1 Stochastic Resource Provisioning for Container ized Multi-Tier Web Ser vices in Clouds Abstract-Under today?s bursty web traffic, the fine-grained per-container control promises more efficient resource provisioning for web services and better resource utilization in cloud datacenters. It optimizes resource provisioning for containerized n-tier web services in accordance with fluctuations of incoming workload to accommodate…
Stochastic Resource Provisioning for Container ized Multi-Tier Web Ser vices in Clouds Abstract-Under today?s bursty web traffic, the fine-grained per-container control promises more efficient resource provisioning for web services and better resource utilization in cloud datacenters. In this paper, we present Two-stage Stochastic Programming Resource Allocator (2SPRA). It optimizes resource provisioning for containerized n-tier web…
2.5 GB/s hybrid WDM/TDM PON using radio over ?ber technique Abstract? 2.5 GB/s hybrid WDM/TDM PON using radio over ?ber technique. Hybrid gigabit-passive optical network (GPON) is a hybrid passive optical network, where wavelength division multiplexing (WDM) GPON and time division multiplexing (TDM)-GPON are integrated into a single passive optical network, reducing cost and increasing…
3-D Face Recognition Under Occlusion Using Masked Projection Abstract?With advances in sensor technology, the three-dimensional (3-D) face has become an emerging biometric modality, preferred especially in high security applications. However, dealing with occlusions covering the facial surface is a great challenge, which should be handled to enable applicability to fully automatic security systems. In…
A Balanced-to-Unbalanced Microstrip Power Divider With Filtering Function Abstract? A balanced-to-unbalanced microstrip power divider based on branch lines with several stubs and one resistor is proposed. The functions of power dividing, frequency selectivity, isolation between output ports, and common-mode suppression can be realized at the same time. The even?odd-mode equivalent circuits combining with the standard…
A Bidirectional Three-level LLC Resonant Converter with PWAM Control Abstract? A bidirectional three-level LLC resonant converter with a new pulse width and amplitude modulation < PWAM > control method. With different control signals, it has three different operation modes with different voltage gains. Therefore, it can achieve wide voltage gain range by switching among these…
A cascaded Couple Inductor- Reverse high step up converter integrating three-winding coupled inductor and diode-capacitor technique Abstract-At the first place, introduces a cascaded high step up converter realized with a tightly coupled three-winding coupled inductor. Compared with existing high step up converters, the proposed converter features that the smaller the turns ratio is, the larger…
A Cloud Computing Based Telemedicine Service Abstract?Health is the greatest possession?. Various techniques are drawn for the better treatment of health of society. As the technology is reaching its peak, it is emerging in medical treatments quickly and fruitfully giving birth to ?telemedicine? – invention of technology in medicine. Earlier slow and erroneous processes…
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks Abstract– In the first place, spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary…
Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data Abstract-High-profile, and often destructive Distributed Denial of Service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly. Among them the SYN Flood attack is the most common type. Conventional DDoS defense solutions may…
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing Abstract– Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback in urgent need of solution is…