Cloud computing solves the problem of real
time demand information and visibility at different location by
which information can be delivered with reliability, scalability
and flexibility between the supplier and customer. Logistics
network requires effective information flow for technical support
by which logistics infrastructures can be totally utilized and
tracked the information collection, transmission and operation.
Cloud is fast growing technology which can effectively reduce the
intermediate cost of flow of information and improve the link
between the logistics partners and customers. This paper
analyzes the advantages of cloud based logistics network and
defines in which way a logistics network manages Information
Flow Control (IFC) over the cloud, which allows the logistics
network to do work effectively.
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
An Analysis on Business Value of Cloud ComputingIOSR Journals
Abstract: The high costs incurred in multiple supplier/Buyer transaction forms the basis for the introduction of
a high-value agent service. This type of agent-based model can lower the cost for both buyers and sellers,
including monetary, mental and physical expenditure. Cloud computing is not just about cost. It can provide a
platform for a business to achieve its ambitions of having an “inclusive” IT system that covers entire supply
chain and its customers, enabling and generating business growth more effectively.
Keywords: Cloud computing, inclusive, Supply chain
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Literature Survey on Resource Management Techniques, Issues and Challenges ...TELKOMNIKA JOURNAL
Cloud computing is a large scale distributed computing which provides on demand services for
clients. Cloud Clients use web browsers, mobile apps, thin clients, or terminal emulators to request and
control their cloud resources at any time and anywhere through the network. As many companies are
shifting their data to cloud and as many people are being aware of the advantages of storing data to cloud,
there is increasing number of cloud computing infrastructure and large amount of data which lead to the
complexity management for cloud providers. We surveyed the state-of-the-art resource management
techniques for IaaS (infrastructure as a service) in cloud computing. Then we put forward different major
issues in the deployment of the cloud infrastructure in order to avoid poor service delivery in cloud
computing.
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
An Analysis on Business Value of Cloud ComputingIOSR Journals
Abstract: The high costs incurred in multiple supplier/Buyer transaction forms the basis for the introduction of
a high-value agent service. This type of agent-based model can lower the cost for both buyers and sellers,
including monetary, mental and physical expenditure. Cloud computing is not just about cost. It can provide a
platform for a business to achieve its ambitions of having an “inclusive” IT system that covers entire supply
chain and its customers, enabling and generating business growth more effectively.
Keywords: Cloud computing, inclusive, Supply chain
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Literature Survey on Resource Management Techniques, Issues and Challenges ...TELKOMNIKA JOURNAL
Cloud computing is a large scale distributed computing which provides on demand services for
clients. Cloud Clients use web browsers, mobile apps, thin clients, or terminal emulators to request and
control their cloud resources at any time and anywhere through the network. As many companies are
shifting their data to cloud and as many people are being aware of the advantages of storing data to cloud,
there is increasing number of cloud computing infrastructure and large amount of data which lead to the
complexity management for cloud providers. We surveyed the state-of-the-art resource management
techniques for IaaS (infrastructure as a service) in cloud computing. Then we put forward different major
issues in the deployment of the cloud infrastructure in order to avoid poor service delivery in cloud
computing.
Current services in cloud computing a surveyijcseit
Due to the fast development of the Cloud Computing technologies, the rapid increase of cloud services
are became very remarkable. The fact of integration of these services with many of the modern
enterprises cannot be ignored. Microsoft, Google, Amazon, SalesForce.com and the other leading IT
companies are entered the field of developing these services. This paper presents a comprehensive survey
of current cloud services, which are divided into eleven categories. Also the most famous providers for
these services are listed. Finally, the Deployment Models of Cloud Computing are mentioned and briefly
discussed.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
Service performance and analysis in cloud computing extened 2Abdullaziz Tagawy
This is a study to the research paper (Service Performance and Analysis in Cloud Computing) by Kaiqi Xiong and Harry Perros in the class related to the course of EC636 Stochastic and Random Process in Tripoli University-Engineering faculty-Computer Engineering Department.
You can find this paper in (https://ieeexplore.ieee.org/document/5190711)
In the present atmosphere of tighter budgets and pressure on resources, many public sector organiza-tions, including local authorities, are outsourcing services to outer organizations under service level agreements in cloud computing. Cloud computing is an approach to convey facilitated benefits over the web. Services are available to the users relying upon cloud arrangement and the Service Level Agreement (SLA) between the service providers and the cli-ents. Service level agreements are being utilized inside associations, directing connection between various sections of the association. It requires a commitment from both parties to support and adhere to the agreement in order for the SLA to work effectively. In spite of the fact that it gives a straightforward view about the cloud condition, such as cloud services, cloud distribution, security issues, responsibilities, agreements and warranties of the services. However, there are several issues occur from incorrect SLA which can cause misunderstanding among service providers and clients. SLA checking device confirm the SLA effectively whether it deals with all administrations as per SLA. In this paper, we represent a SLA confirmation and checking process that can distinguish SLA verification in gathering the information. We consider IaaS (Infrastructure as a Service) parameters for SLA verification in Cloud.
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalKrishna-Kumar
In our lab setup, we have derived a cluster
container orchestration mechanism to handle the
Telco specific (NFV) capabilities on top of the
traditional containers.
Original document @ http://dl6.globalstf.org/index.php/joc/article/view/1641/1667
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
This research deals with study of Degradation
behavior of starch blended with different percentage of
polypropylene (PP) .Twin screw extruder at 160- 190 °C and 50
rpm is used for manufacture of blend sheet. Degradation test
achieved according to ASTM standard (D 638 IV and D570-98).
Studies on their degradation properties were carried out by Soil
burial test, Water absorption test and Hydrolysis test. The
morphology test of the polypropylene / starch blend samples
was obviously seen in the (Dino- Light- Digital Microscope),
Results of soil burial test show that tensile strength and
percentage of elongation of polypropylene / starch blend
decrease with increasing the starch content and burial time. The
hydrolysis test show the weight losses increasing with the
increasing amount of starch. High percent of polypropylene
found to decrease the amount of water absorption of the blend.
The physical appearance and morphology studies of
polypropylene / starch blend after burial test in soil and
hydrolysis in water environment showed that all blend samples
was obviously changed after 90-day study period, whereas the
pure polypropylene samples remained unchanged
On the surface a packet is a chunk of information
but at the deeper level a packet is one unit of binary data capable
of being transferred through a network. Delivering data packets
for highly dynamic mobile ad hoc networks in a reliable and
timely manner. Driven by this issue, an efficient Position-based
Opportunistic Routing (POR) protocol which takes advantage of
the stateless property of geographic routing. In proactive routing
protocols the route discovery and recovery procedures are time
and energy consuming process. Once the path breaks, data
packets will get lost or be delayed for a long time until the
reconstruction of the route, causing transmission interruption.
but Geographic routing (GR) uses location information to
forward data packets, in a hop-by-hop routing fashion. Greedy
forwarding is used to select next hop forwarder with the largest
positive progress toward the destination while void handling
mechanism is triggered to route around communication voids. No
end-to-end route need to be maintained, leading to GR’s high
efficiency and scalability. In the operation of greedy forwarding,
the neighbour which is relatively far away from the sender is
chosen as the next hop. If the node moves out of the sender’s
coverage area, the transmission will fail. In GPSR (a very famous
geographic routing protocol), the MAC-layer failure feedback is
used to offer the packet another chance to reroute.
-In the field of Agriculture most important things
are fertility of soil, nutrition’s available in soil, water availability
in that area, atmospheric conditions .All these parameters are
playing the measure roll regarding the productivity of crop .In
this paper we are trying to go through the techniques which will
show us how to improve productivity with the minimum use of
natural resources like water, and avoid leaching of soil by using
fertilizers through drip. This can be used in greenhouse or open
environments to efficiently monitor soil moisture and
temperature, ambient temperature, and humidity. Wired
communications, sensor networks, and other complementary
technologies provide the necessary tools to compile and processes
physical variables, including temperature, humidity, and soil
moisture, pH of soil, fertilizer concentrations. Greenhouse and
precision agricultural, in general, demand real-time precise
measurement of these parameters in order to avoid unnecessary
exposure to unhealthy ambient conditions, assure maximum
productivity and provide value-added quality. This paper aims to
implement the basic application of automizing the irrigation field
by programming the components and building the necessary
hardware with ARM7 Processor. This is used to find the exact
field condition and maintaining their levels in the soil
Bio-char can be produced by thermal conversion of
biomass. Palm shells were obtained from palm fruits (palmira).
They were air-dried to remove moisture. The dried palm shells
were ground to become powder and heated at 600ºC, 800ºC and
1000ºC for 2 h respectively. After heating, bio-char was obtained.
Structural properties of palm shell powder and bio-char were
examined by X-ray diffraction (XRD). Scanning electron
microscopy (SEM) was used to observe microstructure of biochar.
Properties such as hydration capacity, pH were also
evaluated.
In current year, endurable and entire renewable
energy resources are extensively used in electrical energy
generation system. Mainly, solar energy conservation systems
are apply in stand -alone system. Solar panels covert solar
radiation into direct electrical energy. Solar panels are one of
the most potential renewable energy technologies for refreshing
building. In this study, responsibility analysis of a solar system
installed in my collage academic block and hostel is
investigated. The system includes solar panel, battery,
generator, converter and loads. In this study we calculate
overall load in academic block (Electrical engineering
department and round building) and only boy hostel. After
knowing overall loads result for these buildings we simulate
this data through HOMER tool and we obtain the best result
which is presented in this paper.
The result obtained from the optimization gives the initial
capital cost as 296.000$ while operating cost is 2,882$/yr. Total
net present cost (NPC) is 332,846$ and the cost of energy
(COE) is 0.212$/kWh.
The main purpose of this research paper is that the
maximum demand of energy consumption for both academic
block and hostel are simulated through solar panel, for this
purpose which amount of solar panel and battery is required.
Current services in cloud computing a surveyijcseit
Due to the fast development of the Cloud Computing technologies, the rapid increase of cloud services
are became very remarkable. The fact of integration of these services with many of the modern
enterprises cannot be ignored. Microsoft, Google, Amazon, SalesForce.com and the other leading IT
companies are entered the field of developing these services. This paper presents a comprehensive survey
of current cloud services, which are divided into eleven categories. Also the most famous providers for
these services are listed. Finally, the Deployment Models of Cloud Computing are mentioned and briefly
discussed.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
Service performance and analysis in cloud computing extened 2Abdullaziz Tagawy
This is a study to the research paper (Service Performance and Analysis in Cloud Computing) by Kaiqi Xiong and Harry Perros in the class related to the course of EC636 Stochastic and Random Process in Tripoli University-Engineering faculty-Computer Engineering Department.
You can find this paper in (https://ieeexplore.ieee.org/document/5190711)
In the present atmosphere of tighter budgets and pressure on resources, many public sector organiza-tions, including local authorities, are outsourcing services to outer organizations under service level agreements in cloud computing. Cloud computing is an approach to convey facilitated benefits over the web. Services are available to the users relying upon cloud arrangement and the Service Level Agreement (SLA) between the service providers and the cli-ents. Service level agreements are being utilized inside associations, directing connection between various sections of the association. It requires a commitment from both parties to support and adhere to the agreement in order for the SLA to work effectively. In spite of the fact that it gives a straightforward view about the cloud condition, such as cloud services, cloud distribution, security issues, responsibilities, agreements and warranties of the services. However, there are several issues occur from incorrect SLA which can cause misunderstanding among service providers and clients. SLA checking device confirm the SLA effectively whether it deals with all administrations as per SLA. In this paper, we represent a SLA confirmation and checking process that can distinguish SLA verification in gathering the information. We consider IaaS (Infrastructure as a Service) parameters for SLA verification in Cloud.
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalKrishna-Kumar
In our lab setup, we have derived a cluster
container orchestration mechanism to handle the
Telco specific (NFV) capabilities on top of the
traditional containers.
Original document @ http://dl6.globalstf.org/index.php/joc/article/view/1641/1667
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
This research deals with study of Degradation
behavior of starch blended with different percentage of
polypropylene (PP) .Twin screw extruder at 160- 190 °C and 50
rpm is used for manufacture of blend sheet. Degradation test
achieved according to ASTM standard (D 638 IV and D570-98).
Studies on their degradation properties were carried out by Soil
burial test, Water absorption test and Hydrolysis test. The
morphology test of the polypropylene / starch blend samples
was obviously seen in the (Dino- Light- Digital Microscope),
Results of soil burial test show that tensile strength and
percentage of elongation of polypropylene / starch blend
decrease with increasing the starch content and burial time. The
hydrolysis test show the weight losses increasing with the
increasing amount of starch. High percent of polypropylene
found to decrease the amount of water absorption of the blend.
The physical appearance and morphology studies of
polypropylene / starch blend after burial test in soil and
hydrolysis in water environment showed that all blend samples
was obviously changed after 90-day study period, whereas the
pure polypropylene samples remained unchanged
On the surface a packet is a chunk of information
but at the deeper level a packet is one unit of binary data capable
of being transferred through a network. Delivering data packets
for highly dynamic mobile ad hoc networks in a reliable and
timely manner. Driven by this issue, an efficient Position-based
Opportunistic Routing (POR) protocol which takes advantage of
the stateless property of geographic routing. In proactive routing
protocols the route discovery and recovery procedures are time
and energy consuming process. Once the path breaks, data
packets will get lost or be delayed for a long time until the
reconstruction of the route, causing transmission interruption.
but Geographic routing (GR) uses location information to
forward data packets, in a hop-by-hop routing fashion. Greedy
forwarding is used to select next hop forwarder with the largest
positive progress toward the destination while void handling
mechanism is triggered to route around communication voids. No
end-to-end route need to be maintained, leading to GR’s high
efficiency and scalability. In the operation of greedy forwarding,
the neighbour which is relatively far away from the sender is
chosen as the next hop. If the node moves out of the sender’s
coverage area, the transmission will fail. In GPSR (a very famous
geographic routing protocol), the MAC-layer failure feedback is
used to offer the packet another chance to reroute.
-In the field of Agriculture most important things
are fertility of soil, nutrition’s available in soil, water availability
in that area, atmospheric conditions .All these parameters are
playing the measure roll regarding the productivity of crop .In
this paper we are trying to go through the techniques which will
show us how to improve productivity with the minimum use of
natural resources like water, and avoid leaching of soil by using
fertilizers through drip. This can be used in greenhouse or open
environments to efficiently monitor soil moisture and
temperature, ambient temperature, and humidity. Wired
communications, sensor networks, and other complementary
technologies provide the necessary tools to compile and processes
physical variables, including temperature, humidity, and soil
moisture, pH of soil, fertilizer concentrations. Greenhouse and
precision agricultural, in general, demand real-time precise
measurement of these parameters in order to avoid unnecessary
exposure to unhealthy ambient conditions, assure maximum
productivity and provide value-added quality. This paper aims to
implement the basic application of automizing the irrigation field
by programming the components and building the necessary
hardware with ARM7 Processor. This is used to find the exact
field condition and maintaining their levels in the soil
Bio-char can be produced by thermal conversion of
biomass. Palm shells were obtained from palm fruits (palmira).
They were air-dried to remove moisture. The dried palm shells
were ground to become powder and heated at 600ºC, 800ºC and
1000ºC for 2 h respectively. After heating, bio-char was obtained.
Structural properties of palm shell powder and bio-char were
examined by X-ray diffraction (XRD). Scanning electron
microscopy (SEM) was used to observe microstructure of biochar.
Properties such as hydration capacity, pH were also
evaluated.
In current year, endurable and entire renewable
energy resources are extensively used in electrical energy
generation system. Mainly, solar energy conservation systems
are apply in stand -alone system. Solar panels covert solar
radiation into direct electrical energy. Solar panels are one of
the most potential renewable energy technologies for refreshing
building. In this study, responsibility analysis of a solar system
installed in my collage academic block and hostel is
investigated. The system includes solar panel, battery,
generator, converter and loads. In this study we calculate
overall load in academic block (Electrical engineering
department and round building) and only boy hostel. After
knowing overall loads result for these buildings we simulate
this data through HOMER tool and we obtain the best result
which is presented in this paper.
The result obtained from the optimization gives the initial
capital cost as 296.000$ while operating cost is 2,882$/yr. Total
net present cost (NPC) is 332,846$ and the cost of energy
(COE) is 0.212$/kWh.
The main purpose of this research paper is that the
maximum demand of energy consumption for both academic
block and hostel are simulated through solar panel, for this
purpose which amount of solar panel and battery is required.
RFID-based public transport ticketing systems
rely on widespread networks of RFID readers that locate
the user within the transport network in real time to be
able to verify whether he can travel at that time with the
ticket he holds. This paper presents a system that uses that
same RFID-based location information to give the user
navigation indications depending on his current location
provided that the user has indicated beforehand the places
he intends to visit. The system was designed to be costeffectively
deployable on the short term but open for easy
extension. This paper is based on ticketing and
identification of the passenger in the public transport. In
the metropolitan city like Mumbai, Kolkata we have a
severe malfunction of public transport and various
security problems. Firstly, there is a lot of confusion
between the passengers regarding fares which lead to
corruption, Secondly due to mismanagement of public
transport the passengers faces the problem of traffic jam,
thirdly nowadays we have severe security problems in
public transport due anti-social elements.The entire
network comprises of three modules; Base Station Module,
In-Bus Modules and Bus Stop Module. The base station
module consists of monitoring system which includes GSM
and a PC. The In-Bus Modules consists of two
Microcontrollers, GSM Modem, GPS, Zigbee, RFID, LCD
and infrared sensor. RFID for ticketing purpose, GSM,
GPS is used for mobile data transmission and tracking
location. The Zigbee module is also interfaced with the
microcontroller which is used to send the bus information
to bus stop and to get the information from the bus stop to
bus. The Bus Stop Module is fixed at every bus stop
consists of Zigbee node which is interfaced with the
Microcontroller.
When a ductile material with a crack is loaded in
tension, the deformation energy builds up around the crack tip
and it is understood that at a certain critical condition voids are
formed ahead of the crack tip. The crack extension occurs by
coalescence of voids with the crack tip. The “characteristic
distance” (Lc) defined as the distance b/w the crack tip & the void
responsible for eventual coalescence with the crack tip. Nucleation
of these voids is generally associated with the presence of second
phase particles or grain boundaries in the vicinity of the crack tip.
Although approximate, Lc assumes a special significance since it
links the fracture toughness to the microscopic mechanism
considered responsible for ductile fracture. The knowledge of the
“characteristic distance” is also crucial for designing the size of
mesh in the finite element simulations of material crack growth
using damage mechanics principles. There is not much work
(experimental as well as numerical) available in the literature
related to the dependency of “characteristic distance” on the
fracture specimen geometry. The present research work is an
attempt to understand numerically, the geometry dependency of
“characteristic distance” using three-dimensional FEM analysis.
The variation of “characteristic distance” parameter due to the
change of temperature across the fracture specimen thickness was
also studied. The work also studied the variation of “characteristic
distance”, due to the change in fracture specimen thickness.
Finally, the ASTM requirement of fracture specimen thickness
criteria is evaluated for the “characteristic distance” fracture
parameter. “Characteristic distance” is found to vary across the
fracture specimen thickness. It is dependent on fracture specimen
thickness and it converges after a specified thickness of fracture
specimen. “Characteristic distance” value is also dependent on the
temperature of ductile material. In Armco iron material, it is
found to decrease with the increase in temperature.
—Stochastic processes have many useful applications
and are taught in several university programmers. In this paper
we are using stochastic process with complex concept on Markov
chains which uses a transition matrix to plot a transition diagram
and there are several examples which explains various type of
transition diagram. The concept behind this topic is simple and
easy to understand.
This study aims to employ low-cost agro waste
biosorbent tamarind (Tamarindus indica) pod shells and
activated carbon prepared by complete and partial pyrolysis of
tamarind pod shell for the removal of hexavalent chromium
ions from aqueous solution. The effect of parameters namely,
initial metal ion concentration, pH, temperature, biomass
loading on chromium removal efficiency were studied. More
than 96.9% removal of Chromium was achieved using crude
tamarind pod shells as biosorbent. The experimental data
obtained were fitted with Langmuir, Freundlich, Temkin and
Redlich-Peterson adsorption isotherm models. The
experimental data fits well to Langmuir, Freundlich and
Temkin isotherms with regression coefficient R2 more than 0.9.
For Redlich-Peterson adsorption isotherm the experimental
data does not fit so well. The crude tamarind had maximum
monolayer adsorption capacity of 40 mg/g and a separation
factor of 0.0416 indicating it as best adsorbent among the three
tested adsorbent. Further, an attempt is made to fit sorption
kinetics with pseudo first order and pseudo second order
reactions. Pseudo second order kinetics model fits well to the
experimental data for all three adsorbents.
The combination of steganography and
cryptography is considered as one of the best security methods
used for message protection, due to this reason, in this paper, a
data hiding system that is based on image steganography and
cryptography is proposed to secure data transfer between the
source and destination. Animated GIF image is chosen as a
carrier file format for the steganography due to a wide use in web
pages and a LSB (Least Significant Bits) algorithm is employed to
hide the message inside the colors of the pixels of an animated
GIF image frames. To increase the security of hiding, each frame
of GIF image is converted to 256 color BMP image and the
palette of them is sorted and reassign each pixels to its new index,
furthermore, the message is encrypted by LZW ( Lempel _
Ziv_Welch) compression algorithm before being hidden in the
image frames. The proposed system was evaluated for
effectiveness and the result shows that, the encryption and
decryption methods used for developing the system make the
security of the proposed system more efficient in securing data
from unauthorized users. The system is therefore, recommended
to be used by the Internet users for establishing a more secure
communication
This study was designed to evaluate the effect of
70% ethanolic crude extract of Portulaca oleracea L on mice
orgons . (In vivo),In vivo, the acute toxicity of 70 % ethanolic
extract of the plant on normal mice was studied. No toxic effect
was noted on normal mice even at 9500 mg /kg B.W S/C
injection.Histopathological changes due to ethanolic extract of
the plant in healthy mice were summarized in hyperplasia of
white pulp with amyloid deposition, proliferation of
megakaryocytes and mononuclear cell infiltration in the liver and
kidney parenchyma. There were no significant lesions detected in
the brain, heart and ovary in all treated groups.
A young astronomer’s by now ten years old
results are re-told and put in perspective. The implications are
far-reaching. Angular-momentum shows its clout not only in
quantum mechanics where this is well known, but is also a
major player in the space-time theory of the equivalence
principle and its ramifications. In general relativity, its
fundamental role was largely neglected for the better part of a
century. A children’s device – a friction-free rotating bicycle
wheel suspended from its hub that can be lowered and pulled
up reversibly – serves as an eye-opener. The consequences are
embarrassingly far-reaching in reviving Einstein’s original
dream
To help corporations survive amidst worldwide
quality competition, the authors have focused on the strategic
development of a Higher-Cycled Product Design CAE Model
employing a Highly Reliable CAE Analysis Technology
Component Model. Their efforts are part of principle-based
research aimed at evolving product design and CAE development
processes to ensure better quality assurance. To satisfy the
requirements of developing and producing high quality products
while also reducing costs and shortening development times, the
effectiveness of this model was verified by successfully applying it
to the technological problems of loosening bolts and other
product design bottlenecks at auto manufacturers.
A supply chain consists of all parties involved
directly or indirectly, in fulfilling a customer request. The supply
chain includes not only the manufacturers and suppliers, but also
transporters, workhouse, retailers and even customers
themselves. Within each organization, such as a manufactures,
the supply chain includes all functions involved in receiving and
filling a customer request. These functions include, but are not
limited to, new product development, marketing operations,
distributions, finance, and customer service. Supply chain
management (SCM) is the management of an interconnected or
interlinked between network, channel and node businesses
involved in the provision of product and service packages
required by the end customers in a supply chain. Supply chain
management spans the movement and storage of raw materials,
work-in-process inventory, and finished goods from point of
origin to point of consumption. It is also defined as the "design,
planning, execution, control, and monitoring of supply chain
activities with the objective of creating net value, building a
competitive infrastructure, leveraging worldwide logistics,
synchronizing supply with demand and measuring performance
globally.
The technical study had been performed on
many foreign languages like Japanese; Chinese etc. but the
efforts on Indian ancient script is still immature. As the Modi
script language is ancient and cursive type, the OCR of it is still
not widely available. As per our knowledge, Prof. D.N.Besekar,
Dept. of Computer Science, Shri. Shivaji College of Science,
Akola had proposed a system for recognition of offline
handwritten MODI script Vowels. The challenges of
recognition of handwritten Modi characters are very high due
to the varying writing style of each individual. Many vital
documents with precious information have been written in
Modi and currently, these documents have been stored and
preserved in temples and museums. Over a period of time these
documents will wither away if not given due attention. In this
paper we propose a system for recognition of handwritten
Modi script characters; the proposed method uses Image
processing techniques and algorithms which are described
below.
General Terms
Preprocessing techniques: Gray scaling, Thresholding,
Boundary detection, Thinning, cropping, scaling, Template
generation. Other algorithms used- Average method, otsu
method, Stentiford method, Template-based matching method
Suspended nanoparticles in conventional fluids,
called nanofluids, have been the subject of intensive study
worldwide since pioneering researchers recently discovered the
anomalous thermal behavior of these fluids. The heat transfer from
smaller area is achieved through microchannels. The heat transfer
principle states that maximum heat transfer is achieved in
microchannels with maximum pressure drop across it. In this
research work the experimental and numerical investigation for
the improved heat transfer characteristics of serpentine shaped
microchannel heat sink using Al2O3/water nanofluid is done. The
fluid flow characteristics is also analyzed for the serpentine
shaped micrchannel. The experimental results of the heat
transfer using Al2O3 nanofluid is compared with the numerical
values. The calculations in this work suggest that the best heat
transfer enhancement can be obtained by using a system with an
Al2O3–water nanofluid-cooled micro channel with serpentine
shaped fluid flow
Space-time adaptive processing (STAP) is a signal
processing technique most commonly used in radar systems where
interference is a problem. The radar signal processor is used to
remove the unintentional cluttering effects caused by ground
reflections and echoes due to sea, desert, forest, etc. and intentional
jamming and make the received signal useful. In this paper a new
approach to STAP based on subspace projection has been described
in detail. According to linear algebra and three dimensional
geometry, if we project a range space on to a subspace spanned by
linearly independent vectors, we can suppress data which is
perpendicular to that subspace. In subspace based technique, the
received data is projected on to a subspace which is orthogonal to
clutter subspace to remove the clutter. The probability of target
detection can be find out in order to analyse the performance of the
proposed algorithm. Two existing algorithms, SMI and DPCA are
chosen to do the comparison. while plotting the detection Probability
against SINR , the results obtained are better for subspace technique
than DPCA and SMI. We got the SINR improved for subspace based
technique for same detection probability. The effect of subspace rank
on SINR was also analysed for understanding the computational load
caused by the technique. We also analysed the convergence of the
algorithm by taking plots of SINR against range snapshots.
This paper focuses on the numerous techniques that
have been proposed over the years for metamaterial
characterization. These techniques are categorized into
analytical, field averaging and experimental methods, which
provide various methods to determine the complex permittivity,
complex permeability and refractive index of metamaterials.
The Application Programming Interface restricts
the types of queries that the Web service can answer. For
instance, a Web service might provide a method that returns the
books of a given author in fast manner, but it might not provide a
method that returns the authors of a given book. If the user asks
for the author of some specific book, then the Web service cannot
be called – even though the underlying database might have the
preferred piece of information, this scenario is called asymmetry.
This asymmetry is particularly problematic if the service is used
in a Web service orchestration system. In this survey, we propose
to use on-the-fly information extraction (IE).IE used to collect
values, and then the value can be used as parameter Bindings for
the Web service. This survey shows how the information
extraction can be integrated into a Web service orchestration
system. The proposed approach is fully implemented in a
prototype called Search Using Services and Information
Extraction (SUSIE). Real-life data and services are used to
demonstrate the practical viability and good performance of our
approach
Due to increase demand of energy, increasing price
of petroleum fuels, depletion of petroleum fuels, and
environmental pollution by these fuel emissions, it is very
necessary to find the alternative fuels. This work focused on use
of hybrid blends of Karanja and Cottonseed oil Biodiesels. In this
work 20% and 25% blends are used and the performance and
emission tests were conducted on single cylinder, 4-stroke, water
cooled CI engine by running the engine at a speed of 1500rpm, at
a compression ratio of 16.5:1 and at an injection pressure of
205bar and performance parameters like BP, BSFC, BTE and
the emissions like CO, HC and NOx are compared. It was found
that the blends gave comparatively good results in respect of
performance and emissions.
Cloud computing can give the ability of flexibly outsourcing software for supply chain collaboration and infrastructure needs in a better way. Instead of maintaining and paying for maximum use this technology puts forward the method that provides flexibility to add on the way,depending upon the overall business process and network model of supply chain. Ahead of the usual technology publicity,the worth of cloud computing is that it can be a right technology for supporting and managing a constantly cha nging and dynamic network and thus for supply chain management. Because now a day these are the exact visibility and supply chain collaboration needs. Efficient supply chains are a vital necessity for many c ompanies. Supply chain management acts on operational processes,divergent and consolidated information flows and interaction processes with a variety of business partners. Efforts of recent years are usually facing this diversity by creating and organizing central information system solutions. Taking in account all the well-known probl ems of these central information systems,the question arises,whether cloud-based information system s represent a better alternative to establish an IT support for supply chain management .
Infrastructure of services for a smart cityIJCNCJournal
Sustainability, appropriate use of natural resources and providing a better quality of life for citizens has become a prerequisite to change the traditional concept of a smart city. A smart city needs to use latest generation Information Technologies, IT, and hardware to improve services and data, to offer to create a balanced environment between the ecosystem and inhabitants. This paper analyses the advantages of using a private cloud architecture to share hardware and software resources when it is required. Our case study is Guadalajara, which has nine municipalities and each one monitor’s air quality. Each municipality has a set of servers to process information independently and consists of information systems for the transmission and storage of data with other municipalities. We analysed the behaviour of the carbon footprint during the years1999-2013 and we observed a pattern in each season. Thus our proposal requires municipalities to use a cloud-based solution that allows managing and consolidating infrastructure to minimize maintenance costs and electricity consumption to reduce carbon footprint generated by the city.
Security & privacy issues of cloud & grid computing networksijcsa
Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking
technologies. Cloud computing has become a significant technology in field of information technology.
Security of confidential data is a very important area of concern as it can make way for very big problems
if unauthorized users get access to it. Cloud computing should have proper techniques where data is
segregated properly for data security and confidentiality. This paper strives to compare and contrast cloud
computing with grid computing, along with the Tools and simulation environment & Tips to store data and
files safely in Cloud.
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...nexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...Nexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Cost minimizing dynamic migration of contentnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Evaluation of load balancing approaches for Erlang concurrent application in ...TELKOMNIKA JOURNAL
Cloud system accommodates the computing environment including PaaS (platform as a service), SaaS (software as a service), and IaaS (infrastructure as service) that enables the services of cloud systems. Cloud system allows multiple users to employ computing services through browsers, which reflects an alternative service model that alters the local computing workload to a distant site. Cloud virtualization is another characteristic of the clouds that deliver virtual computing services and imitate the functionality of physical computing resources. It refers to an elastic load balancing management that provides the flexible model of on-demand services. The virtualization allows organizations to improve high levels of reliability, accessibility, and scalability by having a capability to execute applications on multiple resources simultaneously. In this paper we use a queuing model to consider a flexible load balancing and evaluate performance metrics such as mean queue length, throughput, mean waiting time, utilization, and mean traversal time. The model is aware of the arrival of concurrent applications with an Erlang distribution. Simulation results regarding performance metrics are investigated. Results point out that in Cloud systems both the fairness and load balancing are to be significantly considered.
To Improve Data Storage Security Levels in the Cloudrahulmonikasharma
Now-a-Days Cloud Computing is an emerging technology, that works on the principle of pay-per-use. It offers services like Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), Storage as a Service and many more. Cloud computing used for database and software applications to centralize the data. All the cloud users openly store their data on the cloud service provider’s service centers. Here, the management of data and services are not fully confidential. So that the security of the cloud stored data becomes an open challenging task in the field of Cloud Computing. To increase the levels of data security in the cloud, this paper deals with some techniques like public auditability, Homomorphism Linear Authenticator (HLA).
Cloud computing charecteristics and types altanai bisht , 2nd year, part iiiALTANAI BISHT
Computing is being transformed to a model consisting of services based on their requirements without regard to where the services are hosted or how they are delivered.
Oman logestic company
MIS
MBA
IT
1. IT Infrastructure and support systems
2. Data and Document Management system
3. Network management and Mobility
4. IT Security, Compliance, and Continuity
5. E Business and E commerce
6. Web and social media strategies
7. Operational planning and control systems
8. Enterprise information system
9. Business Intelligence and business support
10. IT Strategic Planning
11. Business process management and system development
DONATE BLOOD BANK MANAGEMENT SYSTEM PPT.pptxfortcodex12
A blood bank management system is a software application specifically designed to manage and streamline the operations of a blood bank. This system helps in maintaining records of blood donors, blood units, blood tests, and blood transfusions. It also helps in tracking inventory, scheduling appointments, and generating reports.
A PowerPoint presentation (PPT) on blood bank management system would typically cover the following topics:
Introduction to blood bank management system
Importance of blood banks in healthcare
Features and functionalities of a blood bank management system
Benefits of implementing a blood bank management system
Demonstration of how the system works
Case studies or examples of successful implementation
Challenges and future trends in blood bank management
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to INFORMATION FLOW CONTROL IN LOGISTICS NETWORK OVER CLOUD (20)
Recent joint surgery studies reveal increased
revisions and resurfacing of the metal on metal hip joints. Metal
on metal hip implants were developed more than thirty years ago
and their application has been refined because of availability of
advanced manufacturing techniques and partly by advancements
in material science and engineering. Development of composite
materials may provide greater durability to metal-on-metal hip
implants .This review article is a study of the latest literature of
metal-on-metal hip implants and its various modeling techniques.
Numbers of methods are used for convergence and numerical
solution to investigate the performance of metal-on-metal hip
implant for accurate stable solution. This paper presents analysis
done by various researchers on metal-on-metal hip implants for
wear, lubrication, fatigue, bio-tribo-corrosion, design, toxicity
and resurfacing. After in vivo and in vitro studies, it is found that
all these methods have limitations. There is a need of more
insight for lubrication analysis, geometry of bearings, materials
and input parameters. The information provided in this work is
intended as an aid in the assessment of metal-on-metal hip joints.
Background Hospital contributes significantly tangible and intangible resources on a concurred plan by the scheduling of surgery on the OT list. Postponement decreases efficiency by declining throughput leads to wastage of resources hence burden to the nation. Patients and their family face economic and emotional implication due to the postponement. Postponement rate being a quality indicator controls check mechanism could be developed from the results. Postponement of elective scheduled operations results in inefficient use of the operating room (OR) time on the day of surgery. Inconvenience to patients and families are also caused by postponements. Moreover, the day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extent of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology A cross-sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from March 1st to September 30th, 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (surgeons, Anesthetist, Nursing Officer) and they were further evaluated time series analysis of scheduling of Operation Theater for moving average technique. Results Total 958 surgeries were scheduled and 772 surgeries performed were and 186 surgeries were postponed with a postponement rate of 19.42% in the cardiac surgery department during the study period. Month-wise postponement Rate exponential smoothing of time series data shows the dynamic of operating suits. To test throughput Postponement rate was plotted the postponed surgeries and on regression analysis is in a perfect linear relationship.
Introduction: Postponement of elective scheduled operations results in inefficient use of operating room (OR) time on the day of surgery. Inconvenience to patients and families also caused by postponements. Moreover, day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extend of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology: A cross sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from march 1st to September 30th 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (Surgeons, Anesthetist, Nursing officer) and they were further evaluated Time series analysis of scheduling of Operation Theater for Moving average Technique. Results: total 2,466 surgeries were scheduled and 1,980 surgeries were performed and 486 surgeries were postponed in the general surgery department during the study period. Month wise postponement forecast was in accordance with the performed surgeries and on regression analysis postponed surgeries were in perfect linear relationship with the postponement Rate.
In the present paper the experimental study of
Nanotechnology involves high cost for Lab set-up and the
experimentation processes were also slow. Attempt has also
been made to discuss the contributions towards the societal
change in the present convergence of Nano-systems and
information technologies. one cannot rely on experimental
nanotechnology alone. As such, the Computer- simulations and
modeling are one of the foundations of computational
nanotechnology. The computer modeling and simulations
were also referred as computational experimentations. The
accuracy of such Computational nano-technology based
experiment generally depends on the accuracy of the following
things: Intermolecular interaction, Numerical models and
Simulation schemes used. The essence of nanotechnology is
therefore size and control because of the diversity of
applications the plural term nanotechnology is preferred by
some nevertheless they all share the common feature of control
at the nanometer scale the latter focusing on the observation
and study of phenomena at the nanometer scale. In this paper,
a brief study of Computer-Simulation techniques as well as
some Experimental result
Solar cell absorber Kesterite- type Cu2ZnSnS4 (CZTS) thin films have been prepared by Chemical Bath Deposition (CBD). UV–vis absorption spectra measurement indicated that the band gap of as-synthesized CZTS was about1.68 eV, which was near the optimum value for photovoltaic solar conversion in a single-band-gap device. The polycrystalline CZTS thin films with kieserite crystal structure have been obtained by XRD. The average of crystalline size of CZTS is 27 nm
Multilevel inverters play a crucial part in the
areas of high and medium voltage applications. Among the three
main multilevel inverters used, the capacitor clamped multilevel
inverter(CCMLI) has advantage with respect to voltage
redundancies. This work proposes a switching pattern to improve
the performance of chosen H-bridge type CCMLI over
conventional CCMLI. The PWM technique used in this work is
Phase Opposition Disposition PWM(PODPWM). The
performance of proposed H-bridge type CCMLI is verified
through MATLAB-Simulink based simulation. It has been
observed that the THD is low in chosen CCMLI compared to
conventional CCMLI.
- In this paper, we introduce a practical mechanism of
compressing a binary phase code modulation (BPCM) signal
according to Barker code with 13 chips in presence of additive
white Gaussian noise (AWGN) by using a digital matched filter
(DMF) corresponding to time domain convolution algorithm of
input and reference signals using Cyclone II EP2C70F896C6
FPGA from ALTERA placed on education and development
board DE2-70 with the following parameters: frequency of
BPCM signal fIF=2 MHz, sampling frequency
f MHz SAM 50
,pulse period
T 200s
, pulse width
S 13sc
, chip width
CH 1sc
, compressing factor
KCOM 13
, SNRinp=1/1, 1/2, 1/3, 1/4, 1/5 and processing
gain factor SNRout/SNRinp=11.14 dB.
The results of filter operation are evaluated using a digital
oscilloscope GDS-1052U to display the input and output signals
for different SNRinp.
Flooding is one of the most devastating natural
disasters in Nigeria. The impact of flooding on human activities
cannot be overemphasized. It can threaten human lives, their
property, environment and the economy. Different techniques
exist to manage and analyze the impact of flooding. Some of these
techniques have not been effective in management of flood
disaster. Remote sensing technique presents itself as an effective
and efficient means of managing flood disaster. In this study,
SPOT-10 image was used to perform land cover/ land use
classification of the study area. Advanced Space borne Thermal
Emission and Reflection Radiometer (ASTER) image of 2010 was
used to generate the Digital Elevation Model (DEM). The image
focal statistics were generated using the Spatial Analyst/
Neighborhood/Focal Statistics Tool in ArcMap. The contour map
was produced using the Spatial Analyst/ Surface/ Contour Tools.
The DEM generated from the focal statistics was reclassified into
different risk levels based on variation of elevation values. The
depression in the DEM was filled and used to create the flow
direction map. The flow accumulation map was produced using
the flow direction data as input image. The stream network and
watershed were equally generated and the stream vectorized. The
reclassified DEM, stream network and vectorized land cover
classes were integrated and used to analyze the impact of flood on
the classes. The result shows that 27.86% of the area studied will
be affected at very high risk flood level, 35.63% at high risk,
17.90% at moderate risk, 10.72% at low risk, and 7.89% at no
risk flood level. Built up area class will be mostly affected at very
high risk flood level while farmland will be affected at high risk
flood level. Oshoro, Imhekpeme, and Weppa communities will be
affected at very high risk flood inundation while Ivighe, Uneme,
Igoide and Iviari communities will be at risk at high risk flood
inundation level. It is recommended among others that buildings
that fall within the “Very High Risk” area should be identified
and occupants possibly relocated to other areas such as the “No
Risk” area.
Without water, humans cannot live. Since time began,
we have lived by the water and vast tracts of waterless land have
been abandoned as it is too difficult to inhabit. At any given
moment, the earth’s atmosphere contains 4,000 cubic miles of
water, which is just 0.000012% of the 344 million cubic miles of
water on earth. Nature maintains this ratio via evaporation and
condensation, irrespective of the activities of man.
There is a certain need for an alternative to solve the water
scarcity. Obtaining water from the atmosphere is nothing new -
since the beginning of time, nature’s continuous hydrologic cycle
of evaporation and condensation in the form of rain or snow has
been the sole source and means of regenerating wholesome water
for all forms of life on earth.
An effective method to generate water is by the separation of
moisture present in air by condensation. In this study, the water
present in air is condensed on the surface of a container and then
collected in an external jacket provided on the container.
Insulations are provided to optimize the inner temperature of the
container.
The method is although uncommon but has certain advantages
which make it a success. The process is economical and does not
require a lot of utilities. It also helps in further reducing the
carbon footprint.
In every moment of functioning the Li-Ion
battery must provide the power required by the user, to have a
long operating life and to and to provide high reliability in
operation. The methods for analysis and testing batteries are
ensuring that all these conditions imposed to the batteries are
met by being tested depending on their intended use.
The success rate of real estate project is
decreasing as there is large scale of project and participation of
entities. It is necessary to study the risk factors involved in the
project. This paper focused on types of risks involved in the
project, risk factors, risk management tools & techniques.
Identification of risk of the project in terms of the total cost of the
project has been divided under Technical, Financial, Sociopolitical
and Statutory cost centers. Large real estate projects
have to tackle the following issues: land acquisition, skilledlabour
shortage, non-availability of skilled project managers, and
mechanization of the construction process to cater to the growing
demands. Non- availability of supporting infrastructure, political
issues like instability of the government leading to regulatory
issues, social issues, marketing forms an important part in these
projects as this is a onetime investment and the purchase cycle is
long , long development period makes the same project be at
different points in the real estate value cycle.
- In the present scenario carbon emission and sand
mining are major concern due to its hazardous effect to
environment and making serious imbalance to the ecosystem.
Various studies have been conducted to reduce severe effect on
environment, using byproducts like copper slag as partial
replacement of fine aggregate. Different researchers have also
revealed numerous uses of copper slag as a replacing agent in
determining the strength of concrete. A comprehensive review of
studies has been presented in this paper for scope of replacement
of fine aggregate from copper slag in concrete
- Security is a concept similar to being cautious
or alert against any danger. Network security is the condition of
being protected against any danger or loss. Thus safety plays a
important role in bank transactions where disclosure of any data
results in big loss. We can define networking as the combination
of two or more computers for the purpose of resource sharing.
Resources here include files, database, emails etc. It is the
protection of these resources from unauthorized users that
brought the development of network security. It is a measure
incorporated to protect data during their transmission and also
to ensure the transmitted is protected and authentic.
Security of online bank transactions here has been
improved by increasing the number of bits while establishing the
SSL connection as well as in RSA asymmetric key encryption
along with SHA1 used for digital signature to authenticate the
user
Background: Septoplasty is a common surgical
procedure performed by otolaryngologists for the correction of
deviated nasal septum. This surgery may be associated with
numerous complications. To minimize these complications,
otolaryngologists frequently pack both nasal cavities with
different types of nasal packing. Despite all its advantages,
nasal packing is also associated with some disadvantages. To
avoid these issues, many surgeons use suturing techniques to
obviate the need for packing after surgery.
Objective: To determine the efficacy and safety of trans-septal
suture technique in preventing complications and decreasing
morbidity after septoplasty in comparison with nasal packing.
Patients and methods: Prospective comparative study. This
study was conducted in the department of Otolaryngology -
Head and Neck Surgery, Rizgary Teaching Hospital - Erbil,
from the 6th of May 2014 to the 30th of November 2014.
A total of 60 patients aged 18-45 years, undergoing septoplasty,
were included in the study. Before surgery, patients were
randomly divided into two equal groups. Group (A) with transseptal
suture technique was compared with group (B) in which
nasal packing with Merocel was done. Postoperative morbidity
in terms of pain, bleeding, postnasal drip, sleep disturbance,
dysphagia, headache and epiphora along with postoperative
complications including septal hematoma, septal perforation,
crustation and synechiae formation were assessed over a follow
up period of four weeks.
Results: Out of 60 patients, 37 patients were males (61.7%)
and 23 patients were females (38.3%). Patients with nasal
packing had significantly more postoperative pain (P<0.05)><0.05). There was no significant difference between
the two groups with respect to nasal bleeding, septal
hematoma, septal perforation, crustation and synechiae
formation.
Conclusion: Septoplasty can be safely performed using transseptal
suturing technique without nasal packing.
The basic reason behind the need to
monitor water quality is to verify whether the examined
water quality is suitable for intended usage or not. This
study is conducted on Al -Shamiya al- sharqi drain in
Diwaniya city in Iraq to make valid assessment for the
level of parameters measured and to realize their effects
on irrigation. In order to assess the drainage water
quality for irrigation purposes with a high accuracy, the
Irrigation Water Quality Index (IWQI) will be examined
and upgraded (integrated with GIS) to make a
classification for drainage water. For this purpose, ten
samples of drainage water were taken from different ten
location of the stuay area. The collected samples were
analyzed chemically for different elements which affect
water quality for irrigation.These elements are :
Calcium(Ca+2), Sodium(Na+
), Magnesium(Mg+2),
Chloride( ), Potassium(K+
), Bicarbonate(HCO3),
Nitrate(NO3), Sulfate( , Phosphate( , Electrical
Conductivity(EC), Total Dissolved Solids (TDS), Total
Suspended Solids (TSS) and pH-values (PH). Sodium
Adsorption Ratio (SAR) and Sodium Content (Na%)
have been also calculated. Results suggest that, the use of
GIS and Water Quality Index (WQI) methods could
provide an extremely interesting as well as efficient tool
to water resource management. The results analysis of
(IWQI) maps confirms that: 52% of the drainage water
in study area falls within the "Low restriction" (LR) and
47%of study area has water with (Moderate
restriction)(MR),While 1% of drainage water in the
study area classified as (Sever restriction) (SR). So, the
drainage water should be used with the soil having high
permeability with some constraints imposed on types of
plant for specified tolerance of salts
The cable-hoisting method and rail cable-lifting
method are widely used in the construction of suspension bridge.
This paper takes a suspension bridge in Hunan as an example,
and expounds the two construction methods, and analyzes their
respective merits and disadvantages.
Baylis-Hillman reaction has been achieved on
different organic motifs but with completion times of three to
six days. Micellar medium of CTAB in water along with the
organic base DABCO has been used to effect the BaylisHillman
reaction on a steroidal nucleus of Withaferin-A for the
first time with different aromatic aldehydes within a day to
synthesize a library of BH adducts (W1a –W14a) and (W1bW14b)
as a mixture of two isomers and W15 as a single
compound. The isomers were separated on column and the
major components were chosen for bio-evaluation. Cytotoxic
activity of the synthesized compounds was screened against a
panel of four cancer cell lines Lung A-549, Breast MCF-7,
Colon HCT-116 and Leukemia THP-1 along with 5-florouracil
and Mitomycin-C as references. All the compounds exhibited
promising activity against screened cell lines and were found to
possess enhaunced activity than parent compound. BH adducts
with aromatic systems having methoxy and nitro groups were
found to be more active.
This paper presents the details on the
experimental investigation carried out to get the desired fresh
properties of the SCC. Tests were performed on various mixtures
to obtain the required SCC. In the present research work we
have replaced 15% of cement with class F fly ash. By varying the
quantity of water and sand the mortar mix was prepared. Later
varying percentage of coarse aggregate was added to the mortar
to obtain the desired SCC.
The batteries used in electric and hybrid vehicles
consists of several cells with voltages between 3.6V battery and
4.2 V in series or parallel combinations of configurations for
obtaining the necessary available voltages in the operation of a
hybrid electric vehicle. How malfunction of a single cell affects
the behavior of the entire battery pack, BMS main function is to
protect individual cells against over-discharge, overload or
overheating. This is done by correct balancing of the cells. In
addition BMS estimates the battery charge status
This project aims at using (PD-MCPWM) Phase
disposition multi carrier pulse width modulation technique to
reduce leakage current in a transformerless cascaded multilevel
inverter for PV systems. Advantages of transformerless PV
inverter topology is as follows, simple structure, low weight and
provides higher efficiency , but however this topology provides a
path for the leakage current to flow through the parasitic
capacitance formed between the PV module and the ground.
Modulation technique reduces leakage current with an added
advantage without adding any extra components.
More from International Journal of Technical Research & Application (20)
MATHEMATICS BRIDGE COURSE (TEN DAYS PLANNER) (FOR CLASS XI STUDENTS GOING TO ...PinkySharma900491
Class khatm kaam kaam karne kk kabhi uske kk innings evening karni nnod ennu Tak add djdhejs a Nissan s isme sniff kaam GCC bagg GB g ghan HD smart karmathtaa Niven ken many bhej kaam karne Nissan kaam kaam Karo kaam lal mam cell pal xoxo
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...Amil baba
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Amil In La...
INFORMATION FLOW CONTROL IN LOGISTICS NETWORK OVER CLOUD
1. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 66-68
66 | P a g e
INFORMATION FLOW CONTROL IN LOGISTICS
NETWORK OVER CLOUD
Shivani Dubey1, Sunaina Jain2
1
Research Scholar, 2
Associate Professor
1
Ansal University, Gurgaoun
2
IMS, Ghaziabad
1
dubey.shivani@gmail.com, 2
sunayanagjain@gmail.com
Abstract— Cloud computing solves the problem of real
time demand information and visibility at different location by
which information can be delivered with reliability, scalability
and flexibility between the supplier and customer. Logistics
network requires effective information flow for technical support
by which logistics infrastructures can be totally utilized and
tracked the information collection, transmission and operation.
Cloud is fast growing technology which can effectively reduce the
intermediate cost of flow of information and improve the link
between the logistics partners and customers. This paper
analyzes the advantages of cloud based logistics network and
defines in which way a logistics network manages Information
Flow Control (IFC) over the cloud, which allows the logistics
network to do work effectively.
Keywords: IFC, Logistics Network, Cloud services.
I. INTRODUCTION
Logistics network manage and control the information
optimally with respect to information flow, flow time,
capacity, storage and distribution between the company and
customer. Information flow is the flow of demand data from
company to vendor, vendor to supplier and supplier to
customer so that information flow is needed to be controlled
by perfect planning and accuracy. A logistics network requires
effective information flow for technical support by which
logistics infrastructure resources can be fully utilized and
tracked the information collection, transmission and
operational management. In order to fulfill the task of any
company, it is necessary to organize effective information
flow control with effective functioning and good services. The
implementation of logistics network should take into account
the information needs of links between the company and
customer at various level of management. Cloud Computing
makes it easier to access share and process information in real
time. Cloud computing also provide business to business from
interaction which helps to companies to manage information
flow with accurate automation. Cloud computing can manage
logistics network with advance platform to design and develop
web based infrastructure which can help to achieve better
execution, visibility, cost reduction and collaboration for
information flow control from a company to customer.
II. LOGISTICS NETWORK
A company adopts logistics network to organize its
connections to the network of supplier, customer and service
provider. Company focuses that which logistics tasks cannot
be completed between the supplier and customer. Logistics
network provides design dimension and optimization of
storage and transmission system. A logistics network
establishes the sources and intermediate connectivity which
are provided by transport connectivity for passing the physical
assets. The material flow is delivered and controlled by
information flow. Some parts of information run together with
the material flow and rest of information is delivered by
separate information networks like Intranet, Extranet and
Internet. The logistic networks can be performed as Intralog
(is the internal logistic network of a logistic station), Extralog
(is the external logistic network spanned between the suppliers
or buyers and customers in the company) and Interlog (is the
connection of the logistic networks of all households,
companies, service providers on www. The logistics network
and system require the operating and scheduling strategies to
determine the better IT system and technology. Cloud
computing can help to logistics network to improve operation
efficiency of information flow control and operation cost by
using cloud services which will be very effective for the
connectivity of logistics network [1].
III. CLOUD COMPUTING FOR LOGISTICS
NETWORK
The services of cloud computing are available for
logistics management for various applications such as
warehouse management systems (WMS), transportation
management systems (TMS) and enterprise resource
management (ERP) and also provide consistent global
platforms for sharing real-time data, better decision making,
improving customer service, better automation and
efficiencies. Cloud computing provides systems integration
and many opportunities for some firms to differentiate the
security; reliability and performance issues hinder its
advantages. In a cloud based logistics network there are
multiple logistics stations at various tiers of the supply chain,
these are connected over cloud and the centralized server or
server farm is maintained by the cloud service provider. This
provides facility to integrate the data of multiple logistics
stations and helps in sharing the information and manages
process of IFC in real time across all the logistics stations.
This provides logistics managers, real time visibility on the
number orders initiated and fulfilled across logistics stations at
any given time. This vital information equips the logistics
manager to tackle the impending stock out scenarios at any
point in the supply chain, by routing the orders to an alternate
to fulfill the order on time, thus maintaining the perfect order
fulfillment rate so that logistics stations can be consolidated
using a secured web link such as Hyper Text Transfer Protocol
Secure (https) over internet, which are generally cost
prohibitive [2].
2. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 66-68
67 | P a g e
IV. IFC IN LOGISTICS OVER CLOUD
Cloud Computing is also called distributed Computing,
parallel Computing and Grid Computing which provides the
large calculation of several processing program into several
small sub programs automatically by the network. The large
amount of data which is stored in distributed computer work
together with the processor resources. The calculation of
distribution is done by the distributed computer, rather than
the local computer. The IT resources, data and application as a
service are provided to users through the network. Cloud
computing system is independently calculated which run on a
server that have a large number of data. This server is cloud
based which handles user requests and output. Cloud
computing mainly provides three levels of services. First is
software as a service (SaaS) layer which provides the
application to users with a web-based way, second is platform
as a service (PaaS) which provides the development and
deployment of application as a service to users and the third is
infrastructure as a service (IaaS) which provides various
elements like virtual machine and storage re-sources as a
service to users. These services layers are independent and
provide are completely different, and different user-oriented.
But in technical view these three layers have certain
dependencies such as, SaaS products and services needs to use
SaaS layer technology and deployment platform which is
provided by the PaaS layer and the PaaS products and services
is also likely to build above the IaaS layer services. Cloud
computing center is used to run security, stability, and can be
effectively managed [3].
The Logistics Company provides the different services.
The functions of company are in different size, multiplicity of
service and global range. It includes very large but also small
firms which offer a range of services from transport services
to full service of supply chain by using forwarding,
warehousing, palletizing, packing, packaging. Their range of
functions may comprise a region, country, continent or the
whole world. To ensure that a fast and correct flow of
information between individual entities of the operating
system, a logistics company uses advance information
technologies. The company applies information technology in
order to increase efficiency and automate all the process. The
goal of company is always to meet the expectations of
potential and existing customers. Customers are using the
various services of company which always adapt to new
technologies and tools. The company lacks lot of solutions
that will integrate and automate the services of different
operators at one place. The company needs various resources
and semantics which prevent automated data integration.
Cloud computing is a universal solution which can change the
condition of company which can access software and
information provided to computers and other devices on
demand. Cloud computing is a platform to develop the
cooperation of supplier with users. This platform is easy and
cheap access to information control about current demand for
logistics services. The result should be more efficient
information flow by providing access to entire information
system from a company to supplier [4].
In the proposed logistics network a company can connect
the user with the help of different vendors and supplier at the
same time at the one platform. This platform is based on cloud
which supports any logistics company processes such as order
processing, contract management, quotation and invoicing of
the product or service to deliver the customer with help of
vendors and supplier.
Figure 2: IFC performance in Logistics Network over the cloud
In the cloud based logistics network, the first network is
for senior executive in Logistics Company who can
understand that moving information from end to end network
based on processes and systems that control the information
flow between the executives, vendor, suppliers and customer.
From the executive network the information is passed to
vendor network to verify the production details and forward to
supplier network. Supplier and buyer network makes the
connectivity between the customers and vendors. At the last,
from supplier and buyer network information is used and
available in accurate and visible form to anywhere, anytime by
using any device. This information also includes real time data
which is related to logistics company’s executive, vendor,
supplier, buyer and customer performance details.
V. STATISTICAL APPROACH IN LOGISTICS
NETWORK OVER CLOUD
There is a method of IFC in which conditions that must be
satisfied for information to flow from a source A (Company)
to a destination B (Customer), where A writes to object B or
when B reads from object A. There are two conditions are
occurred as: Information Flow Constraints on Source A
(Company) and Destination B (Customer)
When these conditions are satisfied, we say that A’s
labels are no more restrictive than B’s. A label LA is a subset
of another label LB if and only if LB contains all the tags in
LA. In the secrecy condition, the secrecy label of the source of
the information, A, must be a subset of the secrecy label of the
destination, B. In the integrity condition, the integrity label of
the destination of the information, B, must be a subset of the
integrity label of the source, A (or equivalently, the integrity
label of A must be a superset of the integrity label of B.
3. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 1 (Jan-Feb 2015), PP. 66-68
68 | P a g e
Figure 3: Information Flow Checks from source A to
Destination B
The secrecy condition ensures that confidentiality is
maintained as data propagates. For example, if a process has
knowledge of Company A’s sales information, that is, its
secrecy label contains the corresponding tag, then the process
can only write to a file with secrecy label containing at least
this tag. So that, the secrecy condition allows a process with
secrecy label (Company A Sales) to write to a file with
{Company A Sales, Company B Sales} but not to one with
{Company B Sales}. The integrity condition contains
influences from low-integrity entities. For example, a file
containing a set of verified account numbers may have the
integrity label {Accounting Verified} and the integrity
condition will not allow a process without this tag in its
integrity label, for example, a process with an empty integrity
label, to modify this file [5].
VI. BENEFITS OF CLOUD IN LOGISTICS
NETWORK
Cloud computing measures the performance of the logistics
network on the following parameters:
Cloud based logistics network is cost effective for the
companies compared to on-premise installations, for
example the company pay one-time installation
charges for the software and cost of perpetual
software licenses as annual maintenance costs.
On premise deployments company have to pay the
logistics service providers for software upgrades as
well as for the maintenance contracts. Logistics
network upgrades the software at the end of the
service provider, so company has no need to incur the
software up gradation costs separately.
Logistics network manage the software upgrades and
maintenance of the system. Network infrastructure
can be managed more effectively by the engineers
who created the network and technology rather than
own IT company.
Cloud based logistics network application can be
accessed globally by using all the stakeholders of the
order management using a thin customer. Then
logistics operations can be scaled up at low cost to
the service providers, suppliers and customers to
improve overall supply chain process.
Cloud computing based logistics network enables for
centralized backup, fault tolerance, information
management and guarantee the safe and reliable.
In logistics network over cloud, information is
updated in real-time and interact with data, the
coordination time can be greatly shortened, with the
standardized operation and management, the system
response time and efficiency have been improved
between the supplier and customer.
Cloud computing provides the centralized monitoring
for logistics network, the centralized information
resource center make regulators easy to analyze data,
manage information and visibility of business
process.
VII. CONCLUSION
Logistics Company are integrated with CRM systems,
vendor payments, information handling and requirements
planning and finally with the company’s Enterprise Resource
Planning (ERP) system. Logistics network plays a major role
in organization's Supply chain. Logistics network can be used
by the customers to ordering, receiving, order picking,
dispatch of information, and use of IFC for controlling the
flow of information across the logistics stations. Cloud based
logistics network will give good effect on logistics companies
to improve their competency in the market, and also has the
advantage of less implementation costs and better
connectivity. The continuous development of new
technologies, establishment of networks logistics companies
no longer must invest in self development and IT solutions.
Logistics Company can use the ready-made solutions like
cloud computing. The proposed logistics network over cloud
will improve the process of transmission of orders, reduce
eliminate the reporting process, reduce time processes to
access the information, information flow control and also
evaluate the processes collection, distribution and
visualization at one place.
REFERENCES
[1] Jean Bacon, David Eyers, Thomas F. J.-M. Pasquier,
Jatinder Singh, Ioannis Papagiannis, Peter Pietzuch,
Information Flow Control for Secure Cloud, IEEE
Transactions on Network and service Management
[2] Jean Bacon, David Eyers, Thomas F. J.-M. Pasquier,
Jatinder Singh, Ioannis Papagiannis, Peter Pietzuch,
Information Flow Control for Secure Cloud, IEEE
TRANSACTIONS ON NETWORK AND SERVICE
MANAGEMENT
[3] Dongxin Lu, Qi Teng (2012), Application of Cloud
Computing and IOT in Logistics,Journal of Software
Engineering and Applications, December
[4] Arkadiusz Kawa, Milena Ratajczak-Mrozek, Cooperation
between Logistics Service Providers based on Cloud
Computing , Poznań University of Economics, al.
Niepodleglości 10, 61-875 Poznań, Poland
[5] Winnie Wing-Yee Cheng, Information Flow for Secure
Distributed Applications, Department of Electrical
Engineering and Computer Science, Massachusetts Institute
of Technology 2009.