Stochastic Resource Provisioning for Container ized Multi-Tier Web Ser vices in Clouds Abstract-Under today?s bursty web traffic, the fine-grained per-container control promises more efficient resource provisioning for web services and better resource utilization in cloud datacenters. In this paper, we present Two-stage Stochastic Programming Resource Allocator (2SPRA). It optimizes resource provisioning for containerized n-tier web…
3D Brain Atlas Reconstruction Using Deformable Medical Image Registration: Application to Deep Brain Stimulation Surgery Abstract?In deep brain stimulation surgery the most important step is the correct location of the neurostimulator device. Here, the medical specialist needs to robustly locate the basal ganglia area (i.e. subthalamic nucleus) to implant the neurostimulator. 3D brain atlas reconstruction…
A Classroom Scheduling Service for Smart Classes Abstract-The main aim of this project is to make an android app to know the time table of the college for the student as well as staff. And also admin can easily allocate period as per the staffs availability. By introducing service-oriented architecture (SOA), SmartClass is able to…
A Cloud Computing Based Telemedicine Service Abstract?Health is the greatest possession?. Various techniques are drawn for the better treatment of health of society. As the technology is reaching its peak, it is emerging in medical treatments quickly and fruitfully giving birth to ?telemedicine? – invention of technology in medicine. Earlier slow and erroneous processes…
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks Abstract– In the first place, spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary…
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing Abstract– Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback in urgent need of solution is…
A Comber Approach to Protect Cloud Computing against XML DDoS and HTTP DDoS attack Abstract?Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to…
A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing Abstract? In hybrid cloud computing, cloud users have the ability to procure resources from multiple cloud vendors, and furthermore also the option of selecting different combinations of resources. The problem of procuring a single resource from one of many cloud vendors can be modeled…
A combined approach to ensure data security in cloud computing Abstract? A combined approach to ensure data security in cloud computing. Offering real-time data security for petabytes of data is important for cloud computing. A recent survey on cloud security states that the security of users’ data has the highest priority as well as concern….
A Computational Dynamic Trust Model for User Authorization Abstract? A Computational Dynamic Trust Model for User Authorization. Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for…
A Context-Aware Architecture Supporting Service Availability in Mobile Cloud Computing Abstract? Mobile systems are gaining more and more importance, and new promising paradigms like Mobile Cloud Computing are emerging. Mobile Cloud Computing provides an infrastructure where data storage and processing could happen outside the mobile node. Specifically, there is a major interest in the use…