The document describes a proposed Presence Cloud solution for providing on-demand data to wireless computing devices. The key points are:
1) Existing centralized presence server architectures have scalability issues as the number of presence updates increases. Presence Cloud proposes a peer-to-peer architecture using a quorum-based server overlay to improve efficiency and scalability.
2) Presence Cloud implements caching of presence data across servers, directed buddy searches to minimize response times, and maintenance algorithms to periodically verify server connections.
3) Analysis shows Presence Cloud achieves major performance gains over centralized architectures in terms of reducing messages without sacrificing search satisfaction. The communication cost is reduced to O(n).
The document discusses processes and processors in distributed systems. It covers threads, system models, processor allocation, scheduling, load balancing, and process migration. Threads are lightweight processes that share an address space and resources. There are advantages to using threads like handling signals and implementing producer-consumer problems. System models for distributed systems include workstations with local disks, diskless workstations, and a processor pool model. Processor allocation aims to maximize CPU utilization and minimize response times. Algorithms must consider overhead, complexity, and stability.
Cloud service management tools provide visibility, control, and automation to efficiently manage cloud services across public and private implementations. They allow monitoring of cloud performance, continuity, and efficiency in virtual environments. Cloud service management also simplifies user interactions, accelerates time to value through self-service catalogs, and lowers costs by automatically allocating and de-allocating resources according to provisioning policies.
Message and Stream Oriented CommunicationDilum Bandara
Message and Stream Oriented Communication in distributed systems. Persistent vs. Transient Communication. Event queues, Pub/sub networks, MPI, Stream-based communication, Multicast communication
The document discusses common standards in cloud computing. It describes organizations like the Open Cloud Consortium and Distributed Management Task Force that develop standards. It then summarizes standards for application developers, messaging, and security including XML, JSON, LAMP, SMTP, OAuth, and SSL/TLS.
The document provides an overview of cloud computing, including its basic concepts, deployment models (public, private, hybrid, community clouds), technologies (virtualization, service-oriented architecture, grid computing, utility computing), architecture, infrastructure, planning process, and benefits and risks of different cloud models. It is intended as a tutorial for beginners to understand cloud computing concepts.
Distributed shared memory (DSM) provides processes with a shared address space across distributed memory systems. DSM exists only virtually through primitives like read and write operations. It gives the illusion of physically shared memory while allowing loosely coupled distributed systems to share memory. DSM refers to applying this shared memory paradigm using distributed memory systems connected by a communication network. Each node has CPUs, memory, and blocks of shared memory can be cached locally but migrated on demand between nodes to maintain consistency.
Replication in computing involves sharing information so as to ensure consistency between redundant resources, such as software or hardware components, to improve reliability, fault-tolerance, or accessibility.
Cloud Computing, Social Networking and Social MediaMolly Immendorf
Molly Immendorf, an instructional technology specialist at the University of Wisconsin - Extension, discusses social networks and social media. She defines a social network as a social structure composed of individuals or organizations connected through specific types of interdependencies, like values or friendship. Social media is defined as information content created by users through accessible and scalable publishing technologies. The presentation cautions that social media lacks stability, privacy, and ownership can be an issue since users are personally liable for content while data has a life of its own and may be breached by hackers or accidents.
The document discusses processes and processors in distributed systems. It covers threads, system models, processor allocation, scheduling, load balancing, and process migration. Threads are lightweight processes that share an address space and resources. There are advantages to using threads like handling signals and implementing producer-consumer problems. System models for distributed systems include workstations with local disks, diskless workstations, and a processor pool model. Processor allocation aims to maximize CPU utilization and minimize response times. Algorithms must consider overhead, complexity, and stability.
Cloud service management tools provide visibility, control, and automation to efficiently manage cloud services across public and private implementations. They allow monitoring of cloud performance, continuity, and efficiency in virtual environments. Cloud service management also simplifies user interactions, accelerates time to value through self-service catalogs, and lowers costs by automatically allocating and de-allocating resources according to provisioning policies.
Message and Stream Oriented CommunicationDilum Bandara
Message and Stream Oriented Communication in distributed systems. Persistent vs. Transient Communication. Event queues, Pub/sub networks, MPI, Stream-based communication, Multicast communication
The document discusses common standards in cloud computing. It describes organizations like the Open Cloud Consortium and Distributed Management Task Force that develop standards. It then summarizes standards for application developers, messaging, and security including XML, JSON, LAMP, SMTP, OAuth, and SSL/TLS.
The document provides an overview of cloud computing, including its basic concepts, deployment models (public, private, hybrid, community clouds), technologies (virtualization, service-oriented architecture, grid computing, utility computing), architecture, infrastructure, planning process, and benefits and risks of different cloud models. It is intended as a tutorial for beginners to understand cloud computing concepts.
Distributed shared memory (DSM) provides processes with a shared address space across distributed memory systems. DSM exists only virtually through primitives like read and write operations. It gives the illusion of physically shared memory while allowing loosely coupled distributed systems to share memory. DSM refers to applying this shared memory paradigm using distributed memory systems connected by a communication network. Each node has CPUs, memory, and blocks of shared memory can be cached locally but migrated on demand between nodes to maintain consistency.
Replication in computing involves sharing information so as to ensure consistency between redundant resources, such as software or hardware components, to improve reliability, fault-tolerance, or accessibility.
Cloud Computing, Social Networking and Social MediaMolly Immendorf
Molly Immendorf, an instructional technology specialist at the University of Wisconsin - Extension, discusses social networks and social media. She defines a social network as a social structure composed of individuals or organizations connected through specific types of interdependencies, like values or friendship. Social media is defined as information content created by users through accessible and scalable publishing technologies. The presentation cautions that social media lacks stability, privacy, and ownership can be an issue since users are personally liable for content while data has a life of its own and may be breached by hackers or accidents.
Fault tolerance is important for distributed systems to continue functioning in the event of partial failures. There are several phases to achieving fault tolerance: fault detection, diagnosis, evidence generation, assessment, and recovery. Common techniques include replication, where multiple copies of data are stored at different sites to increase availability if one site fails, and check pointing, where a system's state is periodically saved to stable storage so the system can be restored to a previous consistent state if a failure occurs. Both techniques have limitations around managing consistency with replication and overhead from checkpointing communications and storage requirements.
Transaction concept, ACID property, Objectives of transaction management, Types of transactions, Objectives of Distributed Concurrency Control, Concurrency Control anomalies, Methods of concurrency control, Serializability and recoverability, Distributed Serializability, Enhanced lock based and timestamp based protocols, Multiple granularity, Multi version schemes, Optimistic Concurrency Control techniques
The document discusses schedule-based MAC protocols for wireless sensor networks. It begins with a review of previous concepts and then discusses key schedule-based protocols including LEACH, SPIN, S-MAC, and TRAMA. The document emphasizes that schedule-based protocols explicitly assign transmission timeslots to nodes to avoid collisions and allow nodes to sleep at other times, reducing idle listening and improving energy efficiency compared to contention-based protocols. Time synchronization is necessary for schedule-based protocols to function properly.
S/MIME (Secure Multipurpose Internet Mail Extensions) allows users to securely send emails through encryption and digital signatures. It uses public key cryptography, with algorithms like RSA and ElGamal for encryption and DSS and RSA for digital signatures. S/MIME supports encrypting the message contents, digitally signing the message, or both. It defines new MIME types to implement these security features for email. Other technologies like PGP provide similar email security functionality to S/MIME.
This document provides an overview of operating system security. It discusses the key components and functions of an operating system including multitasking, resource management, user interfaces, and more. It then examines the security environment of an operating system including services, files, memory, authentication, authorization, and vulnerabilities. Finally, it outlines best practices for securing an operating system such as installing only necessary software, configuring users and permissions properly, applying patches and updates, and performing regular security monitoring, backups and testing.
The document discusses various models of parallel and distributed computing including symmetric multiprocessing (SMP), cluster computing, distributed computing, grid computing, and cloud computing. It provides definitions and examples of each model. It also covers parallel processing techniques like vector processing and pipelined processing, and differences between shared memory and distributed memory MIMD (multiple instruction multiple data) architectures.
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...sumithragunasekaran
Terminologies and its types
In-Memory Analytics
In-Database processing
Symmetric Multiprocessor system(SMP)
Massively Parallel Processing
Difference Between Parallel and Distributed Systems
Shared Nothing Architecture
Advantages of a “ shared nothing Architecture”
CAP Theorem Explained
CAP Theorem
The document provides an overview of cloud computing, including its key concepts and components. It discusses the different deployment models (public, private, hybrid, community clouds), service models (IaaS, PaaS, SaaS), characteristics, benefits, history and evolution. Communication protocols used in cloud computing like HTTP, HTTPS and various RPC implementations are also mentioned. The role of open standards in cloud architecture including virtualization, SOA, open-source software and web services is assessed.
This document discusses key aspects of distributed file systems including file caching schemes, file replication, and fault tolerance. It describes different cache locations, modification propagation techniques, and methods for replica creation. File caching schemes aim to reduce network traffic by retaining recently accessed files in memory. File replication provides increased reliability and availability through independent backups. Distributed file systems must also address being stateful or stateless to maintain information about file access and operations.
Cluster computing involves linking multiple computers together to act as a single system. There are three main types of computer clusters: high availability clusters which maintain redundant backup nodes for reliability, load balancing clusters which distribute workloads efficiently across nodes, and high-performance clusters which exploit parallel processing across nodes. Clusters offer benefits like increased processing power, cost efficiency, expandability, and high availability.
The document discusses different models for distributed systems including physical, architectural and fundamental models. It describes the physical model which captures the hardware composition and different generations of distributed systems. The architectural model specifies the components and relationships in a system. Key architectural elements discussed include communicating entities like processes and objects, communication paradigms like remote invocation and indirect communication, roles and responsibilities of entities, and their physical placement. Common architectures like client-server, layered and tiered are also summarized.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
Importance & Principles of Modeling from UML DesigningABHISHEK KUMAR
Object oriented analysis and design uses modeling to understand systems being developed. Models simplify systems at different abstraction levels to visualize structure and behavior, provide templates for building systems, and document decisions. Effective modeling requires choosing appropriate models that influence solutions, expressing models at different abstraction levels for different stakeholders, ensuring models are grounded in reality, and using multiple complementary models to solve complex systems.
Distributed systems allow independent computers to appear as a single coherent system by connecting them through a middleware layer. They provide advantages like increased reliability, scalability, and sharing of resources. Key goals of distributed systems include resource sharing, openness, transparency, and concurrency. Common types are distributed computing systems, distributed information systems, and distributed pervasive systems.
Client-Centric Consistency
Provide guarantees about ordering of operations only for a single client, i.e.
Effects of an operations depend on the client performing it
Effects also depend on the history of client’s operations
Applied only when requested by the client
No guarantees concerning concurrent accesses by different clients
Assumption:
Clients can access different replicas, e.g. mobile users
Layer between OS and distributed applications,Hides complexity and heterogeneity of distributed system ,Bridges gap between low-level OS communications and programming language abstractions,Provides common programming abstraction and infrastructure for distributed applications.
This document summarizes a student's seminar presentation on a proposed "Presence Cloud" system for wireless devices. The system would use a cloud-based server architecture to efficiently store and search for user presence information across large numbers of mobile users. It describes the existing centralized server architectures used by IM systems that do not scale well. The proposed Presence Cloud system would organize servers in a peer-to-peer overlay network with one-hop caching and a directed search algorithm to achieve small constant search times. The performance of the system would be evaluated based on search costs, search messages, and latency.
Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid.
Cloud computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Details are abstracted from the users, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them.
Fault tolerance is important for distributed systems to continue functioning in the event of partial failures. There are several phases to achieving fault tolerance: fault detection, diagnosis, evidence generation, assessment, and recovery. Common techniques include replication, where multiple copies of data are stored at different sites to increase availability if one site fails, and check pointing, where a system's state is periodically saved to stable storage so the system can be restored to a previous consistent state if a failure occurs. Both techniques have limitations around managing consistency with replication and overhead from checkpointing communications and storage requirements.
Transaction concept, ACID property, Objectives of transaction management, Types of transactions, Objectives of Distributed Concurrency Control, Concurrency Control anomalies, Methods of concurrency control, Serializability and recoverability, Distributed Serializability, Enhanced lock based and timestamp based protocols, Multiple granularity, Multi version schemes, Optimistic Concurrency Control techniques
The document discusses schedule-based MAC protocols for wireless sensor networks. It begins with a review of previous concepts and then discusses key schedule-based protocols including LEACH, SPIN, S-MAC, and TRAMA. The document emphasizes that schedule-based protocols explicitly assign transmission timeslots to nodes to avoid collisions and allow nodes to sleep at other times, reducing idle listening and improving energy efficiency compared to contention-based protocols. Time synchronization is necessary for schedule-based protocols to function properly.
S/MIME (Secure Multipurpose Internet Mail Extensions) allows users to securely send emails through encryption and digital signatures. It uses public key cryptography, with algorithms like RSA and ElGamal for encryption and DSS and RSA for digital signatures. S/MIME supports encrypting the message contents, digitally signing the message, or both. It defines new MIME types to implement these security features for email. Other technologies like PGP provide similar email security functionality to S/MIME.
This document provides an overview of operating system security. It discusses the key components and functions of an operating system including multitasking, resource management, user interfaces, and more. It then examines the security environment of an operating system including services, files, memory, authentication, authorization, and vulnerabilities. Finally, it outlines best practices for securing an operating system such as installing only necessary software, configuring users and permissions properly, applying patches and updates, and performing regular security monitoring, backups and testing.
The document discusses various models of parallel and distributed computing including symmetric multiprocessing (SMP), cluster computing, distributed computing, grid computing, and cloud computing. It provides definitions and examples of each model. It also covers parallel processing techniques like vector processing and pipelined processing, and differences between shared memory and distributed memory MIMD (multiple instruction multiple data) architectures.
Terminologies Used In Big data Environments,G.Sumithra,II-M.sc(computer scien...sumithragunasekaran
Terminologies and its types
In-Memory Analytics
In-Database processing
Symmetric Multiprocessor system(SMP)
Massively Parallel Processing
Difference Between Parallel and Distributed Systems
Shared Nothing Architecture
Advantages of a “ shared nothing Architecture”
CAP Theorem Explained
CAP Theorem
The document provides an overview of cloud computing, including its key concepts and components. It discusses the different deployment models (public, private, hybrid, community clouds), service models (IaaS, PaaS, SaaS), characteristics, benefits, history and evolution. Communication protocols used in cloud computing like HTTP, HTTPS and various RPC implementations are also mentioned. The role of open standards in cloud architecture including virtualization, SOA, open-source software and web services is assessed.
This document discusses key aspects of distributed file systems including file caching schemes, file replication, and fault tolerance. It describes different cache locations, modification propagation techniques, and methods for replica creation. File caching schemes aim to reduce network traffic by retaining recently accessed files in memory. File replication provides increased reliability and availability through independent backups. Distributed file systems must also address being stateful or stateless to maintain information about file access and operations.
Cluster computing involves linking multiple computers together to act as a single system. There are three main types of computer clusters: high availability clusters which maintain redundant backup nodes for reliability, load balancing clusters which distribute workloads efficiently across nodes, and high-performance clusters which exploit parallel processing across nodes. Clusters offer benefits like increased processing power, cost efficiency, expandability, and high availability.
The document discusses different models for distributed systems including physical, architectural and fundamental models. It describes the physical model which captures the hardware composition and different generations of distributed systems. The architectural model specifies the components and relationships in a system. Key architectural elements discussed include communicating entities like processes and objects, communication paradigms like remote invocation and indirect communication, roles and responsibilities of entities, and their physical placement. Common architectures like client-server, layered and tiered are also summarized.
This document discusses wireless sensor network applications and energy consumption. It provides examples of WSN applications including disaster relief, environment monitoring, healthcare, and more. It then discusses various factors that influence energy consumption in sensor nodes, including operation states, microcontroller usage, radio transceivers, memory, and the relationship between computation and communication. Specific power consumption numbers are given for different components like radios, sensors, and microprocessors. The goals of optimization for WSNs are discussed as quality of service, energy efficiency, scalability, and robustness.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
Importance & Principles of Modeling from UML DesigningABHISHEK KUMAR
Object oriented analysis and design uses modeling to understand systems being developed. Models simplify systems at different abstraction levels to visualize structure and behavior, provide templates for building systems, and document decisions. Effective modeling requires choosing appropriate models that influence solutions, expressing models at different abstraction levels for different stakeholders, ensuring models are grounded in reality, and using multiple complementary models to solve complex systems.
Distributed systems allow independent computers to appear as a single coherent system by connecting them through a middleware layer. They provide advantages like increased reliability, scalability, and sharing of resources. Key goals of distributed systems include resource sharing, openness, transparency, and concurrency. Common types are distributed computing systems, distributed information systems, and distributed pervasive systems.
Client-Centric Consistency
Provide guarantees about ordering of operations only for a single client, i.e.
Effects of an operations depend on the client performing it
Effects also depend on the history of client’s operations
Applied only when requested by the client
No guarantees concerning concurrent accesses by different clients
Assumption:
Clients can access different replicas, e.g. mobile users
Layer between OS and distributed applications,Hides complexity and heterogeneity of distributed system ,Bridges gap between low-level OS communications and programming language abstractions,Provides common programming abstraction and infrastructure for distributed applications.
This document summarizes a student's seminar presentation on a proposed "Presence Cloud" system for wireless devices. The system would use a cloud-based server architecture to efficiently store and search for user presence information across large numbers of mobile users. It describes the existing centralized server architectures used by IM systems that do not scale well. The proposed Presence Cloud system would organize servers in a peer-to-peer overlay network with one-hop caching and a directed search algorithm to achieve small constant search times. The performance of the system would be evaluated based on search costs, search messages, and latency.
Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid.
Cloud computing is a paradigm shift following the shift from mainframe to client–server in the early 1980s. Details are abstracted from the users, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them.
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
A scalable server architecture for mobile presence servicesSree Chinni
In this we propose an efficient and scalable server architecture, called Presence Cloud, which enables mobile presence services to support large-scale social network applications. When a mobile user joins a network, Presence Cloud searches for the presence of his/her friends and notifies them arrival.
Changes in how business is done combined with multiple technology drivers make geo-distributed data increasingly important for enterprises. These changes are causing serious disruption across a wide range of industries, including healthcare, manufacturing, automotive, telecommunications, and entertainment. Technical challenges arise with these disruptions, but the good news is there are now innovative solutions to address these problems. http://info.mapr.com/WB_Geo-distributed-Big-Data-and-Analytics_Global_DG_17.05.16_RegistrationPage.html
IBM's zAnalytics strategy provides a complete picture of analytics on the mainframe using DB2, the DB2 Analytics Accelerator, and Watson Machine Learning for System z. The presentation discusses updates to DB2 for z/OS including agile partition technology, in-memory processing, and RESTful APIs. It also reviews how the DB2 Analytics Accelerator can integrate with Machine Learning for z/OS to enable scoring of machine learning models directly on the mainframe for both small and large datasets.
An Algorithm to synchronize the local database with cloud DatabaseAM Publications
Since the cloud computing [1] platform is widely accepted by the industry, variety of applications are designed targeting to a cloud platform. Database as a Service (DaaS) is one of the powerful platform of cloud computing. There are many research issues in DaaS platform and one among them is the data synchronization issue. There are many approaches suggested in the literature to synchronise a local database by being in cloud environment. Unfortunately, very few work only available in the literature to synchronise a cloud database by being in the local database. The aim of this paper is to provide an algorithm to solve the problem of data synchronization from local database to cloud database.
This document discusses smart apps and how Pivotal uses data science to build them. It describes three key components of smart apps: data, a smart system that uses data science to understand user behavior, and a user interface. It then provides examples of smart apps Pivotal has developed for logistics and automotive customers, describing how machine learning models were used to predict delivery locations and road conditions. The document emphasizes an API-first approach and using cloud platforms like Cloud Foundry to operationalize models and deliver insights through predictive APIs.
This document provides an overview of cloud computing, including definitions, history, architecture, service models, deployment models, and characteristics. It begins with defining cloud computing and what cloud means. Next, it discusses the history and evolution of cloud computing from concepts like grid computing and utility computing. The remainder of the document covers cloud architecture, including essential characteristics, service modules, and deployment types. It also discusses specific service models like SaaS, PaaS, and IaaS.
This document proposes a scalable server architecture called Presence Cloud for social networking applications. Presence Cloud organizes presence servers into a server-to-server overlay network to improve efficiency and scalability. It employs techniques like one-hop caching and directed buddy search to minimize response times and reduce network traffic. The document describes modules of the proposed system and provides screenshots of a sample implementation.
This talk provides an introduction and key ideas for how to design streaming architecture, how streaming can support microservices, and what capabilities are needed in message transport (event streams) such as Apache Kafka and MapR Streams (that uses Kafka API).
International Journal of Engineering Research and DevelopmentIJERD Editor
This document summarizes an architecture called PresenceCloud that is proposed to address scalability issues in mobile presence services for large-scale social networks. PresenceCloud organizes presence server nodes in a quorum-based overlay network with low diameter to efficiently search for users' buddy lists. It employs a one-hop caching strategy where each node caches the user lists of its neighboring nodes to reduce search latency. When a search request is received, the directed search algorithm first checks the local user list and cache, then forwards the remaining search targets to neighboring nodes based on their identifiers to minimize messages. Analysis shows this architecture reduces the communication cost of buddy searches and presence updates to a constant compared to a linear cost for a simple replication approach.
This document summarizes a research paper that proposes an efficient and scalable server architecture called "Presence Cloud" to address problems in large-scale mobile presence services. Presence Cloud organizes presence servers in a quorum-based overlay network with balanced load and small diameter. It employs a one-hop caching strategy and directed search algorithm to reduce message transmission and provide fast buddy list searches with low latency. The performance of Presence Cloud is analyzed in terms of search cost and satisfaction level.
The document discusses cloud computing technology and applications. It provides an introduction to cloud computing concepts, distributed systems, MapReduce, and technologies like Google File System, BigTable and AppEngine. It then outlines the syllabus for a cloud computing course, including topics on virtualization, data centers, and guest lectures. Project presentations will account for 60% of the grading.
CPaaS.io Y1 Review Meeting - Holistic Data ManagementStephan Haller
Data management and governance aspects of the CPaaS.io platform as presented at the first year review meeting in Tokyo on October 5, 2017.
Disclaimer:
This document has been produced in the context of the CPaaS.io project which is jointly funded by the European Commission (grant agreement n° 723076) and NICT from Japan (management number 18302). All information provided in this document is provided "as is" and no guarantee or warranty is given that the information is fit for any particular purpose. The user thereof uses the information at its sole risk and liability. For the avoidance of all doubts, the European Commission and NICT have no liability in respect of this document, which is merely representing the view of the project consortium. This document is subject to change without notice.
An Introduction to the MapR Converged Data PlatformMapR Technologies
Listen to the webinar on-demand: http://info.mapr.com/WB_Partner_CDP_Intro_EMEA_DG_17.05.31_RegistrationPage.html
In this 90-minute webinar, we discuss:
- The MapR Converged Data Platform and its components
- Use cases for the Converged Data Platform
- MapR Converged Partner Program
- How to get started with MapR
- Becoming a partner
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
Presence cloud
1. Department of Computer Science & Engineering
Shri Sant Gajanan Maharaj College of Engineering
Shegaon (444203)
“Presence Cloud based solution for on
demand data in wireless computing devices”
Guided by :
Prof. N. M. Kandoi
Submitted by:
Ms. Monali D. Akhare
M.E. 2nd year (Computer Engg)
1/16/20171
“Presence Cloud based solution for on demand
data in wireless computing devices”
Seminar on
2. OVERVIEW
1/16/20172
“Presence Cloud based solution for on demand
data in wireless computing devices”
Motivation
Existing Work
Analysis of Problem
Proposed Work
Implementation of Presence Cloud
-Modules
-Algorithm
Flowchart
Snapshot
Result Analysis
Applications
Conclusion
Future Scope
References
Dissemination of work
3. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
3
• Social network services are growing and many
people are sharing digital resources in order
to facilitate, enhance or improve collaborative work.
• A mobile presence service is an essential component of social networking
applications as it keeps user presence information.
• If presence updates occur frequently, enormous number of message
distributed by servers may lead to scalability problem.
MOTIVATION
Cloud
Server-side Virtual World
Compute Power
4. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
4
• To address this problem , Chi-Jen et la, [1]in 2013 propose an efficient
and scalable server architecture which is called Presence Cloud.
• Presence Cloud organizes presence servers into server-to-server
architecture.
• The performance can be analysed in terms of search cost and search
satisfaction level.
5. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
5
• Objective is to propose an on demand QoS(Quality of service)
routing algorithm.
• The proposed approach has two phases namely:
-route discovery phase
-route maintenance phase
• This is first work that explicitly design a presence server architecture
that significantly outperforms those based distributed hash table.
6. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
6
•3 popular commercial IM systems are : AIM[1],Microsoft MSN[8][13],
Yahoo! Messenger.
•They leverage some form of centralized clusters.
•Centralized clusters are used to provide presence services.
•Storing the presence is one of the most messaging traffic in these instant
messaging system.
EXISTING SYSTEM
7. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
7
• All these IM services use central server architecture leads to
scalability problem at server side.
• Several studies have investigated the issues of user satisfaction in
several domians,including www search engine.
• There is no study of exploring the user satisfaction issues, such as
search response time, search precise etc,about mobile presence
service.
• So to address the problem, Presence Cloud organizes presence
servers into a quorum-based server-to-server architecture for
efficient presence searching.
8. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
8
• Mobile ubiquity services is important element of cloud computing
environments.
• If presence updates occur often number of messages distributed by
presence server lead to scalability problem & buddy list search problem.
• To overcome scalability problem proposed an efficient and ascendable
server architecture called Presence Cloud.
• People are nomadic and mobile information is more mutable and
dynamic, so new design of mobile presence services is needed to
address the buddy-list search problem especially for the demand of
mobile social n/w application.
ANALYSIS OF PROBLEM
9. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
9
PROPOSED SYSTEM
•Aim of proposed system is to design Peer–to–peer cloud server
architecture to remove centralized server.
•P2P reduces the maintenance costs and failures in server based
deployment.
•Presence Cloud is based on grid quorum based system the clients are
organized in DHT & size of Presence server node is O√m.
•The results demonstrate Presence-Cloud achieves major performance
gains in terms of reducing number of messages without sacrificing search
satisfaction.
10. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
10
• There are 3 elements in presence cloud which run across presence
servers such as Presence Cloud Server overlay, One hop Caching
approach, and Directed buddy search .
Overview of Presence Cloud
IMPLEMENTATION
11. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
11
1. Presence cloud server overlay
• This construction algorithm organizes ps nodes in to server – to –
server overlay.
• It provides a good low diameter property.
• It ensure that a ps node needs only two hops.
Presence Cloud Server Overlay
MODULES
12. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
12
2. One hop caching
• To improve efficiency, presence cloud requires a caching strategy.
• In Presence Cloud, each PS node maintains a user list of presence
information of the attached users.
• The cache is updated when neighbors establishes a connection to it and
it updated periodically with it neighbors.
• Therefore, when any PS node receives a query, it can respond not only
with its own user list but also matches in the user lists offered by all of
its neighbors.
13. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
13
3. Directed buddy search
• Minimizing the searching response time is important in presence
services.
• Thus, the buddy list searching algorithm of Presence Cloud coupled
with the two-hop overlay and one-hop caching strategy ensures that
Presence Cloud can typically provide swift responses for a large
number of mobile users.
• Clearly, this mechanism reduces
both network traffic and response
time.
Buddy list searching in Presence Cloud.
14. 1/16/201714
ALGORITHM
Presence Cloud Maintenance Algorithm 1:
/* periodically verify PS node n’s pslist */
Definition:
pslist: set of the current PS list of this PS node, n
pslist[].connection: the current PS node in pslist
pslist[].id: identifier of the correct connection in pslist
node.id: identifier of PS node node
Algorithm:
r .Sizeof(pslist)
for i = 1 to r do
node .pslist[i].connection
if node.id ≠pslist[i].id then
/* ask node to refresh n’s PS list entries */
“Presence Cloud based solution for on demand
data in wireless computing devices”
15. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
15
findnode.Find_CorrectPSNode(node)
if findnode=nil then
pslist[i].connection.RandomNode(node)
else
pslist[i].connection.findnode
end if
else
/* send a heartbeat message */
bfailed.SendHeartbeatmsg(node)
if bfailed= true then
pslist[i].connection.RandomNode(node)
end if
end if
end for
16. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
16
Directed Buddy Search Algorithm 2:
1.A mobile user logins Presence Cloud and decides the associated PS node,
q.
2.The user sends a Buddy List Search Message, B to the PS node q.
3.When the PS node q receives a B, then retrieves each bi from B and
searches its user list and one-hop cache to respond to the coming query.
And removes the responded buddies from B.
4. If B = nil, the buddy list search operation is done.
5.Otherwise, if B =nil, the PS node q should hash each remaining identifier
in B to obtain a grid ID, respectively.
6.Then, the PS node q aggregates these b(g) to become a new B(j), for each
g Sj. Here, PS node j is the intersection node of Sq intersection Sg. And
sends the new B(j) to PS node j.
26. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
26
SCREEN 9
System Database
table showing
distance between
nodes
27. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
27
SCREEN 10
Android Mobile app
(Video on demand)
28. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
28
SCREEN 11
Creating User Profile
29. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
29
SCREEN 12
Connecting nodes and
accessing data
30. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
30
RESULT ANALYSIS
Cost Analysis
•The communication cost of searching buddies and replicating presence
information can be formulated as:
Mcost = QMesh +RMesh,
- RMesh communication cost of replicating presence information to all PS
nodes, hence Mcost = O(n).
- QMesh, is only one message.
•The distance between the source node to destination node can be
calculated by using formula: 2((√n)-1)*v
•The maximum communication cost of the buddy list search problem is
O(√n), where n is the number of presence servers.
31. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
31
SCREEN 13
Calculated Node
Path and Time
Required by
Normal
Algorithm
32. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
32
SCREEN 14
Calculated Node
Path and Distance
using Our New
Algorithm
33. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
33
Performance Metrics
• Performance Metrics Within the context of the model, we measure the
performance of server architectures using the following three metrics:
-Total searching messages
-Average searching messages per-arrived user
-Average searching latency
34. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
34
• Worst case-The mobile users are distributed equally among all the PS
nodes.
• Presence cloud is used to overcome the several types of existing
problems in presence services of mobility devices.
• The result of output shows that Presence Cloud is very much efficient
system when compare to the previous existing system.
35. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
35
Efficiency Graph of Normal Algorithm vs Presence Cloud Algorithm
0
5
10
15
20
25
0 500 1000 1500 2000 2500
Pie chart showing Distance
Distance in Normal
Distance By Our Algo
Distance
Time (ms)
36. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
36
Number Description Alternatives (If
available)
1 PC with 100 GB hard-disk and
2 GB RAM
Not-Applicable
2 PCs in Network
HARDWARE System Configuration
37. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
37
Number Description Alternatives(If
available)
1 Windows 7/8/XP/linux with MS-
office
Not Applicable
2 Java(1.6), Java 1.5,
3 Eclipse 3.3 Neat Bean 7.4
4 Android Mobile
5 Tomcat server 7
6 Mysql Database Server 5.5
SOFTWARE System Configuration
38. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
38
APPLICATIONS
• Server overlay and a directed buddy search algorithm are used to
achieve small constant search latency.
• The rationale behind the design of Presence Cloud is to distribute the
information of millions of users among thousands of presence servers
on the Internet, mobile telephones.
• Maps, Robot navigation, Urban traffic planning, Optimal pipelining of
VLSI chip, Subroutine in advanced algorithms, Routing of
telecommunications messages.
39. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
39
Presence Cloud, a scalable server architecture that supports mobile
presence services in large-scale social network.
Scalability problem in server and buddy-list search problem is been
resolved.
The results of simulations demonstrate that Presence Cloud achieves major
performance gains in terms of the search cost and search satisfaction
within Time.
CONCLUSION
40. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
40
Presence is a powerful network capability that is useful for consumers,
for enterprises and for mobile operators.
Presence complements new business models in open mobile eco-
systems.
Application developers for Android, iPhone or Windows Mobile can
easily derive and use Presence to offer new social applications.
In the future, mobile devices will become more powerful, sensing, and
media capture devices.
FUTURE SCOPE
41. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
41
REFERENCES
[1] Chi-Jen Wu, Jan-Ming Ho, Member, IEEE, and Ming-Syan Chen, Fellow, IEEE on “A
Scalable Server Architecture for Mobile Presence Services in Social Network
Applications”, 2013.
[2] R.B. Jennings, E.M. Nahum, D.P. Olshefski, D. Saha, Z.-Y.Shae, and C. Waters, “A Study
of Internet Instant Messaging and Chat Protocols,” IEEE Network, vol. 20, no. 6, pp. 16-
21, July/Aug.2006.
[3] Z. Xiao, L. Guo, and J. Tracey, “Understanding Instant Messaging Traffic
Characteristics,” Proc. IEEE 27th Int’l Conf. Distributed Computing Systems (ICDCS),
2007.
[4] C. Chi, R. Hao, D. Wang, and Z.-Z. Cao, “IMS Presence Server:Traffic Analysis and
Performance Modelling,” Proc. IEEE Int’lConf. Network Protocols (ICNP), 2008.
[5] A. Houri, S. Parameswar, E. Aoki, V. Singh, and H. Schulzrinne, “Scaling Requirements
for Presence in SIP/SIMPLE,” IETF Internet draft, 2009
[6] S.A. Baset, G. Gupta, and H. Schulzrinne, “Open VoIP: An Open Peer-to-Peer VoIP and
IM System,” Proc. ACM SIGCOMM, 2008.
[7] Open Mobile Alliance, “OMA Instant Messaging and Presence Service,” 2005
[8] W.-E. Chen, Y.-B.Lin, and R.-H. Liou, “A Weakly Consistent Scheme for
42. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
42
IMS Presence Service,” IEEE Trans. Wireless Comm.,vol. 8, no. 7, pp. 3815-3821, July
2009.
[9] N. Banerjee, A. Acharya, and S.K. Das, “Seamless SIP-BasedMobility for Multimedia
Applications,” IEEE Network, vol. 20, no. 2, pp. 6–13, 2006.
[10] Kundan Singh and Henning Schulzrinne Department of Computer Science, Columbia
University {kns10,hgs}@cs.columbia.edu, “SIPPEER : A session iniiation protocol
(SIP)-baed peer-to-peer internet telephony cllient adaptor” .
[11] Michael Piatek, Tomas Isdal, Arvind Krishnamurthy , and Thomas Anderson “One hop
Reputations for Peer to Peer FileSharing Workloads”.
[12] Brent Hecht, Jaime Teevan , Meredith Ringel Morris, and Dan Liebling, “SearchBuddies:
Bringing Search Engines into theConversation”,2012.
[13] K. Singh and H. Schulzrinne, ”Peer-to-peer internet telephony using sip,” Proc. of ACM
NOSSDVA, 2005.
[14] P. Saint-Andre, ”Interdomain presence scaling analysis for the extensible messaging and
presence protocol (xmpp),” RFC Internet Draft, 2008.
[15] A. Houri, T. Rang, and E. Aoki, ”Problem statement for sip/simple,” RFC Internet-Draft,
2009.
[16] A. Houri, S. Parameswar, E. Aoki, V. Singh, and H. Schulzrinne, ”Scaling requirements
for presence in sip/simple,” RFC Internet- Draft, 2009.
43. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
43
[17] J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M.
Handley, and E. Schooler, ”Sip: Session initiation protocol,” RFC 3261, 2002.
[18] P. Bellavista, A. Corradi, and L. Foschini, ”Ims-based presence service with enhanced
scalability and guaranteed qos for inter domain enterprise mobility,” IEEE Wireless
Communications, 2009.
[19] A. Houri, E. Aoki, S. Parameswar, T. Rang, , V. Singh, and H. Schulzrinne, ”Presence
interdomain scaling analysis for sip/simple,” RFC Internet-Draft, 2009.
[20] M. Maekawa, ”Ap n algorithm for mutual exclusion in decentralized systems,” ACM
Transactions on Computer Systems, 1985.
[21] D. Eastlake and P. Jones, ”Us secure hash algorithm 1 (SHA1),” RFC 3174, 2001.
[22] M. Steiner, T. En-Najjary, and E. W. Biersack, ”Long term study of peer behavior in the
kad DHT,” IEEE/ACM Trans. Netw., 2009.
[23] K. Singh and H. Schulzrinne, ”Failover and load sharing in sip telephony,” International
Symposium on Performance Evaluation of Computer and Telecommunication Systems,
July 2005. 2011 14
[24] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, ”Chord: A
scalable peer-to-peer lookup service for internet,” IEEE/ACM Tran. on Networking, 2003.
[25] X. Chen, S. Ren, H. Wang, and X. Zhang, ”Scope: scalable consistency maintenance in
structured p2p systems,” Proc. of IEEE INFOCOM, 2005.
[26] K. P. Gummadi, S. Saroiu, and S. D. Gribble., ”King: Estimating latency between
arbitrary internet end hosts,” Proc. of ACM IMW, 2002.
44. 1/16/2017
“Presence Cloud based solution for on demand
data in wireless computing devices”
44
Published:
1. Monali.D.Akhare and Prof.N.M.Kandoi “AN ANALYSIS OF PRESENCE CLOUD BASED
SOLUTION FOR ON DEMAND DATA IN WIRELESS COMPUTING DEVICES”, International
Journal of Research in Computer & Information Technology, Vol.1, Special Issue 1, 2016,45th
International Conference held in Amravati ISTE,January-2016.
2. Monali.D.Akhare and Prof.N.M.Kandoi “A Survey on Presence Cloud based solution for on demand
data in wireless computing devices”,IJR volume 2,Issue 10,October 2015.
3. Monali.D.Akhare and Prof.N.M.Kandoi “Reviewing the Problem for Presence Cloud Based
Solution for on Demand Data in Wireless Computing Devices”, International Journal on Recent and
Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 4 Issue: Jan,2016.
4. Monali.D.Akhare and Prof.N.M.Kandoi “Accessing Data by using Presence Cloud based solution
for on demand services in wireless computing devices” International Conference on Computational
Modeling and Security (CMS 2016) Elsevier Procedia & Science
Direct,doi:10.1016/j.procs.2016.05.270.
DISSEMINATION OF WORK