期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Implementation and Validation of the Optimized Deduplication Strategy in Federated Cloud Environment
1
作者 Nipun Chhabra manju bala Vrajesh Sharma 《Computers, Materials & Continua》 SCIE EI 2022年第4期2019-2035,共17页
Cloud computing technology is the culmination of technical advancements in computer networks,hardware and software capabilities that collectively gave rise to computing as a utility.It offers a plethora of utilities t... Cloud computing technology is the culmination of technical advancements in computer networks,hardware and software capabilities that collectively gave rise to computing as a utility.It offers a plethora of utilities to its clients worldwide in a very cost-effective way and this feature is enticing users/companies to migrate their infrastructure to cloud platform.Swayed by its gigantic capacity and easy access clients are uploading replicated data on cloud resulting in an unnecessary crunch of storage in datacenters.Many data compression techniques came to rescue but none could serve the purpose for the capacity as large as a cloud,hence,researches were made to de-duplicate the data and harvest the space from exiting storage capacity which was going in vain due to duplicacy of data.For providing better cloud services through scalable provisioning of resources,interoperability has brought many Cloud Service Providers(CSPs)under one umbrella and termed it as Cloud Federation.Many policies have been devised for private and public cloud deployment models for searching/eradicating replicated copies using hashing techniques.Whereas the exploration for duplicate copies is not restricted to any one type of CSP but to a set of public or private CSPs contributing to the federation.It was found that even in advanced deduplication techniques for federated clouds,due to the different nature of CSPs,a single file is stored at private as well as public group in the same cloud federation which can be handled if an optimized deduplication strategy be rendered for addressing this issue.Therefore,this study has been aimed to further optimize a deduplication strategy for federated cloud environment and suggested a central management agent for the federation.It was perceived that work relevant to this is not existing,hence,in this paper,the concept of federation agent has been implemented and deduplication technique following file level has been used for the accomplishment of this approach. 展开更多
关键词 Federation agent deduplication in federated cloud central management agent for cloud federation interoperability in cloud computing bloom filters cloud computing cloud data storage
下载PDF
Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node
2
作者 Neha Malhotra manju bala 《Computers, Materials & Continua》 SCIE EI 2022年第3期5269-5284,共16页
Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,p... Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility.In such attacks,an adversary accesses a few network nodes,generates replication,then inserts this replication into the network,potentially resulting in numerous internal network attacks.Most existing techniques use a central base station,which introduces several difficulties into the system due to the network’s reliance on a single point,while other ways generate more overhead while jeopardising network lifetime.In this research,an intelligent double hashing-based clone node identification scheme was used,which reduces communication and memory costs while performing the clone detection procedure.The approach works in two stages:in the first,the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second,the clone node identification procedure searches for any clone node in the network.This first phase verifies the node prior to network deployment,and then,whenever a node wants to interact,it executes the second level of authentication.End-to-end delay,which is bound to increase owing to the injection of clone nodes,and packet loss,which is reduced by the double hashing technique,were used to evaluate the performance of the aforementioned approach. 展开更多
关键词 Node authentication clone node mobile computing double hashing fault tolerance
下载PDF
Performance Tradeoff with Routing Protocols for Radio Models in Wireless Sensor Networks
3
作者 manju bala Lalit Awasthi 《Wireless Engineering and Technology》 2011年第2期53-59,共7页
In this paper, we have simulated and evaluated the performance tradeoff with routing protocols: Constrained Flooding, the Real-Time Search and the Adaptive Tree on MICA and MICAz platform with different radio models u... In this paper, we have simulated and evaluated the performance tradeoff with routing protocols: Constrained Flooding, the Real-Time Search and the Adaptive Tree on MICA and MICAz platform with different radio models using PROWLER for wireless sensor networks. The simulation results establish that the MICAz motes give low latency, high throughput, high energy consumption, low efficiency but better lifetime while the MICA motes give high success rate and less loss rate. It has been, thus, concluded that in case of all the radio models the MICAz is preferably better than MICA in applications where energy is a constraint. Moreover, use of MICAz motes increases the network lifetime in comparison to MICA for the radio models. Further, the AT protocol can be applied to achieve better energy consumption, efficiency and lifetime in real time for wireless sensor networks. 展开更多
关键词 Constraint-Based ROUTING Meta-Strategies Real-Time REINFORCEMENT Learning ROUTING TREE Wireless Sensor Networks
下载PDF
An internet of things assisted drone based approach to reduce rapid spread of COVID-19
4
作者 Mohit Angurala manju bala +2 位作者 Sukhvinder Singh Bamber Rajbir Kaur Prabhdeep Singh 《Journal of Safety Science and Resilience》 2020年第1期31-35,共5页
With the quick spread of pandemic disease,many individuals have lost their lives across different parts of the world.So,the need for a novel approach or model to overcome the problem becomes a necessity.In this paper,... With the quick spread of pandemic disease,many individuals have lost their lives across different parts of the world.So,the need for a novel approach or model to overcome the problem becomes a necessity.In this paper,a mechanism is proposed called DBCMS(Drone Based Covid-19 Medical Service)for the safety of medical em-ployees who are prone to Covid-19 infection.The proposed mechanism can effectively improve the treatment process of Covid-19 patients.Drones are nowadays commonly used in the field of medical emergency situations.The proposed model in this paper uses drone service to reduce the risk of infection to the doctors or other medical staff,thereby preventing the disease spread.This paper further assumes that the primary step is to isolate people at their home instead of admitting them to the hospitals,also called a situation of lockdown or curfew.Thus,in this way,the spread can be significantly reduced across the globe if DBCMS approach is implemented at cluster level. 展开更多
关键词 Drone based medical service GPS based Tracking IOT
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部