SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013
pp. 185–191, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3419
THE IMPROVEMENT AND PERFORMANCE
OF MOBILE ENVIRONMENT USING BOTH
CLOUD AND TEXT COMPUTING
Dr.S.Saravana Kumar, J.Lakshmi Priya, P.Hannah Jennifer,
N.Jeff Monica and Fathima
Panimalar Institute of Information Technology Chennai, India
{Saravanakumars81,hannahalbert07,lakshmibtch,monica.nedun,
ayeshu9298}@gmail.com
ABSTRACT
In this research paper presents an design model for file sharing system for ubiquitos mobile
devices using both cloud and text computing. File sharing is one of the rationales for computer
networks with increasing demand for file sharing applications and technologies in small and
large enterprise networks and on the Internet. File transfer is an important process in any form
of computing as we need to really share the data across. The Wireless Network changed the way
we were sharing the files. Infra-Red and Bluetooth are the technology we use to share files in
mobile phones and Bluetooth is the successful one. In exisiting system there is no immediate
predecessor for the proposed system. Bluetooth file transfer is the already existing system.
Drawbacks of Existing System are Short Range , Slow transfer rate and Unsecure .But in our
research paper the idea is to use Both cloud and text computing network to transfer files.A
wireless network is created and the devices connected in this network can share files between
them. Benefits over the Existing System are more Secure , Range – upto 300 mts and Data rate
is 50-140 mbps. In future without internet connection we can transfer our information very
easily.Key words : cloud and text computing, Bluetooth, network, internet, system , file transfer.
1. INTRODUCTION
Cloud Computing and Text Computing are becoming the hottest topics due to the increase in the
technological advancements. In this research wifi source is used instead of local network. You
can shift your whole OS to the Web using the Concept of Cloud Computing. Text Computing is
used as an addition feature to provide more performance measure and efficiency for Cloud
Computing.
2. WHAT IS CLOUD COMPUTING ?
Cloud computing is Internet-based computing, whereby shared resources, software and
information are provided to computers and other devices on-demand, like electricity. Computing
in which services and storage are provided over the Internet (or "cloud").Cloud computing is a
186 Computer Science & Information Technology (CS & IT)
general term for anything that involves delivering hosted services over the Internet. These
services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-
a-Service (PaaS) and Software-as-a-Service (SaaS).
2.1 Software as a Service
With software as a service as large number of concern can access applications and large amounts
of virtual computing power without buying it. instaed, the application is used by some other
company, that huge loss of cost and time for the users. Some Service applications may operate
via a connection between two or many networks . "Now we're talking about large number of
computers" linked together via the Internet or some other network connection.
3. PURPOSE OF CLOUD COMPUTING
While using online storage application when it get stores or we going download else timing or
any other internet-based application, you use Cloud and text Computing. Internet based
applications is mainly used for daily in home, organization, schools, offices, social media, etc.
There are technological, economic and communications reasons for why Cloud Computing is
used by many people. Simply we can one sentence , its user friendly , easier to learn and easy to
understand by all people including new learner too, finally easy remember ever technical aspect.
4. ADVANTAGES OF CLOUD COMPUTING
Main advantages of cloud computing Query Flooding and Query responses are monitored and
kept on track for future verification in order to avoid major flaws in the system. Peer Nodes
failure will be automatically updated to the fellow nodes and an automatic inherit plan occurs to
avoid bifurcation of request to the failed peers.
4.1 Reduced Cost:
Cloud technology is paid incrementally, saving organizations money.
4.2 Increased Storage:
Organizations can store more data than on private computer systems.
4.3 Highly Automated:
No longer do IT personnel need to worry about keeping software up to date.
4.4 Flexibility:
Cloud computing offers much more flexibility than past computing methods.
Computer Science & Information Technology (CS & IT) 187
4.5 More Mobility:
Employees can access information wherever they are, rather than having to remain at their
desks.
4.6 Allows it to Focus:
No longer having to worry about constant server updates and other computing issues,
government organizations will be free to concentrate on innovation.
5. REQUIREMENTS OF CLOUD COMPUTING
Requirements specification is produced at the culmination of the analysis task. The function and
performance allocated to software as part of system engineering are refined by establishing a
complete information description as functional representation of system behavior, an indication of
performance requirements and design constraints, appropriate validation criteria.
Figure 1.Cloud Computing Network
6. WEB OS- MEANS MOVING OS TO THE WEB
This study is carried out to check the technical feasibility, that is, the technical requirements of
the system. Any system developed must not have a high demand on the available technical
resources. This will lead to high demands on the available technical resources. This will lead to
high demands being placed on the client. The developed system must have a modest requirement,
as only minimal or null changes are required for implementing this system.
Of course, the Web OS won’t replace the traditional operating system any time soon. But as
users become more comfortable working over the Web, the Web OS could become more
popular. Nonetheless, the technology still has several important shortcomings that proponents
must address.
7. EARLY DEVELOPMENTS
One of the Web OS’s predecessors was Tarantella, which the Santa Cruz Operation launched in
1993. It was a Unix-based X Window System that worked over corporate networks and let PCs
188 Computer Science & Information Technology (CS & IT)
display a Unix desktop. However, the technology never caught on commercially. Sun acquired
Tarantella in 2005 and integrated it into the SGD. In 1992, University of California, Berkeley,
researchers began work on what, four years later, became Web OS. The system delivered OS like
functionality via the Internet.
8. INSIDE THE WEB OS
Web OSs bring together Web based applications using the browser as the interface, which is
designed to look like a traditional operating system’s interface, as Figure 1 shows. They work
with a URL-based file system that lets a Web based application access files from the OS
provider’s server online via a domain-name-system query. Similarly, the technology uses a
location-independent resource naming system that lets applications make calls to services and
resources on remote severs.
Figure 2. Simplified Web Os Architecture
Figure 3. Web Os System Architecture
The Application Environment refers to Objector uses the term” agents” to represent some of the
hardware and software systems. In Fusion method, there is no requirement phase, where a user
will supply the initial requirement document. Any software project is worked out by both the
analyst and the designer. The Architecture is a graphic tool used for expressing system
requirements in a graphical form. The purpose of clarifying system requirements and identifying
major transformations that to become program in system design. This can be stated as the
starting point of the design phase that functionally decomposes the requirements specifications
down to the lowest level of detail. It consist of series of bubbles joined by lines. The bubbles
represent data transformations and the lines represent data flows in the system. This describes
what that data flow in rather than how they are processed. So it does not depend on hardware,
software, data structure or file organization.
Computer Science & Information Technology (CS & IT) 189
9. ADVENT OF WEB APPLICATIONS
The development of Web OSs has been the improvement of Web-based applications using text
computing. Several of these applications have started gaining traction in recent years, particularly
those for e-mail (such as Hotmail and Gmail), instant messaging, and storage (like Xdrive).
Recently, there have also been Web -based word-processing and spreadsheet applications (such
as Google Docs and Number). With the first generation of Web applications, implementing even
some modest functions like dragging and dropping files, making minor changes to documents
without having to refresh the entire page, and caching data locally—was difficult.
10. TEXT COMPUTING
Text computing is nothing but resources from multiple concern domains from a similar goal.
Text Computing is an technology that provides seamless access to computing large amount of
data storage capacity and distributed all over the world.
10.1 Purpose of Text is Cloud
The cloud computing is achieves its communication with supercomputing, or high-performance
computing power, sequentially used by military and research facilities, to perform million of
computations works per second, in consumer-oriented applications such as financial portfolios or
even to deliver personalized information, or power immersive computer application likes
multimedia, graphics ,etc . We can increase our ability of work it by coupling it with Text
computing.
10.2 The Text Batch System
There are two fundamental data types in Text-Batch: table or indexed table (borrowed from
database terminology). A table contains a set of records (rows) that are independent of each
other. All records in a 730 table follow the same schema, and each record may contain several
fields (columns). Indexed table is SIMILAR to table except that each record also has an
associated index, where the index could simply be one of the fields or other data provided by the
user. The Text-Batch system consists of two pieces of related software components: the
distributed file system (DFS) and the job scheduler.
Figure 4. Cloud with Text Architecture
190 Computer Science & Information Technology (CS & IT)
11. CONCLUSION
Cloud solution embeds a state-of-the-art PIR protocol in a distributed environment, by utilizing a
novel striping technique. Cloud can retrieve arbitrarily large blocks of information with a single
query. We present a comprehensive solution that includes a data placement policy, result
retrieval, and authentication mechanisms, which confirm the effectiveness and practicality of our
scheme. Specifically, compared to the traditional client/server architecture, pCloud drops the
query response time by orders of magnitude, and its performance improves linearly with the
number of peers. Whether you call it Cloud Computing or utility computing, the omnipresent
power of high-speed internet connections and linkages to databases, applications and processing
power will change the way we work in communications. We may use Cloud Computing tools
without being aware of what they actually are. We may learn our way into Cloud Computing
applications that seem strange today. We will find entirely new applications in the Cloud to help
send messages more effectively to target audiences. Young practitioners today will stand back
and listen with wry smiles to their seniors who talk about the “good old days” when the PC first
appeared and early Local Area Networks provided the first hint of productivity. In fact, they are
smiling already at the old fogies.
REFERENCES
[1] Mancini,E.P.;Rak,M.;Villano,U.; Enabling Technologies: Infrastructures for Collaborative
Enterprises, 2009. WETICE '09. 18th IEEE International Workshops on Digital Object Identifier:
10.1109/WETICE.2009.47 Publication Year: 2009 ,
[2] Foster,I.;YongZhao;Raicu,I.;Lu,S.; Text Computing Environments Workshop, 2008. GCE '08
Digital Object Identifier: 10.1109/GCE.2008.4738445 Publication Year: 2008
[3] Mancini, E.P.; Rak, M.; Villano, U.; Enabling Technologies: Infrastructures for Collaborative
Enterprises, 2009. WETICE '09. 18th IEEE International Workshops on Digital Object
Identifier:10.1109/WETICE.2009.47 Publication Year: 2009
[4] Vieira, K.; Schulter, A.; Westphall, C.B.; Westphall, C.M.; IT Professional Volume: 12 , Issue: 4
Digital Object Identifier: 10.1109/MITP.2009.89 Publication Year 2010;
[5] Shuai Zhang; Shufen Zhang; Xuebin Chen; Xiuzhen Huo; Future Networks, 2010. ICFN '10. Second
International Conference on Digital Object Identifier: 10.1109/ICFN.2010.58 Publication Year:
2010
[6] AjayKumar, S.; Nachiappan, C.; Periyakaruppan, K.; Boominathan, P.; 2009 International
Conference on Signal Processing Systems Digital Object Identifier: 10.1109/ICSPS.2009.106
Publication Year: 2009
Computer Science & Information Technology (CS & IT) 191
AUTHORS
Dr. S. Saravana Kumar received the Undergraduate Degree in Information Technology
from Madras University, the Post Graduate degree in Computer Science and
Engineering from Anna University ,and Doctorate from Bharath university. He has
published more than 45 publications in National and International journal
proceeding. He has more than11 years of teaching experience. His areas of interest
includes Artificial Neural Networks , Image Processing, Data Mining, Data Structures,
Database Management Systems, Distributed systems and Operating systems.
J.Lakshmi Priya is a third year student pursuing her B. tech Information Technology,
Panimalar institute of Technology. She has attended several conferences and National
level Symposium. She has submitted papers on cloud computing, peer to peer systems
and search engine optimisation. Her domain of interest are Database management and
systems, mobile optimization.
P. Hannah Jennifer is a third year student pursuing her B.Tech Information
Technology, Panimalar Institute of technology. She has attended several conferences
and National level symposium. She has submitted papers on peer to peer systems and
search engine optimization. Her domain of Interest in area of Adhoc, ANN, Security in
Sensor Network, Mobile Database and Data Mining.
N. Jeff Monica is a third year student pursuing her B.Tech Information
Technology, Panimalar institute of technology. She has attended several conferences
and National level symposium. She has submitted papers on system search engine
optimization. Her domain of Interest are Database management and systems, web
technology and web designing technology.
Z. Fathima is a third year student pursuing her B.Tech Information Technology,
Panimalar Institute of Technology. She has attended several Conferences and National
Level symposium. She has submitted papers on Cloud computing, peer to peer system
and search engine optimization. Her domain of Interest are web technology, web
designing, search engine optimisation.

Weitere Àhnliche Inhalte

Was ist angesagt?

Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectMohamed Shorbagy
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)Hussain Hamil
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITGovt. P.G. College Dharamshala
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentationshilpa bojji
 
Cloud computing on smartphone
Cloud computing on smartphoneCloud computing on smartphone
Cloud computing on smartphoneAlexander Decker
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 
Project Report on Cloud Storage
Project Report on Cloud StorageProject Report on Cloud Storage
Project Report on Cloud StorageRachitSinghal17
 
Untitled 1
Untitled 1Untitled 1
Untitled 1ajayzkumarz
 
Understanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And ChallengesUnderstanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And Challengestheijes
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paperShashi Bhushan
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utilityiosrjce
 

Was ist angesagt? (17)

Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
Cloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation ProjectCloud Computing for Universities Graduation Project
Cloud Computing for Universities Graduation Project
 
Cloud computing (1)
Cloud computing (1)Cloud computing (1)
Cloud computing (1)
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
 
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGA SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING
 
cloud computing documentation
cloud computing documentationcloud computing documentation
cloud computing documentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction of cloud By Pawan Thakur
Introduction of cloud By Pawan ThakurIntroduction of cloud By Pawan Thakur
Introduction of cloud By Pawan Thakur
 
Cloud computing on smartphone
Cloud computing on smartphoneCloud computing on smartphone
Cloud computing on smartphone
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410
 
Project Report on Cloud Storage
Project Report on Cloud StorageProject Report on Cloud Storage
Project Report on Cloud Storage
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Understanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And ChallengesUnderstanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And Challenges
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
cloud computing based its solutions term paper
cloud computing based its solutions term papercloud computing based its solutions term paper
cloud computing based its solutions term paper
 
Cloud Computing: Overview & Utility
Cloud Computing: Overview & UtilityCloud Computing: Overview & Utility
Cloud Computing: Overview & Utility
 

Andere mochten auch

Jobs by college_major
Jobs by college_majorJobs by college_major
Jobs by college_majorjwalton951
 
Campaign of networking in csit association of Nepal
Campaign of networking in csit association of NepalCampaign of networking in csit association of Nepal
Campaign of networking in csit association of NepalSuraj Katwal
 
Why these courses?
Why these courses?Why these courses?
Why these courses?CSIT-In-3
 
Why Major in Computer Science and Software Engineering at Auburn University?
Why Major in Computer Science and Software Engineering at Auburn University?Why Major in Computer Science and Software Engineering at Auburn University?
Why Major in Computer Science and Software Engineering at Auburn University?Xiao Qin
 
Computer science web
Computer science webComputer science web
Computer science webImran Syed
 
Getting started with project
Getting started with projectGetting started with project
Getting started with projectahmed hamza
 
Computer Science
Computer ScienceComputer Science
Computer ScienceJavier Ramirez
 
B.sc computre sci
B.sc computre sciB.sc computre sci
B.sc computre scicareermine
 
Advantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your CareerAdvantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your Careermisc
 
Careers in CIS and IT
Careers in CIS and ITCareers in CIS and IT
Careers in CIS and ITMark Frydenberg
 
Cis Major Minor 2008
Cis Major Minor 2008Cis Major Minor 2008
Cis Major Minor 2008Mark Frydenberg
 
Final datesheet fall 11 (all campuses)
Final datesheet fall 11 (all campuses)Final datesheet fall 11 (all campuses)
Final datesheet fall 11 (all campuses)fadhi143
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challengesAlexander Decker
 

Andere mochten auch (15)

Jobs by college_major
Jobs by college_majorJobs by college_major
Jobs by college_major
 
Campaign of networking in csit association of Nepal
Campaign of networking in csit association of NepalCampaign of networking in csit association of Nepal
Campaign of networking in csit association of Nepal
 
39 43
39 4339 43
39 43
 
Why these courses?
Why these courses?Why these courses?
Why these courses?
 
Why Major in Computer Science and Software Engineering at Auburn University?
Why Major in Computer Science and Software Engineering at Auburn University?Why Major in Computer Science and Software Engineering at Auburn University?
Why Major in Computer Science and Software Engineering at Auburn University?
 
Computer science web
Computer science webComputer science web
Computer science web
 
Getting started with project
Getting started with projectGetting started with project
Getting started with project
 
Computer Science
Computer ScienceComputer Science
Computer Science
 
B.sc computre sci
B.sc computre sciB.sc computre sci
B.sc computre sci
 
Advantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your CareerAdvantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your Career
 
Careers in CIS and IT
Careers in CIS and ITCareers in CIS and IT
Careers in CIS and IT
 
Career planning
Career planningCareer planning
Career planning
 
Cis Major Minor 2008
Cis Major Minor 2008Cis Major Minor 2008
Cis Major Minor 2008
 
Final datesheet fall 11 (all campuses)
Final datesheet fall 11 (all campuses)Final datesheet fall 11 (all campuses)
Final datesheet fall 11 (all campuses)
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challenges
 

Ähnlich wie THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TEXT COMPUTING

SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGijwscjournal
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
äș‘èźĄçź—ćŠć…¶ćș”甚
äș‘èźĄçź—ćŠć…¶ćș”甚äș‘èźĄçź—ćŠć…¶ćș”甚
äș‘èźĄçź—ćŠć…¶ćș”甚lantianlcdx
 
Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17MJD Management Group
 
Cloud computing
Cloud computingCloud computing
Cloud computingMIDAUTEL
 
Cloud-Computing-PPT-1 for on demand provisioning.pptx
Cloud-Computing-PPT-1 for on demand provisioning.pptxCloud-Computing-PPT-1 for on demand provisioning.pptx
Cloud-Computing-PPT-1 for on demand provisioning.pptxssuser53aac4
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
cloud computing is the delivery of computing services
cloud computing is the delivery of computing servicescloud computing is the delivery of computing services
cloud computing is the delivery of computing servicesabidhassan225
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatioChetan Sontakke
 
How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...Claudia Brown
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationAhmed Abdisalan
 

Ähnlich wie THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TEXT COMPUTING (20)

Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
SURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTINGSURVEY OF CLOUD COMPUTING
SURVEY OF CLOUD COMPUTING
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
äș‘èźĄçź—ćŠć…¶ćș”甚
äș‘èźĄçź—ćŠć…¶ćș”甚äș‘èźĄçź—ćŠć…¶ćș”甚
äș‘èźĄçź—ćŠć…¶ćș”甚
 
Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17Cloud Computing Michael Davis 2008 Aug17
Cloud Computing Michael Davis 2008 Aug17
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
webiOS
webiOSwebiOS
webiOS
 
Cloud-Computing-PPT-1 for on demand provisioning.pptx
Cloud-Computing-PPT-1 for on demand provisioning.pptxCloud-Computing-PPT-1 for on demand provisioning.pptx
Cloud-Computing-PPT-1 for on demand provisioning.pptx
 
G017324043
G017324043G017324043
G017324043
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
cloud computing is the delivery of computing services
cloud computing is the delivery of computing servicescloud computing is the delivery of computing services
cloud computing is the delivery of computing services
 
Cloud computing applicatio
Cloud  computing  applicatioCloud  computing  applicatio
Cloud computing applicatio
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...How Should I Prepare Your Enterprise For The Increased...
How Should I Prepare Your Enterprise For The Increased...
 
Cloud Computing Essays
Cloud Computing EssaysCloud Computing Essays
Cloud Computing Essays
 
The Cloud Of Cloud Computing Essay
The Cloud Of Cloud Computing EssayThe Cloud Of Cloud Computing Essay
The Cloud Of Cloud Computing Essay
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 

KĂŒrzlich hochgeladen

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

KĂŒrzlich hochgeladen (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TEXT COMPUTING

  • 1. Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013 pp. 185–191, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3419 THE IMPROVEMENT AND PERFORMANCE OF MOBILE ENVIRONMENT USING BOTH CLOUD AND TEXT COMPUTING Dr.S.Saravana Kumar, J.Lakshmi Priya, P.Hannah Jennifer, N.Jeff Monica and Fathima Panimalar Institute of Information Technology Chennai, India {Saravanakumars81,hannahalbert07,lakshmibtch,monica.nedun, ayeshu9298}@gmail.com ABSTRACT In this research paper presents an design model for file sharing system for ubiquitos mobile devices using both cloud and text computing. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. File transfer is an important process in any form of computing as we need to really share the data across. The Wireless Network changed the way we were sharing the files. Infra-Red and Bluetooth are the technology we use to share files in mobile phones and Bluetooth is the successful one. In exisiting system there is no immediate predecessor for the proposed system. Bluetooth file transfer is the already existing system. Drawbacks of Existing System are Short Range , Slow transfer rate and Unsecure .But in our research paper the idea is to use Both cloud and text computing network to transfer files.A wireless network is created and the devices connected in this network can share files between them. Benefits over the Existing System are more Secure , Range – upto 300 mts and Data rate is 50-140 mbps. In future without internet connection we can transfer our information very easily.Key words : cloud and text computing, Bluetooth, network, internet, system , file transfer. 1. INTRODUCTION Cloud Computing and Text Computing are becoming the hottest topics due to the increase in the technological advancements. In this research wifi source is used instead of local network. You can shift your whole OS to the Web using the Concept of Cloud Computing. Text Computing is used as an addition feature to provide more performance measure and efficiency for Cloud Computing. 2. WHAT IS CLOUD COMPUTING ? Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity. Computing in which services and storage are provided over the Internet (or "cloud").Cloud computing is a
  • 2. 186 Computer Science & Information Technology (CS & IT) general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as- a-Service (PaaS) and Software-as-a-Service (SaaS). 2.1 Software as a Service With software as a service as large number of concern can access applications and large amounts of virtual computing power without buying it. instaed, the application is used by some other company, that huge loss of cost and time for the users. Some Service applications may operate via a connection between two or many networks . "Now we're talking about large number of computers" linked together via the Internet or some other network connection. 3. PURPOSE OF CLOUD COMPUTING While using online storage application when it get stores or we going download else timing or any other internet-based application, you use Cloud and text Computing. Internet based applications is mainly used for daily in home, organization, schools, offices, social media, etc. There are technological, economic and communications reasons for why Cloud Computing is used by many people. Simply we can one sentence , its user friendly , easier to learn and easy to understand by all people including new learner too, finally easy remember ever technical aspect. 4. ADVANTAGES OF CLOUD COMPUTING Main advantages of cloud computing Query Flooding and Query responses are monitored and kept on track for future verification in order to avoid major flaws in the system. Peer Nodes failure will be automatically updated to the fellow nodes and an automatic inherit plan occurs to avoid bifurcation of request to the failed peers. 4.1 Reduced Cost: Cloud technology is paid incrementally, saving organizations money. 4.2 Increased Storage: Organizations can store more data than on private computer systems. 4.3 Highly Automated: No longer do IT personnel need to worry about keeping software up to date. 4.4 Flexibility: Cloud computing offers much more flexibility than past computing methods.
  • 3. Computer Science & Information Technology (CS & IT) 187 4.5 More Mobility: Employees can access information wherever they are, rather than having to remain at their desks. 4.6 Allows it to Focus: No longer having to worry about constant server updates and other computing issues, government organizations will be free to concentrate on innovation. 5. REQUIREMENTS OF CLOUD COMPUTING Requirements specification is produced at the culmination of the analysis task. The function and performance allocated to software as part of system engineering are refined by establishing a complete information description as functional representation of system behavior, an indication of performance requirements and design constraints, appropriate validation criteria. Figure 1.Cloud Computing Network 6. WEB OS- MEANS MOVING OS TO THE WEB This study is carried out to check the technical feasibility, that is, the technical requirements of the system. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical resources. This will lead to high demands being placed on the client. The developed system must have a modest requirement, as only minimal or null changes are required for implementing this system. Of course, the Web OS won’t replace the traditional operating system any time soon. But as users become more comfortable working over the Web, the Web OS could become more popular. Nonetheless, the technology still has several important shortcomings that proponents must address. 7. EARLY DEVELOPMENTS One of the Web OS’s predecessors was Tarantella, which the Santa Cruz Operation launched in 1993. It was a Unix-based X Window System that worked over corporate networks and let PCs
  • 4. 188 Computer Science & Information Technology (CS & IT) display a Unix desktop. However, the technology never caught on commercially. Sun acquired Tarantella in 2005 and integrated it into the SGD. In 1992, University of California, Berkeley, researchers began work on what, four years later, became Web OS. The system delivered OS like functionality via the Internet. 8. INSIDE THE WEB OS Web OSs bring together Web based applications using the browser as the interface, which is designed to look like a traditional operating system’s interface, as Figure 1 shows. They work with a URL-based file system that lets a Web based application access files from the OS provider’s server online via a domain-name-system query. Similarly, the technology uses a location-independent resource naming system that lets applications make calls to services and resources on remote severs. Figure 2. Simplified Web Os Architecture Figure 3. Web Os System Architecture The Application Environment refers to Objector uses the term” agents” to represent some of the hardware and software systems. In Fusion method, there is no requirement phase, where a user will supply the initial requirement document. Any software project is worked out by both the analyst and the designer. The Architecture is a graphic tool used for expressing system requirements in a graphical form. The purpose of clarifying system requirements and identifying major transformations that to become program in system design. This can be stated as the starting point of the design phase that functionally decomposes the requirements specifications down to the lowest level of detail. It consist of series of bubbles joined by lines. The bubbles represent data transformations and the lines represent data flows in the system. This describes what that data flow in rather than how they are processed. So it does not depend on hardware, software, data structure or file organization.
  • 5. Computer Science & Information Technology (CS & IT) 189 9. ADVENT OF WEB APPLICATIONS The development of Web OSs has been the improvement of Web-based applications using text computing. Several of these applications have started gaining traction in recent years, particularly those for e-mail (such as Hotmail and Gmail), instant messaging, and storage (like Xdrive). Recently, there have also been Web -based word-processing and spreadsheet applications (such as Google Docs and Number). With the first generation of Web applications, implementing even some modest functions like dragging and dropping files, making minor changes to documents without having to refresh the entire page, and caching data locally—was difficult. 10. TEXT COMPUTING Text computing is nothing but resources from multiple concern domains from a similar goal. Text Computing is an technology that provides seamless access to computing large amount of data storage capacity and distributed all over the world. 10.1 Purpose of Text is Cloud The cloud computing is achieves its communication with supercomputing, or high-performance computing power, sequentially used by military and research facilities, to perform million of computations works per second, in consumer-oriented applications such as financial portfolios or even to deliver personalized information, or power immersive computer application likes multimedia, graphics ,etc . We can increase our ability of work it by coupling it with Text computing. 10.2 The Text Batch System There are two fundamental data types in Text-Batch: table or indexed table (borrowed from database terminology). A table contains a set of records (rows) that are independent of each other. All records in a 730 table follow the same schema, and each record may contain several fields (columns). Indexed table is SIMILAR to table except that each record also has an associated index, where the index could simply be one of the fields or other data provided by the user. The Text-Batch system consists of two pieces of related software components: the distributed file system (DFS) and the job scheduler. Figure 4. Cloud with Text Architecture
  • 6. 190 Computer Science & Information Technology (CS & IT) 11. CONCLUSION Cloud solution embeds a state-of-the-art PIR protocol in a distributed environment, by utilizing a novel striping technique. Cloud can retrieve arbitrarily large blocks of information with a single query. We present a comprehensive solution that includes a data placement policy, result retrieval, and authentication mechanisms, which confirm the effectiveness and practicality of our scheme. Specifically, compared to the traditional client/server architecture, pCloud drops the query response time by orders of magnitude, and its performance improves linearly with the number of peers. Whether you call it Cloud Computing or utility computing, the omnipresent power of high-speed internet connections and linkages to databases, applications and processing power will change the way we work in communications. We may use Cloud Computing tools without being aware of what they actually are. We may learn our way into Cloud Computing applications that seem strange today. We will find entirely new applications in the Cloud to help send messages more effectively to target audiences. Young practitioners today will stand back and listen with wry smiles to their seniors who talk about the “good old days” when the PC first appeared and early Local Area Networks provided the first hint of productivity. In fact, they are smiling already at the old fogies. REFERENCES [1] Mancini,E.P.;Rak,M.;Villano,U.; Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009. WETICE '09. 18th IEEE International Workshops on Digital Object Identifier: 10.1109/WETICE.2009.47 Publication Year: 2009 , [2] Foster,I.;YongZhao;Raicu,I.;Lu,S.; Text Computing Environments Workshop, 2008. GCE '08 Digital Object Identifier: 10.1109/GCE.2008.4738445 Publication Year: 2008 [3] Mancini, E.P.; Rak, M.; Villano, U.; Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009. WETICE '09. 18th IEEE International Workshops on Digital Object Identifier:10.1109/WETICE.2009.47 Publication Year: 2009 [4] Vieira, K.; Schulter, A.; Westphall, C.B.; Westphall, C.M.; IT Professional Volume: 12 , Issue: 4 Digital Object Identifier: 10.1109/MITP.2009.89 Publication Year 2010; [5] Shuai Zhang; Shufen Zhang; Xuebin Chen; Xiuzhen Huo; Future Networks, 2010. ICFN '10. Second International Conference on Digital Object Identifier: 10.1109/ICFN.2010.58 Publication Year: 2010 [6] AjayKumar, S.; Nachiappan, C.; Periyakaruppan, K.; Boominathan, P.; 2009 International Conference on Signal Processing Systems Digital Object Identifier: 10.1109/ICSPS.2009.106 Publication Year: 2009
  • 7. Computer Science & Information Technology (CS & IT) 191 AUTHORS Dr. S. Saravana Kumar received the Undergraduate Degree in Information Technology from Madras University, the Post Graduate degree in Computer Science and Engineering from Anna University ,and Doctorate from Bharath university. He has published more than 45 publications in National and International journal proceeding. He has more than11 years of teaching experience. His areas of interest includes Artificial Neural Networks , Image Processing, Data Mining, Data Structures, Database Management Systems, Distributed systems and Operating systems. J.Lakshmi Priya is a third year student pursuing her B. tech Information Technology, Panimalar institute of Technology. She has attended several conferences and National level Symposium. She has submitted papers on cloud computing, peer to peer systems and search engine optimisation. Her domain of interest are Database management and systems, mobile optimization. P. Hannah Jennifer is a third year student pursuing her B.Tech Information Technology, Panimalar Institute of technology. She has attended several conferences and National level symposium. She has submitted papers on peer to peer systems and search engine optimization. Her domain of Interest in area of Adhoc, ANN, Security in Sensor Network, Mobile Database and Data Mining. N. Jeff Monica is a third year student pursuing her B.Tech Information Technology, Panimalar institute of technology. She has attended several conferences and National level symposium. She has submitted papers on system search engine optimization. Her domain of Interest are Database management and systems, web technology and web designing technology. Z. Fathima is a third year student pursuing her B.Tech Information Technology, Panimalar Institute of Technology. She has attended several Conferences and National Level symposium. She has submitted papers on Cloud computing, peer to peer system and search engine optimization. Her domain of Interest are web technology, web designing, search engine optimisation.