call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
This is the firs presentation I created for training IBM EBIS community on cloud computing and apporach to cloud sales and projects. All the materials come from IBM internal documentation and precedent classes slide.
This is the firs presentation I created for training IBM EBIS community on cloud computing and apporach to cloud sales and projects. All the materials come from IBM internal documentation and precedent classes slide.
Introduces the characteristics of clouds and discusses the challenges that these pose for engineering scientific applications on the cloud. Key challenges are programming models, developing PaaS interfaces for high performance/high throughput computing and developing an SDE for cloud programmng.
The term “Cloud Computing” is a recent buzzword in the IT world. Behind this fancy poetic phrase, there lies a true picture for the future of computing for both in technical prospective and social prospective. However, the term “Cloud Computing” is recent but the idea of centralizing computation and storage in distributed data centers maintained by third party companies is not new but it came in the way back in 1990s along with distributed computing approaches like grid computing. Cloud computing aimed at providing IT as a service to the cloud users on-demand basic with greater flexibility, availability, reliability and scalability with utility computing model. This new paradigm of computing has an immense potential in it to be use in the field of e-governance and in rural development perspective in the developing country like India.
The basics of cloud computing , Everything as a service, cloud broker, Importance of Telco in cloud computing and more.
Download it here
https://youtu.be/ohK8Nd8Jq_o
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Introduces the characteristics of clouds and discusses the challenges that these pose for engineering scientific applications on the cloud. Key challenges are programming models, developing PaaS interfaces for high performance/high throughput computing and developing an SDE for cloud programmng.
The term “Cloud Computing” is a recent buzzword in the IT world. Behind this fancy poetic phrase, there lies a true picture for the future of computing for both in technical prospective and social prospective. However, the term “Cloud Computing” is recent but the idea of centralizing computation and storage in distributed data centers maintained by third party companies is not new but it came in the way back in 1990s along with distributed computing approaches like grid computing. Cloud computing aimed at providing IT as a service to the cloud users on-demand basic with greater flexibility, availability, reliability and scalability with utility computing model. This new paradigm of computing has an immense potential in it to be use in the field of e-governance and in rural development perspective in the developing country like India.
The basics of cloud computing , Everything as a service, cloud broker, Importance of Telco in cloud computing and more.
Download it here
https://youtu.be/ohK8Nd8Jq_o
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
A Beijaflor Moto Express, veio com o objetivo de ser uma empresa motoboy para entrega referência, e vem realizando um trabalho muito bom e reconhecido no ramo.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Welcome to International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 6, Issue 7 (April 2013), PP.69-73
69
A Open Source Tools & Comparative Study on Cloud
Computing
RajuVadicharla, Ravi Kumar V, Nagaraju Samala, P.VenkatakishanRao
1
M.Tech Software Engineering from JTUH
2,3,4
M.Tech Computer Science & Engineering from JTUH
Abstract:- Cloud computing offers information technology business use through the model, to build
the type of application system we are using the cloud open source tools. The idea of tool is a process,
developing the program and compile or run the package file automatically. Our goal is to implement
open source tool analysis and development came into cloud computing system recognize to generate in
human understandable way. This work shows the existing work on cloud open source is solution to
implement industry applications, products. Few open source tools are configuration, monitoring, and
automated techniques on the importance for this research.Comparative work of cloud sim, EC2 is
shows that cloud sim is having best effort which is reliable.
Keywords:- Cloud Computing, Cloud SIM, EC2, Open source Tools.
I. INTRODUCTION
Cloud computing relies on sharing computing resources rather than having local servers or personal
devices to handle applications. The word cloud is used as a metaphor for the internet so the phrase cloud
computing is a type of internet based computing devices such as storage and applications, the goal of cloud
computing is to apply traditional super computing power normally used by military and research facilities to
perform trillions per second in consumer oriented applications such as financial portfolios. To do this cloud
computing uses large networks groups of servers typically running low cost consumer technology with
specialized connections to spread data processing across them.
The stands for connecting the computer systems software needed to make cloud computing work are
not fully defined at present time, many companies to define their cloud environment systems offered by
company like IBM “Blue Cloud”. Cloud computing has started to obtain mass appeal in corporate data centers
as it enables the data center to operate through the process of enabling computing resources to be accessed and
shared as virtual resources in a secure and scalable. The term cloud used to have appears its origins in network
diagrams that represented the internet or various parts of it as schematic clouds, was coined for what happens
when applications and services are moved into the internet cloud. Characteristics of cloud include shared
infrastructure uses a virtualized software model enabling the sharing of physical services storage and
networking capabilities. Dynamic provisioning allows for the provision of services based on current demand
requirements done automatically using software automation and enabling expansion and contraction of service
capability as needed. Network access is the internet from a broad range of devices such as pcs laptops and
mobile devices using standards based on APIs and managed metering uses metering for managing and
optimizing the service and to provide reporting and billing information. Cloud computing is dynamically
scalable because users only have to consume the amount of online computing resources they actually need.
Cloud vendors like Amazon, Google, IBM quite literally sell computer processing power by the every hour.
Cloud computing is task centric because the usage model is based entirely among what users need to achieve
rather than any particular software hardware or network infrastructure.
II. RELATED WORK
The most important benefits of cloud computing are cost and growth self-service access to an available
pool of computing resources users can run in seconds instead of years. Making adjustments to computing
capacity is also fast elastically scalable grid computing. Cloud computing is a pay per use operates at high scale
and automated the efficiency of cloud computing is very compelling as well. The other work reveals that there
are several issues that are holding some organizations back from rushing to the cloud. Some particularly
sensitive applications will remain in while other may take advantage of public clouds other concern is quality of
service since clouds may not be able to fully guarantee service level agreement in terms of performance and
availability. Cloud computing is characterized by real time capabilities such as self-service auto scaling and
charge back but is also based on many established techniques such as grid computing virtualization service
2. A Open Source Tools & Comparative Study on Cloud Computing
70
oriented architecture shared services and large scale systems management automation, offers compelling quality
of service and fit. Oracle Cloud computing strategy is to provide the industry most complete integrated set of
products from applications. Oracle provides high performance reliability scalability availability security
portability interoperability characteristics demand before moving important work to public and private cloud.
Organizations are adopting different deployment models for computing on applications at different rates of
speed so oracle supports customers no matter what type of cloud to choose. Oracle provides the most complete
portfolio of software and hardware products to enable organizations to build and deploy manage public and
private PaaS and IaaS. It offers a very broad portfolio of horizontal and industry applications that are deployed
in either a private shared services environment or in a public SaaS model.
III. OPEN SOURCE IS A DEVELOPMENT METHOD FOR SOFTWARE THAT
HARNESS THE POWER OF DISTRIBUTED PEER REVIEW AND TRANSPARENCY OF
PROCESS
3.1. CloudSim: Cloud computing emerged as the technology for delivering reliable secure sustainable
computational services presents as software infrastructure or platform as service. Moreover these services may
be offered for clients or yet it is possible that both public and private clouds are combined in hybrids clouds. A
suitable alternative of simulation tool is open possibility of evaluating the hypothesis prior to software
development in an environment where one can reproduce tests. In cloud computing access to the infrastructure
incurs payments in real currency simulation based approaches offer significant benefits as it allows cloud
customers to test their services in repeatable and controllable environment free of cost.
3.1.1. Cloud Report: It is a graphical tool that simulates distributed computing environment based on the cloud
computing paradigm uses cloud sim as its simulation engine and provides an easy to use user interface report
generation features and creation of extensions. The application simulates an infrastructure as a service provider
with an arbitrary number of data centers entirely customizable, user can easily set the amount of computational
nodes and their resource configuration includes processing capacity amount of RAM available bandwidth power
consumption. Customer of the LaaS provider are also simulated and entirely customizable can set the number of
virtual machines each customer owns a broker responsible for allocating these virtual machines and resource
consumption algorithms. Each virtual machine has its own configuration that consists of its hypervisor image
size scheduling algorithms for tasks
.
Figure 1 Screen shot shows how to integrate with the data centers
We can compile the cloud report from source or run the jar file. Cloud reports supports the
development of extensions that can be plugged in on execution time using the java reflection API.
3.2. Amazon Elastic Compute: It is a web service that provides resizable compute capacity in the cloud
designed to make web scale computing easier for developers. It allows to obtain configure capacity with
minimal friction and provides with complete control of computing resources. Amazon EC2 reduces the time
required to obtain to boot new server instances to minutes allowing to quickly scaling capacity. Amazon EC2
changes the economics of computing allowing to pay only for capacity that actually use.
Functionality of Amazon presents a true virtual computing environment allowing to use web service
interface to launch instance with a variety of operating systems, loaded with custom application environment
manage networks access permissions
3. A Open Source Tools & Comparative Study on Cloud Computing
71
Pre-requisite for EC2 is to select a pre-configured template Amazon machine image to get up and
running immediately or create an AMI containing application libraries data configuration settings
Configure security and network access on Amazon EC2 instance
Choose the instance which want then start terminate and monitor as many instances as needed using the
web service API or the variety of management tools provided.
Determine whether to run in multiple locations utilize static IP endpoints attach persistent block storage
to your instances
Amazon EC2 enables to increase capacity within minutes not hours commission hundreds or thousands
of server instance simultaneously.
Amazon offers persist storage for amazon EC2 instances and EBS volumes are highly reliable volumes
that can be leveraged as an Amazon EC2 instance boot partition or attached to a running Amazon EC2 instance
as standard restarted volumes offer greatly improved durability over local amazon EC2 instance stores are
automatically replicated on the backend.
EBS optimized instances for a low additional hourly fee customers can launch selected Amazon EC2
instances types as EBS optimized instances and fully utilize that IOPS provisioned on an EBS volume.
Amazon cloud watch is a web service that provides monitoring for AWS cloud resources and
applications starting with Amazon EC2 and also provides visibility into resource utilization operational
performance and overall demand patterns including metrics such as CPU utilization, disk read/write and
network traffic.
IV. OPEN SOURCE TOOLS FOR CLOUD COMPUTING
The role of open source in cloud has vulnerability and security threats and flexibility and cost savings
open source would provide the time to invest and open source cloud computing
Open QRM is the data centers management platform a single management console for the complete IT
setup and defined API to integrate third party tools open QRM on a high level comes with complete set of
features around Business continuity deployment monitoring storage management virtualization.
Cobbler is a linux installation server that allows for rapid setup of network installation environment
glues together and automates many associated linux tasks so do not have to hop between lots of various
commands and applications when rolling out new systems and changing existing ones.
Configuration tools help system administrators produce a consistent reproducible and verifiable
description of their environment and offers visualization reporting tools to aid in day to day administrative tasks.
It is portable has been successfully run on AIX free BSD open solaris along with many GNU linux distribution.
CFE community is the open source core of innovative technology for data center self-handing
configuration and management we can download software online is a professional enterprise solutions.
Puppet is an enterprise system management that standardizes the way IT staff deploy and manage
infrastructure in the enterprise cloud.
Figure 2 Table shows the Comparison of Configuring Tools
Monitoring tools like Ganglia is a scalable distributed monitoring system for high performance
computing systems such as clusters and Grids, it is based on a hierarchical design targeted at federations of
clusters leverages widely used technology such as xml for data representation compact portable data transport
and RRD tool
Zabbix offers advanced monitoring alerting and visualization features to day which are missing in other
monitoring alerting and visualization features today which are missing in other monitoring systems even some
of the best commercial ones comes with distributed real-time agentless based monitoring features along with
good scalability visualization problem resolution reporting easy import export and escalation notification
features.
Nagios is enterprise class monitoring solution almost used by most of the organizations that I or mates
happen to work with enterprise hardware and software monitoring.
Automatelt is open source tool for automating the setup and maintenance of servers applications and
their dependencies provides a surprisingly simple powerful way to manage files packages services networks
accounts roles templates and more.
4. A Open Source Tools & Comparative Study on Cloud Computing
72
Figure 3 Table shows the Comparison of Monitoring Tools
Capistrano is an open source tool written in ruby for running scripts on multiple servers its main use is
deploying web applications automates the process of making a new version of an application available on more
web servers.
Rundeck is open source software that helps automate adhoc routine procedures in data center or cloud
environment provides a number of features that will alleviate time consuming grunt work and make it easy for
scale up scripting efforts.
Func provides a two way authenticated system for generically doing these sort of things can build own
applications on it and easily expand func by adding in additional modules whether want these to work through
the func command line or by means of some other application.
Figure 4 Table shows the Comparison of Automated Tools
V. COMPARATIVE STUDY
The Main features of EC2 pre-requisits need to be comfortable with command line linux, it does not fit
everyone requirements, it requires people whom require software as a service hosting of servers. Ec2 as
colocation hosting is not the cheapest quite reasonable than existing hosting service provider. It is exceptionally
flexible with its ability to launch instances as required and for use and it has drawbacks risk mentioned further
down, nothing is local so have to only the API and accept the risk of instance, learning threshold is significant to
scare non-geeks. Compare EC2 cloud Sim is to support for modeling and simulation of large scale cloud
computing infrastructure including data centers on single physical computing node and a self-containedplatform
for modeling data centers service brokers scheduling and allocations policies. Unique features of cloud sim are
availability of virtualized engine aids in creation and management of multiple independent virtualized services.
Cloud sim is a networking based mobile recording where a handset application is not desirable or suitable for
needs, cloud sim offers an alternative mobile call recording mechanism to integrate with cloud platform. It is
network between a core network provider and our cloud telephony routing calls transparently through secure
recording infrastructure.
A replacement SIM is provided and users port existing numbers to the new sim.
When inbound and outbound calls are made calls are routed at a low level to our highly
scalable cloud telephony.
Recording occurs inline completely transparently to the mobile user.
VI. CONCLUSION
This research work proposed and listed in the field of open source tools in cloud computing analysis. It
focuses on configuration tools, monitoring tools in cloud environment, several techniques, analysis method,
variety of cloud sim applications that are commonly used cloud analysis. Wide range of this comparison work is
efficient. In fact it has scope of computer science and networking analysis. Finally this paper concludes cloud
5. A Open Source Tools & Comparative Study on Cloud Computing
73
sim and EC2 tools in cloud tasks are very innovative, future extends with detail implementation of integrating
data centers.
REFERENCE
[1]. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A.
Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,”
University of California, Berkeley, Tech. Rep. UCB-EECS-2009-28, Feb 2009.
[2]. Anton Beloglazov, and RajkumarBuyya, Optimal Online Deterministic Algorithms and Adaptive
Heuristics for Energy and Performance Efficient Dynamic Consolidation of Virtual Machines in Cloud
Data Centers, Concurrency and Computation: Practice and Experience, Volume 24, Issue 13, Pages:
1397-1420, John Wiley & Sons, Ltd, New York, USA, 2012
[3]. Rodrigo Calheiros, Rajiv Ranjan and RajkumarBuyya, Virtual Machine Provisioning Based on
Analytical Performance and QoS in Cloud Computing Environments, Proceedings of the 40th
International Conference on Parallel Processing (ICPP 2011), Taipei, Taiwan, September 13-16, 2011.
[4]. Linlin Wu, Saurabh Kumar Garg and RajkumarBuyya, SLA-based Resource Allocation for a Software
as a Service Provider in Cloud Computing Environments, Proceedings of the 11th IEEE/ACM
International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2011), Los Angeles, USA,
May 23-26, 2011.
[5]. Adel NadjaranToosi, Rodrigo N. Calheiros, Ruppa K. Thulasiran, RajkumarBuyya, Resource
Provisioning Policies to Increase IaaS Provider's Profit in a Federated Cloud Environment, Proceedings
of the 13rd International Conference on High Performance and Communications (HPCC 2011), Banff,
Canada, September 2-4, 2011.
[6]. Anton Beloglazov, and RajkumarBuyya, Energy Efficient Allocation of Virtual Machines in Cloud
Data Centers. Proceedings of the 10th IEEE/ACM International Symposium on Cluster, Cloud and
Grid Computing (CCGrid 2010), Melbourne, Australia, May 17-20, 2010.
[7]. Rodrigo N. Calheiros, RajkumarBuyya, Cesar A. F. De Rose, Building an automated and self-
configurable emulation testbed for grid applications. International Journal of Software: Practice and
Experience, Volume 40, Issue 5, Pages: 405-429, Wiley Press, USA, April 2010.
[8]. KyongHoon Kim, Anton Beloglazov, and RajkumarBuyya, Power-aware Provisioning of Cloud
Resources for Real-time Services. Proceedings of the 7th International Workshop on Middleware for
Grids, Clouds and e-Science, Urbana Champaign, Illinois, USA: ACM, 2009.
[9]. Rodrigo N. Calheiros, RajkumarBuyya, Cesar A. F. De Rose, A Heuristic for Mapping Virtual
Machines and Links in Emulation Testbeds, Proceedings of the 38th International Conference on
Parallel Processing (ICPP 2009), Vienna, Austria, September 22-25, 2009.
RajuVadicharlaM.Tech Software Engineering from JTUH, B.Tech from Kakatiya
University Currently he is working as an Asst. Prof, at Balaji Institute of Engineering
Sciences ,Narsampet,Warangal and has 4+ years of experience in Academic. His
research areas include cloud computing &Parallel computing, Cryptography, Network
Security, Data base Administration & Data base Management.
Nagaraju Samala M.Tech Computer Science & Engineering from JTUH
Currently he is working as an Asst. Prof, atBalaji Institute of Engineering & Sciences,
Warangal and has 4+ years of experience in Academic. His research areas include cloud
computing &Parallel computing, Cryptography Network Security.
Ravi Kumar V M.Tech Computer Science & Engineering from JTUH
MSc Electronics from Andhra University BSc from KakatiyaUniversity. Currently he is
working as an Associate Prof, atBalajiInstitute of Engineering & Sciences, Warangal
and has 8+ years ofexperience in Academic. His research areas include cloud computing
&Parallel computing, Cryptography Network Security, ComputerOrganization, Image
Processing, Embedded Systems & Bio-Metrics
P.VenkatakishanRaoM.Tech Computer Science & Engineering from JTUH Currently he
is working as an Asst. Prof, atGanapathy Engineering College,Warangal, and has 5+
years of experience in Academic. His research areas include cloud computing &Parallel
computing.