Abstract In this present work we have given a concise and systematic study of evolution of cloud computing from shared web hosting to public cloud computing along with multi clouds based on a wide spectrum of factors which include scalability, availability and performance. The proposed work studies hosting types and aims to promote the use of single and multi-clouds to reduce the risks. Cloud computing is a multi-paradigm technology which has evolved as a cost effective, flexible, performance oriented infrastructure for agile development of business operations. Cloud computing changes the way we think about computing by decoupling data processing, data retention, and data presentation – in effect, divorcing components from location. Today due to the need of hour and security constraints, single cloud computing is transforming to multi cloud computing. Focus has been done on Multi cloud which is also known as “inter cloud” or “cloud of clouds” which reduces the security risks like failure of service availability, data loss and confidentiality breaches that are drawbacks with single cloud. Keywords: Cloud Computing, Evolution, Hosting Types, Multi cloud
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
nable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract--The paper identifies the issues and the solution to overcome these problems. Cloud computing is a subscription based service where we can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. But having many advantages for IT organizations cloud has some issues that must be consider during its deployment. The main concern is security privacy and trust. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario [4].
Keywords--Cloud, Issues, Security, Privacy, Resources, Technology.
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
Total interpretive structural modelling on enablers of cloud computingeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud Computing Basics Features and Servicesijtsrd
Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the client's requirement at specific time 1 . Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. In this paper, we explore the different services in different computing platforms and applications. Cloud computing is a service, which offers customers to work over the internet 2 . Kyi Pyar | Me Me Khaing "Cloud Computing Basics: Features and Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27960.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/27960/cloud-computing-basics-features-and-services/kyi-pyar
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
nable applications provide as a services for the users
with low computational cost through internet. As we store data
and it also provide services in distributed environment. Cloud
ease its users by providing virtualization technology of resources
through internet. Cloud computing is the emerging field, due to
this reason the various new techniques are still developing. At
current scenario new security challenges were increases for cloud
professionals. Due to lack of security in cloud computing
environment user of cloud lost it trust in cloud. Multi-tenancy,
elasticity, Security Performance and Optimization, etc are
various security issues in cloud computing. In this paper we will
discuss some of the issue in cloud. This paper also discuss some of
the existing security technique for securing a cloud and help
researchers and professionals to know about various security
threats.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides
various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the
information is available for on demand service users. Security issue in Cloud computing is the important and critical issues
because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe
enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble
data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a
virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the
parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by
providers and consumers about their data, privacy, and infected application and security issues. It also presents some security
solutions for tackling these issues and problems.
Review on Security Techniques using Cloud ComputingEditor IJCATR
Cloud Computing is the nascent technology which is based on Pay-Per-Use Model. Cloud computing is emerging as a
model of “Everything as a Service” (XaaS). Cloud Computing is computing paradigm where applications, data bandwidth and IT
services are provided over the Internet. Cloud Computing is a relatively new computing model that provides on demand business
and IT services over the Internet. The main concerns in adapting Cloud Computing is its security, different security risks that
affects the cloud environment in the area of confidentiality, Integrity and computing on data is thoroughly investigated
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
Enhanced technique for regression testingeSAT Journals
Abstract
Regression testing perform where to retest modified version of software which already modified by developers on the basis of
Feedback and testing of the software. Regression testing performs where no internal software knowledge and code known by the
tester. Here all test cases not possible to retest this is a problem. So here we will use test case priority technique. that will
provide priority to retest test case first. this test case priority technique uses for increase efficiency of regression testing. Because
high priority test case execute first. and in our proposed technique we are set priority on the basis of [average time for
execution(figure.1).which find out average time for execution on the basis of fault/time. and we will also ignore test cases which
contain same average time for execution and we will select only one test cases in this situation.. After arrange test cases in
descending order by average time of test cases execute test suite. This method gives more prioritization of test cases is compare to
previous techniques. Finally we will get more prioritized test suite. Then we have also checked efficiency of this new method by
APFD Metric [1]. Our primary purpose of this research paper to introduce new prioritization technique which provides better
result is compare to previous techniques. which improves efficiency of Regression testing.
Keywords: Regression Testing, Prioritization, Test Case, Test Suite, APFD Metric[1].
Effect of gradation of aggregates on marshall properties of sdbc mix designeSAT Journals
Abstract
Semi Dense Bituminous concrete (SDBC) is the upper bituminous layer of the road subjected to moderate traffic loads. The
grading of aggregates used to prepare the SDBC mix should fall within the limits specified in MoRTH. For each aggregate
fraction there is a specified gradation range with lower and higher limits of aggregates passing through a particular sieve size.
The gradation range specified in MoRTH is quite wide. Therefore mix design by adopting a particular gradation of the aggregate
falling within the MoRTH range also affects the Marshall properties. The present study is taken to evaluate the Marshall property
of SDBC mix prepared using the aggregate having different grading within the grading limits specified by the MoRTH. In order to
study this aspect five mixes having different gradation were prepared. The gradation used correspond to Lower Grade (L.G.),
Lower Middle Grade (L.M.G.), Middle Grade (M.G.), Higher Middle Grade (H.M.G.), Higher Grade (H.G.) of the gradation
range specified by MoRTH . The test result revealed that there is significant variation in Marshall Properties of the mixes having
different gradation of the aggregates. The Stability values obtained is maximum for the Lower Middle Grade (L.M.G.) range of
MoRTH specification. The Flow values obtained is maximum for the Middle Grade (M.G.).The Optimum Bitumen Content
(O.B.C.) is also minimum in Lower Middle Grade (L.M.G.).
Keywords: Aggregate Gradation, Semi Dense Bitumen Concrete, Marshall Properties, Morth.
A vm scheduling algorithm for reducing power consumption of a virtual machine...eSAT Journals
Abstract This paper concentrates on methods which provide efficient processing time of a virtual machine, CPU utilization time of a virtual machine. As the user increases, the performance may be significantly reduced if the tasks are not scheduled in a proper order. In this paper the performance of two already existing algorithms DSP (Dependency Structural Prioritization) algorithm and credit scheduling algorithm are analyzed and compared. A single virtual machine’s processing time and CPU utilization time are measured .Satisfactory results are achieved while comparing the two algorithms. This study concludes that the DSP algorithm can perform efficiently than the credit scheduling algorithm. Keywords: Virtual Machine, DSP algorithm, credit scheduling algorithm
Characterizations and optimization study on influence of different parameters...eSAT Journals
Abstract
A new technological approach was used for the production of silver nanoparticles using metal acquiring microorganism as a
means of fabrication and making of superior biomaterials. Silver nanoparticles (AgNPs) are nanoparticles of silver which are in
the range of 1 and 100 nm in size. Extracellular synthesis of AgNPs was observed when Streptomyces species was exposed to
colloidal silver salt solution optimised at 1mM ionic strength by autoclaving method.UV-Visible spectroscopic analysis were done
to monitor the drift in change of pH, precursor concentration, Streptomyces supernatant volume and effect of temperature on the
formation of AgNPs. Influence of different factors such as pH, initial silver molar strength, water dilution, and methodology used o
synthesize nanoparticles were found to be extremely reliable for consistent stability and storage purpose. The results indicated
that temperature optimised was at 280C for storage, pH was at neutral 7 and water orchestrated as “diluent”, showed increased
Nano-particle spectra. The formation of nanoparticles was first monitored by measuring the surface plasmon resonance (SPR)
band at 410nm by UV-Visible absorption spectroscopy. The presence of elemental silver and the crystalline structure of the
AgNPs were confirmed by Thermogravimetric analysis (TGA) and Powder X-ray diffraction (PXRD).In addition, Atomic Force
Microscopy (AFM) along with FESEM imaging used for characterising nanoparticles revealed that they in spherical shape with
an average particle size of 20-70nm.Finally, FTIR investigations revealed that many efficient clusters of functional bio molecules
are playing significant role in capping and synthesis process.
Keywords: Antagonism, Silver Nanoparticles (AgNPs), 16S Ribosomal Gene, Atomic Force Microscopy (AFM).
Cloud computing is a model which uses the mixture concept of “software-as-a-service” and “utility computing”, and provides
various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the
information is available for on demand service users. Security issue in Cloud computing is the important and critical issues
because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe
enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble
data. There is also a possibility where a malicious user can penetrate the cloud by imitate an authorized user, and affect with a
virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the
parameters that affects the security of the cloud then it explores the security issues of cloud computing and the troubles faced by
providers and consumers about their data, privacy, and infected application and security issues. It also presents some security
solutions for tackling these issues and problems.
Review on Security Techniques using Cloud ComputingEditor IJCATR
Cloud Computing is the nascent technology which is based on Pay-Per-Use Model. Cloud computing is emerging as a
model of “Everything as a Service” (XaaS). Cloud Computing is computing paradigm where applications, data bandwidth and IT
services are provided over the Internet. Cloud Computing is a relatively new computing model that provides on demand business
and IT services over the Internet. The main concerns in adapting Cloud Computing is its security, different security risks that
affects the cloud environment in the area of confidentiality, Integrity and computing on data is thoroughly investigated
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
“This chapter provide an overview of introductory cloud computing topics. It begins with a brief history of cloud computing along with short descriptions of its business and technology drivers. This is followed by definitions of basic concepts and terminology, in addition to explanations of the primary benefits and challenges of cloud computing adoption.”
Enhanced technique for regression testingeSAT Journals
Abstract
Regression testing perform where to retest modified version of software which already modified by developers on the basis of
Feedback and testing of the software. Regression testing performs where no internal software knowledge and code known by the
tester. Here all test cases not possible to retest this is a problem. So here we will use test case priority technique. that will
provide priority to retest test case first. this test case priority technique uses for increase efficiency of regression testing. Because
high priority test case execute first. and in our proposed technique we are set priority on the basis of [average time for
execution(figure.1).which find out average time for execution on the basis of fault/time. and we will also ignore test cases which
contain same average time for execution and we will select only one test cases in this situation.. After arrange test cases in
descending order by average time of test cases execute test suite. This method gives more prioritization of test cases is compare to
previous techniques. Finally we will get more prioritized test suite. Then we have also checked efficiency of this new method by
APFD Metric [1]. Our primary purpose of this research paper to introduce new prioritization technique which provides better
result is compare to previous techniques. which improves efficiency of Regression testing.
Keywords: Regression Testing, Prioritization, Test Case, Test Suite, APFD Metric[1].
Effect of gradation of aggregates on marshall properties of sdbc mix designeSAT Journals
Abstract
Semi Dense Bituminous concrete (SDBC) is the upper bituminous layer of the road subjected to moderate traffic loads. The
grading of aggregates used to prepare the SDBC mix should fall within the limits specified in MoRTH. For each aggregate
fraction there is a specified gradation range with lower and higher limits of aggregates passing through a particular sieve size.
The gradation range specified in MoRTH is quite wide. Therefore mix design by adopting a particular gradation of the aggregate
falling within the MoRTH range also affects the Marshall properties. The present study is taken to evaluate the Marshall property
of SDBC mix prepared using the aggregate having different grading within the grading limits specified by the MoRTH. In order to
study this aspect five mixes having different gradation were prepared. The gradation used correspond to Lower Grade (L.G.),
Lower Middle Grade (L.M.G.), Middle Grade (M.G.), Higher Middle Grade (H.M.G.), Higher Grade (H.G.) of the gradation
range specified by MoRTH . The test result revealed that there is significant variation in Marshall Properties of the mixes having
different gradation of the aggregates. The Stability values obtained is maximum for the Lower Middle Grade (L.M.G.) range of
MoRTH specification. The Flow values obtained is maximum for the Middle Grade (M.G.).The Optimum Bitumen Content
(O.B.C.) is also minimum in Lower Middle Grade (L.M.G.).
Keywords: Aggregate Gradation, Semi Dense Bitumen Concrete, Marshall Properties, Morth.
A vm scheduling algorithm for reducing power consumption of a virtual machine...eSAT Journals
Abstract This paper concentrates on methods which provide efficient processing time of a virtual machine, CPU utilization time of a virtual machine. As the user increases, the performance may be significantly reduced if the tasks are not scheduled in a proper order. In this paper the performance of two already existing algorithms DSP (Dependency Structural Prioritization) algorithm and credit scheduling algorithm are analyzed and compared. A single virtual machine’s processing time and CPU utilization time are measured .Satisfactory results are achieved while comparing the two algorithms. This study concludes that the DSP algorithm can perform efficiently than the credit scheduling algorithm. Keywords: Virtual Machine, DSP algorithm, credit scheduling algorithm
Characterizations and optimization study on influence of different parameters...eSAT Journals
Abstract
A new technological approach was used for the production of silver nanoparticles using metal acquiring microorganism as a
means of fabrication and making of superior biomaterials. Silver nanoparticles (AgNPs) are nanoparticles of silver which are in
the range of 1 and 100 nm in size. Extracellular synthesis of AgNPs was observed when Streptomyces species was exposed to
colloidal silver salt solution optimised at 1mM ionic strength by autoclaving method.UV-Visible spectroscopic analysis were done
to monitor the drift in change of pH, precursor concentration, Streptomyces supernatant volume and effect of temperature on the
formation of AgNPs. Influence of different factors such as pH, initial silver molar strength, water dilution, and methodology used o
synthesize nanoparticles were found to be extremely reliable for consistent stability and storage purpose. The results indicated
that temperature optimised was at 280C for storage, pH was at neutral 7 and water orchestrated as “diluent”, showed increased
Nano-particle spectra. The formation of nanoparticles was first monitored by measuring the surface plasmon resonance (SPR)
band at 410nm by UV-Visible absorption spectroscopy. The presence of elemental silver and the crystalline structure of the
AgNPs were confirmed by Thermogravimetric analysis (TGA) and Powder X-ray diffraction (PXRD).In addition, Atomic Force
Microscopy (AFM) along with FESEM imaging used for characterising nanoparticles revealed that they in spherical shape with
an average particle size of 20-70nm.Finally, FTIR investigations revealed that many efficient clusters of functional bio molecules
are playing significant role in capping and synthesis process.
Keywords: Antagonism, Silver Nanoparticles (AgNPs), 16S Ribosomal Gene, Atomic Force Microscopy (AFM).
A review on fuel cell and its applicationseSAT Journals
Abstract With the increase in the demand of electrical energy now it is the time to think for the alternate source of energy. In order to mitigate the demand of electrical energy and to create pollution free environment the fuel cell acts as an alternate solution. The fuel cells are very much similar to an ordinary dry cell or battery. It has an electrode, some chemical material and an electrical circuit to give the supply to an external circuit. Due to absence of rotating devices they are quite simple and efficient in nature. This paper describes about the working methods of fuel cells and their future and economic growth. Keywords: Fuel cell, Electrolyte, Electrode, DC
An approach for ids by combining svm and ant colony algorithmeSAT Journals
Abstract This piece of work researches the intrusion detection problem of the network sanctuary; the primary task is to classify network behavior as normal or abnormal while reducing misclassification. In this paper, two efficient data mining algorithms are combined together to detect the network intrusion. Combining SVM and Ant colony (CSVAC) used for well-organized data classification, this technique takes the advantage of both the algorithm while avoiding their weaknesses. This algorithm is implemented and evaluated using standard benchmark KDDCUP99 data set. Experimental results drastically well produce superior results than the other algorithm in terms of accuracy rate and run time efficiency, and this algorithm able to detect the new types of attacks Keywords: Intrusion Detection; Support Vector Machine; Ant colony; Combined Support vector with ant colony
Analytical study on effects of water quality parameters using remote sensing ...eSAT Journals
Abstract Rapid urbanization and industrialization has led to unchecked proliferation of hazardous industries in and around Hyderabad, unchecked and unregulated distribution and management of urban resources especially green areas, water bodies and the combination of above aspects with large scale urban sprawl have all made Hyderabad an unmanaged polluting city. One of the major problems 'Water Pollution' is referred to the addition to water an excess of material that is harmful to humans, animals, or desirable aquatic life, or otherwise causes significant departures from the normal activities of various living communities, in or near bodies of water. The term water pollution refers to any type of aquatic contamination between two extremes: A highly enriched over productive biotic community such as river or lake with nutrients from sewer or fertilizer. Water bodies poisoned by toxic chemicals, which eliminate living organizing, exclude all forms of life. Many steps are being taken to keep pollutants from reaching groundwater supplies. Manufacturers should use fewer toxic raw materials. Consumers have switched to phosphate-free detergents and other less polluting household products. Pollution control measures such as the Clean Water Act have also been a big part of the protection of drinking water supplies. Reutilization and Recycling of Waste: Various kinds of wastes like paper pulp, municipal and industrial effluents, sewage and thermal pollutants can be recycled to advantage. For example, urban waste could be recycled to generate cheaper fuel gas and electricity. Removal of Pollutants- The various physicochemical techniques used for removal of chemical biological or radiological pollutants have been adsorption, electro dialysis, ion exchange and reverse osmosis etc. Keywords: Water Bodies, Water Pollution, Water Quality.
High dimensionality reduction on graphical dataeSAT Journals
Abstract In spite of the fact that graph embedding has been an intense instrument for displaying data natural structures, just utilizing all elements for data structures revelation may bring about noise amplification. This is especially serious for high dimensional data with little examples. To meet this test, a novel effective structure to perform highlight determination for graph embedding, in which a classification of graph implanting routines is given a role as a slightest squares relapse issue. In this structure, a twofold component selector is acquainted with normally handle the component cardinality at all squares detailing. The proposed strategy is quick and memory proficient. The proposed system is connected to a few graph embedding learning issues, counting administered, unsupervised and semi supervised graph embedding. Key Words:Efficient feature selection, High dimensional data, Sparse graph embedding, Sparse principal component analysis, Subproblem Optimization.
Abstract
Routing in MANET is one of the most researched areas in the field of networking; moreover it is one of the most complex tasks.
RF based transmission techniques are widely used in wireless communication networks. Due to the availability of sophisticated
optical components, the networking domain could be merged with optical domain to have a higher capacity and better
transmission. So in order to overcome the disadvantages of RF domain, we can use light as a medium between nodes. i.e, FSOMANET.
This work is aimed at designing an efficient routing in FSO MANET. This paper proposes a method to find the stable
path as well as stable nodes between the source and destination. The steps are as follows. i) Topology Management ii) Trust Level
Calculation iii) Award and Reward ranking iv)Path Selection. The proposed technique will be implemented in the working
platform of MATLAB.
Keywords: Mobile Ad Hoc Network, Free Space Optics, Link Stability, Delay Tolerant Networking, Clustering
Technique, Award and Reward
Tungsten oxide nanostructures for energy storage and field emission applicationseSAT Journals
Abstract
Single crystalline tungsten oxide (WO3) nanorods were synthesized over flexible carbon fabric via simple hydrothermal method
and used directly as supercapacitor (SC) electrode. WO3 nanorods with their peculiar structural features over the fabric exhibited
excellent electrochemical performance with a high specific capacitance of 481.34 F/g at scan speed 10 mV s-1. Additionally, these
nanorods showed propitious as electron field emitters where the registered turn on field and estimated field enhancement values
were 3.6 V/μm and 4550 respectively. These results indicate that present unique WO3 nanorods arrays over flexible carbon cloth
substrate are a promising candidate for constructing high-performance solid state electronics and electrochromic devices.
Key Words: Semiconductor compounds, Nanorods, carbon fabric, Supercapacitors, Field emitters and arrays
Electrochemical impedance spectroscopy on thermal ageing evaluation of epoxy ...eSAT Journals
Abstract This research concentrates on the thermal ageing of a full 3-coat system with sacrificial pigment (zinc rich) primer on mild steel where the temperature dependence test is conducted to explore the correlation between the coating resistances with the corrosion rate underneath the coating. Electrochemical impedance spectroscopy (EIS) is introduced over a range of temperature to extract activation energies for the rate of controlling processes in the corrosion reactions. It is expected that the zinc rich primer does not form a barrier coating for the metal substrate rather it will be the most active component of the substrate in the electrochemistry. Full 3-coat system with zinc rich primer show the extracted activation energy from coating resistance is significantly lower than the activation energy extracted from the charge transfer resistance. This suggested that the coating resistance from EIS cannot be controlling the corrosion reaction. The activation energies generated for the corrosion process here (78–97 kJmol-1) are very much higher than those of ion transport through the coating (19–37 kJmol-1) during early immersion. Further interesting findings come from the activation energy trends over time particularly for the corrosion process which shown that the value is decreasing where at the end of exposure, the activation energy values for coating and charge transfer resistance become quite similar. It is suggested that at this stage ion transport in the coating might be controlling the corrosion process unlike at the beginning; the activation energy is getting smaller due to coating degradation. Index Terms: epoxy coating, electrochemical impedance spectroscopy, thermal effect, zinc rich primer
Influence of curing process interrupt on ilss of thin carbon epoxy laminateseSAT Journals
Abstract Autoclave curing process of any composite part lasts for about 5 to 6 hrs during which the composite parts will undergo physical & chemical changes due to the polymerization process. Any interrupts or breakdown during curing process due to mechanical / power / controller failures can affect the properties and in turn results in improper curing of a composite part. Hence there is a prime need to analyze the effects of process interrupt at critical stages of the curing process on part quality and strength. Efforts are made in this paper to study and analyse the effects of curing process interrupts on the properties of Hexcel 913 carbon /epoxy composite laminates of thickness 2 mm at five critical stages (750 C, 900 C, 1100 C, 1200C, and 1350 C ) of a cure cycle. The ILSS (Inter laminar Shear Strength) is analyzed as per Dutch Institute for Norms (DIN) standards and the results are compared with the master specimen. The results exhibits low strength at cure temperatures 90, 110 and 120 oC for process interrupt of 60 mins due to significant decrease in temperature during the process interrupt and eventually result in incomplete resin transition at critical Tg points from 90 to 120 deg.C. The laminates cured with process interrupt for 60 mins at 75 oC have reduced 0.5 % of the ILSS properties and between 90 to 120 oC the ILSS has reduced by 4 - 8% of the reference laminate properties. Hence the autoclave break down / power failure for more than 40 mins at 90 oC and 30 mins at 120 oC is not recommended for curing of composite parts of thickness less than 3 mm as the part strength gradually decreases .However these conditions vary for curing thicker composite laminates, since it consists of more layers and will have high thermal gradients between the layers during curing. Mathematical equations are formulated to determine the Avg. ILSS values at particular cure temperature for different process interrupt periods. This helps the designer or the manufacturer to evaluate and analyse the ILSS values due to process interrupts at critical points during curing process. Keywords: Autoclave, Curing, Composites, Fiber, Flexural, Laminates, Strength.
Abstract Ground water is fresh water located in the core space of soil and rocks and water is essential for the survival of human beings. In addition to food, shelter and clothing, water is one of our basic human needs and lack of potable water is a major cause of death and disease in our world. Now a days due to rapid industrialization even in rural areas, water become contaminated. Presently there are no appropriate low cost methods available for removal of water contaminants from drinking water. There are a variety of purification methods of drinking water which are very costly and those methods cannot serve a common man effectively. The purpose of this study is to provide information on low cost household water treatment using seeds of the Drum stick tree. Present study deals with the suitability of coagulation-flocculation process using Moringa Oleifera seeds as natural coagulant for purification of water for drinking purpose. In present study various does of Moringa Oleifera seed powder like 50, 100 and 150 mg/litre were taken and checked for the efficiency dose for various water samples. After treatment of water samples with Morigna Oleifera seed powder were analyzed for the parameters like Turbidity and pH. There is an appreciable change in these parameters and the values are within the range of W.H.O. standards. Application of this low cost Moringa Oleifera seeds is recommended for eco-friendly, non-toxic, simplified water treatment where rural people living in extreme poverty are presently drinking highly turbid and contaminated water. Keywords: Drumstick (Moringa Oleifera), Natural coagulant, water samples, absorbent, coagulant.
Breast cancer diagnosis and recurrence prediction using machine learning tech...eSAT Journals
Abstract Breast Cancer has become the common cause of death among women. Due to long hours invested in manual diagnosis and lesser diagnostic system available emphasize the development of automated diagnosis for early diagnosis of the disease. Our aim is to classify whether the breast cancer is benign or malignant and predict the recurrence and non-recurrence of malignant cases after a certain period. To achieve this we have used machine learning techniques such as Support Vector Machine, Logistic Regression, KNN and Naive Bayes. These techniques are coded in MATLAB using UCI machine learning depository. We have compared the accuracies of different techniques and observed the results. We found SVM most suited for predictive analysis and KNN performed best for our overall methodology. Keywords: Breast Cancer, SVM, KNN, Naive Bayes, Logistic Regression, Classification.
Effect of a diffuser tower on the power output of a solar chimney power planteSAT Journals
Abstract The present paper has discussed about the effect of the diffuser tower instead of the conventional cylindrical tower on the power
output of the Manzeneres Solar Chimney Power Plant. The power output of the plant has been estimated if the diffuser tower
would have been implemented. For implementing the draft in the tower the use of adifferent structure is proposed instead of the
sheet steel ring structure.
Keywords: Solar Chimney, Diffuser Tower, Solar Updraft Tower, Draft Angle.
Design of transformer less power supply for low power applicationeSAT Journals
Abstract Appropriate power supply is the most required parameter for any electronics gadget. We need it for all kind of works related to electronic world (example: you need it if you are working on any project or to power up your designed device). Most of the electronic components work with DC power supply. To power up these components we can use various D.C. sources i.e. battery, AC to DC converter, Rectifier Circuit etc. We can use any of them depending upon our need. But sometimes we may fall in situation that we need only few mA of current at very low voltage and we may not have the option to use costly and bulky AC to DC converter circuit, any battery source or any other power source like DC adapter available in the market (example: you have designed a device and you want to build a separate power supply source for it so that it can operate directly from AC mains) but on the other hand you don’t want to use step down transform in the converter circuit to reduce the size and cost. To solve the issue we have designed a circuit which can be used anywhere to provide power supply for current requirement up to few mA at low voltage. Circuit has very good response to the high voltage surge and spikes even which lasting for few milliseconds. Further circuit is modified from the conventional techniques available across the internet [1] to get the step type voltage response across capacitor at output side to avoid any malfunctioning of connected device. Keywords: Regulated Power Supply, Transformer less Power Supply, Bridge Rectifier, Low Power Application, A.C. to D.C. converter etc…
Implementation of flex sensor for hand gesture based wireless automation of j...eSAT Journals
Abstract The project is totally based on automation. It has been made to contribute in the field industry. Many Projects have been undertaken previously to develop automatic JCB using various technology like Remote control, Zig bee control etc. But none have such Dual Mode feature like Flex Sensor control and DTMF control with LDR sensor, Flame Detector and IR sensor integrated on a single chip. This project will not require a worker sitting inside a JCB and can be run from outside with more comfortable and more accuracy and is also cost effective and requires low maintenance. It can be controlled by simple hand gestures. It employs a Flex sensor which controls the JCB’s movements like up-down and 360 degree clockwise and anticlockwise rotation by bending it and making our JCB move accordingly. Also if any problem occur in Flex Sensor then we can switch to other mode of operation which is DTMF. Using which we can easily control our JCB worldwide through cell phone. The entire core of the project lies in the microcontroller which is a device used to establish automation. The main aim of this paper is to implement a JCB with Dual mode of operation. It also includes other features like IR sensor to detect any obstacle in field work like excavation, LDR sensor to make our JCB work at night also by automatically illuminating the LED’s in the dark places. Flame Detector to detect fire when any kind of accident occur. Key Words: Flex sensor, DTMF control, IR sensor, Flame detector etc…
Performance evaluation of 1 tbps qpsk dwdm system over isowceSAT Journals
Abstract Optical wireless communications has been in latest trends of high speed communications. They enable the use of optical wireless channel in applications like inter satellite links and underwater communications etc. In this paper, we communicate an ultra high bit rate i.e. 1 Tbps (10 x 100 Gbps) QPSK WDM System over optical Wireless communication Link. The system is a Line of Sight optical wireless link incorporating Coherent QPSK modulation Scheme for10 channels each at 100 Gbps The performance is evaluated in terms of Q-Factor and Minimum Bit Error Rate which are noticed to be in acceptable standards. The Link is analyzed under various parameters such as Power, Distance etc and maximum achievable distance is noticed to be 50,000 km at power values ranging from 0 dBm to 40 dBm
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Addressing the cloud computing security menaceeSAT Journals
Abstract Cloud Computing is fast gaining popularity today with its scalable, flexible and on-demand service provision. It brings cost saving and agility to organization with pay-as-you-go approach. Abundant resources are available and the user has a huge range to select from. Cloud facilitates virtualization, simplification, automation and accelerated delivery of application and services for a sustainable business advantage. As much as the technological benefit, cloud computing also has security issues. Security in cloud computing is essential for providing quality of service. In this paper we address security issues which concern cloud computing environment today. We analyze Cloud Computing and security menace it faces due to different threats. Index Terms: Cloud Computing, Cloud Service Provider (CSP), Cloud Security, Cloud User, SaaS, PaaS, IaaS, StaaS
A Detail Overview of Cloud Computing with its Opportunities and Obstacles in ...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
Cloud computing has recently emerged as new paradigm in field of technology. Cloud computing is attractive to business owners and IT people. It is still in its infancy and many issues are to be addressed. This paper covers the cloud computing basics and discusses load balancing in cloud computing environment as the one of the major challenges of cloud computing. It also discusses the various existing load balancing algorithms.
An study of security issues & challenges in cloud computingijsrd.com
"Cloud Computing" is a term, which involves virtualization, distributed computing, networking and web-services. It is a way of offering services to users by allowing them to tap into a massive pool of shared computing resources such as servers, storage and network. User can use services by simply plug into the cloud and pay only for what he uses. All these features made a cloud computing very advantageous and demanding. But the data privacy is a key security problem in cloud computing which comprises of data integrity, data confidentiality and user privacy specific concerns. Most of the persons do not prefer cloud to store their data as they are having a fear of losing the privacy of their confidential data. This paper introduces some cloud computing data security problem and its strategy to solve them which also satisfies the user regarding their data security.
Cloud computing is a realized wonder. It delights its users by providing applications, platforms and infrastructure without any initial investment. The “pay as you use” strategy comforts the users. The usage can be increased by adding infrastructure, tools or applications to the existing application. The realistic beauty of cloud computing is that there is no need for any sophisticated tool for access, web browser or even smartphone will do. Cloud computing is a windfall for small organizations having less sensitive information. But for large organizations, the risks related to security may be daunting. Necessary steps have to be taken for managing the issues like confidentiality, integrity, privacy, availability and so on. In this paper availability is taken and studied in a multi-dimensional perspective. Availability is taken a key issue and the mechanisms that enable enhancement are analyzed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Software as a service for efficient cloud computingeSAT Journals
Abstract This Research paper explores importance of Software As A Service (SaaS) for efficient cloud computing in organizations and its implications. Enterprises now a days are betting big on SaaS and integrating this service delivery model of cloud computing architecture in their IT services. SaaS applications are service centric cloud computing delivery model used as IT Infrastructure which is multi-tenant architecture used to provide rich user experience with desired set of features requested by the cloud user. This research paper also discusses the importance of SaaS application architecture, functionality, efficiency, advantages and disadvantages. Keywords: Cloud Computing, Service Delivery Models, Software as a Service, SaaS Architecture.
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc. Keywords: Cloud computing, community model, hybrid model, Public model, private model
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cloud computing Review over various scheduling algorithmsIJEEE
Cloud computing has taken an importantposition in the field of research as well as in thegovernment organisations. Cloud computing uses virtualnetwork technology to provide computer resources tothe end users as well as to the customer’s. Due tocomplex computing environment the use of high logicsand task scheduler algorithms are increase which resultsin costly operation of cloud network. Researchers areattempting to build such kind of job scheduling algorithms that are compatible and applicable in cloud computing environment.In this paper, we review research work which is recently proposed by researchers on the base of energy saving scheduling techniques. We also studying various scheduling algorithms and issues related to them in cloud computing.
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 668
AN ASSESSMENT OF CLOUD COMPUTING: EVOLUTION
Manvi Mishra1
, Isha Arora2
, Pooja Singh3
, Sugandha Prabhakar4
1
Professor & Head, Department of Computer Science, SRMSWCET, U.P, India
2
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
3
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
4
Research Scholar, Department of Computer Science, SRMSWCET, U.P, India
Abstract
In this present work we have given a concise and systematic study of evolution of cloud computing from shared web hosting to public
cloud computing along with multi clouds based on a wide spectrum of factors which include scalability, availability and performance.
The proposed work studies hosting types and aims to promote the use of single and multi-clouds to reduce the risks. Cloud computing
is a multi-paradigm technology which has evolved as a cost effective, flexible, performance oriented infrastructure for agile
development of business operations. Cloud computing changes the way we think about computing by decoupling data processing, data
retention, and data presentation – in effect, divorcing components from location. Today due to the need of hour and security
constraints, single cloud computing is transforming to multi cloud computing. Focus has been done on Multi cloud which is also
known as “inter cloud” or “cloud of clouds” which reduces the security risks like failure of service availability, data loss and
confidentiality breaches that are drawbacks with single cloud.
Keywords: Cloud Computing, Evolution, Hosting Types, Multi cloud
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing enables a ubiquitous, easily accessible and
an on demand infrastructure for sharing a resource pool of
services. The characteristics of cloud computing includes: - on
demand self-service, broad network access, resource pooling,
rapid flexibility and measured performance. The consumers
and industry have an extensive dependence on cloud
computing in which security is a major issue. Cloud security is
multi paradigm and includes computer security, information
security and network security. Cloud computing in its real
sense came into existence in October 2007, when IBM and
Google collaborated and gave the concept of ―Blue Cloud‖.
The use of cloud computing has increased rapidly in many
organizations. Cloud computing provides many benefits in
terms of low cost and accessibility of data.[1] Ensuring the
security of cloud computing is a major factor in the cloud
computing environment, as users often store sensitive
information with cloud storage providers but these providers
may be untrusted. Dealing with ―single cloud‖ providers is
predicted to become less popular with customers due to risks
of service availability failure and the possibility of malicious
insiders in the single cloud. A movement towards ―multi-
clouds‖ or in other words, ―inter clouds‖or―cloud-of-clouds
has emerged recently. In the paper we have discussed the
evolution of cloud computing and laid emphasis on the
emergence of multi clouds. The following section highlights a
brief review of cloud computing. The remaining sections are
organized as follows. In Section III discussion about Evolution
of Cloud Computing is made. Section IV deliberates on
Benefits and Challenges of Cloud Computing. Section V
focuses on Evolution of Single to Multi cloud. Section VI
presents the Results and Section VII presents the Conclusion.
2. REVIEW OF LITERATURE
This review surveyed the existing literature using a principled
and systematic approach. The U.S. National Institutes of
Standards and Technology defines cloud as‖ Cloud
Computing is a model for enabling convenient, on demand
network access to a shared pool of configurable computing
resources(e.g. Networks, services, storage and applications)
that can be rapidly provisioned and released with a minimal
management effort or service provider interaction. This cloud
model promotes availability and is composed of five essential
characteristics, three delivery models and four deployment
models.‖ [1].Following are the factors which lead to the
evolution of cloud computing: [2]
1. Scalability: The number of resources that are needed
to be accessed by a wide range of users having varied
requests is increasing day by day. This lead to the
evolution of cloud computing.
2. Heterogeneity: Together with the number of devices,
the range of types of resources currently increases
significantly.
3. Economic Reasons: the business models around the
IT service and resource provisioning have changed
drastically over recent years, moving away from
onetime license fees and licensing models tied to
individual users or machines, to flat rates and free or
low cost online applications.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 669
4. Mobility: in the modern, globalized economy and
with modern smart phones and powerful mobile
devices, a growing demand for online availability,
accessibility to data, mobile office like working
environments etc. is notable.
Cloud services are usually divided in the three main types
which are:
1. Software as a Service (SaaS): SaaS clients rent
usage of applications running within the Cloud’s
provider infrastructure, for example Sales Force. The
applications are typically offered to the clients via the
Internet and are managed completely by the Cloud
provider.
2. Platform as a Service (PaaS): PaaS Cloud providers
offer an application platform as a service, for
example Google App Engine. This enables clients to
deploy custom software using the tools and
programming languages offered by the provider.
Clients have control over the deployed applications
and environment-related settings.
3. Infrastructure as a Service (IaaS): IaaS delivers
hardware resources such as CPU, disk space or
network components as a service. These resources are
usually delivered as a virtualization platform by the
Cloud provider and can be accessed across the
Internet by the client with the client having full
control of the virtualized platform. Deploying cloud
computing can differ depending on requirements in
four deployment models which have been identified
each with specific characteristics that supports the
needs of services and users of the clouds. These are:
public, private, community and hybrid clouds.
Fig-1: Types of Cloud
3. EVOLUTION OF CLOUD COMPUTING
The trend toward cloud computing started in the late 1980s
with the concept of grid computing when, for the first time, a
large number of systems were applied to a single problem,
usually scientific in nature and requiring exceptionally high
levels of parallel computation. The objective of Cloud
computing is the newest name for what has been around since
the mid-90s as ―on-demand infrastructure.‖ In 1995, it was
known as ―Shared Web Hosting‖ and had limited features
such as multi-tenant, automated provisioning, easy-to-use
interface. In 1998 VPS Hosting became available – this web
host improved by having partial infrastructure demand and
resource size flexibility. 1997 brought Dedicated Hosting,
both managed and unmanaged. [3] This type of automated
computing had dedicated servers with promises of full
administrative access.[4] The 2000s was when automated
computing came in the form of Grid /utility computing and
had full infrastructure demand and multi-tenant, partial
resource size flexibility and automated provisioning came
closer to what is known as ―cloud today‖. From 2012’s
through today the cloud computing has gathered a wide
spectrum of audience making it more scalable, flexible and
performance oriented. [5]
1. Shared Web Hosting – Shared web hosting
service or virtual hosting service or derive host refers to
a web hosting service where many websites reside on
one web server connected to the Internet. Each site
"sits" on its own partition, or section/place on the server,
to keep it separate from other sites. This is generally the
most economical option for hosting, as many people
share the overall cost of server maintenance
2. VPS Hosting – A virtual private server (VPS) is
a virtual machine sold as a service by an Internet hosting
service. A VPS runs its own copy of an operating
system, and customers have super user-level access to
that operating system instance, so can install almost any
software that runs on that OS. For many purposes they
are functionally equivalent to a dedicated physical
server, and being software defined are able to be much
more easily created and configured. [6]
3. Dedicated Hosting– It is software installed on a
separate virtual server to manage the end user
connections with the virtualized desktops. A dedicated
hosting service, dedicated server, or managed hosting
service is a type of Internet hosting in which the client
leases an entire server not shared with anyone else. This
is more flexible than shared hosting, as organizations
have full control over the server(s), including choice of
operating system, hardware, etc. There is also another
level of dedicated or managed hosting commonly
referred to as complex managed hosting.[7]
4. Grid computing- Grid computing is the collection of
computer resources from multiple locations to reach a
common goal. What distinguishes grid computing from
conventional high performance computing systems such
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 670
as cluster computing is that grids tend to be more
loosely coupled, heterogeneous, and geographically
dispersed. Although a single grid can be dedicated to a
particular application, commonly a grid is used for a
variety of purposes. Grids are often constructed with
general purpose grid middleware software libraries.
5. Public Cloud Computing- In Public clouds the cloud
infrastructure is available to the public on a commercial
basis by a cloud service provider. This enables a
consumer to deploy and develop a service in the cloud
with a very little financial outlays compared to other
deployment models. Private cloud incorporates specific
services and is maintained and deployed for a specific
organization. In Community cloud the cloud
infrastructure is shared among a number of
organizations with similar interests and requirements.
The Hybrid cloud comprises of a number of clouds of
any type but the clouds have the ability through their
interfaces to allow data or applications to be moved
from one cloud to another. How to access data in single
cloud using one of these four deployment methods or a
combination is shown in fig 2.
6. Multi clouds- Multi cloud computing is a new
dimension in cloud computing which is the concurrent
use of two or more cloud services to minimize the risk
of widespread data loss or downtime due to localized
component failure in a cloud computing environment as
shown in fig 3. A multi cloud approach can offer not
only the hardware, software and infrastructure but
redundancy necessary to optimize fault tolerance.
Fig-2: Accessing data in single cloud
Fig-3: Accessing data in multi-cloud
4. BENEFITS AND CHALLENGES
Organizations pay for the usage of cloud which is carefully
monitored and measured — in past managed services models,
it was difficult to see actual results based on IT spending
centralized computing resources, within the cloud provider,
are managed by fewer personnel with heavy use of automation
and consistent processes resulting in lower cost to the
consumers. Consuming organizations do not need a
sophisticated IT staff which is expensive, hard to find
transition of work for a cloud provider. This improves quality,
maintainability, security, and reduces cost to the consumers of
cloud. [8] Numerous legacy IT integrators are claiming to
provide cloud solutions but are essentially still legacy
managed service providers. Organizations have significant
legacy computing resources (servers, data centers, and IT
personnel) that will need to be transitioned or eliminated in
order to achieve true cost savings and flexibility provided by
cloud providers/services. Mission critical applications that are
core to the business or the consuming organization must be
transitioned to the cloud. This is neither quick nor easy, and
will take some time. Businesses need to evaluate whether
their custom/legacy application is truly needed and worth the
re-investment budgeting for cloud services is a challenge to
some commercial and government organizations. Existing
procurement policies may need to be adapted. Following are
the major challenges to cloud computing which encompass
lack of ownership of data, Overdependence, Information
Security, Privacy, Availability, Performance, Data Migration
and Stability of Provider. [9]
5. EVOLUTION OF SINGLE TO MULTI-CLOUD
This section provides brief summary review of prior works on
cloud computing with respect to security. Cloud computing
security was explored in single cloud environment [10].
Service availability was focused in [11] in single cloud
environment. Multi-shares with secret sharing algorithm was
proposed in [12] for cloud security and data integrity. Cloud
security was explored using cryptographic methods [13]. The
security risks addressed include service availability, data
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 671
intrusion, and data integrity. The solution used cloud storage
and multi-clouds. In [14] a survey has been made to know
security issues and solutions with respect to single cloud.
RACS and RAID kind of techniques were used for cloud
security using multi-clouds [15]. Client centric distributed
protocols were explored for data integrity with multi-clouds
usage [16].Service availability problem was focused in single
cloud environment. [17] There was discussion about cloud
security issues [18]. Cryptography is used to protect cloud
data in single cloud environment [19]. A security mechanism
by name ―Depot‖ is used to single cloud environment [20]. A
security mechanism by name ―Venus‖ was proposed in [21]
which focused on data integrity issue in single cloud
environment. In [22] a survey is made on cloud security. In
[23] cloud data integrity is focused in single cloud
environment. In [24] a new security mechanism was proposed
by name ―HAIL‖ for improving service availability in multi-
cloud environment. In [25] a survey was done on cloud data
integrity in multi-cloud environment. Encrypted cloud VPN
technique is used in [26] for data integrity in multi-cloud
environment. Cloud security was discussed in [27] in single
cloud environment. TCCP techniques for cloud data integrity
issues and service availability were presented in [28] in single
cloud environment tokens and erasure codes were used in [29]
to ensure cloud data integrity in single cloud environment.
PDP schemes were used to protect data integrity in clouds.
Fig-4:Multi-Tenancy of Cloud Computing
For ensuring more security in cloud environment, we can use
data encryption. If the data is distributed in multi cloud.
Environment as well as it is encrypted, we can protect our data
in even better way. The data which is uploaded by the user can
be encrypted first and then we can store it on the cloud server
which is shown in fig: 5 and fig: 6. this will be helpful in
providing two-way security to the customer’s data. To store
the data in multi-cloud environment the symmetric key or
secret key algorithms are the best choice. Symmetric key
algorithm is also known as the secret key encryption. It is a
cryptographic technique in which both the sender and receiver
of data use the same key for the purpose of encryption and
decryption of data. Symmetric key algorithms are suitable for
storing data in cloud multi cloud, as user should be able to
access his data easily.
Fig-5: One way encryption in single cloud
Fig-6: Two way encryption in multi-cloud
6. RESULTS AND DISCUSSION
This work takes notes of the critical analysis of various
features provided by hosting types that includes Infrastructure
on Demand, Resource Size Flexibility, Multitenant, and
Application on demand, Network Flexibility, Automated
Provisioning, Scalability, Billing Type and Easy to use
Interfaces. Thus giving us the advantages of one type of
hosting over another and the advent of the concept of cloud.
In Traditional Hosting there are controlled environment and
power and forms parts of foundation of cloud computing. As
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 672
compared to shared web hosting on the cloud hosting our data
is hosted not on one but on several servers connected to work
as one. The VPS servers are less efficient since they allocate a
guaranteed amount of resources to each client that can never
be rerouted to others. In Dedicated hosting unlike cloud
computing the web hosting still owns the machines and has to
monitor the performance of the server ensuring uninterrupted
work flow of server .In Grid computing all machines process
different parts of a larger task.
The advantages of cloud computing over traditional hosting
are cloud computing is sold on demand typically as pay per
lease or leased service. Users are able to control and budget
costs more efficiently. Users determine how much of the
service they wish to use typically at the enrolment time or by
changing configuration dynamically through a web
administered interface. Users can typically access the service
from any location. User services are managed and provided by
cloud services. Table 1 depicts the various hosting types along
with their year of evolution and a comparison of the various
features and infrastructure provided by these hosting services.
Table-1: Evolution Of cloud Computing
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 673
7. CONCLUSIONS AND FUTURE SCOPE
Cloud hosting is reliable, easily scalable and affordable
hosting solution that differs from traditional hosting solutions
in many aspects. Cloud computing is promising paradigm for
IT services as computing utilities. This approach has several
advantages over the traditional web hosting services and grid
computing including higher security, lesser costs, better
efficiency, and simplified data storage. It is clear that although
the use of cloud computing has rapidly increased; cloud
computing security is still considered the major issue in the
cloud computing environment. Customers do not want to lose
their private information as a result of malicious intruders in
the cloud. Furthermore, data intrusion leads to many problems
for the users of cloud computing. The purpose of this work is
to survey the recent research on single clouds and multi-clouds
to address the security risks and solutions. We have found that
much research has been done to ensure the security of the
single cloud and cloud storage whereas multi clouds have
received less attention in the area of security. We support the
migration to multi-clouds due to its ability to decrease security
risks that affect the cloud computing user.
REFERENCES
[1]. H. Shacham, B. Waters (Dec 2008), "Compact proofs of
retrievability", in Proc. of Asia crypt 2008, vol. 5350, pp. 90–
107
[2]. M.A. Shah, R. Swaminathan, M. Baker (2008), "Privacy
preserving audit and extraction of digital contents"
[3]. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou (2009),
"Enabling public verifiability and data dynamics for storage
security in cloud computing", in Proc. of ESORICS’09.
[4]. Wang, K. Ren, W. Lou (2010), ―Achieving secure,
scalable, and fine-grained access control in cloud computing‖,
in Proc. of IEEE INFOCOM’10, San Diego.
[5]. Cloud Security Alliance, (2009) ―Security guidance for
critical areas of focus in cloud computing,‖
[6]. ― Design and Implementation of Virtual Private Services‖
Sotiris Ionnandis Steven M.Bellovin
[7]. ―Internet Infrastructure Technology‖ Structure Research,
September 2012.
[8]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and
Privacy Challenges in Cloud Computing Environments", IEEE
Security & Privacy, 8(6), 2010, pp. 24-31.
[9]. Amazon, Amazon Web Services. Web serviceslicensing
agreement, October3, 2006
[10]. S.L. Garfinkel, "An evaluation of amazon’s grid
computing services: EC2, S3, and QS", Technical Report TR-
08-07, Computer Science Group, Harvard University,
Citeseer, 2007, pp. 1-15
[11]. S. Subashini and V. Kavitha, "A survey on security
issues in service delivery models of cloud computing", Journal
of Network and ComputerApplications, 34(1), 2011, pp 1-11.
[12]. M.A. AlZain and E. Pardede, "Using Multi Sharesfor
Ensuring Privacy in Database-as-a-Service",44th Hawaii Intl.
Conf. on System Sciences(HICSS), 2011, pp. 1-9.
[13]. A. Bessani, M. Correia, B. Quaresma, F. André andP.
Sousa, "DepSky: dependable and secure storage in a cloud-of-
clouds", EuroSys'11:Proc. 6thConf. On Computer systems,
2011, pp. 31-46.
[14]. F. Rocha and M. Correia, "Lucy in the Sky without
Diamonds: Stealing Confidential Data in the Cloud", Proc.
1stIntl. Workshop of Dependability of Clouds, Data Centers
and Virtual Computing Environments, 2011, pp. 1-6.
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 674
[15]. H. Abu-Libdeh, L. Princehouse and H.Weatherspoon,
"RACS: a case for cloud storage diversity", SoCC'10:Proc. 1st
ACM symposium onCloud computing, 2010, pp. 229-240.
[16]. C. Cachin, R. Haas and M. Vukolic, "Dependable
storage in the Inter cloud", Research Report RZ,3783, 2010.
[17]. A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W.
Felten, "SPORC: Group collaboration using untrusted cloud
resources", OSDI, October2010, pp. 1-14.
[18]. E. Grosse, J. Howie, J. Ransome, J. Reavis and S.
Schmidt, "Cloud computing roundtable", IEEE Security &
Privacy, 8(6), 2010, pp. 17-23.
[19]. S. Kamara and K. Lauter, "Cryptographic cloud storage",
FC'10: Proc. 14thIntl.Conf. on Financial cryptograpy and data
security,2010, pp. 136-149.
[20]. P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi,M.
Dahlin and M. Walfish, "Depot: Cloud storage with minimal
trust", OSDI'10: Proc. of the 9thUSENIX Conf. on Operating
systems design and implementation, 2010, pp. 1-16.
[21]. A. Shraer, C. Cachin, A. Cidon, I. Keidar,
Y.Michalevsky and D. Shaket, "Venus: Verification for
untrusted cloud storage", CCSW'10: Proc. ACM workshop on
Cloud computing security workshop, 2010, pp. 19-30.
[22]. H. Takabi, J.B.D. Joshi and G.-J. Ahn, "Security and
Privacy Challenges in Cloud Computing Environments", IEEE
Security & Privacy, 8(6), 2010, pp. 24-31.
[23]. M. Van Dijk and A. Juels, "On the impossibility of
cryptography alone for privacy-preserving cloud computing",
HotSec'10: Proc. 5thUSENIX Conf. on Hot topics in security,
2010, pp.1-8.
[24]. K.D. Bowers, A. Juels and A. Oprea, "HAIL: Ahigh-
availability and integrity layer for cloud storage", CCS'09:
Proc. 16th ACM Conf. on Computer and communications
security, 2009, pp.187-198.
[25]. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud",
ACM SIGACT News, 40, 2009, pp. 81-86.
[26]. Clavister, "Security in the cloud", Clavister White Paper,
2008.
[27]. T. Ristenpart, E. Tromer, H. Shacham and S.Savage,
"Hey, you, get off of my cloud: exploring formation leakage in
third-party compute clouds", CCS'09: Proc. 16thACM Conf.
on Computer and communications security, 2009, pp.199-212.
[28]. N. Santos, K.P. Gummadi and R. Rodrigues ,"Towards
trusted cloud computing", USENIX Association, 2009, pp. 3-
9.
[29]. C. Wang, Q. Wang, K. Ren and W. Lou, "Ensuringdata
Int. Conf. on Advances in Recent Technologies in.
Proc.Int. Conf. on Advances in Recent Technologies in
Communication and Computing, 2010, pp. 1-9.
BIOGRAPHIES
Manvi Mishra, Professor & Head,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India.
Isha Arora, Research Scholar, Department
of Computer Science, Shri Ram Murti
Smarak Women’s College Of Engineering
and Technology, Bareilly, Uttar Pradesh,
India
Pooja Singh, Research Scholar,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India
Sugandha Prabhakar, Research Scholar ,
Department of Computer Science, Shri
Ram Murti Smarak Women’s College Of
Engineering and Technology, Bareilly,
Uttar Pradesh, India