Virtualizing the Private Cloud for Maximum Resource Utilization
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
Cloud computing ,now- a- days is a trend in the IT industry.We normally deploy cloud based infrastructure, applications on Bare-metal hardware. But still the resource utilization is not at its maximum .There is still some amount of room for addition of more applications, etc..to utilize resources to their max. Now, since cloud is already virtualized, we further virtualize the cloud using Virtualization Software.The resources may be CPU,Memory,etc..Virtualization of cloud enables us to run multiple clouds on a single physical machine. That makes resource utilization, the maximum. This paper shows how to use the resources optimally by deploying multiple clouds on a single physical machine.
Authors and Affiliations
C. Shreeharsha, , Prof. ManasiKulkarni
Authentication for Online Voting Using Steganography and Biometrics
In this paper an online voting authentication technique is proposed which provides biometric as well as password security to voter accounts. Voters are first identified by their facial image by using PCA. Second st...
Emphasizing the Data Quality with Privacy Preservation
t-In recent years a wide variety of information is available for the research, business applications and other development organizations but before taken this information into consideration we must ensure that th...
XML Query Answering using Tree based Association Rules
Mainly two approaches are used to access XML document: keyword-based search and query-answering. The first one comes from the tradition of information retrieval. Where most searches are performed on the textual con...
A Maintainability Estimation Model and Metrics for Object-Oriented Design (MOOD)
Maintainability is that phase which may help the designer for improving the quality of the software system before deliver to a customer. This paper uses a multivariate linear model, which estimates the maintainabil...
Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks
Technological improvement of Wireless Communication is important aspect of our daily life. Mobile WiMAX IEEE 802.16m standard aims at fulfilling the requirements on 4G Systems. Providing seamless handover authentication...