Comparative Study of Different Cloud Computing Techniques
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 7
Abstract
The significant advances in Information and Communications Technology over the last half century led to an increasingly perceived vision that computing will one day be the 5th utility (after water, electricity, gas, and telephony). This computing utility, like all other four existing utilities, will provide the basic level of computing service which essential to meet the day-to-day needs of the general community. With the increasing prevalence and demand of large scale cloud computing environment, a researcher has to draw more attention towards the services provided by the CLOUD. As the access to the server.is increasing, centralized and distributed computing architecture will produce bottlenecks data which affect the quality of cloud computing services and bring the huge support to users. In this paper we are going to propose certain vital aspects such as memory utilization, storage capacity to check the efficiency and performance of various clouds in cloud computing environment. This is based upon the static data. The proposed mechanism enables users to access memories in various systems depending on the predefined criteria. Selection method for accessing the memory of a resource is properly introduced in this paper. Our evaluation results show that the aggregation of various clouds is effective in indicating the better efficiency and also to reduce network traffic sent over cloud networks.
Authors and Affiliations
Palvi Gupta, Anamika Mitra, Nishu Singh
Performance of RC Frame With and Without Bracing Pushover Analysis
Now a days an earthquakes are more affected on concrete structures have been severely damaged or collapsed. So there is a need of to evaluate the seismic adequacy. We can’t avoid the future earthquakes but we can manage...
Video Detection and Tracking Using Extended Kalman Filter
An efficient moving object segmentation algorithm suitable for real-time content-based multimedia communication systems is proposed in this paper. First, a background registration technique is used to construct a reliab...
Decontamination of Lead Polluted Soil Using Pseudomonas Aeruginosa Bacteria: A Biosorption Study
The Soil may become contaminated with heavy metals and metalloids accumulation due to atmospheric deposition from natural (volcanoes, earthquakes etc.) and anthropogenic (Industrial and vehicular) emissions. Soil is the...
Captcha as a Graphical Password Using Hard AI Problems
The new security premitive based on hard Artificial inteligence problems, say as graphical password system built on top of Captcha Technology referred to as “Captcha As a gRaphical Password (CaRP)”. CaRP resolves a numb...
A Secure Based Approach in M-voting for Human Identification based on Iris Recognition using Biometrics
The iris recognition is one of the preeminent biometrics characteristics which are used for security purpose. This biometrics technology is related to human physiological and behavioral characteristics. This paper illus...