SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
356
IMPROVING ACCESS LATENCY OF WEB BROWSER BY USING
CONTENT ALIASING IN PROXY CACHE SERVER
Sachin Chavan1
, Nitin Chavan2
1
Department of Computer Engineering, MPSTME, NMIMS, Shirpur
2
Department of Information Technology, MPSTME, NMIMS, Shirpur
ABSTRACT
The web community is growing so quickly that the number of clients accessing web
servers is increasing nearly tremendously. This rapid increase of web clients affected several
aspects and characteristics of web such as reduced network bandwidth, increased latency, and
higher response time for users who require large scale web services. This paper considers
different types of proxy actions and proposes a novel design and methodology to address
these issues. Focused on studies in what way they influence the browser display time. It
discusses also acceptable loading times and the scope of cacheable objects. The methodology
works by analysing content in the proxy cache, identifying content aliasing, duplicate
suppression and by the creation of the respective soft links. The present solution makes
intelligent use of the proxy cache server to overcome these problems. In this study proxies
were designed to enable network administrators to control internet access from within
intranet. But when proxy cache is used, there develops the problem of Aliasing. Aliasing in
proxy server caches occurs when the same content is stored in the cache several times. The
present methodology improves performance in case of access latency and browser response
time at the same time it avoids storing the same content in cache multiple times those results
in wastage of storage space.
KEYWORDS: Access Latency, Cache, Web Proxy, Mirroring, and Duplicate Suppression,
Content aliasing.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 2, March – April (2013), pp. 356-365
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
357
1. INTRODUCTION
In the field of web server management, researchers have focused on aliasing in proxy
server caches for a long time. Web caching consists of storing frequently referred objects on a
caching server instead of the original server, so that web servers can make better use of
network bandwidth, reduce the workload on servers, and improve the response time for users.
Aliasing means giving multiple names to the same thing.
The proxy cache also stores all of the images and sub files for the visited pages, so if
the user jumps to a new page within the same site that uses, for example, the same images,
the proxy cache has them already stored and can load them into the user's browser quicker
than having to retrieve them from the Web site server's remote site. Aliasing in proxy server
caches occurs when the same content is stored in cache multiple times. On the World Wide
Web, aliasing commonly occurs when a client makes two requests, and both the requests
have the same payload. Currently, browsers perform cache lookups using Uniform Resource
Locators (URLs) as identifiers.
Websites that contain the same content are called mirrors. Mirrors are redundancy
mechanisms built into the web space to serve web pages faster, but they cost in terms of
cache space. As the amount of web traffic increases, the efficient utilization of network
bandwidth increasingly becomes more important. The Technique needs to analyse web traffic
to understand its characteristics. That will optimize the use of network bandwidth to reduce
network latency and to improve response time for users [8].
A proxy cache is a shared network device that can undertake Web transactions on
behalf of a client, and, like the browser, the proxy cache stores the content. Subsequent
requests for this content, by this or any other client of the cache will trigger the cache to
deliver the locally stored copy of the content, avoiding a repeat of the download from the
original content source [4].
Figure 1. Concept of Caching (Proxy Cache)
Bandwidth Saving and Traffic Reduction
Proxy Cache Server
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
358
1.1 Advantages of Caching
1. Web caching reduces the workload of the remote Web server
2. Client can obtain a cached copy at the proxy if the remote server is not available.
3. It provides us a chance to analyze an organization usage patterns.
1.2 Disadvantages of using a caching:
1. A client might be looking at stale data due to the lack of proper proxy updating.
2. The access latency may increase in the case of a cache miss due to the extra proxy
processing.
3. A single proxy cache is always a bottleneck.
4. A single proxy is a single point of failure.
2. RELATED WORK
2.1 The Access Latency
Latency is defined as the delay between a request for a Web page and receiving that
page in its entirety. The latency problem occurs when users judge the download as too long.
Unacceptable latency does not only adversely effects user satisfaction. Web pages that are
loaded faster are judged to be significantly more interesting than their slower counterparts
[12].
Studies on human cognition revealed that the response time shorter than 0.1 second is
unnoticeable and the delay of 1 second matches the pace of interactive dialog. Following
table shows the transfer rate of different connection types.
Table 1. Transfer Rates for different connection Type
Connection Type Slow Normal Maximum
Modem 33k6 <2.734 ≈3 ≈3.65
Modem 56k <4.199 ≈5 ≈6.08
ISDN 64k <5.469 ≈6 ≈6.94
Cable <9.766 ≈17 by provider
ADSL <12.21 ≈24 ≈732
Ethernet 10Base-T (10 Megabits/sec) <73 ≈195 ≈977
Table shows the different parameters that affects the access time of browser. The different
parameters are type of connection used by the user and the condition of connection. The
timing of internet use also affects on access latency due to bandwidth sharing.
2.2 Web Traffic
The amount of data sent and received by visitors to a website is web traffic. It is
analysis to see the popularity of web sites and individual pages or sections within a site. Web
traffic can be analyzed by viewing the traffic statistics found in the web server log file, an
automatically generated list of all the pages served.
Traffic analysis is conducted using access logs from web proxy server. Each entry in
access logs records the URL of document being requested, date and time of the request, the
name of the client host making the request, number of bytes returns to requesting client, and
information that describe how the clients request was treated as proxy [1].
Processing these log entries can produce useful summary statistics about workload volume,
document type and sizes, popularity of document and proxy cache performance [5].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
359
2.3 Static Caching
It is a new approach of web caching which uses yesterday’s log to predict the today’s
user request. The static caching algorithm defines a fixed set of URLs by analyzing the logs
of previous periods. It then calculates the value of the unique URL. Depending on the value,
URLs are arranged in the descending order, and the URL with the highest value is selected.
This set of URLs is known as the working set. When a user requests a document and the
document is present in the working set, the request is fulfilled from the cache. Otherwise, the
user request is fulfilled from the origin server [6].
2.4 Dynamic Caching
Dynamic caching is more complex than static caching and requires detailed
knowledge of the application. One must consider the candidates for dynamic caching
carefully since, by its very nature, dynamically generated content can be different based on
the state of the application. Therefore, it is important to consider under what conditions
dynamically generated content can be cached returning the correct response. This requires
knowledge of the application, its possible states, and other data, such as parameters that
ensure the dynamic data is generated in a deterministic manner [3].
2.5 MD5 Algorithm
MD5, developed by Ron Rives in 1992, is a comparison cryptographic hash algorithm
that succeeded the MD4 algorithm. MD5 takes an input of any length and generates an MD5
digest of fixed length (128 bits or 32 characters). Because MD5 uses the same algorithm
every time, a particular data string always generates the same MD5 hash every time.
MD5 cryptographic hash offers several advantages over its predecessors (such as MD4) and
its competitors (such as, SHA and SHA.1). One of these advantages is that MD5 is a one way
cryptographic hash. Another advantage is that MD5 can accept inputs of any length but still
generates a fixed length output. MD5 is fast, and it is highly unlikely that two different
strings can hash to the same digest. Moreover, with MD5 it is also highly unlikely that two
different input strings can hash to the same digest. Furthermore, MD5 is reliable in the sense
that the same input string always yields the same output digest every time [11].
3. EXPERIMENTAL SETUP
3.1 Changing of proxy server
In most of the organization’s or institution server does not support the proxy cache, so
it is difficult to use main server as cache server so we have to change the proxy server from
main server to other server [2].
Following are the steps to switch machine to other proxy:
1. Open the browser for ex. Internet Explorer
2. In internet explorer pull down the Tools menu and click Internet Options...
3. Click the Connections tab:
4. click the LAN Settings... button:
5. In the Address: box change "proxy1 Address" to "proxy2 Address" or vice versa and
click OK.
6. Click OK on the Internet Options dialogue box to get back to the browser screen and
you will now be able to get external sites.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
360
3.2 Duplication of Data
Duplication of data means storing the multiple copies of same data object. In case of
cache when we cache the object or the webpage that web page is stored at cache memory but
when the different users request the same page then the multiple copies of that object or web
page is stored at cache memory which results in the wastage of storage space as we all know
the maintenance of cache is an expensive task so such wastage is not affordable. To avoid the
problem of duplication of the data objects or web page duplicate suppression mechanism is to
be used [7]. If the duplicate copy of data is saved at proxy cache then it acquires more space
of storage in the analysis part given in work shows that the effect of duplication in the cache
space [4].
3.3 Duplicate Suppression
You can reduce storage space requirements by avoiding duplicating copies of the
same data. Content Engine provides the option to suppress storage of duplicate content
elements. Duplicate suppression applies to any kind of content. Incoming content is not
added to the storage area if identical content exists in the storage area; only unique content is
added [14].
Due to large network size there are many pages on web, most of those pages will not be
referenced multiple times by any one cache, means the probability with which the Kth
page
will be referenced is 1/K. re-referenced follow a distribution similar to Zipf’s law [9].
3.5 Experimental Results
The experimentation carried out at the lab of our institute. Some of popular websites
are considered for experiment. Those websites are use to analyse for access latency of
browser under different conditions. Keyword based search also used for Latency time based
on the type of content either image or text search.
Table 2. Response time of search engine for Text and Image Search.
Text Search Image Search
Keywords
From
Web Server
From
Cache Server
From
Web Server
From
Cache Server
SVKM 250 140 230 200
NMIMS 140 130 300 100
RCPIT 250 120 350 150
CANNON 240 130 250 100
SAMSUNG 210 140 640 200
NOKIA 250 190 240 120
MATLAB 240 160 280 160
OPERA 250 150 120 120
SIEMENS 230 160 310 100
MICROMAX 160 140 190 110
MPSC 170 140 180 100
UPSC 210 150 150 140
IRCTC 160 140 330 90
RRB 260 120 310 70
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
361
Table 2 show the reduction into response time of browser when page is fetched from
cache server instead of web server. First column shows the different keywords which is used
for analysis. Same keywords are used for the text search and image search. Table contains
response time of browser for text search as well as image search. From table we can say that
there is considerable amount of reduction of access latency when the page is fetch from
Proxy Cache.
Figure 2 shows the comparison of response time when the page is fetch from main
server and the response time when it is fetch from proxy cache. From Figure 2 we can say
that there is considerable amount of reduction of the response time. Figure shows the graph
plot for comparison of response time when the response comes from main source and when
the response comes from local cache server for Text Search for some keywords. Here first bar
shows the response time when the page is fetch from Web server where second bar shows the
response time when the page is fetch from local proxy cache server where we have
implemented content aliasing algorithm.
Figure.2 Response time of Search engine for Text Search
From Figure 2 it is clear that in text search for keyword we get 40 or more than 40
percent of reduction of response time. Where in case of some keywords like Samsung,
IRCTC, RRB, Siemens the response time is reduced by more than 70 percent. Wherein case
of opera, SVKM, and UPSC it is negligible or at most 10 percent. It is due to dynamic
content comes under the search.
Figure 3 shows the comparison of response time for image search for given keywords
when the page is fetch from main server and the response time when it is fetch from proxy
cache. From Figure 3 we can say that there is difference between the response times. Figure
shows the graph plot for comparison of response time when the response comes from main
source and when the response comes from local cache server for Image Search for some
keywords. Here first bar shows the response time when the page is fetch from Web server
where second bar shows the response time when the page is fetch from local proxy cache
server where we have implemented content aliasing algorithm.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
362
Figure 3. Response time of Search engine for Image Search
From Figure 3 it is clear that in Image search for keyword we get very less amount of
reduction in the response time because the images are more dynamic than the text.
Table 3. Connection Time and Response time of browser for some Websites.
From Web Server From Cache Server
WEBSITE Connection Response Connection Response
www.nmims.edu 7000 44000 3000 14000
www.rcpit.ac.in 6120 26140 3920 10310
www.mpsc.gov.in 5800 25700 3200 6390
www.upsc.gov.in 1890 4760 320 690
www.unipune.ac.in 2480 8600 1130 1580
www.wipro.com 2300 24750 900 3780
www.infosys.com 1710 18180 770 1980
www.techmahindra.com 990 18000 1260 7250
www.jaihindcollege.com 1210 13230 500 1170
www.jaihindcollege.ac.in 1800 15930 540 1040
www.msbte.com 1800 10170 810 1130
www.msbshse.ac.in 1530 4550 540 1040
www.cbse.nic.in 1130 5580 630 900
www.irctc.com 1710 12960 1670 3240
Table 3 shows the connection time and response time of browser for a various sites. It
gives the comparison of connection time and response time when page is fetched from cache
server instead of web server. First column shows the different websites which is used for
analysis. From table we can say that there is considerable amount of reduction of access
latency when the page is fetch from Proxy Cache instead of main server.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
363
Figure.4 Connection time for different Websites
Figure 4 shows the effect of content aliasing on the access time of web browser in
terms of connection time. In maximum cases we get more than 50 percent of reduction in
connection time. In some cases the reduction is 30-50 percent. In case of IRCTC website the
reduction in connection time is negligible. Where in case of ‘TECHMAHINDRA’ website
connection time increased. It is due to the dynamic content is more on website.
Figure. 5 Response time for Different Websites
Figure 5 shows the comparative graph of response time of browser for different
websites. When the web page is fetched from cache server then the response time is less.
From above graph we can say that the reduction in response time is more than 60 percent in
each case. In some cases the reduction into the response time is more than 90 percent. So by
using the content aliasing in proxy cache server we get significant amount of time save in
terms of response time as well as connection time.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
364
It is clear that amount of user time is saved by using the concept of content aliasing.
We have achieved reduction of access latency by also considering other parameters like
cache size, stale data.
4. CONCLUSION
The analysis based experimental results proves the need for methodology that
improve the web access performance to enhance bandwidth utilization and greater
connectivity speed. Here the suggested Design aspects improve the web performance in terms
of reduced latency, improved user response time, and optimal use of the existing bandwidth
by using web caching. Content aliasing successfully detected using a web based application,
database queries and files system calls. A considerable amount of duplicate storage can be
avoided through the suggested methodology. It is, therefore, a very useful mechanism for
web proxy caches. Moreover, the solution is successfully able to keep cached pages in
synchronization with the pages on the web server, checking for new pages if needed. This
work can be further optimize by the Daemon Process, which can be design and run
periodically to check the consistency of the data cached and the data at the web server. This
can be scheduled during the slack time with the less traffic which will not add any additional
toll on the bandwidth as well as it updates the TTL – Time to Live Period of the cached data.
REFERENCES
[1] Kartik Bommepally, Glisa T. K., Jeena J. Prakash, Sanasam Ranbir Singh and Hema A
Murthy “Internet Activity Analysis through Proxy Log” IEEE, 2010.
[2] E-Services Team, “Changing Proxy Server” by the Robert Gordon University, School
hill, Aberdeen, Scotland-2006.
[3] Chen, W.; Martin, P.; Hassanein, H.S., "Caching dynamic content on the Web,"
Canadian Conference on Electrical and Computer Engineering, 2003, vol.2, no., pp.
947- 950 vol.2, 4-7 May 2003.
[4] Sadhna Ahuja, Tao Wu and Sudhir Dixit “On the Effects of Content Compression on
Web Cache Performance,” Proceedings of the International Conference on Information
Technology: Computers and Communications, 2003.
[5] Mark S. Squillante, David D. Yaot and Li Zhang “Web Traffic Modeling and Web
Server Performance Analysis” Proceedings of the 38' Conference on Decision &
Control Phoenix, Arizona USA December 1999.
[6] C. E. Wills and M. Mikhailov, “Studying the Impact of More Complete Server
Information on Web Caching,” Computer Communications, vol. 24, no. 2, pp. 184.190,
May 2000.
[7] J Wang “A Survey of Web Caching Schemes for the Internet” - Cornell Network
Research Group (C/NRG), Department of Computer Science, Cornell University 1999.
[8] N. Shivakumar and H. Garcia-Molina, “Finding near Replicas of Documents on the
Web” Proc. Workshop on Web Databases, Mar. 1998.
[9] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web caching and Zipf like
Distributions: Evidence and Implications. In Proc. Infocom ’99. New York, NY, March,
1999.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
365
[10] Guerrero, C.; Juiz, C.; Puigjaner, R.; "Web Performance and Behavior Ontology,"
Complex, Intelligent and Software Intensive Systems, 2008. CISIS 2008. International
Conference on, vol., no., pp.219-225, 4-7 March 2008.
[11] Kimmo Jarvinen, Matti Tommiska and Jorma Skytta, “Hardware Implementation
Analysis of the MD5 Hash Algorithm,” IEEE Computer Society. 2005.
[12] Andrzej Sieminski, “The impact of Proxy caches on Browser Latency” International
Journal of Computer Science & Applications, 2005, Vol. II, No. II, pp. 5 – 21.
[13] S B Patil, Sachin Chavan, Preeti Patil; “High quality design to enhance and improve
performance of large scale web applications” International Journal of Computer
Engineering and Technology (IJCET), Volume 3, Issue 1, January- June (2012),
pp. 198-205, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[14] S.Vikram Phaneendra, “Minimizing Client-Server Traffic Based on AJAX”,
International journal of Computer Engineering & Technology (IJCET), Volume 3,
Issue 1, 2012, pp. 10 - 16, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[15] A. Suganthy, G.S.Sumithra, J.Hindusha, A.Gayathri and S.Girija, “Semantic Web
Services and its Challenges”, International journal of Computer Engineering &
Technology (IJCET), Volume 1, Issue 2, 2010, pp. 26 - 37, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.

More Related Content

What's hot

Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageIJSRD
 
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET Journal
 
UOW-Caching and new ways to improve response time (Paper)
UOW-Caching and new ways to improve response time (Paper)UOW-Caching and new ways to improve response time (Paper)
UOW-Caching and new ways to improve response time (Paper)Guson Kuntarto
 
Exchange CAS server | Proxy versus redirection | 4#23
Exchange CAS server | Proxy versus redirection | 4#23Exchange CAS server | Proxy versus redirection | 4#23
Exchange CAS server | Proxy versus redirection | 4#23Eyal Doron
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDJournal For Research
 
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...paperpublications3
 
Secure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved ReliabilitySecure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved Reliability1crore projects
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...Bharath Nair
 
Mendix rest services
Mendix rest servicesMendix rest services
Mendix rest servicesG Acellam
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
 
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICESA COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICESijcsit
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationPrem Rao
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageeSAT Publishing House
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED
 

What's hot (20)

Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
IRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud DataIRJET- Multiple Keyword Search over Encrypted Cloud Data
IRJET- Multiple Keyword Search over Encrypted Cloud Data
 
UOW-Caching and new ways to improve response time (Paper)
UOW-Caching and new ways to improve response time (Paper)UOW-Caching and new ways to improve response time (Paper)
UOW-Caching and new ways to improve response time (Paper)
 
Exchange CAS server | Proxy versus redirection | 4#23
Exchange CAS server | Proxy versus redirection | 4#23Exchange CAS server | Proxy versus redirection | 4#23
Exchange CAS server | Proxy versus redirection | 4#23
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUDPROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
PROVABLE DATA PROCESSING (PDP) A MODEL FOR CLIENT'S SECURED DATA ON CLOUD
 
20120140504021
2012014050402120120140504021
20120140504021
 
Farheen
Farheen Farheen
Farheen
 
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
Secure Deduplication with Efficient and Reliable Dekey Management with the Pr...
 
HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
HitBand: A Prefetching Model to Increase Hit Rate and Reduce Bandwidth Consum...
 
Secure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved ReliabilitySecure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved Reliability
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...PUBLIC AUDITING 	             FOR SECURE CLOUD STORAGE                       ...
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
 
Mendix rest services
Mendix rest servicesMendix rest services
Mendix rest services
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICESA COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
A COMPARISON OF CACHE REPLACEMENT ALGORITHMS FOR VIDEO SERVICES
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Hybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized DeduplicationHybrid Cloud Approach for Secure Authorized Deduplication
Hybrid Cloud Approach for Secure Authorized Deduplication
 
Secure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storageSecure file sharing of dynamic audit services in cloud storage
Secure file sharing of dynamic audit services in cloud storage
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJSRED-V2I2P10
IJSRED-V2I2P10IJSRED-V2I2P10
IJSRED-V2I2P10
 

Viewers also liked

Implementation and validation of multiplier less fpga based digital filter
Implementation and validation of multiplier less fpga based digital filterImplementation and validation of multiplier less fpga based digital filter
Implementation and validation of multiplier less fpga based digital filterIAEME Publication
 
Cfd analysis of flow charateristics in a gas turbine a viable approach
Cfd analysis of flow charateristics in a gas turbine  a viable approachCfd analysis of flow charateristics in a gas turbine  a viable approach
Cfd analysis of flow charateristics in a gas turbine a viable approachIAEME Publication
 
Knowledge and skill requirements in the installation of prefabricated members
Knowledge and skill requirements in the installation of prefabricated membersKnowledge and skill requirements in the installation of prefabricated members
Knowledge and skill requirements in the installation of prefabricated membersIAEME Publication
 
Investigation into the effects of delamination parameters of the layered compo
Investigation into the effects of delamination parameters of the layered compoInvestigation into the effects of delamination parameters of the layered compo
Investigation into the effects of delamination parameters of the layered compoIAEME Publication
 
Design & performance of six pulse voltage multipliers 2
Design & performance of six pulse voltage multipliers 2Design & performance of six pulse voltage multipliers 2
Design & performance of six pulse voltage multipliers 2IAEME Publication
 
Statistical evaluation of compression index equations
Statistical evaluation of compression index equationsStatistical evaluation of compression index equations
Statistical evaluation of compression index equationsIAEME Publication
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotationIAEME Publication
 
Classification of finger grasping by using pca based on best matching unit b...
Classification of finger grasping by using pca based on best matching unit  b...Classification of finger grasping by using pca based on best matching unit  b...
Classification of finger grasping by using pca based on best matching unit b...IAEME Publication
 
Effective energy conservation techniques in industries
Effective energy conservation techniques in industriesEffective energy conservation techniques in industries
Effective energy conservation techniques in industriesIAEME Publication
 
Investigation on process response and parameters in wire electrical
Investigation on process response and parameters in wire electricalInvestigation on process response and parameters in wire electrical
Investigation on process response and parameters in wire electricalIAEME Publication
 
Mergers and acquisitions the hr issues
Mergers and acquisitions the hr issuesMergers and acquisitions the hr issues
Mergers and acquisitions the hr issuesIAEME Publication
 
A high performance novel image compression technique using huffman coding
A high performance novel image compression technique using huffman codingA high performance novel image compression technique using huffman coding
A high performance novel image compression technique using huffman codingIAEME Publication
 
Principal component analysis for the classification of fingers movement data ...
Principal component analysis for the classification of fingers movement data ...Principal component analysis for the classification of fingers movement data ...
Principal component analysis for the classification of fingers movement data ...IAEME Publication
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmIAEME Publication
 
Experimental studies on antioxidant properties of calotropis gigantea
Experimental studies on antioxidant properties of calotropis giganteaExperimental studies on antioxidant properties of calotropis gigantea
Experimental studies on antioxidant properties of calotropis giganteaIAEME Publication
 
Optimal approach for text summarization
Optimal approach for text summarizationOptimal approach for text summarization
Optimal approach for text summarizationIAEME Publication
 
Triangular slot circular patch antenna for circular polarization reconfigura
Triangular slot circular patch antenna for circular polarization reconfiguraTriangular slot circular patch antenna for circular polarization reconfigura
Triangular slot circular patch antenna for circular polarization reconfiguraIAEME Publication
 

Viewers also liked (20)

Implementation and validation of multiplier less fpga based digital filter
Implementation and validation of multiplier less fpga based digital filterImplementation and validation of multiplier less fpga based digital filter
Implementation and validation of multiplier less fpga based digital filter
 
Bleeding in concrete
Bleeding in concreteBleeding in concrete
Bleeding in concrete
 
Cfd analysis of flow charateristics in a gas turbine a viable approach
Cfd analysis of flow charateristics in a gas turbine  a viable approachCfd analysis of flow charateristics in a gas turbine  a viable approach
Cfd analysis of flow charateristics in a gas turbine a viable approach
 
Knowledge and skill requirements in the installation of prefabricated members
Knowledge and skill requirements in the installation of prefabricated membersKnowledge and skill requirements in the installation of prefabricated members
Knowledge and skill requirements in the installation of prefabricated members
 
Investigation into the effects of delamination parameters of the layered compo
Investigation into the effects of delamination parameters of the layered compoInvestigation into the effects of delamination parameters of the layered compo
Investigation into the effects of delamination parameters of the layered compo
 
Design & performance of six pulse voltage multipliers 2
Design & performance of six pulse voltage multipliers 2Design & performance of six pulse voltage multipliers 2
Design & performance of six pulse voltage multipliers 2
 
Statistical evaluation of compression index equations
Statistical evaluation of compression index equationsStatistical evaluation of compression index equations
Statistical evaluation of compression index equations
 
Key frame extraction methodology for video annotation
Key frame extraction methodology for video annotationKey frame extraction methodology for video annotation
Key frame extraction methodology for video annotation
 
Classification of finger grasping by using pca based on best matching unit b...
Classification of finger grasping by using pca based on best matching unit  b...Classification of finger grasping by using pca based on best matching unit  b...
Classification of finger grasping by using pca based on best matching unit b...
 
Effective energy conservation techniques in industries
Effective energy conservation techniques in industriesEffective energy conservation techniques in industries
Effective energy conservation techniques in industries
 
Investigation on process response and parameters in wire electrical
Investigation on process response and parameters in wire electricalInvestigation on process response and parameters in wire electrical
Investigation on process response and parameters in wire electrical
 
Mergers and acquisitions the hr issues
Mergers and acquisitions the hr issuesMergers and acquisitions the hr issues
Mergers and acquisitions the hr issues
 
A high performance novel image compression technique using huffman coding
A high performance novel image compression technique using huffman codingA high performance novel image compression technique using huffman coding
A high performance novel image compression technique using huffman coding
 
Principal component analysis for the classification of fingers movement data ...
Principal component analysis for the classification of fingers movement data ...Principal component analysis for the classification of fingers movement data ...
Principal component analysis for the classification of fingers movement data ...
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
 
Experimental studies on antioxidant properties of calotropis gigantea
Experimental studies on antioxidant properties of calotropis giganteaExperimental studies on antioxidant properties of calotropis gigantea
Experimental studies on antioxidant properties of calotropis gigantea
 
Optimal approach for text summarization
Optimal approach for text summarizationOptimal approach for text summarization
Optimal approach for text summarization
 
Triangular slot circular patch antenna for circular polarization reconfigura
Triangular slot circular patch antenna for circular polarization reconfiguraTriangular slot circular patch antenna for circular polarization reconfigura
Triangular slot circular patch antenna for circular polarization reconfigura
 
Tauromaquia
TauromaquiaTauromaquia
Tauromaquia
 
Tarea 6
Tarea 6Tarea 6
Tarea 6
 

Similar to Improving Web Browser Access Latency Using Content Aliasing in Proxy Cache

Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsijfcstjournal
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsijfcstjournal
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...ASAITHAMBIRAJAA
 
Fast Synchronization In IVR Using REST API For HTML5 And AJAX
Fast Synchronization In IVR Using REST API For HTML5 And AJAXFast Synchronization In IVR Using REST API For HTML5 And AJAX
Fast Synchronization In IVR Using REST API For HTML5 And AJAXIJERA Editor
 
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...Hossam Al-Ansary
 
IRJET- HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
IRJET-  	  HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...IRJET-  	  HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
IRJET- HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...IRJET Journal
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
 
IRJET- A Review on Performance Enhancement of Web Services using Tagged-Sub O...
IRJET- A Review on Performance Enhancement of Web Services using Tagged-Sub O...IRJET- A Review on Performance Enhancement of Web Services using Tagged-Sub O...
IRJET- A Review on Performance Enhancement of Web Services using Tagged-Sub O...IRJET Journal
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Editor IJARCET
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Editor IJARCET
 
Cooperative Architectures and Algorithms for Discovery and ...
Cooperative Architectures and Algorithms for Discovery and ...Cooperative Architectures and Algorithms for Discovery and ...
Cooperative Architectures and Algorithms for Discovery and ...Videoguy
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsIAEME Publication
 

Similar to Improving Web Browser Access Latency Using Content Aliasing in Proxy Cache (20)

50120140505007
5012014050500750120140505007
50120140505007
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
 
Analysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systemsAnalysis of quality of service in cloud storage systems
Analysis of quality of service in cloud storage systems
 
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...Ieeepro techno solutions   2014 ieee dotnet project - query services in cost ...
Ieeepro techno solutions 2014 ieee dotnet project - query services in cost ...
 
Fast Synchronization In IVR Using REST API For HTML5 And AJAX
Fast Synchronization In IVR Using REST API For HTML5 And AJAXFast Synchronization In IVR Using REST API For HTML5 And AJAX
Fast Synchronization In IVR Using REST API For HTML5 And AJAX
 
El35782786
El35782786El35782786
El35782786
 
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
 
50120140504006
5012014050400650120140504006
50120140504006
 
IRJET- HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
IRJET-  	  HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...IRJET-  	  HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
IRJET- HHH- A Hyped-up Handling of Hadoop based SAMR-MST for DDOS Attacks...
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
 
IRJET- A Review on Performance Enhancement of Web Services using Tagged-Sub O...
IRJET- A Review on Performance Enhancement of Web Services using Tagged-Sub O...IRJET- A Review on Performance Enhancement of Web Services using Tagged-Sub O...
IRJET- A Review on Performance Enhancement of Web Services using Tagged-Sub O...
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060
 
Bi4201403406
Bi4201403406Bi4201403406
Bi4201403406
 
Cooperative Architectures and Algorithms for Discovery and ...
Cooperative Architectures and Algorithms for Discovery and ...Cooperative Architectures and Algorithms for Discovery and ...
Cooperative Architectures and Algorithms for Discovery and ...
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applications
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Improving Web Browser Access Latency Using Content Aliasing in Proxy Cache

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 356 IMPROVING ACCESS LATENCY OF WEB BROWSER BY USING CONTENT ALIASING IN PROXY CACHE SERVER Sachin Chavan1 , Nitin Chavan2 1 Department of Computer Engineering, MPSTME, NMIMS, Shirpur 2 Department of Information Technology, MPSTME, NMIMS, Shirpur ABSTRACT The web community is growing so quickly that the number of clients accessing web servers is increasing nearly tremendously. This rapid increase of web clients affected several aspects and characteristics of web such as reduced network bandwidth, increased latency, and higher response time for users who require large scale web services. This paper considers different types of proxy actions and proposes a novel design and methodology to address these issues. Focused on studies in what way they influence the browser display time. It discusses also acceptable loading times and the scope of cacheable objects. The methodology works by analysing content in the proxy cache, identifying content aliasing, duplicate suppression and by the creation of the respective soft links. The present solution makes intelligent use of the proxy cache server to overcome these problems. In this study proxies were designed to enable network administrators to control internet access from within intranet. But when proxy cache is used, there develops the problem of Aliasing. Aliasing in proxy server caches occurs when the same content is stored in the cache several times. The present methodology improves performance in case of access latency and browser response time at the same time it avoids storing the same content in cache multiple times those results in wastage of storage space. KEYWORDS: Access Latency, Cache, Web Proxy, Mirroring, and Duplicate Suppression, Content aliasing. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), pp. 356-365 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 357 1. INTRODUCTION In the field of web server management, researchers have focused on aliasing in proxy server caches for a long time. Web caching consists of storing frequently referred objects on a caching server instead of the original server, so that web servers can make better use of network bandwidth, reduce the workload on servers, and improve the response time for users. Aliasing means giving multiple names to the same thing. The proxy cache also stores all of the images and sub files for the visited pages, so if the user jumps to a new page within the same site that uses, for example, the same images, the proxy cache has them already stored and can load them into the user's browser quicker than having to retrieve them from the Web site server's remote site. Aliasing in proxy server caches occurs when the same content is stored in cache multiple times. On the World Wide Web, aliasing commonly occurs when a client makes two requests, and both the requests have the same payload. Currently, browsers perform cache lookups using Uniform Resource Locators (URLs) as identifiers. Websites that contain the same content are called mirrors. Mirrors are redundancy mechanisms built into the web space to serve web pages faster, but they cost in terms of cache space. As the amount of web traffic increases, the efficient utilization of network bandwidth increasingly becomes more important. The Technique needs to analyse web traffic to understand its characteristics. That will optimize the use of network bandwidth to reduce network latency and to improve response time for users [8]. A proxy cache is a shared network device that can undertake Web transactions on behalf of a client, and, like the browser, the proxy cache stores the content. Subsequent requests for this content, by this or any other client of the cache will trigger the cache to deliver the locally stored copy of the content, avoiding a repeat of the download from the original content source [4]. Figure 1. Concept of Caching (Proxy Cache) Bandwidth Saving and Traffic Reduction Proxy Cache Server
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 358 1.1 Advantages of Caching 1. Web caching reduces the workload of the remote Web server 2. Client can obtain a cached copy at the proxy if the remote server is not available. 3. It provides us a chance to analyze an organization usage patterns. 1.2 Disadvantages of using a caching: 1. A client might be looking at stale data due to the lack of proper proxy updating. 2. The access latency may increase in the case of a cache miss due to the extra proxy processing. 3. A single proxy cache is always a bottleneck. 4. A single proxy is a single point of failure. 2. RELATED WORK 2.1 The Access Latency Latency is defined as the delay between a request for a Web page and receiving that page in its entirety. The latency problem occurs when users judge the download as too long. Unacceptable latency does not only adversely effects user satisfaction. Web pages that are loaded faster are judged to be significantly more interesting than their slower counterparts [12]. Studies on human cognition revealed that the response time shorter than 0.1 second is unnoticeable and the delay of 1 second matches the pace of interactive dialog. Following table shows the transfer rate of different connection types. Table 1. Transfer Rates for different connection Type Connection Type Slow Normal Maximum Modem 33k6 <2.734 ≈3 ≈3.65 Modem 56k <4.199 ≈5 ≈6.08 ISDN 64k <5.469 ≈6 ≈6.94 Cable <9.766 ≈17 by provider ADSL <12.21 ≈24 ≈732 Ethernet 10Base-T (10 Megabits/sec) <73 ≈195 ≈977 Table shows the different parameters that affects the access time of browser. The different parameters are type of connection used by the user and the condition of connection. The timing of internet use also affects on access latency due to bandwidth sharing. 2.2 Web Traffic The amount of data sent and received by visitors to a website is web traffic. It is analysis to see the popularity of web sites and individual pages or sections within a site. Web traffic can be analyzed by viewing the traffic statistics found in the web server log file, an automatically generated list of all the pages served. Traffic analysis is conducted using access logs from web proxy server. Each entry in access logs records the URL of document being requested, date and time of the request, the name of the client host making the request, number of bytes returns to requesting client, and information that describe how the clients request was treated as proxy [1]. Processing these log entries can produce useful summary statistics about workload volume, document type and sizes, popularity of document and proxy cache performance [5].
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 359 2.3 Static Caching It is a new approach of web caching which uses yesterday’s log to predict the today’s user request. The static caching algorithm defines a fixed set of URLs by analyzing the logs of previous periods. It then calculates the value of the unique URL. Depending on the value, URLs are arranged in the descending order, and the URL with the highest value is selected. This set of URLs is known as the working set. When a user requests a document and the document is present in the working set, the request is fulfilled from the cache. Otherwise, the user request is fulfilled from the origin server [6]. 2.4 Dynamic Caching Dynamic caching is more complex than static caching and requires detailed knowledge of the application. One must consider the candidates for dynamic caching carefully since, by its very nature, dynamically generated content can be different based on the state of the application. Therefore, it is important to consider under what conditions dynamically generated content can be cached returning the correct response. This requires knowledge of the application, its possible states, and other data, such as parameters that ensure the dynamic data is generated in a deterministic manner [3]. 2.5 MD5 Algorithm MD5, developed by Ron Rives in 1992, is a comparison cryptographic hash algorithm that succeeded the MD4 algorithm. MD5 takes an input of any length and generates an MD5 digest of fixed length (128 bits or 32 characters). Because MD5 uses the same algorithm every time, a particular data string always generates the same MD5 hash every time. MD5 cryptographic hash offers several advantages over its predecessors (such as MD4) and its competitors (such as, SHA and SHA.1). One of these advantages is that MD5 is a one way cryptographic hash. Another advantage is that MD5 can accept inputs of any length but still generates a fixed length output. MD5 is fast, and it is highly unlikely that two different strings can hash to the same digest. Moreover, with MD5 it is also highly unlikely that two different input strings can hash to the same digest. Furthermore, MD5 is reliable in the sense that the same input string always yields the same output digest every time [11]. 3. EXPERIMENTAL SETUP 3.1 Changing of proxy server In most of the organization’s or institution server does not support the proxy cache, so it is difficult to use main server as cache server so we have to change the proxy server from main server to other server [2]. Following are the steps to switch machine to other proxy: 1. Open the browser for ex. Internet Explorer 2. In internet explorer pull down the Tools menu and click Internet Options... 3. Click the Connections tab: 4. click the LAN Settings... button: 5. In the Address: box change "proxy1 Address" to "proxy2 Address" or vice versa and click OK. 6. Click OK on the Internet Options dialogue box to get back to the browser screen and you will now be able to get external sites.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 360 3.2 Duplication of Data Duplication of data means storing the multiple copies of same data object. In case of cache when we cache the object or the webpage that web page is stored at cache memory but when the different users request the same page then the multiple copies of that object or web page is stored at cache memory which results in the wastage of storage space as we all know the maintenance of cache is an expensive task so such wastage is not affordable. To avoid the problem of duplication of the data objects or web page duplicate suppression mechanism is to be used [7]. If the duplicate copy of data is saved at proxy cache then it acquires more space of storage in the analysis part given in work shows that the effect of duplication in the cache space [4]. 3.3 Duplicate Suppression You can reduce storage space requirements by avoiding duplicating copies of the same data. Content Engine provides the option to suppress storage of duplicate content elements. Duplicate suppression applies to any kind of content. Incoming content is not added to the storage area if identical content exists in the storage area; only unique content is added [14]. Due to large network size there are many pages on web, most of those pages will not be referenced multiple times by any one cache, means the probability with which the Kth page will be referenced is 1/K. re-referenced follow a distribution similar to Zipf’s law [9]. 3.5 Experimental Results The experimentation carried out at the lab of our institute. Some of popular websites are considered for experiment. Those websites are use to analyse for access latency of browser under different conditions. Keyword based search also used for Latency time based on the type of content either image or text search. Table 2. Response time of search engine for Text and Image Search. Text Search Image Search Keywords From Web Server From Cache Server From Web Server From Cache Server SVKM 250 140 230 200 NMIMS 140 130 300 100 RCPIT 250 120 350 150 CANNON 240 130 250 100 SAMSUNG 210 140 640 200 NOKIA 250 190 240 120 MATLAB 240 160 280 160 OPERA 250 150 120 120 SIEMENS 230 160 310 100 MICROMAX 160 140 190 110 MPSC 170 140 180 100 UPSC 210 150 150 140 IRCTC 160 140 330 90 RRB 260 120 310 70
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 361 Table 2 show the reduction into response time of browser when page is fetched from cache server instead of web server. First column shows the different keywords which is used for analysis. Same keywords are used for the text search and image search. Table contains response time of browser for text search as well as image search. From table we can say that there is considerable amount of reduction of access latency when the page is fetch from Proxy Cache. Figure 2 shows the comparison of response time when the page is fetch from main server and the response time when it is fetch from proxy cache. From Figure 2 we can say that there is considerable amount of reduction of the response time. Figure shows the graph plot for comparison of response time when the response comes from main source and when the response comes from local cache server for Text Search for some keywords. Here first bar shows the response time when the page is fetch from Web server where second bar shows the response time when the page is fetch from local proxy cache server where we have implemented content aliasing algorithm. Figure.2 Response time of Search engine for Text Search From Figure 2 it is clear that in text search for keyword we get 40 or more than 40 percent of reduction of response time. Where in case of some keywords like Samsung, IRCTC, RRB, Siemens the response time is reduced by more than 70 percent. Wherein case of opera, SVKM, and UPSC it is negligible or at most 10 percent. It is due to dynamic content comes under the search. Figure 3 shows the comparison of response time for image search for given keywords when the page is fetch from main server and the response time when it is fetch from proxy cache. From Figure 3 we can say that there is difference between the response times. Figure shows the graph plot for comparison of response time when the response comes from main source and when the response comes from local cache server for Image Search for some keywords. Here first bar shows the response time when the page is fetch from Web server where second bar shows the response time when the page is fetch from local proxy cache server where we have implemented content aliasing algorithm.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 362 Figure 3. Response time of Search engine for Image Search From Figure 3 it is clear that in Image search for keyword we get very less amount of reduction in the response time because the images are more dynamic than the text. Table 3. Connection Time and Response time of browser for some Websites. From Web Server From Cache Server WEBSITE Connection Response Connection Response www.nmims.edu 7000 44000 3000 14000 www.rcpit.ac.in 6120 26140 3920 10310 www.mpsc.gov.in 5800 25700 3200 6390 www.upsc.gov.in 1890 4760 320 690 www.unipune.ac.in 2480 8600 1130 1580 www.wipro.com 2300 24750 900 3780 www.infosys.com 1710 18180 770 1980 www.techmahindra.com 990 18000 1260 7250 www.jaihindcollege.com 1210 13230 500 1170 www.jaihindcollege.ac.in 1800 15930 540 1040 www.msbte.com 1800 10170 810 1130 www.msbshse.ac.in 1530 4550 540 1040 www.cbse.nic.in 1130 5580 630 900 www.irctc.com 1710 12960 1670 3240 Table 3 shows the connection time and response time of browser for a various sites. It gives the comparison of connection time and response time when page is fetched from cache server instead of web server. First column shows the different websites which is used for analysis. From table we can say that there is considerable amount of reduction of access latency when the page is fetch from Proxy Cache instead of main server.
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 363 Figure.4 Connection time for different Websites Figure 4 shows the effect of content aliasing on the access time of web browser in terms of connection time. In maximum cases we get more than 50 percent of reduction in connection time. In some cases the reduction is 30-50 percent. In case of IRCTC website the reduction in connection time is negligible. Where in case of ‘TECHMAHINDRA’ website connection time increased. It is due to the dynamic content is more on website. Figure. 5 Response time for Different Websites Figure 5 shows the comparative graph of response time of browser for different websites. When the web page is fetched from cache server then the response time is less. From above graph we can say that the reduction in response time is more than 60 percent in each case. In some cases the reduction into the response time is more than 90 percent. So by using the content aliasing in proxy cache server we get significant amount of time save in terms of response time as well as connection time.
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 364 It is clear that amount of user time is saved by using the concept of content aliasing. We have achieved reduction of access latency by also considering other parameters like cache size, stale data. 4. CONCLUSION The analysis based experimental results proves the need for methodology that improve the web access performance to enhance bandwidth utilization and greater connectivity speed. Here the suggested Design aspects improve the web performance in terms of reduced latency, improved user response time, and optimal use of the existing bandwidth by using web caching. Content aliasing successfully detected using a web based application, database queries and files system calls. A considerable amount of duplicate storage can be avoided through the suggested methodology. It is, therefore, a very useful mechanism for web proxy caches. Moreover, the solution is successfully able to keep cached pages in synchronization with the pages on the web server, checking for new pages if needed. This work can be further optimize by the Daemon Process, which can be design and run periodically to check the consistency of the data cached and the data at the web server. This can be scheduled during the slack time with the less traffic which will not add any additional toll on the bandwidth as well as it updates the TTL – Time to Live Period of the cached data. REFERENCES [1] Kartik Bommepally, Glisa T. K., Jeena J. Prakash, Sanasam Ranbir Singh and Hema A Murthy “Internet Activity Analysis through Proxy Log” IEEE, 2010. [2] E-Services Team, “Changing Proxy Server” by the Robert Gordon University, School hill, Aberdeen, Scotland-2006. [3] Chen, W.; Martin, P.; Hassanein, H.S., "Caching dynamic content on the Web," Canadian Conference on Electrical and Computer Engineering, 2003, vol.2, no., pp. 947- 950 vol.2, 4-7 May 2003. [4] Sadhna Ahuja, Tao Wu and Sudhir Dixit “On the Effects of Content Compression on Web Cache Performance,” Proceedings of the International Conference on Information Technology: Computers and Communications, 2003. [5] Mark S. Squillante, David D. Yaot and Li Zhang “Web Traffic Modeling and Web Server Performance Analysis” Proceedings of the 38' Conference on Decision & Control Phoenix, Arizona USA December 1999. [6] C. E. Wills and M. Mikhailov, “Studying the Impact of More Complete Server Information on Web Caching,” Computer Communications, vol. 24, no. 2, pp. 184.190, May 2000. [7] J Wang “A Survey of Web Caching Schemes for the Internet” - Cornell Network Research Group (C/NRG), Department of Computer Science, Cornell University 1999. [8] N. Shivakumar and H. Garcia-Molina, “Finding near Replicas of Documents on the Web” Proc. Workshop on Web Databases, Mar. 1998. [9] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker. Web caching and Zipf like Distributions: Evidence and Implications. In Proc. Infocom ’99. New York, NY, March, 1999.
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 365 [10] Guerrero, C.; Juiz, C.; Puigjaner, R.; "Web Performance and Behavior Ontology," Complex, Intelligent and Software Intensive Systems, 2008. CISIS 2008. International Conference on, vol., no., pp.219-225, 4-7 March 2008. [11] Kimmo Jarvinen, Matti Tommiska and Jorma Skytta, “Hardware Implementation Analysis of the MD5 Hash Algorithm,” IEEE Computer Society. 2005. [12] Andrzej Sieminski, “The impact of Proxy caches on Browser Latency” International Journal of Computer Science & Applications, 2005, Vol. II, No. II, pp. 5 – 21. [13] S B Patil, Sachin Chavan, Preeti Patil; “High quality design to enhance and improve performance of large scale web applications” International Journal of Computer Engineering and Technology (IJCET), Volume 3, Issue 1, January- June (2012), pp. 198-205, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [14] S.Vikram Phaneendra, “Minimizing Client-Server Traffic Based on AJAX”, International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 10 - 16, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [15] A. Suganthy, G.S.Sumithra, J.Hindusha, A.Gayathri and S.Girija, “Semantic Web Services and its Challenges”, International journal of Computer Engineering & Technology (IJCET), Volume 1, Issue 2, 2010, pp. 26 - 37, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.