IOSR Journal of Computer Engineering (IOSR-JCE)

Nov. - Dec. 2016 Volume 18 - Issue 6

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6

Paper Type : Research Paper
Title : Rule Based Expert System Prototype Application for Crime Against Women Law in Indian Legislation System
Country : India
Authors : Prof. J.S. Jadhav || Dr. K.M. Nalawade || Dr. M.M. Bapat

Abstract: Law is a system of rules and guidelines which are enforced through social institutions or society to govern behavior.[http://en.wikipedia.org/wiki/Law]Laws can be made by legislatures through legislation, the execution of law through regulations, or judges through binding precedents (normally in common law jurisdictions). Criminal lawis also known as penal law, pertains to crimes and punishment. It thus regulates the definition of and penalties for offences found to have a sufficiently social impact but, it makes no moral judgment on an offender nor imposes restrictions on society that physically prevents people from committing a crime in the first place. The law of criminalprocedure regulated by Investigating............

Keywords: Expert system, Indian penal code (IPC), Artificial intelligence, Expert system shell, Expertise, prototype.

[1] Justice Y V Chandrachud, V R Manohar, The Indian Penal Code (Reprint 2000), Wadhwa and company, Nagar
[2] N.B. Bilgi, R.V. Kulkarni (2008) ―Knowledge based system prototype Application for Transfer of property law in Indian Judicial‖ International journal of Intelligent information processing serials publication, PP 137-144.
[3] Website:―Crime against Women‖ Unit 21, Offence against women under Indian Penal Code.‖
[4] Crime against women, Chapter.5
[5] The Evaluation of Expert System Griffith University, Domain Expert systems Design and Development http//www.cit.gu.edu.qu/ ~ Noran by ovidiusNoran.


Paper Type : Research Paper
Title : ICT: A Super Highway to Reaching the Unreached Rural Communities of India
Country : India
Authors : Mr. Atul D. Newase || Dr. Jitendra Sheetlani || Dr. Ranjit D. Patil

Abstract: Since dawn of civilization Information played a catalyst role to transform societies into informationrich and knowledgeable societies. We have seen in the last few years that Information and Communication Technologies (ICTs) played an intrinsic role in overall development of the societies in developed and developing nations. Now ICT completly changes in all aspects of ours life but unfortunately peoples of rural area still suffering to get massive benefits of Information and Communication Technology and hence they can't walk with the modern information-rich and knowledgeable societies..........

Keywords: Digital Divide, ICT, Indian Rural Community, Rural Development

[1] World Bank Report, http://documents.worldbank.org/curated/en/538451468762925037/pdf/278770ICT010mdgs0Complete.pdf ,
2003, accessed on 03 December 2016.
[2] Warner M. F., Adoption of ICT in agricultural management in the United Kingdom: the intra-rural digital divide. Agriculture
Economics, 48(1), 2002, 1- . http://www.agriculturejournals.cz/publicFiles/59184.pdf accessed on 03/12/2016.
[3] Siriginidi Subba Rao, Role of ICTS in India Rural Communities. The Journal of community informatics, http://www.cijournal.
net/index.php/ciej/article/view/313/429 accessed on 18 December 2016.
[4] http://indiafacts.in/india-census-2011/urban-rural-population-o-india/ accessed on 18 December 2016.
[5] https://en.wikipedia.org/wiki/Internet#Access accessed on 04/12/2016.


Paper Type : Research Paper
Title : Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
Country : India
Authors : Dr. K. Gangadhara Rao || Dr.B.Basaveswara Rao || Qutaiba Mumtaz Dawood

Abstract: Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of these files...........

Keywords: Deduplication, duplication authorized check, hybrid cloud.

[1] Dropbox, a file-storage and sharing service. http://www.dropbox.com/.
[2] Google Drive. http://drive.google.com.
[3] MOZY. Mozy, a file-storage and sharing service. http://mozy.com/.
[4] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou. "A Hybrid Cloud Approach for Secure Authorized Deduplication ". In IEEE Transactions on Parallel and Distributed Systems, 2015.
[5] J. Yuan and S. Yu, "Secure and constant cost public cloud storage auditing with deduplication," in IEEE Conference on Communications and Network Security (CNS), 2013, pp. 145–153.


Paper Type : Research Paper
Title : Design Efficient Image Compression Algorithm for Gray Scale Image Using RBF and SOM Neural Network
Country : India
Authors : Shailesh Saxena || Dr. R. P. Singh

Abstract: Image compression is important phase of computer vision. The compression of image reduces the size of data and increase the efficiency of data transmission over the internet. Now a day's various authors proposed image compression technique based on neural network model. The used neural network model is very efficient for the process of compression, but the rate of compression is very slow. In this paper proposed the hybrid model of image compression using the combination of RBF and SOM neural network model. The RBF neural network model estimates the trained pattern for the compression process of SOM neural network. For the processing of data in neural network model used discreet wavelet transform function. The proposed algorithm simulated in matlab software and measure standard parameter such as PSNR, compression rate and compression ratio. The proposed algorithm gives better result instead of other neural network based image compression technique.

Keywords: Image compression, WT, SOM, RBF.

[1] V. V. Sunil Kumar And M. IndraSena Reddy, "Image Compression Techniques By Using Wavelet Transform", 2012, Journal Of Information Engineering And Applications, Pp.35-40.
[2] S. S. Panda, M.S.R.S Prasad, M.N.M. Prasad and Ch. Skvr Naidu, "Image Compression Using Back Propagation Neural Network", International Journal of Engineering Science & Advanced Technology, 2012, Pp.74-78.
[3] Mohammad H. Asghari and BahramJalali, Discrete Anamorphic Transform for Image Compression, IEEE Signal Processing Letters, 2014, Pp.829-833.
[4] Palle E. T. Jorgensen and Myung-Sin Song, "Analysis of Fractals, Image Compression, Entropy Encoding, Karhunen-Loeve Transforms", ActaApplicandaeMathematicae, 2008, Pp.2-23.
[5] NegarRiazifar and MehranYazdi, Effectiveness of Contourlet Vs Wavelet Transform on Medical Image Compression: A Comparative Study", World Academy of Science, Engineering and Technology, 2009, Pp.837-842.


Paper Type : Research Paper
Title : Data Management: Improving data Security and Safety of Microcomputer Systems
Country : Nigeria
Authors : Akingbade L.O.

Abstract: The achievable potentials of data security and protection in microcomputer systems are considered and described in this paper. The overview of the most important threats and attacks on security of microcomputer systems and data is given first. Then, the possibilities and ways for protection of those systems are described. Finally, the paper provides a detailed description of various practical implementations of protection of data on personal computers which represents the combination of hardware and software protection.

Keywords: Microcomputer systems, data security, attacks and protection.

[1] Chwan-Hwa Wu and J. David Irwin (2013), Introduction to Computers and Data Security. Boca Raton: CRC Press
[2] Dave .D. (2010), Network monitoring/Intrusion Detection Systems (IDS), University of Washington.
[3] Gasser, Morrie (2014). Building a Secure Computer System. Van Nostrand Reinhold.
[4] Jannsen, Cory.(2014) Security Architecture. Techopedia. Janalta Interactive Inc.
[5] John Bumgarner (2010). "Computers and Data". IO Journal.
[6] Mark Den (2014)Data Security Awareness". MS-ISAC (Multi-Stat Information Sharing & Analysis Center).


Paper Type : Research Paper
Title : Classification Techniques in Data Mining-Case Study
Country : India
Authors : Swathi Agarwal || G.L.Anand Babu || Dr.K.S.Reddy

Abstract: Data Mining was a basic technique for examine the data in a choice of perception and categorizes it and finally to compress it. Classification was used to expect cluster relationship for data instances in data mining. Many key types of classification techniques including KNN, Bayesian classification, and Decision tree (DT) induction, C4.5, ID3, SVM, and ANN are used for classification. The major purpose of this assessment was to grant a complete examination of various classification mechanisms in data mining.

Keywords: C4.5, ID3, SVM, Decision Tree, KNN.

[1]. KS Reddy, GPS Varma, MK Reddy, An Effective Methodology for Pattern Discovery in Web Usage Mining - International Journal of Computer Science and Information Technologies, 2012
[2]. Boser, B. E., I. Guyon, and V. Vapnik (1992). A training algorithm for optimal margin classifiers. In Proceedings of the Fifth Annual Workshop on Computational Learning Theory, pages. 144 -152. ACM Press 1992.
[3]. Dr.Sudarson Jena, Santhosh Pasuladi, Karthik Kovuri, G.L.Anand Babu, An Investigation And Evaluation on Précised Decision For Scientific Data Using New Approaches in DMDW, International Journal Of Computer Applications In Engineering, Technology And Sciences (Ij-Ca-Ets), Issn: 0974-3596 | April 2012- September 2012 | Volume 4 : Issue 2) [4]. KS Reddy, GPS Varma, SSS Reddy, Understanding the scope of web usage mining & applications of web data usage patterns, International Conference on Computing, Communication and Applications, 2012
[5]. L. Breiman, L. Friedman, R. Olshen, and C. Stone. Classification and Regression Trees. Wadsworth and Brooks, 1984.


Paper Type : Research Paper
Title : Performance Analysis on Fingerprint Watermarking with its Transform Techniques
Country : India
Authors : Mili Singh || Dr. Jitendra Sheetlani

Abstract: In this paper discuss about the watermarking of a fingerprinting based to prevent the forgery users and also discuss the concept of a watermarking. In this paper enhancement process of a fingerprint like, binary thinning process, minutiae process etc. Also, discuss the techniques of a watermarking i.e. spatial domain and the frequency domain and also further divided into techniques process like a least significant bit(LSB), discrete wavelet transform etc. and to calculate the result analysis of a DWT based for an embedding and extracting process. To find out the image quality i.e. PSNR is high and the MSE is a low.

Keywords: Least Significant Bit(LSB); Discrete Wavelet Transform(DWT); Peak-signal-to-noise ratio(PSNR); Mean Square Error(MSE)

[1]. Ms.Jalpa M.Pate1, Mr.Prayag Patel, "A brief survey on digital image watermarking techniques". In International Journal for Technological Research in Engineering Volume 1, Issue 7, March-2014 ISSN.
[2]. Dr. Mohammad V. Malakooti, Zahed FerdosPanah, "Image Recognition Method based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD)" In ISBN: 978-0-9853483-3-5, 2013 SDIWC.
[3]. Sisanda Makinana, "Latent Fingerprint Wavelet Transform Image Enhancement Technique for Optical Coherence Tomography", ISBN: 978-1-4673-9187-0 ©2016 IEEE


Paper Type : Research Paper
Title : Detection And Handling of Denial – of – Service, That Uses Encrypted Protocol Headers
Country : India
Authors : B.Mallikeswari

Abstract: One type of attack of Denial of service is Reflector attack, which is very difficult to be traced by traditional IP trace back techniques. There are many solutions to these problems, which resolves any one of factors causing the problems. This is because solution is not designed to analyze all the factors. In this context the purpose of this research paper is to detect the attacks and handle the encrypted protocol header of packets by traditional decryption algorithm from reflector.............

Keywords: DoS, Encrypted Header, Reflector attack, Detection filter, Encryption classifier, SSL/TL and Decryption.

[1]. E. Alomari, B.B.Gupta, S.Karuppayah, Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art, Int. J.Comput. Appl. 49(7)(2012)24–32.
[2]. Lau, F., Rubin, S.H., Smith, M.H., and Trajkovic, L,"Distributed denial of service attacks"
[3]. Systems, Man, and Cybernetics, 2000 IEEE International Conference on, Volume:3 , 2000, pp. 2275 -2280 vol.3.
[4]. K. Park and H. Lee, "On the Effectiveness of Route-Based Packet Filtering for Distributed DoS Attack Prevention in Power-Law Internets," Proc. ACM SIGCOMM '01, pp. 15-26, 2001.
[5]. W. H. Press, B. P. Flannery, S. A. Teukolsky, and W. T. Vetterling, "Numerical Recipes in FORTRAN: The Art of Scientific Computing", Cambridge University Press, 1992, pp.83-84.


Paper Type : Research Paper
Title : Design and Implementation of Lightweight Security Auditing Tool for Android Smart Mobile Phone
Country : Ethiopia
Authors : Fetulhak Abdurahman || Arun Radhakrishnan

Abstract: Due to the fast growing market in Android smartphone operating systems to date cyber criminals have naturally extended their target towards Google's Android mobile operating system. Threat researchers are reporting an alarming increase of detected malware for Android from 2012 to 2013. Static analysis techniques for malware detection are based on signatures of known malicious applications. It cannot detect new malware applications and the attacker will get window of opportunities until the threat databases are updated for the new malware. Malware detection techniques based on dynamic analysis are mostly designed as a cloud based services where the user must submit the application to know whether the application is malware or not.............

Keywords: Smartphones, Android, Malware Detection, Machine Learning, Classification

[1]. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weisee, Y. (2012)"Andromaly": a behavioral malware detection framework for android devices Journal Intelligent Systems, 2012.
[2]. Over 1 billion Android-based smart phones to ship in 2017. Canalys, http://www.canalys.com/newsroom/over-1-billion-android-based-smart-phones-ship-2017Feb.2013.
[3]. Ramon Llamas, Ryan Reith, and Michael Shirer. Apple Cedes Market Share in Smartphone Operating System Market as Android Surges and Windows Phone Gains, According to IDC. http://www.idc.com/getdoc.jsp?containerId=prUS24257413, Jul. 2013.
[4]. Kindsight Security Labs Malware Report - Q2 2013. Alcatel-Lucent, http://www.alcatel-lucent.com/solutions/kindsight-security.Access date: Jul.2013.
[5]. FortiGuard Midyear Threat Report.Fortinet,http://www.fortinet.com/resource_center/whitepapers/quarterly-threat-landscape-report-q213.html.Access date: Oct. 2013.


Paper Type : Research Paper
Title : Web Content Mining: Tool, Technique & Concept
Country : India
Authors : Anil Kumar Sinha || Nidhi Raj || Shameemul Haque || Alimul Haque || N.K.Singh

Abstract: Today the evolution of the World Wide Web has brought us enormous and ever growing amounts of data and information.. The web is full of structured or unstructured information which is directly or indirectly influencing society or people in every day life. Due to huge data available with the web it has become a challenge for people with interest in utilizing this information. For mining the huge available data on web in the form of frequently used patterns and log files for meaning use is considered in this paper. The paper presents a preliminary review of Web content mining contributions in the field of web mining and the prominent successful algorithms and some tools.

Keywords: Social Web Mining, Web Content Mining, Web Mining, and Application of Web content Mining.

[1]. Q. Han, X. Gao, and W. Wu, Study on Web Mining Algorithm Based on Usage Mining, 2010.
[2]. O. Etzioni. The world-wide web: Quagmire or gold mine? Communications of the ACM, 39(11), 1996, 65-68,.
[3]. L. Eikvil. Information extraction from world wide web - a survey. Technical Report 945, Norweigan Computing Center, 1999.
[4]. A. J. Ratnakumar, "An Implementation of Web Personalization Using Web Mining Techniques," Journal of and applied information technology, 2005.
[5]. W. Bin and L. Zhijing, "Web Mining Research," in Proceedings of the fifth International Conference on Intelligenceand Multimedia Applications (ICCIMA'03), 2003.


Paper Type : Research Paper
Title : Dyf1.0 Software Code: Prediction and Processing data for Design of Yarns
Country : Bulgaria
Authors : Radostina A. Angelova || Lyuben Krumov || Hristina Konova

Abstract: The paper presents DYF1.0 software code for prediction and processing data for design of yarns. The design of the yarn is an important part of the whole yarns' production process, starting with the purchase of the raw materials and ending with the dispatch of winding yarns. The need for software codes for design of yarns is generated by the high demands on the quality of the yarns, combined with low prices. The stages in the yarn's design are presented. The main features of the DYF1.0 software code are also discussed in details. The application of the software code in designing and education is presented at the end.

Keywords: DYF1.0 software code, design of yarns, design of fabrics, yarns properties, blends

[1] Taylor, M. A., Technology of Textile Properties (3rd edn, Forbes Publications, 1994).
[2] Wilson, J., Handbook of Textile Design: Principles, Processes and Practice, (Cambridge, Woodhead Publishing, 2001).
[3] Georgiev I., Design of Yarns (Проектиране на прежди) (Technical University of Sofia, Sofia, Bulgaria, 2007).
[4] Kellner, M. I., Madachy, R. J., & Raffo, D. M., Software process simulation modeling: why? what? how?. Journal of Systems and Software, 46(2), 1999, 91-105.
[5] Verpoest, I., & Lomov, S. V., Virtual textile composites software WiseTex: Integration with micro-mechanical, permeability and structural analysis. Composites Science and Technology, 65(15), 2005, 2563-2574.


Paper Type : Research Paper
Title : Parallel Algorithm for the Simulation of Geomagnetic Fields Variations along the Equatorial Regions
Country : Nigeria
Authors : Tokula Umaha || Esiefarienrhe Bukohwo Michael || Ale Felix

Abstract: This work presents the development of a parallel algorithm for the computation of geomagnetic field data for stations 30 degrees North and South of the equator. The parallel computing hardware platform used involved multi-core processing unit. MATLAB 2012a's parallel computing toolbox was used to simulate solar quiet daily (Sq) variations on four(4) Intel Xeon E5410 processors, with clock speed 2.3 GHz and 16378MB RAM. A large geomagnetic dataset obtained from International Real-time Magnetic Observatory Network (INTERMAGNET), corresponding to 25 stations for year 2000 was used. The performances of both algorithm were compared using some indices such as execution time, efficiency, speed and overhead. The result from the parallel algorithm was two times faster than the corresponding sequential algorithm under same platform and workload in all of the indices.

Keywords: Parallel Computing, Multicore Architecture, Geomagnetic Field, Parallel Algorithm.

[1]. Amdahl, G.M., "Validity of the Single-Processor Approach to Achieving Large-Scale
[2]. Ananth, G., Anshul, G., George, K., & Vipin, K. (2005). Introduction to parallel Computing,. Boston: Addison Wesley.
[3]. Campbell,W.H. & Shiffmacher, E.R. (1987), Quiet ionospheric currents and earth conductivity profile computed from quite-time geomagnetic field changes in the region of Australia. Aust. J. Phys. 40, 73-87.
[4]. Campbell,W. & Honore, (1997), Introduction to Geomagnetic Fields, Cambridge University Press.
[5]. Chapman, S., The equatorial electrojet as detected from the abnormal electric current distribution above Huancayo, Peru, and elsewhere, Arch.Meteorol. Geophys. Bioclimatol. A, 4, 368–390, 1951.


Paper Type : Research Paper
Title : System Support Decision Making in Data Centers
Country : Mexico
Authors : Durán López, Manuel

Abstract: The purpose of wireless sensor networks is to establish smart environments, which is constantly censusing the environment for automatically operating devices adapt the environment according to the needs of people and equipment present is actuated . It is desirable that in such environments exist autonomous mechanisms that allow constant monitoring of the operation of the sensor network, so that in the event of failure of one of them, mechanisms of self-reconfiguration and synchronization is activated. The purpose of the sensor network is that census data acquisition never stops. In this work, we propose an ontology model in order to help in decision making at site monitoring using environmental sensors.

Keywords: Decision making, ontology, smart environment, wireless sensor network, monitoring.

[1] N. Xu, W. Zhang, H. Yang, X. Zhang, X. Xing, "CACOnt: A Ontology-Based Model for Context Modeling and Reasoning", Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013).
[2] K. Ko, K. Sim, "Development of Context Aware System based on Bayesian Network driven Context Reasoning Method and Ontology Context Modeling", International Conference on Control, Automation and Systems 2008 Oct. 14-17, 2008 in COEX, Seoul, Korea
[3] D. Riboni, C. Bettini, "Context-aware Activity Recognition through a Combination of Ontological and Statistical Reasoning", Università di Milano
[4] M. Bravo, F. Martínez, J. Rodríguez,"Representation of an Academic and Institutional Context Using Ontologies", Research in Computing Science 87 (2014)
[5] J. Reyes, M. Bravo, O.Herrera, A. Gudiño, "Poblado automático de ontologías de perfiles académicos s académicos" Research in Computing Science 95 (2015)


Paper Type : Research Paper
Title : Minimizing Detection Probability in Ad-Hoc Sensor Networks Routing Using Directional Antennas Under Wide and Restricted Network
Country : India
Authors : Dr.Srinivas Ambala

Abstract: Directional receiving wires can be helpful in altogether expanding hub and system lifetime in remote specially appointed systems. So as to use directional receiving wires, a calculation is required that will empower hubs to indicate their reception apparatuses the ideal place at the opportune time. In this paper we introduce an energy-efficient steering and planning calculation that directions transmission in impromptu systems where every hub has a solitary directional radio wire........

Keywords: Directional antenna, energy, routing, scheduling, matching.

[1]. Y. B. Ko, V. Shankarkumar, and N. H. Vaidya, "Medium access control protocols using directional antennas in ad-hoc networks," Proc. IEEE INFOCOM'2000, March 2000.
[2]. A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto, "A MAC protocol for mobile ad hoc networks using directional antennas," Proc. IEEE Wireless Communications andNetworking Conference (WCNC'2000), 2000.
[3]. A. Nasipuri, J. Mandava, H. Manchala, and R. E. Hiromoto, "Ondemand routing using directional antennas in mobile ad hoc networks," Proc. IEEE Computer Communications and Networks, 2000.
[4]. IEEE Local and Metropolitan Area Network Standards Committee, Wireless LAN medium access control (MAC) andphysical layer (PHY) specifications, IEEE standard 802.11-1999, 1999.
[5]. D. Johnson, D. Maltz, Yih-Chun Hu, and Jorjeta G. Jetcheva, "Dynamic source routing (dsr)," Internet Draft, draft-ietf-manet-dsr- 06.txt, November 2001.


Paper Type : Research Paper
Title : An Efficient Load Balancing Approach in a Cloud Computing Platform
Country : India
Authors : Saptarshi Bhowmik || Sudipa Biswas || Karan Vishwakarma || Subhankar Chattoraj

Abstract: Technology has always played an important role changing human lives and helping to perform faster and easier job. In recent years cloud computing has replaced the traditional method of grid computing, cluster computing and introduced virtualization as the key technology in cloud computing. It has become one of the most demanding services due to its high reliability, efficiency and cost effectiveness. But cloud computing faces certain major issue which involves efficient load balancing and virtual machine (VM) arrangement. In this paper we have proposed a priority based virtual machine (VM) arrangement and load balancing using round robin scheduling. The VM is arranged by comparing the vital parameters which involve bandwidth, RAM, and MIPS (Million instructions per second)........

Keywords: Virtual machine, Cloudsim, load distribution, Resource scheduling, Priority based scheduling

[1]. Oktay Tontaş; Jorge Bernardino "The ethics in cloud computing": 2016 2nd International Conference of the Portuguese Society for Engineering Education (CISPEE)

[2]. Sajay K R; Suvanam Sasidhar Babu " A study of cloud computing environments for High Performance applications" : 2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)

[3]. Ahmadreza Montazerolghaem; Mohammad Hossein Yaghmaee; Alberto Leon-Garcia; Mahmoud Naghibzadeh; Farzad TashtarianA Load-Balanced Call Admission Controller for IMS Cloud Computing
[4]. Xiaolong Xu; Lingling Cao; Xinheng Wang; Xiaolong Xu; Lingling Cao; Xinheng Wang "Resource pre-allocation algorithms for low-energy task scheduling of cloud computing" : Journal of Systems Engineering and ElectronicsYear: 2016, Volume: 27, Issue: 2

[5]. Jia Zhao; Kun Yang; Xiaohui Wei; Yan Ding; Liang Hu; Gaochao Xu " A Heuristic Clustering-Based Task Deployment Approach for LoadBalancing Using Bayes Theorem in Cloud Environment ": IEEE Transactions on Parallel and Distributed SystemsYear: 2016, Volume: 27, Issue: 2


Researcher can also search IOSR published article contents through

IOSR Xplore