || Sugandh Srivastava || Prateek Aggarwal
: 10.9790/0661-16164752    logo
Abstract: The pressures on today's system administrators to have secure systems are ever increasing. One area where security can be improved is in authentication. Face, retina, iris and sclera recognition, biometrics, provide one of the most secure methods of authentication and identification. These technologies are very useful in areas such as information security, physical access security, ATMs and airport security. These technologies are more or less accurate, easy to use, non-intrusive, and difficult to forge and, despite what people may think, are actually quite fast systems once initial enrolment has taken place. However, they do require the co-operation of the subject: need specific hardware and software to operate. These recognition technologies do provide a good method of authentication to replace the current methods of passwords, token cards or PINs and if used in conjunction with something the user knows in a two-factor authentication system then the authentication becomes even stronger.
Keywords: Biometrics, Iris, Sclera, Retina and Facial Recognition.
[1] R. Derakhshani,A.Ross,S.Crihalmeanu,A new biometric modality based on conjunctival vasculature, in: Proceedings of Artificial Neural Networks in Engineering (ANNIE2006),St.Louis,Missouri,USA,2006.
[2] S. Crihalmeanu,A.Ross,R.Derakhshani, Enhancement and registration schemes for matching conjunctival vasculature,in:Proceedingsofthe3rd IAPR/IEEE International Conferenceon Biometrics(ICB2009),Italy,2009, pp. 1240–1249.
[3] N.L. Thomas, Y. Du, Z. Zhou, A new approach for sclera vein recognition, in: Proceedings of the International Society for Optical Engineering (SPIE), vol. 7708, 2010.
[4] Z. Zhou,E.Y.Du,N.L.Thomas,A comprehensive sclera image quality measure, in: proceedings of the 11th International Conference on Control, Automation, Robotics and Vision(ICARCV2010),Singapore,2010,pp.638–643.
[5] S.Crihalmeanu,A.Ross,Multispectral scleral patterns for ocular biometric recognition, PatternRecognit.Lett.33(14)(2012)1860–1869.

Paper Type : Research Paper
Title : RED TACTON (An avant-garde Human Area Networking technology)
Country : India
Authors : Mrignayani Chhotwani || Anshul Vyas
: 10.9790/0661-16165361    logo
Abstract: So many technologies for networking are known and are in use. These technologies connect people, objects and other networks together so as to share data and thus make information ready for access. Our body could soon be the backbone of a broadband personal data network linking your mobile phone or MP3 player to a cordless headset, your digital camera to a PC or printer, and all the gadgets you carry around to each other. A new networking technology called RedTacton was announced by NTT labs in 2005, which makes use of human body surface as communication medium when exchanging data among people, objects and networks. It is completely distinct from wireless and infrared. RedTacton has contrived a new pattern of behavior which defines different application areas of the technology. With this new technology ubiquitous computing services is enhanced. This is because it brings user-friendly ubiquitous services to people and objects in a network, in very close proximity. A transmission path is formed at the moment a part of the human body in contact with a RedTacton transceiver. Physically separating ends the contact and thus ends communication.
[1]. www.technologyreview.com
[2]. www.taipeitimes.com/News/biz/archives/2005/03/20/2003247076
[3]. http://www.ntt.co.jp/news/news05e/0502/050218.html
[4]. http://www.physorg.com/news3153.html
[5]. http://www.ntt.co.jp/RD/OFIS/active/2005pdfe/pdf/h_ct02_e.pdf

Paper Type : Research Paper
Title : Use Map EstimationFor Image Sharpening
Country : India
Authors : Mrs. Kshirsagar P. G. || Dr. Ashok Gaikwad
: 10.9790/0661-16166265    logo
Abstract: This paper presents a various paradigms for estimating a single latent sharp image given multiple blurry and/or noisy observations. Whether employing it to make an unusable image good, a good image better or giving a great image that extra edge, it produces unparalleled sharpening and deblurring results that add distinction and definition. From a blurred image to recover a sharp version is a long-standing inverse problem. We point out the weaknesses of the deterministic filter and unify the limitation. Theoretically and experimentally we analyze image deblurring through three paradigms are: 1) The filter determination 2) Estimation by Bayesian 3) Alpha tonal correction methods. The resulting paradigms, which require no essential tuning parameters, can recover a high quality image from a set of observations containing potentially both blurry and noisy examples, without knowing a priori the degradation type of each observation. Our goal is to reveal the limitations and potentials of recent methods when dealing with quite large blurs and severe noise. Experimental results on both synthetic and real-world test images clearly demonstrate the ability to produce a desired or intended result of the proposed method.
Keywords: Step-Edge Based Filter (SEBF), Sample Number (SN), Bounded-Input Bounded-Output (BIBO).
[1]. Gonzalez and Woods, Digital image processing, 2nd edition, Prentice Hall, 2002. Chap 4 Sec 4.3, 4.4; Chap 5 Sec 5.1 – 5.3(pages 167-184 and 220-243).
[2]. C. Liu,W. T. Freeman, R. Szeliski, and S. B. Kang. Noise estimation from a single image. In Proc.IEEE Conf. Computer Vision and Patter Recognition, pages 901–908, Jun 2006.
[3]. BEN-EZRA, M., AND NAYAR, S. K. 2004. Motion-based motion deblurring. TPAMI 26, 6, 689–698.
[4]. JIA, J. 2007. Single image motion deblurring using transparency. In CVPR.
[5]. LUCY, L. 1974. Bayesian-based iterative method of image restoration. Journal of Astronomy 79, 745–754.

Paper Type : Research Paper
Title : Mapping Procedural Modules To Storage
Country : India
Authors : Vijaylaxmi Bittal || Shruti Mittal
: 10.9790/0661-16166669    logo

Abstract: Majors in computer science accept structured programming as a subset of procedural programming paradigm and it is intended for complex system design and development. But as everyone is moving towards object orientation so as to model real world , which will be easily mapped to database So we also need to have a conversion tool for mapping procedural modules to storage. Our goal is to design a methodology to convert (map) structure/record to storage.

Index Terms: Structure, Record, procedural paradigm, storage.

[1]. Su Jian; Weng Wenyong;Wang Zebing "A Teaching path for Java object oriented Programming" Information Technology and Applications 2009

[2] Whity R.W; Fenton, N.E; Kapsi, A.A,"Structured Programming: A tutorial Guide" Volume 3, Issue 3, 1984

[3] Dewan, RM; Gavish B"Modules for the combined logical and physical design of the database "Volume 38, Issue 7, 1989.Computers IEEE

[4] Pan S, Dromey R G "Structured Programming" Software Engineering 1996 18th International Conference


Paper Type : Research Paper
Title : Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes
Country : India
Authors : Ajay Kumar || Mrs. Manu Bansal
: 10.9790/0661-16167075    logo
Abstract: with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techniques now a day. The Image hiding in cover image gives us a choice to hide different planes of image in different planes of cover image. In this paper, Negative of original image is hidden in cover image for security purposes. In our implementation pixels of negative image to be substituted in cover image pixels.

[1] Youssef Bassil "Image Steganography Method based on Brightness Adjustment" Advances in Computer Science and Application (ACSA),ISSN:2166-2924,Vol. 2,No. 2,2012.

[2] Dr. Sudeep D. Thepade,Smita S. Chavan "Cosine, walsh and Slant Wavelet Transforms for Robust Image Steganography" International Conference on wireless and Optical Communication Networks, 26-28 July 2013.

[3] V.Lokeswara Reddy, Dr. A. Subramanyam and Dr. P. Chenna Reddy, "Implementation of LSB Steganography and its evaluation for various file formats" Int. J. Advanced Networking and Application,Vol. 2,pp. 868-872,2011.

[4] Dr. DiwediSamidha, DipeshAgrawal, "Random Image Steganography in Spatial Domain", International Journal of Computer Science and Information Security Publication March 2010, Volume 7 No. 3, March 2013.

[5] Ali K. Hmood, B.B Zaindan "An Overview on hiding information techniques in images" Journal of applied Science 10(18):2094-2100, 2010 ISSN 1812-5654, 2010 Asian Network for scientific information.

[6] Mohammad TanvirParvez,Adnan Abdul-Aziz Gutub,-"RGB intensity based variable bits image steganography", IEEE Asia Pacific Services Computing Conference,2008.


Paper Type : Research Paper
Title : Online Hotel Parcel and Payment System Using GPS and Android
Country : India
Authors : Aniket Sahani || Shivram Suravase || Chaitanya Ghule || Prafulla Gavade
: 10.9790/0661-16167681    logo
Abstract: With the advent of GPS technologies more and more applications are getting developed on various independent platforms relating to services offered by smart devices such as smartphones, tablets, Pc's based on locations fetched by the GPS (Global positioning system). And with the world going online for purchasing their day to day basic things the need of clubbing GPS based services with other important sectors of the economy such as retail, hotel industry is the need of the fast becoming world.We would like to use location based services to help user to find good restaurants from its current place.
[1] Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V., Veijalainen, J., Katanosov, A., and Tirri, H.Developing GIS supported location-based services. In Web Information Systems Engineering (2001), IEEE, pp. 66_75.
[2] D'Roza, T., and Bilchev, G. An overview of location-based services. BT Technology Journal 21, 1 (2003), 20_27
[3] Schwinger, W., Grin, C., Prll1, B., and Retschitzegger, W. A light-weight framework for location-based services. In Lecture Notes in Computer Science (Berlin, 2005), Springer, pp. 206_210

Paper Type : Research Paper
Title : Load Balancing In Public Cloud
Country : India
Authors : Shrikant M. Lanjewar || Susmit S. Surwade || Sachin P. Patil || Pratik S. Ghumatkar || Prof Y.B. GURAV
: 10.9790/0661-16168287    logo
Abstract: In present days cloud computing is one of the greatestplatform which provides storage of data in very lowercost and available for all time over the internet.But ithas more critical issue like security, load managementand fault tolerance. In this paper we are discussingLoad Balancing approach. Many types of load concernwith cloud like memory load, CPU load and networkload. Load balancing is the process of distributing loadover the different nodes which provides good resourceutilization when nodes are overloaded with job. Loadbalancing has to handle the load when one node isoverloaded. When node is overloaded at that time loadis distributed over the other ideal nodes.
[1] Gaochao Xu, Junjie Pang, and Xiaodong Fu,A LoadBalancing Model Based on Cloud Partitioningfor the Public Cloud, IEEE TRANSACTIONS ON CLOUD COMPUTING YEAR 2013
[2] K. Nishant, P. Sharma, V. Krishna, C. Gupta, K. P. Singh,N. Nitin, and R. Rastogi, Load balancing of nodesin cloud using ant colony optimization, in Proc. 14thInternational Conference on Computer Modelling andSimulation (UKSim), Cambridgeshire, United Kingdom,Mar. 2012, pp. 28-30
[3] M. Randles, D. Lamb, and A. Taleb-Bendiab, Acomparative study into distributed load balancingalgorithms for cloud computing, in Proc. IEEE 24thInternational Conference on Advanced InformationNetworking and Applications, Perth, Australia, 2010,pp. 551-556
[4] Ms. Parin V. Patel, Mr. Hitesh. D. Patel, Pinal. J. Patel,A Survey On Load Balancing In Cloud Computing, International Journal of Engineering Research & Technology (IJERT)Vol. 1 Issue 9, November- 2012ISSN: 2278-0181
[5] Microsoft Academic Research, Cloud computing,http://libra.msra.cn/Keyword/6051/cloud-computing?query= cloud%20computing, 2012


IOSR Journals are published both in online and print versions.