: Virtualization and cloud computing is creating a fundamental change in computer architecture,
software and tools development, in the way we store, distribute and consume information. In the recent era of
autonomic computing it comes the importance and need of basic concepts of having and sharing various
hardware and software and other resources & applications that can manage themself with high level of human
guidance. Virtualization or Autonomic computing is not a new to the world, but it developed rapidly with Cloud
computing. In this paper there give an overview of various types of computing. There will be discussion on
Cluster, Grid computing, Utility & Cloud Computing. Analysis architecture, differences between them,
characteristics , its working, advantages and disadvantages
Virtualization refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network.
The main goal of virtualization is to manage workloads by radically transforming traditional computing to make it more scalable.
The server administrator uses a software application to divide one physical server into multiple isolated virtual environments.
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
Virtualization refers to the creation of a virtual resource such as a server, desktop, operating system, file, storage or network.
The main goal of virtualization is to manage workloads by radically transforming traditional computing to make it more scalable.
The server administrator uses a software application to divide one physical server into multiple isolated virtual environments.
Cloud Computing offers an on-demand and scalable access to a shared pool of resources hosted in a data center at providers’ site. It reduces the overheads of up-front investments and financial risks for the end-user. Regardless of the fact that cloud computing offers great advantages to the end users, there are several challenging issues that are mandatory to be addressed.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
Cloud computing & energy efficiency using cloud to decrease the energy use in...Puru Agrawal
Cloud can be used to decrease the energy use in large companies. This presentation deals with a model which explains as how cloud can be used to decrease the energy uses. This is a field related to green computing and minimum use of energy resources.
A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
The Grid means the infrastructure for the Advanced Web, for computing, collaboration and communication.
The goal is to create the illusion of a simple yet large and powerful self managing virtual computer out of a large collection of connected heterogeneous systems sharing various combinations of resources.
“Grid” computing has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and ,in some cases, high-performance orientation .
We presented the Grid concept in analogy with that of an electrical power grid and Grid vision
Introduction to Cloud Computing, Roots of Cloud Computing ,Desired Features of Cloud Computing ,Challenges and Risks ,Benefits and Disadvantages of Cloud Computing
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Cloud Application Development – The Future is nowSPEC INDIA
Cloud computing has been carving a niche for itself in each and every business, be it any domain, any geography. Providing a big relief to the business owners in terms of maintaining infrastructure, costs, efficiency, security and profitability, Cloud Application Development has a strong hold in the present as well as in the future to come. Have a look at certain attributes that makes cloud computing as the technology of today and tomorrow.
Get More at: http://blog.spec-india.com/cloud-application-development-set-rule-today-tomorrow/
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
All Operating Systems provide interface to users and inherent applications running on a system. Today with the advancement in the field of cloud computing, its services are in high demand. The Cloud is becoming an active paradigm of computation through services. However, such services do not prove to be very efficient in slow networks. Thus, the paper intends to achieve faster response of services provided by the Cloud infrastructure through the use of a new mechanism of servicing client requests. The focus of the paper is to realize most operating system functions at the client side over the Cloud infrastructure using the virtualization technique. It also proposes to overcome the issues present in the current infrastructure service and resulting in a faster service
Cloud computing & energy efficiency using cloud to decrease the energy use in...Puru Agrawal
Cloud can be used to decrease the energy use in large companies. This presentation deals with a model which explains as how cloud can be used to decrease the energy uses. This is a field related to green computing and minimum use of energy resources.
A brief discussion about Cloud computing for a beginner, you can get a clear idea about cloud computing from this slides.Also, discuss cloudsim simulator.
The Grid means the infrastructure for the Advanced Web, for computing, collaboration and communication.
The goal is to create the illusion of a simple yet large and powerful self managing virtual computer out of a large collection of connected heterogeneous systems sharing various combinations of resources.
“Grid” computing has emerged as an important new field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and ,in some cases, high-performance orientation .
We presented the Grid concept in analogy with that of an electrical power grid and Grid vision
Introduction to Cloud Computing, Roots of Cloud Computing ,Desired Features of Cloud Computing ,Challenges and Risks ,Benefits and Disadvantages of Cloud Computing
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Cloud Application Development – The Future is nowSPEC INDIA
Cloud computing has been carving a niche for itself in each and every business, be it any domain, any geography. Providing a big relief to the business owners in terms of maintaining infrastructure, costs, efficiency, security and profitability, Cloud Application Development has a strong hold in the present as well as in the future to come. Have a look at certain attributes that makes cloud computing as the technology of today and tomorrow.
Get More at: http://blog.spec-india.com/cloud-application-development-set-rule-today-tomorrow/
Cloud infrastructure mechanisms are foundational building blocks of cloud environments that establish primary artifacts to form the basis of fundamental cloud technology architecture.
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
All Operating Systems provide interface to users and inherent applications running on a system. Today with the advancement in the field of cloud computing, its services are in high demand. The Cloud is becoming an active paradigm of computation through services. However, such services do not prove to be very efficient in slow networks. Thus, the paper intends to achieve faster response of services provided by the Cloud infrastructure through the use of a new mechanism of servicing client requests. The focus of the paper is to realize most operating system functions at the client side over the Cloud infrastructure using the virtualization technique. It also proposes to overcome the issues present in the current infrastructure service and resulting in a faster service
A Virtualization Model for Cloud ComputingSouvik Pal
Cloud Computing is now a very emerging field in the IT industry as well as research field. The advancement of Cloud Computing came up due to fast-growing usage of internet among the people. Cloud Computing is basically on-demand network access to a collection of physical resources which can be provisioned according to the need of cloud user under the supervision of Cloud Service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. Virtualization technology is widely applied to modern data center for cloud computing. Virtualization is used computer resources to imitate other computer resources or whole computers. This paper provides a Virtualization model for cloud computing that may lead to faster access and better performance. This model may help to combine self-service capabilities and ready-to-use facilities for computing resources.
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc. Keywords: Cloud computing, community model, hybrid model, Public model, private model
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
Efficient architectural framework of cloud computing Souvik Pal
Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs) use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
The “Virtualization and Cloud Computing” is a recent buzzword in the digital world. Behind this fancy
poetic phrase there lies a true picture of future computing for both in technical and social perspective.
Though the “Virtualization and Cloud Computing are recent but the idea of centralizing computation and
storage in distributed data centres maintained by any third party companies is not new but it came in way
back in 1990s along with distributed computing approaches like grid computing, Clustering and Network
load Balancing. Cloud computing provide IT as a service to the users on-demand basis. This service has
greater flexibility, availability, reliability and scalability with utility computing model. This new concept of
computing has an immense potential in it to be used in the field of e-governance and in the overall IT
development perspective in developing countries like Bangladesh.
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
The “Virtualization and Cloud Computing” is a recent buzzword in the digital world. Behind this fancy
poetic phrase there lies a true picture of future computing for both in technical and social perspective.
Though the “Virtualization and Cloud Computing are recent but the idea of centralizing computation and
storage in distributed data centres maintained by any third party companies is not new but it came in way
back in 1990s along with distributed computing approaches like grid computing, Clustering and Network
load Balancing. Cloud computing provide IT as a service to the users on-demand basis. This service has
greater flexibility, availability, reliability and scalability with utility computing model. This new concept of
computing has an immense potential in it to be used in the field of e-governance and in the overall IT
development perspective in developing countries like Bangladesh.
Abstract:-
This paper is based on the study of grid computing and cloud computing technology. These two technologies are related with geographically defined network standards. The main aspect of this paper is deep learning of latest technology and trends in the field of networking.
Keywords:-Technology,Cloud Computing,Grid Computing
Cloud computing is very useful then also its own set of cons discourage cloud users to choose them as a best option. The multitenant architecture of cloud exposed to several threats such as improper trust management at service provider site, Storage security, Shared technology vulnerabilities, data lost/leakage during transit, unauthorized access of data. This paper studied review work on cloud steganography.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Land Cover maps supply information about the physical material at the surface of the Earth (i.e. grass, trees, bare ground, asphalt, water, etc.). Usually they are 2D representations so to present variability of land covers about latitude and longitude or other type of earth coordinates. Possibility to link this variability to the terrain elevation is very useful because it permits to investigate probable correlations between the type of physical material at the surface and the relief. This paper is aimed to describe the approach to be followed to obtain 3D visualizations of land cover maps in GIS (Geographic Information System) environment. Particularly Corine Land Cover vector files concerning Campania Region (Italy) are considered: transformed raster files are overlapped to DEM (Digital Elevation Model) with adequate resolution and 3D visualizations of them are obtained using GIS tool. The resulting models are discussed in terms of their possible use to support scientific studies on Campania Land Cover.
Comparison between Cisco ACI and VMWARE NSXIOSRjournaljce
Software-Defined Networking(SDN) allows you to have a logical image of the components in the data center, also you could arrange the components logically and use them according to the software application needs. This paper gives an overview about the architectural features of Cisco’s Application Centric Infrastructure (ACI) and Vmware’s NSX and also compares both the architectures and their benefit
Student’s Skills Evaluation Techniques using Data Mining.IOSRjournaljce
Technological Advancement is the mainstay of the Indian economy. Software Development is a primary factor which offers many sources of employment across the state. The major role of Software Company is to provide qualitized product by Managerial Decisions. To improve the Software Quality and Maintenance, Organization concentrates the Programmer’s ability and restricts the Placement with various kinds of audiences such as Written test, Personal Interview, Technical Round, Group Discussion etc. Accordingly, Programmer’s has to be formed. So Higher Educational institutes have to amend the student’s Performance as their expectations. The student’s Programming Skill is analyzed with the help of Decision making and Knowledge Discovery in Data Mining Techniques. In this example, the actual data are collected from Private College, which holds data about academic performance for pupils. This report suggests a method to judge their accomplishments through the utilization of data mining methods and specifies the means to identify their skills and assist them to improve their Knowledge by predicting Training Programs.
Data mining is a process to extract information from a huge amount of data and transform it into an
understandable structure. Data mining provides the number of tasks to extract data from large databases such
as Classification, Clustering, Regression, Association rule mining. This paper provides the concept of
Classification. Classification is an important data mining technique based on machine learning which is used to
classify the each item on the bases of features of the item with respect to the predefined set of classes or groups.
This paper summarises various techniques that are implemented for the classification such as k-NN, Decision
Tree, Naïve Bayes, SVM, ANN and RF. The techniques are analyzed and compared on the basis of their
advantages and disadvantages
: Cloud processing is turning into an inexorably mainstream endeavor demonstrate in which figuring assets are made accessible on-request to the client as required. The one of a kind incentivized offer of distributed computing makes new chances to adjust IT and business objectives. Distributed computing utilizes the web advancements for conveyance of IT-Enabled abilities 'as an administration' to any required clients i.e. through distributed computing we can get to anything that we need from anyplace to any PC without agonizing over anything like about their stockpiling, cost, administration etc. In this paper, I give a far-reaching study on the inspiration variables of receiving distributed computing, audit the few cloud sending and administration models. It additionally investigates certain advantages of distributed computing over customary IT benefit environment-including versatility, adaptability, decreased capital and higher asset usage are considered as appropriation explanations behind distributed computing environment. I additionally incorporate security, protection, and web reliance and accessibility as shirking issues. The later incorporates vertical versatility as specialized test in cloud environment.
An Experimental Study of Diabetes Disease Prediction System Using Classificat...IOSRjournaljce
Data mining means to the process of collecting, searching through, and analyzing a large amount of data in a database. Classification in one of the well-known data mining techniques for analyzing the performance of Naive Bayes, Random Forest, and Naïve Bayes tree (NB-Tree) classifier during the classification to improve precision, recall, f-measure, and accuracy. These three algorithms, of Naive Bayes, Random Forest, and NB-Tree are useful and efficient, has been tested in the medical dataset for diabetes disease and solving classification problem in data mining. In this paper, we compare the three different algorithms, and results indicate the Naive Bayes algorithms are able to achieve high accuracy rate along with minimum error rate when compared to other algorithms.
Candidate Ranking and Evaluation System based on Digital FootprintsIOSRjournaljce
Digital resume provides insights about a candidate to the organization. This paper proposes a system where digital resumes of candidates are generated by extracting data from social networking sites like Facebook, Twitter and LinkedIn. Data which is relevant to recruitment is obtained from unstructured data using Data Mining algorithms. Candidates are evaluated based on their digital resumes and ranked accordingly. Ranking is done based on the requirements specified by an organization for a key position. The key aspects of this paper are a) Specification and design of system. b) Generation of digital Resume. c) Ranking of candidates. According to the ranking provided by this system, Recruiters can shortlist candidates for interviews. Thus, it revolutionizes the traditional recruitment process.
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...IOSRjournaljce
Cervical cancer is the highest rate of incidence after breast cancer, gastric cancer, colorectal cancer, thyroid cancer among all malignant that occurs to females ; also it is the most prevalent cancer among female genital cancers. Manual cervical cancer diagnosis methods are costly and sometimes result inaccurate diagnosis caused by human error but machine assisted classification system can reduce financial costs and increase screening accuracy. In this research article, we have developed multi class cervical classification system by using Pap Smear Images according to the WHO descriptive Classification of Cervical Histology. Then, this system classifies the cell of the Pap Smear image into anyone of five types of the classes of normal cell, mild dysplasia, moderate dysplasia, severe dysplasia and carcinoma in situ (CIS) by using individual and Combining individual feature extraction method with the classification technique. In this paper three Feature Extraction methods were used: From that three, two were individual feature extraction method namely Enriched Rough Set Texton Co-Occurrence Matrix (ERSTCM) and Enriched Micro Structure Descriptor (EMSD) and the remained one was combining individual feature extraction method namely concatenated feature extraction method (CFE). The CFE method represents all the individual feature extraction methods of ERSTCM & EMSD features are combining together to one feature to assess their joint performance. Then these three feature extraction methods are tested over Fuzzy Logic based Hybrid Kernel Support Vector Machine (FL-HKSVM) Classifier. This Examination was conducted over a set of single cervical cell based pap smear images. The dataset contains five classes of images, with a total of 952 images. The distribution of number of images per class is not uniform. Then the performance was evaluated in both the individual and combining individual feature extraction method with the classification techniques by using the statistical parameters of sensitivity, specificity & accuracy. Hence the resultant values of the statistical parameters described in individual feature extraction method with the classification technique, proposed EMSD+FLHKSVM Classifier had given the better results than the other ERSTCM+FLHKSVM Classifier and combining individual feature extraction method with the classification technique described, proposed CFE+FLHKSVM Classifier had given the better results than other EMSD+FLHKSVM & ERSTCM+FLHKSVM classifiers.
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...IOSRjournaljce
As we probably aware now a days networks are broadly dispersed so administrators relies on upon different devices, for example, pings and follow course to troubleshoot the issue in network. So we proposed a robotized and orderly approach for testing and troubleshooting network called "Automatic Test Packet Generation"(ATPG). ATPG first peruses switch arrangement and produces a gadget free model. The model is utilized to produce least number of test packets to cover each connection in a network and every control in network. ATPG is equipped for researching both useful and execution issues. Test packets are sent at customary interims and separate strategy is utilized to confine flaws. The working of few disconnected devices which automatically create test packets are additionally given, yet ATPG goes past the prior work in static (checking liveness and fault localization).
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemIOSRjournaljce
Big data problem in intrusion detection system is mainly due to the large volume of the data. The dimension of the original data is 41. Some of the feature of original data are unnecessary. In this process, the volume of data has expanded into hundreds and thousands of gigabytes(GB) of information. The dimension span of data and volume can be reduced and the system is enhanced by using K-NN and BA. The reduction ratio of KDD datasets and processing speed is very slow so the data has been reduced for extracting features by Bees Algorithm (AB) and use K-nearest neighbors as classification (KNN). So, the KDD99 datasets applied in the experiments with significant features. The results have gave higher detection and accuracy rate as well as reduced false positive rate. Keywords: Big Data; Intru
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
The purpose of the study is to explore and find a research gap in E-Governance Information Security (InfoSec) domain in Indian Context. The study identifies the research gap in E-Governance InfoSec domain and substantiates given research gap with relevant literature review. The study outcomes clearly depict the requirement of research in the field of InfoSec in e-governance domain in a country like India.
The purpose of the study is to explore web security status of the E-Governance websites and web applications. The central theme of the paper is to study and analyze the security vulnerabilities in the technologies utilized for E-Governance website and web application development. The study was conducted in the State of Gujarat,India. The data related to web development technologies, vulnerabilities affecting those technologies, vulnerability severity, and vulnerability type were gathered from 26 E-Governance website/Web application for detail analysis. The outcome of the study depicts the relationship between technology vis-a-vis vulnerability type and vulnerability severity.
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsIOSRjournaljce
: In spatial tasks, the use of cognitive aids reduce mental load and therefore being appealing to trainers and trainees. However, these aids can act as shortcuts and prevents the trainees from active exploration which is necessary to perform the task independently in non-supervised environment. In this paper we used adaptive repetition as control strategy to explore the 3D- Virtual Learning environments. The proposed approach enables the trainee to get the benefits of cognitive support while at the same time he is actively involved in the learning process. Experimental results show the effectiveness of the proposed approach
Human Face Detection Systemin ANew AlgorithmIOSRjournaljce
Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts. In addition, Gray level has been used to detect the area which contains a skin, after that anotherlevel used to erase the area that does not contain skin. The system which proposed applied on many photos and passed with great accuracy of detecting faces and it has a good efficient especially to separate the area that does not contain skin or face from the area which contain face and skin. It has been agreed and approved that the accuracy of the proposed system is 98% in human face detection.
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...IOSRjournaljce
The paper presents an innovative approach to mathematical modeling of complex systems „humandynamical process”. The approach is based on the theory of measurement and utility theory and permits inclusion of human preferences in the objective function. The objective utility function is constructed by recurrent stochastic procedure which represents machine learning based on the human preferences. The approach is demonstrated by two case studies, portfolio allocation with Wiener process and portfolio allocation in the case of financial process with colored noise. The presented formulations could serve as foundation of development of decision support tools for design of management/control. This value-oriented modeling leads to the development of preferences-based decision support in machine learning environment and control/management value based design.
Assessment of the Approaches Used in Indigenous Software Products Development...IOSRjournaljce
Acceptability of indigenous software is always low in most of the African countries especially in Nigeria. This paper then study and presents the results on the assessment of the approaches used in indigenous software development products. The study involved ICT firms that specialized in software development and educational institutions who were part of major stakeholders as well as users of software packages. The primary tool for data collection was questionnaire, which was used to elicit information from software developers on the various approaches adopted in their operations. This was also complemented with information from secondary sources. The identified approaches were measured on a five-point Likert scale rating of 5 to 1 to determine their relative strength index (RSI) in the factors. The result revealed the various approaches adopted for software development had significant difference of chi (45)1699.06 at p≤ 0.001 with spiral (6.02), agile (5.86), prototyping (5.67), object oriented (5.48), rotational unified process (5.32), computer and incremental case (4.50), waterfall (3.66) and integrated (1.98) were the commonly adopted approaches used for software development. Similarly, the approaches adopted by software development firms were correlated and returned a significant difference of (Z = 1699.06, p≤ 0.001). The result implies that these approaches had a great impact on the domestic use of software products and perhaps is the most important driver of software industry growth for emerging technologies.
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
The Data sharing is an important functionality in cloud storage. We describe new public key crypto systems which produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts are possible. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. Ensuring the security of cloud computing is second major factor and dealing with because of service availability failure the single cloud providers demonstrated less famous failure and possibility malicious insiders in the single cloud. A movement towards Multi-Clouds, In other words ”Inter-Clouds” or ”Cloud-Of-Clouds” as emerged recently. This works aim to reduce security risk and better flexibility and efficiency to the user. Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability.
Panorama Technique for 3D Animation movie, Design and EvaluatingIOSRjournaljce
This paper presents an applied approach for Panorama 3D movies enhanced with visual sound effects. The case study that considered is IIPS@UOIT. Many selected S/W have been used to introduce the 3D Movie. 3D Animation is a modern technology in the field of the world of filmmaking and is considered the core of multimedia, where the vast majority of movies such as Hollywood movies that we see today, it was using 3D technology. Where this technique is used in all the magazines, such as medical experiments, engineering, astronomy, planets and stars, to prove scientific theories, history, geography, etc., where they are building models or scenes or characters simulates reality and the movement of the viewer to the heart of the event. A three-dimensional film was made to (IIPS @ UOITC) to give it a future vision and published in the global sites such as YouTube, Facebook and Google earth. By using many specialized 3d software and cinematic tricks, with a focusing on movement, characters, lighting, cameras and final render.
Density Driven Image Coding for Tumor Detection in mri ImageIOSRjournaljce
The significant of multi spectral band resolution is explored towards selection of feature coefficients based on its energy density. Toward the feature representiaon in transformed domain, multi wavelet transformations were used for finer spectral representation. However, due to a large feature count these features are not optimal under low resource computing system. In the recognition units, running with low resources a new coding approach of feature selection, considering the band spectral density is developed. The effective selection of feature element, based on its spectral density achieve two objective of pattern recognition, the feature coefficient representiaon is minimized, hence leading to lower resource requirement, and dominant feature representation, resulting in higher retrieval performance.
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...IOSRjournaljce
The acoustic emission (AE) technique is a non-destructive testing technique applied to pressurized rigid pipelines in order to identify metallurgical discontinuities. This study analyses the dynamic behavior of the propagation of discontinuities in cracks via AE, in the following propagation classes: no propagation (NP), stable propagation (SP), and unstable propagation (UP). The methodology involves applying the concept of modulation of analogue signals, which are used in signal transmission in telecommunications, for the development of a neural network in order to determine new parameters for the AE waveform. The classification of AE signals into propagation classes occurs, therefore, through the extraction of information related to the dynamics of AE signals, by means of the parameters of the analogue carriers of the modulations (in amplitude and in angle) that make up the AE signal. This set of parameters enables an efficient classification (average of 90%) through the identification of patterns from the AE signals in the classes for monitoring the state of the discontinuity, through the use of computational intelligence techniques (artificial neural networks and nonlinear classification).
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. IV (Jan.-Feb. 2017), PP 55-60
www.iosrjournals.org
DOI: 10.9790/0661-1901045560 www.iosrjournals.org 55 | Page
Analyzing the Difference of Cluster, Grid, Utility & Cloud
Computing
Manju Sharma1
, Sadia Husain2
(Department of Computer Science & Information Systems, Jazan University, Jazan, KSA)
Abstract: Virtualization and cloud computing is creating a fundamental change in computer architecture,
software and tools development, in the way we store, distribute and consume information. In the recent era of
autonomic computing it comes the importance and need of basic concepts of having and sharing various
hardware and software and other resources & applications that can manage themself with high level of human
guidance. Virtualization or Autonomic computing is not a new to the world, but it developed rapidly with Cloud
computing. In this paper there give an overview of various types of computing. There will be discussion on
Cluster, Grid computing, Utility & Cloud Computing. Analysis architecture, differences between them,
characteristics , its working, advantages and disadvantages.
Keywords: Cluster computing, Grid computing, Utility computing, Cloud computing, Virtual machine monitor
(VMM).
I. Introduction
Grid computing is the collection of computer resources from multiple locations to achieve common
goal. The grid can be thought of as a distributed system with non-interactive workloads that involve a large
number of files. Grid computing is distinguished from conventional high performance computing systems such
as cluster computing in that grid computers have each node set to perform a different task/application. Grid
computers also tend to be more heterogeneous and geographically dispersed (thus not physically coupled) than
cluster computer [Wiki].
Cloud computing [1,4,5] is a computing style in which flexible and scalable IT functionalities are
delivered as a service to end users using Internet. Grid computing [7] has proven to be an important field
focusing on the sharing of resources and provides solution to performance as well as capacity problems for
several applications.Cluster Computing [6] mainly addresses the latest results in different fields that support
High Performance Distributed Computing (HPDC). Using virtualization software (VMware), it became possible
to execute one or many operating systems simultaneously in an isolated environment. In section I we will
discuss Cloud Computing followed by II CLOUD COMPUTING CHARACTERISTICS, III Cloud Computing
Concepts and Benefits, IV Cloud computing building blocks, V. Virtual machine monitor (VMM), VI Cluster
Computing, VII Cluster computing characteristics, VII Grid Computing, IX difference in Architecture of Cloud
and Grid computing and X Utility Computing.
II. Cloud Computing
“Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal management effort or service provider interaction.”
US National Institute of Standards and Technology, Information Technology Laboratory
Cloud computing is a comprehensive solution that delivers IT as a service. It is an Internet-based
computing solution where shared resources are provided like electricity distributed on the electrical grid.
Computers in the cloud are configured to work together as a unit and the various applications use the collective
computing power as if they are running on a single system. The flexibility of cloud computing is a function of
the allocation of resources on demand. This facilitates the use of the system's cumulative resources, negating the
need to assign specific hardware to a task. Before cloud computing, websites and server-based applications were
executed on a specific system. With the invention of cloud computing, resources are used as an aggregated to
virtual computer. This provides an environment where applications execute independently without regard for
any particular configuration.
2. Analysing the Difference of Cluster, Grid, Utility & Cloud Computing
DOI: 10.9790/0661-1901045560 www.iosrjournals.org 56 | Page
III. Cloud Computing Characteristics
The essential characteristics of cloud computing can be elaborated as follows [4]:
1. On-demand self-service
2. Broad network access
3. Resource pooling
4. Rapid elasticity
5. Measured service
IV. Cloud Computing Concepts & Benefits
A. Below is a list of cloud computing environment attributes, describe how those attributes are realized to
provide business advantages, so that the business advantages of cloud computing have been defined. With
emphasis on performing the following tasks:
a. Virtualization: IT resources can be shared between many computing resources (physical servers or
application servers). Provide more efficient utilization of IT resources and reduce hardware cost through
resource consolidations and economies of scale. Lowering total cost of ownership and improving asset
utilization.
b. Provisioning: IT resources are rapidly provisioned (or de-provisioned) based on consumer demands.Reduce
IT cycle time and management cost.
c. Elastic scaling: IT environments scale up and down by any magnitudes as needed to satisfy customer
demands. Optimize IT resource utilization and increase flexibility.
d. Service Automation Management: IT environments that provide the capability to request, deliver, and
manage IT services automatically. Reduce IT operational costs by automating the processes used to deliver and
manage a cloud computing environment.
e. Pervasiveness: Services are delivered through the use of the Internet and on any platform. Improve
customers' experience by enabling services to be accessed from anywhere, at any time , and on any device.
f. Flexible pricing: Services are tracked with usage metrics to enable multiple payment models. Improve cost
transparency and offer more flexible pricing schemes.
V. Cloud Computing Building Blocks
The cloud computing model is comprised of a front end and a back end. These two elements are
connected with the help of a network or the Internet. The front end allow the user to interacts with the system;
the back end is the cloud itself. The front end is composed of a client computer, or the computer network of an
enterprise, and the applications used to access the cloud. The back end provides the applications, various
devices, computers, servers, and data storage that creates the cloud of services.
Fig. 1.1The cloud reference architecture.[20]
3. Analysing the Difference of Cluster, Grid, Utility & Cloud Computing
DOI: 10.9790/0661-1901045560 www.iosrjournals.org 57 | Page
VI. Virtual machine monitor (VMM)
The virtual machine monitor (VMM) provides the means for simultaneous use of cloud facilities (see
figure 1.2). VMM is a program on a host system that allows one computer to support multiple, identical
execution environments. From the user's point of view, the system is a self-contained computer which is isolated
from other users. In reality, every user is being served by the same machine. A virtual machine is one operating
system (OS) that is being managed by an underlying control program allowing it to appear to be multiple
operating systems. In cloud computing, VMM allows users to monitor and thus manage aspects of the process
such as data access, data storage, encryption, addressing, topology, and workload movement.[13]
Figure 1.2 How the Virtual Machine Monitor works [13]
VII. Cluster Computing
Cluster computing it’s a group of computers connected to each other and work together as a single
computer. These computers are often linked through a LAN.[8] The clusters came to existence for the high need
for them, because the computing requirements are increasing in a high rate and there’s more data to process, so
the cluster has been used widely to improve performance. [9] The cluster is a tightly coupled system, and from
its characteristics that it’s a centralized job management and scheduling system. All the computers in the cluster
use the same hardware and operating system, and the computers are the same physical location and connected
with a very high speed connection to perform as a single computer. The resources of the cluster are managed by
centralized resource manager. The cluster is single owned, to only one organization. Its interconnection network
is a high-end with low latency and high bandwidth, the security in the cluster is a login/password-based, and it
has a medium level of privacy depends on users privileges. It has a stable and guaranteed capacity. The self
healing in the cluster is Limited, it’s often restarts the failed tasks and applications its service negotiations are
limited, and the user management is centralized.[8, 11] The cluster computing is usually used in educational
resources, commercial sectors for industrial promotion & Medical research.[2,8]
VIII. Cluster Computing Characteristics
The essential characteristics of cluster computing can be elaborated as follows [12]:
1. Tightly coupled systems
2. Single system image
3. Centralized Job management & scheduling system
Advantages Disadvantages
Reducing cost Programmability Issues
Manageability Problem in Finding Fault
Single System Image Difficult to handle by a Layman
High Availability Difficult for developing software for
distributed system
Improves network
technology
Easily accessed and applied to secret data
Table1-3: Advantages and Disadvantages of Cluster Computing [1,12]
IX. Grid Computing
Grid computing is a combination of resources from multiple administrative domains to reach a
common target, and this group of computers can distributed on several location and each a group of grids can be
connected to each other. [2,14] The need of access to additional resources and the collaborating between
organizations leads to the need for grid computing. [6] Grid environments are extremely well suited to run jobs
4. Analysing the Difference of Cluster, Grid, Utility & Cloud Computing
DOI: 10.9790/0661-1901045560 www.iosrjournals.org 58 | Page
that can be split into smaller chunks and run concurrently on many nodes. The grid is a loosely coupled systems
and from its characteristics that it’s a distributed Job Management and scheduling, the computers in the grid are
not required to be in the same physical location and can be operated independently, so each computer on the
grid is concerned a distinct computer, the computers in the grid are not tied to only on operating system and can
run different OSs and different hardware, when it comes to a large project, the grid divides it to multiple
computers to easily use their resources. The grid is multiple owned, it could be owned by several companies.
Interconnection network is mostly internet with high latency and low bandwidth. The security in the grid is
public and private based on authentication and mapping user to an account. And it has limited support privacy,
its capacity is not stable, it varies, but it’s high. The self healing in the cluster is Limited, it’s often restarts the
failed tasks and applications. its service negotiations are based on service level agreements, and the user
management is decentralized.[2,14,15] The grid computing is usually used in predictive modeling and
simulations, engineering design and automation, energy resources exploration, medical, military, basic Research
and visualization. [14]
X. Difference in Architecture Of Cloud And Grid Computing
When viewed in a broader sense both cloud and grid computing look like one and the same thing but if we study
minutely then we can see the difference between them very clearly as explained below:
Figure 2: Grid computing and Cloud computing Architecture [21,22]
Business Models: While in grid business models are usually based on bilateral agreements between academic
institutions, provision of resource in clouds requires more differentiated business models. Currently, we observe
several types of business models ranging from resource providers who only provide computing resources (e. g.,
Amazon), over SaaS providers who sell their own resources together with their own software services (e. g.,
GoogleApps, Salesforce.com) to companies that attempt to run a mixed approach, i. e., they allow users to
create their own services but at the same time offer their own services (Sun N1 Grid, Microsoft Azure) [24].
Resource Management: Resource management represents another major difference between grids and clouds.
While grids rely on batch systems, utilization of virtualization technologies represents the resource management
solution for the clouds.
Resource Provision Models: Grid resource provisioning models are based on virtual organizations where the
relationships are established offline. In clouds usage of SLAs, compliance, and trust management is essential.
Resource Availability: In grids resource sharing relies on the best effort manner, sometimes resources are not
available and sometimes there are plenty of resources which are idle. Clouds rely on massive elasticity in
clouds. Challenging issues in clouds are to find the balance between wasting resources due to the virtualization
overhead and standby modes of devices on the one hand, and pooling of resources to facilitate efficient
consumption of resources and reducing energy consumption on the other. Let us differentiate two technologies
on basis of features side by side. The difference between cloud and grid computing is given below in tabular
form [22] [23]
XI. Utility Computing
Utility Computing refers to a type of computing technologies and business models which provide
services and computing resources to the customers, such as storage, applications and computing power.[17] This
5. Analysing the Difference of Cluster, Grid, Utility & Cloud Computing
DOI: 10.9790/0661-1901045560 www.iosrjournals.org 59 | Page
model has the advantage of a low cost with no initial price to reach the computer resources. This repackaging of
computing services is the foundation of the shift to on demand computing, software as a service and cloud
computing models which late developed the idea of computing, applications and network as a service. [17]
Utility computing is kind of virtualization, that means the whole web storage space and computing power which
it’s available to users is much larger than the single time-sharing computer. Multiple backend web servers used
to make this kind of web service possible. [18] Utility computing is similar to cloud computing and it often
requires a cloud-like infrastructure. [18]
11.1 Architecture of utility computing: It depends on the devices of the users and the providing company for
the utility service.And similar to the architecture of the cloud.
11.2 Advantages of utility computing: Here are some benefits of utility computing such as that the client
doesn't have to buy all the hardware, software and licenses needed to do business. Instead, the client relies on
another party to provide these services. It also gives companies the option to subscribe to a single service and
use the same suite of software throughout the entire client organization. And it offers compatibility of all the
computers in large companies. [18]
11.3 Disadvantages of utility computing: There’s some issues are considered as disadvantages such as
reliability which means the service could be stopped from the utility computing company for any reason such as
a financial trouble or equipment problems. Also utility computing systems can also be attractive targets for
hackers, and much of the responsibility of keeping the system safe falls to the provider [18]
XII. Conclusion
In this paper, we have presented a detailed comparis on the different computing models like cluster
computing, grid, utility computing and cloud computing. We believe a comparison such as this can help to
understand, share and evolve infrastructure and technology within, across, and accelerate Cloud Computing
from early prototypes to production systems. When it comes to grid and cloud computing, the two are often seen
as the same computing paradigm under different names. In this paper, we sought to separate grids from clouds
and provide a side by side comparison in how they are works, advantages disadvantages and what services are
offered. In a word, the concept of cloud computing is becoming more and more popular now a days. Now cloud
computing is in the beginning stage. All kinds of companies are providing all kinds of cloud computing service,
from software application to net storage. We believe cloud computing will become main technology in our
information life. Cloud has owned all the conditions. Now the dream of grid computing will be realized by
cloud computing. It will be a great event in the IT history. Grid and cloud computing appears to be a promising
model focusing on standardizing APIs, security, interoperability, new business models, and dynamic pricing
systems for complex services. Hence there is a scope for further research in these areas.
References
[1]. Comparison between Cloud Computing, Grid Computing, Cluster Computing and Virtualization Rakesh Kumar Department of
Information Technology JECRC, Jaipur,
[2]. Comparative study between Cluster, Grid, Utility, Cloud and Autonomic computing 1Samah Mawia Ibrahim Omer, 2Amin Babiker
A.Mustafa, 3Fatema Abdallah Elmahdi Alghali
[3]. Seyyed Mohsen Hashemi, Amid Khatibi Bardsiri (MAY 2012) “Cloud Computing Vs. Grid Computing”, ARPN Journal of Systems
and Software, VOL. 2, NO.5.
[4]. Siddharth Jain, Rakesh Kumar, Sourabh Kumawat, Sunil Kumar Jangir (Novenber, 2014) “An analysis of security and privacy
issues, Challenges with possible solution in cloud computing”, National Conference on Computational and Mathematical Sciences
(COMPUTATIA-IV), Technically Sponsored By: ISITA and RAOPS, Jaipur.
[5]. Rakesh Kumar, Neha Gupta, Shilpi Charu, Somya Bansal, Kusum Yadav (August, 2014) “Comparison of SQL with HiveQL”,
International Journal for Research in Technological Studies, Vol. 1, Issue 9, ISSN (online): 2348-1439, pg. 28-30.
[6]. Rakesh Kumar, Kanishk Jain, Hitesh Maharwal, Neha Jain, Anjali Dadhich (July, 2014) “Apache CloudStack: Open Source
Infrastructure as a Service Cloud Computing Platform”, IJAETMAS, Vol.1, Issue.2, pg. 111-116, ISSN: 2349-3224.
[7]. http://edutechwiki.unige.ch/en/Grid_computing
[8]. Indu Gandotra, Pawanesh Abrol, Pooja Gupta, Rohit Uppal and Sandeep Singh - Cloud Computing Over Cluster, Grid Computing:
a Comparative Analysis - Journal of Grid and Distributed Computing - Volume 1, Issue 1, 2011
[9]. Cluster, Grid, Cloud –Concepts Kalaiselvan.K – GGOA - C-DAC Bangalore - 17/03/2011
[10]. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing
[11]. http://utilitygridcomputing.blogspot.com/2008/10/advantages-disadvantages-of-uc.html
[12]. Siddharth Jain, Rakesh Kumar, Sourabh Kumawat, Sunil Kumar Jangir (Novenber, 2014) “An analysis of security and privacy
issues, Challenges with possible solution in cloud computing”, National Conference on Computational and Mathematical Sciences
(COMPUTATIA-IV), Technically Sponsored By: ISITA and RAOPS, Jaipur.
[13]. Cloud computing fundamentals A different way to deliver computer resources Skill Level: Introductory Grace Walker IT
Consultant Walker Automated Services.
[14]. Indu Gandotra, Pawanesh Abrol, Pooja Gupta, Rohit Uppal and Sandeep Singh - Cloud Computing Over Cluster, Grid Computing:
a Comparative Analysis - Journal of Grid and Distributed Computing - Volume 1, Issue 1, 2011
[15]. http://it.toolbox.com/blogs/technews/grid-computing-advantages-and-disadvantages-23668
[16]. http://utilitygridcomputing.blogspot.com/2008/10/advantages-disadvantages-of-uc.html
[17]. http://en.wikipedia.org/wiki/Utility_computing.
6. Analysing the Difference of Cluster, Grid, Utility & Cloud Computing
DOI: 10.9790/0661-1901045560 www.iosrjournals.org 60 | Page
[18]. http://utilitygridcomputing.blogspot.com/2008/10/advantages-disadvantages-of-uc.html
[19]. http://gigaom.com/2008/02/28/how-cloud-utility-computing-are-different/.http://en.wikipedia.org/wiki/Utility_computing.
[20]. Cloud Computing – Research Issues, Challenges, Architecture, Platforms and Applications: A Survey Santosh Kumar and R. H.
Goudar.
[21]. Comparison of Cloud and Grid Computing Sukhdev Singh Ghuman SBDSM Khalsa College, Domeli, Kapurthala, Punjab, India.
[22]. Milan Kantial Vachhani, Kishore H.Atkotiya ,”similarities and contrast between Grid Computing and Cloud Computing.” Indian
Journal of applied research Vol.3,Issue.3 2013.
[23]. Seyyed Mohsen Hashemi, Amid Khatibi Bardsiri,” Cloud Vs. Grid computing” ARPN Journal of Systems and Software, VOL. 2,
NO.5, MAY 2012.
[24]. Ivona Brandic, Schahram Dustdar, Vienna University of Technology Cloud v/s Grid Computing Technology comparison
Information Technology 53 (2011) Special Issue.