SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
1
RESOURCE PROVISIONING FOR VIDEO ON DEMAND IN SAAS
Praveen Reshmalal 1, Dr. S.H.Patil 2
1
Research Scholar, Bharati Vidyapeeth Deemed University College of Engineering,
2
Guide, Bharati Vidyapeeth Deemed University College of Engineering
ABSTRACT
A Cloud based video on demand is proposed solution to monitor the camera which
is accessible to the client on demand. This camera is present on server computer which is
controlled by cloud controller. Also it makes use of scheduling algorithms to handle
multiple requests. This software provides functionality to remotely access the camera by
making use of cloud architecture. All of the above actions are performed in complete
discretion, without the user’s knowledge, by a background approach, by making use of
cloud controller.
Keywords- VoD; Cloud sim
I. INTRODUCTION
The term cloud computing implies access to remote computing services offered by
third parties via a TCP/IP connection to the public Internet [1]. Cloud computing is a model
for enabling convenient, on demand network access to a shared pool of configurable
computing resources that can be rapidly provided and released with minimal management
effort or service provider interaction. This offers reliable services delivered through data
centers that are built on computer and storage virtualization technologies [5]. Therefore, it is
a technology aiming to deliver on demand IT resources on a pay per use basis and cloud
uses the stateless protocol HTTP, to communicate with your computers. The Cloud
Computing Architectural model is shown in Figure 1.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 01-09
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
2
Fig.1 The Cloud Computing Architectural model
II. WHAT IS CLOUD COMPUTING
Cloud computing?
Cloud computing is the development of distributed processing (Distributed
Computing),Parallel Processing (Parallel Comp) and Grid Computing (Grid Computing) ,
split numerous processing system of computing into smaller subroutines automatically
through grid, send to an extensive system of multiple servers, return the results to the user
after calculation and analysis. Through cloud computing, network service providers can
handling tens of millions or even billions of dollars of information in seconds, reach a
powerful network services as “super computer “.
Cloud computing, for example, is the Virtualization of computer programs through an
internet connection rather than installing applications on every office computer. Using
virtualization, users can access servers or storage without knowing specific server or
storage details. The virtualization layer w i l l e x e c u te us e r re que s t f or c o m pu t i n g
resources by accessing appropriate resources. Virtualization can be applied to many
types of computer resources: Infrastructure such as Storage, Network, Compute (CPU /
Memory etc.), Platform (such as Linux/ Windows OS) and Software as Services.
Cloud computing in computing research and industry today has the potential to make
the new idea of ‘computing as a utility’ in the near future. The Internet is often represented
as a cloud and the term “Cloud Computing”. Cloud computing is the dynamic provisioning
of IT capabilities/IT services (hardware, software, or services) from third parties over a
network [1][2][9]. These IT services are delivered on demand and they aredelivered
elastically, in terms of ‘able to scale out’ and ‘scale in’. The sections below briefly details
different types of cloud computing and how Virtual Machines (VMs) can be provided as
cloud Infrastructure as a Service(Iaas).
III. MODELING THE VM ALLOCATION [5][6]
Cloud computing infrastructure is the massive deployment of virtualization tools
and techniques as it has an extra layer i.e. Virtualization layer that acts as an creation,
execution, management, and hosting environment for application services.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
3
The modeled VMs in the above virtual environment are contextually isolated but still they
need to share computing resources- processing cores, system bus etc. Hence, the amount
of hardware resources available to each VM is constrained by the total processing power ie.
CPU, the memory and system bandwidth available within the host. The choice of virtual
machine, meaning that you can select a configuration of CPU, memory, storage, bandwidth
etc. that is optimal for an application.
CloudSim supports VM provisioning at two levels:-
At the host level – It is possible to specify how much of the overall processing
power of each core will be assigned to each VM. Known as VM policy Allocation
At the VM level – the VM assigns a fixed amount of the available processing power
to the individual application services (task units) that are hosted within its execution
engine. Known as VM Scheduling.
Note that at each level CloudSim implements the time-shared and space-shared
provisioning policies. In this paper, we have proposed the VM load Balancing algorithm at
the VM level (VM Scheduling-time shared) where, individual application services is
assigned varying (different) amount of the available processing power of VMs.
This is because- in the real world, it’s not necessary all the VMs in a DataCenter has
fixed amount of processing powers but it can vary with different computing nodes at
different ends.
And then to these VMs of different processing powers, the tasks/requests (application
services) are assigned or allocated to the most powerful VM and then to the lowest and so
on. They are given the required priority weights. Hence, the performance parameters such
as overall response time and data processing time are optimized.
IV. LOAD BALANCING IN CLOUD COMPUTING
Load balancing is the process of distributing the load among various resources in any
system. Thus load need to be distributed over the resources in cloud-based architecture, so
that each resources does approximately the equal amount of task at any point of time. Basic
need is to provide some techniques to balance requests to provide the solution of the
application faster.
Cloud vendors are based on automatic load balancing services, which allow clients to
increase the number of CPUs or memories for their resources to scale with
increased demands. This service is optional and depends on the clients business needs. So
load balancing serves two important needs, primarily to promote availability of Cloud
resources and secondarily to promote performance [2,4].
In order to balance the requests of the resources it is important to recognize a few major
goals of load balancing algorithms:
a) Cost effectiveness: primary aim is to achieve an overall improvement in system
performance at a reasonable cost.
b) Scalability and flexibility: the distributed system in which the algorithm is implemented
may change in size or topology. So the algorithm must be scalable and flexible enough to
allow such changes to be handled easily.
c) Priority: prioritization of the resources or jobs need to be done on before hand through
the algorithm itself for better service to the important or high prioritized jobs in spite of
equal service provision for all the jobs regardless of their origin.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
4
Brief reviews of few existing load balancing algorithms are presented in the following:
I. Token Routing: The main objective of the algorithm [2,4] is to minimize the system cost
by moving the tokens around the system. But in a scalable cloud system agents cannot have
the enough information of distributing the work load due to communication bottleneck. So
the workload distribution among the agents is not fixed. The drawback of the token routing
algorithm can be removed with the help of heuristic approach of token based load
balancing. This algorithm provides the fast and efficient routing decision. In this algorithm
agent does not need to have an idea of the complete knowledge of their global state and
neighbor’s working load. To make their decision where to pass the token they actually
build their own knowledge base. This knowledge base is actually derived from the
previously received tokens. So in this approach no communication overhead is generated.
II. Round Robin: In this algorithm [2,5], the processes are divided between all processors.
Each process is assigned to the processor in a round robin order. The process allocation
order is maintained locally independent of the allocations from remote processors. Though
the work load distributions between processors are equal but the job processing time for
different processes are not same. So at any point of time some nodes may be heavily loaded
and others remain idle. This algorithm is mostly used in web servers where Http requests are
of similar nature and distributed equally.
III. Randomized: Randomized algorithm is of type static in nature. In this algorithm [2,5]
a process can be handled by a particular node n with a probability p. The process allocation
order is maintained for each processor independent of allocation from remote processor.
This algorithm works well in case of processes are of equal loaded. However, problem
arises when loads are of different computational complexities. Randomized algorithm
does not maintain deterministic approach. It works well when Round Robin algorithm
generates overhead for process queue.
IV. Central queuing: This algorithm [1,3] works on the principal of dynamic distribution.
Each new activity arriving at the queue manager is inserted into the queue. When request
for an activity is received by the queue manager it removes the first activity from the
queue and sends it to the requester. If no ready activity is present in the queue the
request is buffered, until a new activity is available. But in case new activity comes to the
queue while there are unanswered requests in the queue the first such request is removed
from the queue and new activity is assigned to it. When a processor load falls under the
threshold then the local load manager sends a request for the new activity to the central load
manager. The c e n t r a l manager then answers the request if ready activity is found
otherwise queues the request until new activity arrives.
V. Connection mechanism: Load balancing algorithm [6] can also be based on least
connection mechanism which is a part of dynamic scheduling algorithm. It needs to count the
number of connections for each server dynamically to estimate the load. The load balancer
records the connection number of each server. The number of connection increases when a
new connection is dispatched to it, and decreases the number when connection finishes or
timeout happens.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
5
Table 1 presents a comparative study of the above- mentioned load balancing algorithms:
Algorithm Nature Environment Process
Migration
Steadiness Resource
utilization
Token
Routing
Dynam
ic
Decentral
ized
Possible unstable More
Round
robin
Static Decentral
ized
Difficult Stable Less
Randomiz
ed
Staic Decentral
ized
Difficult Stable Less
Central
Queuing
Dynam
ic
Difficult Unstabl
e
Less
Least
location
Dynam
ic
Difficult stable Less
IV. SYSTEM ARCHITECTURE
The following structure shows the architecture of the cloud based VoD. Node Controller
controls the camera. User requests through the cloud controller and receives the live feed of the
video from the camera through the cloud controller.
Work On-Demand Cloud Architecture for Video Application:
On-demand videos can be delivered to sub-scribers through different network structures – i.e.
the video server location and the network between the video servers to the subscriber. For many
cases, proxy server, located closer to the subscribers, is widely used to decrease network traffic and
delays through high speed and robust connection. But proxy server has a finite storage and
distribution capacity, and therefore, a popularity scheme is needed to assist in the s e l e c t i o n of
v i d e o s du ri ng cach in g. Video servers, on the other hand, have a finite capacity and can
only service limited request at one time. For large content library and the unforeseen spikes in
number of active subscribers, Telco are looking for ways to keep service calls rejection to an absolute
minimum. Figure shows the system architecture of the on-demand cloud for IPTV. Videos can be
streamed from any of the virtual servers, irrespective of its capacity, which was align
continuously , notably to handle peak loads, to avoid overload and to achieve continuous, high
utilization levels of servers while meeting its Service Level Agreements (SLAs). In most cases,
performance is not affected as each virtual server behaves as a dedicated server. However, when too
many virtual servers reside on the single physical machine, services may be delivered more
slowly [8].
Fig. 2 System Architecture
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
6
V. SIMULATION
Simulation is a technique where a program models the behaviour of the system
(CPU, network etc.) by calculating the interaction between its different entities using
mathematical formulas’, or actually capturing and playing back observations from a
production system. The available Simulation tools in Cloud Computing today are:
simjava, gridsim and CloudSim.
5.1 CloudSim [1][3][6]
CloudSim is a framework developed by the GRIDS laboratory of University of
Melbourne which enables seamless modeling, simulation and experimenting on
designing Cloud computing infrastructures. CloudSim is a self-contained platform
which can be used to model video on demand, host, service brokers, scheduling and
allocation policies of a large scaled Cloud platform. This CloudSim framework is built on
top of GridSim framework which is also developed by the GRIDS laboratory. Hence, the
researcher has used CloudSim to model of video on demand hosts, VMs for
experimenting in simulated cloud environment.
Virtual machine enables the abstraction of an OS and Application running on it
from the hardware. The interior hardware infrastructure services interrelated to the Clouds is
modelled in the Cloudsim simulator by a video on demand element for handling service
requests. These requests are application elements sandboxed within VMs, which need to be
allocated a share of processing power on video on demand host components video on
demand object manages the data management activities such as VM creation and destruction
and does the routing of user requests.
5.2 Results
In this section, we present the evaluation of the performance of the cloud based load
balancer.
The main results investigated in this paper are summarized as follows:
♦ λm: The effective arrival rate to the main server
♦ λc: The effective arrival rate to the cloudserver
♦ W: average waiting time inside the system
♦ D: average delay in the buffer
♦ S: average server time in each server
♦ L : average number of requests in the system
♦ Q: average number of requests in the buffer
♦ X: average number of requests per server
(Server Utilization)
♦ Pr: probability of a request gets rejected
♦ Pd: probability of a request gets serviced without getting buffered
♦ Pb: probability of a request gets serviced after getting buffered
The simulator was validated by comparing its results with those of proven
formulas of M/M/c/k queuing system. Results of the formulas of the average waiting times
in the system as well as in the buffer were compared to that counterpart of the simulator
that considers exponential distributed random variable for both of the inter-arrival time and
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
7
service time. Additionally, the average number of requests in the systems as well as in the
buffer of both theoretically proven formulas and simulation were also compared. Both
results of the theoretical and simulation were almost identical. Figure 1 shows the
comparison of the average numbers in the system. The average waiting times were too
small to be presented.
Figure 1. Simulation Validation, E[L]: expected number of requests in the system, E[q]:
expected number of requests in the queue
Cloudsim was used t o c a lc u la t e the a ve r a ge number of requests in the
system. The law stated that during the steady state of a system, the average number of
requests is equal to their average arrival rate, multiplied by their average time spent in the
system. Little's law was used in to derive the average number of requests in the system,
buffer, and per server. For another validating the results of the simulation, the follow
equations were used and tested to hold true.
W = D + S L = Q + X
Pr + Pd + Pb = 1
Figure 2 shows the breakdown of the average time spent in the system
The time spent in the servers is quite constant and it represents the average service
time. The request response time is somehow dominated by the service time as the
buffering time represents small portion of the total response time.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
8
The average number of requests is shown in Figure 3. The figure shows that the number
of requests in the main servers is 30% more than that of the cloud server. It also depicts
that the requests occupancy of the buffer is noticeable only at higher offered loads
ρ≥70%. This shows that with specification model under consideration, the buffer plays
remarkable role only when the system under stress.
Figure 4 presents that the main server is utilized at least 30% more than the clouds based
server. This results is helpful is sizing the hardware of load balanced main-cloud server
system under certain workload.
VII CONCLUSION
We evaluated the performance of a load balanced cloud server system under
different offered loads. The results show that the buffer of the load balance plays marginal
role except at very high loads. It also show that the main server handle at least 30% as
much requests at the cloud based server. It will be very informative to pursue the study of
optimizing the buffer size that meets the minimal rejection probability. The future work is
to compare the performance evaluation of systems considering different combinations of
service time and interarrival time distributions.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
9
VIII. REFERENCES
[1] R. Buyy, R. Ranjan, R. Calheiros, "Modeling and simulation of scalable Cloud
computing environments and the CloudSim toolkit: Challenges and opportunities".
Proceedings of the Conference on High Performance Computing and Simulation (HPCS
2009), June 2009
[2] J. Cao , G. Bennett , K. Zhang, "Direct execution simulation of load balancing algorithms
with real workload distributed", Journal of Systems and Software, vol. 54, no. 3, p.227-
237, November 2000
[3] Y. Cheng; K. Wang; R. Jan; C. Chen; C. Huang; ``Efficient failover and Load Balancing
for dependable SIP proxy servers", IEEE Symposium on Computers and
Communications, pp. 1153 - 1158, 2008
[4] A. Downey, ``Evidence for long-tailed distributions in the internet," Proceedings of the
1st ACM IGCOMM Workshop on Internet Measurement, pp. 229-241, 2001. [5] A.
Downey,``Lognormal and Pareto distributions in the Internet," Computer
Communications, vol. 28, no. 7, pp. 790-801, 2005.
[6] D. Ersoz, M. S. Yousif, and C. Das, "Characterizing network traffic in a clusterbased,
multi-tier data center," Proceedings of the 27th International Conference on Distributed
Computing Systems (ICDCS'07), pp. 59-68, 2007.
[7] Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Rajkumar Buyya,“CloudAnalyst: A
CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and
Applications”, 20-23, April 2010, pp. 446-452.
[8] Cloud computing insights from 110 implementation projects; IBM Academy of
TechnologyThought Leadership White Paper, October 2010.
[9] IoannisPsoroulas,IoannisAnagnostopoulos,VassiliLoumos, Eleftherios Kayafas, “A
Study of the Parameters Concerning Load Balancing Algorithms”, IJCSNS
International Journal of Computer Science and Network Security, Vol. 7, No. 4, 2007,
pp. 202-214 .
[10] Sandeep Sharma, Sarabjit Singh, Meenakshi Sharma “Performance Analysis of Load
Balancing Algorithms”, World Academy of Science, Engineering and Technology,
38, 2008 pp. 269- 272.
[11] D.Asir, Shamila Ebenezer and Daniel.D, “Adaptive Load Balancing Techniques in
Global Scale Grid Environment”, International Journal of Computer Engineering &
Technology (IJCET), Volume 1, Issue 2, 2010, pp. 85 - 96, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
[12] Abhishek Pandey, R.M.Tugnayat and A.K.Tiwari, “Data Security Framework for Cloud
Computing Networks”, International Journal of Computer Engineering & Technology
(IJCET), Volume 4, Issue 1, 2013, pp. 178 - 181, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
[13] Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in Cloud
Computing”, International Journal of Computer Engineering & Technology (IJCET),
Volume 3, Issue 1, 2013, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.

Weitere ähnliche Inhalte

Was ist angesagt?

Virtualization Technology using Virtual Machines for Cloud Computing
Virtualization Technology using Virtual Machines for Cloud ComputingVirtualization Technology using Virtual Machines for Cloud Computing
Virtualization Technology using Virtual Machines for Cloud ComputingIJMER
 
Cloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyCloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyINFOGAIN PUBLICATION
 
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...idescitation
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Reviewijtsrd
 
IRJET- Time and Resource Efficient Task Scheduling in Cloud Computing Environ...
IRJET- Time and Resource Efficient Task Scheduling in Cloud Computing Environ...IRJET- Time and Resource Efficient Task Scheduling in Cloud Computing Environ...
IRJET- Time and Resource Efficient Task Scheduling in Cloud Computing Environ...IRJET Journal
 
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM IAEME Publication
 
Elastic neural network method for load prediction in cloud computing grid
Elastic neural network method for load prediction in cloud computing gridElastic neural network method for load prediction in cloud computing grid
Elastic neural network method for load prediction in cloud computing gridIJECEIAES
 
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...Susheel Thakur
 
Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...ijccsa
 
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENTVIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENTijmpict
 
Paper id 25201464
Paper id 25201464Paper id 25201464
Paper id 25201464IJRAT
 
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingIJCNCJournal
 
LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY
LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY
LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY ijccsa
 
Intelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIntelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIJTET Journal
 
SERVER COSOLIDATION ALGORITHMS FOR CLOUD COMPUTING: A REVIEW
SERVER COSOLIDATION ALGORITHMS FOR CLOUD COMPUTING: A REVIEWSERVER COSOLIDATION ALGORITHMS FOR CLOUD COMPUTING: A REVIEW
SERVER COSOLIDATION ALGORITHMS FOR CLOUD COMPUTING: A REVIEWSusheel Thakur
 
IRJET- Dynamic Resource Allocation of Heterogeneous Workload in Cloud
IRJET- Dynamic Resource Allocation of Heterogeneous Workload in CloudIRJET- Dynamic Resource Allocation of Heterogeneous Workload in Cloud
IRJET- Dynamic Resource Allocation of Heterogeneous Workload in CloudIRJET Journal
 
Cloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport StructureCloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport StructureIRJET Journal
 
Load Balancing in Cloud Computing Through Virtual Machine Placement
Load Balancing in Cloud Computing Through Virtual Machine PlacementLoad Balancing in Cloud Computing Through Virtual Machine Placement
Load Balancing in Cloud Computing Through Virtual Machine PlacementIRJET Journal
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingIOSRjournaljce
 

Was ist angesagt? (20)

Virtualization Technology using Virtual Machines for Cloud Computing
Virtualization Technology using Virtual Machines for Cloud ComputingVirtualization Technology using Virtual Machines for Cloud Computing
Virtualization Technology using Virtual Machines for Cloud Computing
 
Cloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyCloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based Survey
 
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
A Strategic Evaluation of Energy-Consumption and Total Execution Time for Clo...
 
Virtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A ReviewVirtual Machine Migration and Allocation in Cloud Computing: A Review
Virtual Machine Migration and Allocation in Cloud Computing: A Review
 
IRJET- Time and Resource Efficient Task Scheduling in Cloud Computing Environ...
IRJET- Time and Resource Efficient Task Scheduling in Cloud Computing Environ...IRJET- Time and Resource Efficient Task Scheduling in Cloud Computing Environ...
IRJET- Time and Resource Efficient Task Scheduling in Cloud Computing Environ...
 
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM
A REVIEW ON LOAD BALANCING IN CLOUD USING ENHANCED GENETIC ALGORITHM
 
Elastic neural network method for load prediction in cloud computing grid
Elastic neural network method for load prediction in cloud computing gridElastic neural network method for load prediction in cloud computing grid
Elastic neural network method for load prediction in cloud computing grid
 
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
 
Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...
 
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENTVIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
 
Paper id 25201464
Paper id 25201464Paper id 25201464
Paper id 25201464
 
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
 
LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY
LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY
LOCALITY SIM: CLOUD SIMULATOR WITH DATA LOCALITY
 
Intelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud EnvironmentIntelligent Workload Management in Virtualized Cloud Environment
Intelligent Workload Management in Virtualized Cloud Environment
 
SERVER COSOLIDATION ALGORITHMS FOR CLOUD COMPUTING: A REVIEW
SERVER COSOLIDATION ALGORITHMS FOR CLOUD COMPUTING: A REVIEWSERVER COSOLIDATION ALGORITHMS FOR CLOUD COMPUTING: A REVIEW
SERVER COSOLIDATION ALGORITHMS FOR CLOUD COMPUTING: A REVIEW
 
IRJET- Dynamic Resource Allocation of Heterogeneous Workload in Cloud
IRJET- Dynamic Resource Allocation of Heterogeneous Workload in CloudIRJET- Dynamic Resource Allocation of Heterogeneous Workload in Cloud
IRJET- Dynamic Resource Allocation of Heterogeneous Workload in Cloud
 
Cloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport StructureCloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport Structure
 
Load Balancing in Cloud Computing Through Virtual Machine Placement
Load Balancing in Cloud Computing Through Virtual Machine PlacementLoad Balancing in Cloud Computing Through Virtual Machine Placement
Load Balancing in Cloud Computing Through Virtual Machine Placement
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
 
20120140504025
2012014050402520120140504025
20120140504025
 

Andere mochten auch

Detailed structure applicable to hybrid recommendation technique
Detailed structure applicable to hybrid recommendation techniqueDetailed structure applicable to hybrid recommendation technique
Detailed structure applicable to hybrid recommendation techniqueIAEME Publication
 
Influence of subgrade condition on rutting in flexible pavements
Influence of subgrade condition on rutting in flexible pavementsInfluence of subgrade condition on rutting in flexible pavements
Influence of subgrade condition on rutting in flexible pavementsIAEME Publication
 
Financial astrology an unexplored tool of security analysis
Financial astrology an unexplored tool of security analysisFinancial astrology an unexplored tool of security analysis
Financial astrology an unexplored tool of security analysisIAEME Publication
 
Fuzzy rule based classification and recognition of handwritten hindi
Fuzzy rule based classification and recognition of handwritten hindiFuzzy rule based classification and recognition of handwritten hindi
Fuzzy rule based classification and recognition of handwritten hindiIAEME Publication
 
Viscoelastic modeling of aortic excessive enlargement of an artery
Viscoelastic modeling of aortic excessive enlargement of an arteryViscoelastic modeling of aortic excessive enlargement of an artery
Viscoelastic modeling of aortic excessive enlargement of an arteryIAEME Publication
 
Cost optimization of reinforced concrete chimney
Cost optimization of reinforced concrete chimneyCost optimization of reinforced concrete chimney
Cost optimization of reinforced concrete chimneyIAEME Publication
 
Factors affecting the regularity of purchase of organic tea – an application dis
Factors affecting the regularity of purchase of organic tea – an application disFactors affecting the regularity of purchase of organic tea – an application dis
Factors affecting the regularity of purchase of organic tea – an application disIAEME Publication
 
Evaluation of remote sensing satellite ground station performance in prbs local
Evaluation of remote sensing satellite ground station performance in prbs localEvaluation of remote sensing satellite ground station performance in prbs local
Evaluation of remote sensing satellite ground station performance in prbs localIAEME Publication
 
Simulation of eight wheeled rocker bogie suspension system using
Simulation of eight wheeled rocker bogie suspension system usingSimulation of eight wheeled rocker bogie suspension system using
Simulation of eight wheeled rocker bogie suspension system usingIAEME Publication
 

Andere mochten auch (9)

Detailed structure applicable to hybrid recommendation technique
Detailed structure applicable to hybrid recommendation techniqueDetailed structure applicable to hybrid recommendation technique
Detailed structure applicable to hybrid recommendation technique
 
Influence of subgrade condition on rutting in flexible pavements
Influence of subgrade condition on rutting in flexible pavementsInfluence of subgrade condition on rutting in flexible pavements
Influence of subgrade condition on rutting in flexible pavements
 
Financial astrology an unexplored tool of security analysis
Financial astrology an unexplored tool of security analysisFinancial astrology an unexplored tool of security analysis
Financial astrology an unexplored tool of security analysis
 
Fuzzy rule based classification and recognition of handwritten hindi
Fuzzy rule based classification and recognition of handwritten hindiFuzzy rule based classification and recognition of handwritten hindi
Fuzzy rule based classification and recognition of handwritten hindi
 
Viscoelastic modeling of aortic excessive enlargement of an artery
Viscoelastic modeling of aortic excessive enlargement of an arteryViscoelastic modeling of aortic excessive enlargement of an artery
Viscoelastic modeling of aortic excessive enlargement of an artery
 
Cost optimization of reinforced concrete chimney
Cost optimization of reinforced concrete chimneyCost optimization of reinforced concrete chimney
Cost optimization of reinforced concrete chimney
 
Factors affecting the regularity of purchase of organic tea – an application dis
Factors affecting the regularity of purchase of organic tea – an application disFactors affecting the regularity of purchase of organic tea – an application dis
Factors affecting the regularity of purchase of organic tea – an application dis
 
Evaluation of remote sensing satellite ground station performance in prbs local
Evaluation of remote sensing satellite ground station performance in prbs localEvaluation of remote sensing satellite ground station performance in prbs local
Evaluation of remote sensing satellite ground station performance in prbs local
 
Simulation of eight wheeled rocker bogie suspension system using
Simulation of eight wheeled rocker bogie suspension system usingSimulation of eight wheeled rocker bogie suspension system using
Simulation of eight wheeled rocker bogie suspension system using
 

Ähnlich wie Resource provisioning for video on demand in saas

A load balancing strategy for reducing data loss risk on cloud using remodif...
A load balancing strategy for reducing data loss risk on cloud  using remodif...A load balancing strategy for reducing data loss risk on cloud  using remodif...
A load balancing strategy for reducing data loss risk on cloud using remodif...IJECEIAES
 
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGIRJET Journal
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEAUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEIRJET Journal
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachIRJET Journal
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTpharmaindexing
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...IEEEGLOBALSOFTTECHNOLOGIES
 
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...Eswar Publications
 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...acijjournal
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud Shyam Hajare
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingScientific Review SR
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time IJECEIAES
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingijccsa
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computingneirew J
 

Ähnlich wie Resource provisioning for video on demand in saas (20)

A load balancing strategy for reducing data loss risk on cloud using remodif...
A load balancing strategy for reducing data loss risk on cloud  using remodif...A load balancing strategy for reducing data loss risk on cloud  using remodif...
A load balancing strategy for reducing data loss risk on cloud using remodif...
 
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTING
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
50120140502008
5012014050200850120140502008
50120140502008
 
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUEAUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
AUTOMATED VM MIGRATION USING INTELLIGENT LEARNING TECHNIQUE
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Dynamic resource allocation using...
 
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
Load Balancing in Cloud Computing Environment: A Comparative Study of Service...
 
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
DYNAMIC ALLOCATION METHOD FOR EFFICIENT LOAD BALANCING IN VIRTUAL MACHINES FO...
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud
 
A Short Appraisal on Cloud Computing
A Short Appraisal on Cloud ComputingA Short Appraisal on Cloud Computing
A Short Appraisal on Cloud Computing
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 
Implementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud ComputingImplementation of the Open Source Virtualization Technologies in Cloud Computing
Implementation of the Open Source Virtualization Technologies in Cloud Computing
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 

Kürzlich hochgeladen (20)

AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 

Resource provisioning for video on demand in saas

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 1 RESOURCE PROVISIONING FOR VIDEO ON DEMAND IN SAAS Praveen Reshmalal 1, Dr. S.H.Patil 2 1 Research Scholar, Bharati Vidyapeeth Deemed University College of Engineering, 2 Guide, Bharati Vidyapeeth Deemed University College of Engineering ABSTRACT A Cloud based video on demand is proposed solution to monitor the camera which is accessible to the client on demand. This camera is present on server computer which is controlled by cloud controller. Also it makes use of scheduling algorithms to handle multiple requests. This software provides functionality to remotely access the camera by making use of cloud architecture. All of the above actions are performed in complete discretion, without the user’s knowledge, by a background approach, by making use of cloud controller. Keywords- VoD; Cloud sim I. INTRODUCTION The term cloud computing implies access to remote computing services offered by third parties via a TCP/IP connection to the public Internet [1]. Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provided and released with minimal management effort or service provider interaction. This offers reliable services delivered through data centers that are built on computer and storage virtualization technologies [5]. Therefore, it is a technology aiming to deliver on demand IT resources on a pay per use basis and cloud uses the stateless protocol HTTP, to communicate with your computers. The Cloud Computing Architectural model is shown in Figure 1. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 01-09 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 2 Fig.1 The Cloud Computing Architectural model II. WHAT IS CLOUD COMPUTING Cloud computing? Cloud computing is the development of distributed processing (Distributed Computing),Parallel Processing (Parallel Comp) and Grid Computing (Grid Computing) , split numerous processing system of computing into smaller subroutines automatically through grid, send to an extensive system of multiple servers, return the results to the user after calculation and analysis. Through cloud computing, network service providers can handling tens of millions or even billions of dollars of information in seconds, reach a powerful network services as “super computer “. Cloud computing, for example, is the Virtualization of computer programs through an internet connection rather than installing applications on every office computer. Using virtualization, users can access servers or storage without knowing specific server or storage details. The virtualization layer w i l l e x e c u te us e r re que s t f or c o m pu t i n g resources by accessing appropriate resources. Virtualization can be applied to many types of computer resources: Infrastructure such as Storage, Network, Compute (CPU / Memory etc.), Platform (such as Linux/ Windows OS) and Software as Services. Cloud computing in computing research and industry today has the potential to make the new idea of ‘computing as a utility’ in the near future. The Internet is often represented as a cloud and the term “Cloud Computing”. Cloud computing is the dynamic provisioning of IT capabilities/IT services (hardware, software, or services) from third parties over a network [1][2][9]. These IT services are delivered on demand and they aredelivered elastically, in terms of ‘able to scale out’ and ‘scale in’. The sections below briefly details different types of cloud computing and how Virtual Machines (VMs) can be provided as cloud Infrastructure as a Service(Iaas). III. MODELING THE VM ALLOCATION [5][6] Cloud computing infrastructure is the massive deployment of virtualization tools and techniques as it has an extra layer i.e. Virtualization layer that acts as an creation, execution, management, and hosting environment for application services.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 3 The modeled VMs in the above virtual environment are contextually isolated but still they need to share computing resources- processing cores, system bus etc. Hence, the amount of hardware resources available to each VM is constrained by the total processing power ie. CPU, the memory and system bandwidth available within the host. The choice of virtual machine, meaning that you can select a configuration of CPU, memory, storage, bandwidth etc. that is optimal for an application. CloudSim supports VM provisioning at two levels:- At the host level – It is possible to specify how much of the overall processing power of each core will be assigned to each VM. Known as VM policy Allocation At the VM level – the VM assigns a fixed amount of the available processing power to the individual application services (task units) that are hosted within its execution engine. Known as VM Scheduling. Note that at each level CloudSim implements the time-shared and space-shared provisioning policies. In this paper, we have proposed the VM load Balancing algorithm at the VM level (VM Scheduling-time shared) where, individual application services is assigned varying (different) amount of the available processing power of VMs. This is because- in the real world, it’s not necessary all the VMs in a DataCenter has fixed amount of processing powers but it can vary with different computing nodes at different ends. And then to these VMs of different processing powers, the tasks/requests (application services) are assigned or allocated to the most powerful VM and then to the lowest and so on. They are given the required priority weights. Hence, the performance parameters such as overall response time and data processing time are optimized. IV. LOAD BALANCING IN CLOUD COMPUTING Load balancing is the process of distributing the load among various resources in any system. Thus load need to be distributed over the resources in cloud-based architecture, so that each resources does approximately the equal amount of task at any point of time. Basic need is to provide some techniques to balance requests to provide the solution of the application faster. Cloud vendors are based on automatic load balancing services, which allow clients to increase the number of CPUs or memories for their resources to scale with increased demands. This service is optional and depends on the clients business needs. So load balancing serves two important needs, primarily to promote availability of Cloud resources and secondarily to promote performance [2,4]. In order to balance the requests of the resources it is important to recognize a few major goals of load balancing algorithms: a) Cost effectiveness: primary aim is to achieve an overall improvement in system performance at a reasonable cost. b) Scalability and flexibility: the distributed system in which the algorithm is implemented may change in size or topology. So the algorithm must be scalable and flexible enough to allow such changes to be handled easily. c) Priority: prioritization of the resources or jobs need to be done on before hand through the algorithm itself for better service to the important or high prioritized jobs in spite of equal service provision for all the jobs regardless of their origin.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 4 Brief reviews of few existing load balancing algorithms are presented in the following: I. Token Routing: The main objective of the algorithm [2,4] is to minimize the system cost by moving the tokens around the system. But in a scalable cloud system agents cannot have the enough information of distributing the work load due to communication bottleneck. So the workload distribution among the agents is not fixed. The drawback of the token routing algorithm can be removed with the help of heuristic approach of token based load balancing. This algorithm provides the fast and efficient routing decision. In this algorithm agent does not need to have an idea of the complete knowledge of their global state and neighbor’s working load. To make their decision where to pass the token they actually build their own knowledge base. This knowledge base is actually derived from the previously received tokens. So in this approach no communication overhead is generated. II. Round Robin: In this algorithm [2,5], the processes are divided between all processors. Each process is assigned to the processor in a round robin order. The process allocation order is maintained locally independent of the allocations from remote processors. Though the work load distributions between processors are equal but the job processing time for different processes are not same. So at any point of time some nodes may be heavily loaded and others remain idle. This algorithm is mostly used in web servers where Http requests are of similar nature and distributed equally. III. Randomized: Randomized algorithm is of type static in nature. In this algorithm [2,5] a process can be handled by a particular node n with a probability p. The process allocation order is maintained for each processor independent of allocation from remote processor. This algorithm works well in case of processes are of equal loaded. However, problem arises when loads are of different computational complexities. Randomized algorithm does not maintain deterministic approach. It works well when Round Robin algorithm generates overhead for process queue. IV. Central queuing: This algorithm [1,3] works on the principal of dynamic distribution. Each new activity arriving at the queue manager is inserted into the queue. When request for an activity is received by the queue manager it removes the first activity from the queue and sends it to the requester. If no ready activity is present in the queue the request is buffered, until a new activity is available. But in case new activity comes to the queue while there are unanswered requests in the queue the first such request is removed from the queue and new activity is assigned to it. When a processor load falls under the threshold then the local load manager sends a request for the new activity to the central load manager. The c e n t r a l manager then answers the request if ready activity is found otherwise queues the request until new activity arrives. V. Connection mechanism: Load balancing algorithm [6] can also be based on least connection mechanism which is a part of dynamic scheduling algorithm. It needs to count the number of connections for each server dynamically to estimate the load. The load balancer records the connection number of each server. The number of connection increases when a new connection is dispatched to it, and decreases the number when connection finishes or timeout happens.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 5 Table 1 presents a comparative study of the above- mentioned load balancing algorithms: Algorithm Nature Environment Process Migration Steadiness Resource utilization Token Routing Dynam ic Decentral ized Possible unstable More Round robin Static Decentral ized Difficult Stable Less Randomiz ed Staic Decentral ized Difficult Stable Less Central Queuing Dynam ic Difficult Unstabl e Less Least location Dynam ic Difficult stable Less IV. SYSTEM ARCHITECTURE The following structure shows the architecture of the cloud based VoD. Node Controller controls the camera. User requests through the cloud controller and receives the live feed of the video from the camera through the cloud controller. Work On-Demand Cloud Architecture for Video Application: On-demand videos can be delivered to sub-scribers through different network structures – i.e. the video server location and the network between the video servers to the subscriber. For many cases, proxy server, located closer to the subscribers, is widely used to decrease network traffic and delays through high speed and robust connection. But proxy server has a finite storage and distribution capacity, and therefore, a popularity scheme is needed to assist in the s e l e c t i o n of v i d e o s du ri ng cach in g. Video servers, on the other hand, have a finite capacity and can only service limited request at one time. For large content library and the unforeseen spikes in number of active subscribers, Telco are looking for ways to keep service calls rejection to an absolute minimum. Figure shows the system architecture of the on-demand cloud for IPTV. Videos can be streamed from any of the virtual servers, irrespective of its capacity, which was align continuously , notably to handle peak loads, to avoid overload and to achieve continuous, high utilization levels of servers while meeting its Service Level Agreements (SLAs). In most cases, performance is not affected as each virtual server behaves as a dedicated server. However, when too many virtual servers reside on the single physical machine, services may be delivered more slowly [8]. Fig. 2 System Architecture
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 6 V. SIMULATION Simulation is a technique where a program models the behaviour of the system (CPU, network etc.) by calculating the interaction between its different entities using mathematical formulas’, or actually capturing and playing back observations from a production system. The available Simulation tools in Cloud Computing today are: simjava, gridsim and CloudSim. 5.1 CloudSim [1][3][6] CloudSim is a framework developed by the GRIDS laboratory of University of Melbourne which enables seamless modeling, simulation and experimenting on designing Cloud computing infrastructures. CloudSim is a self-contained platform which can be used to model video on demand, host, service brokers, scheduling and allocation policies of a large scaled Cloud platform. This CloudSim framework is built on top of GridSim framework which is also developed by the GRIDS laboratory. Hence, the researcher has used CloudSim to model of video on demand hosts, VMs for experimenting in simulated cloud environment. Virtual machine enables the abstraction of an OS and Application running on it from the hardware. The interior hardware infrastructure services interrelated to the Clouds is modelled in the Cloudsim simulator by a video on demand element for handling service requests. These requests are application elements sandboxed within VMs, which need to be allocated a share of processing power on video on demand host components video on demand object manages the data management activities such as VM creation and destruction and does the routing of user requests. 5.2 Results In this section, we present the evaluation of the performance of the cloud based load balancer. The main results investigated in this paper are summarized as follows: ♦ λm: The effective arrival rate to the main server ♦ λc: The effective arrival rate to the cloudserver ♦ W: average waiting time inside the system ♦ D: average delay in the buffer ♦ S: average server time in each server ♦ L : average number of requests in the system ♦ Q: average number of requests in the buffer ♦ X: average number of requests per server (Server Utilization) ♦ Pr: probability of a request gets rejected ♦ Pd: probability of a request gets serviced without getting buffered ♦ Pb: probability of a request gets serviced after getting buffered The simulator was validated by comparing its results with those of proven formulas of M/M/c/k queuing system. Results of the formulas of the average waiting times in the system as well as in the buffer were compared to that counterpart of the simulator that considers exponential distributed random variable for both of the inter-arrival time and
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 7 service time. Additionally, the average number of requests in the systems as well as in the buffer of both theoretically proven formulas and simulation were also compared. Both results of the theoretical and simulation were almost identical. Figure 1 shows the comparison of the average numbers in the system. The average waiting times were too small to be presented. Figure 1. Simulation Validation, E[L]: expected number of requests in the system, E[q]: expected number of requests in the queue Cloudsim was used t o c a lc u la t e the a ve r a ge number of requests in the system. The law stated that during the steady state of a system, the average number of requests is equal to their average arrival rate, multiplied by their average time spent in the system. Little's law was used in to derive the average number of requests in the system, buffer, and per server. For another validating the results of the simulation, the follow equations were used and tested to hold true. W = D + S L = Q + X Pr + Pd + Pb = 1 Figure 2 shows the breakdown of the average time spent in the system The time spent in the servers is quite constant and it represents the average service time. The request response time is somehow dominated by the service time as the buffering time represents small portion of the total response time.
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 8 The average number of requests is shown in Figure 3. The figure shows that the number of requests in the main servers is 30% more than that of the cloud server. It also depicts that the requests occupancy of the buffer is noticeable only at higher offered loads ρ≥70%. This shows that with specification model under consideration, the buffer plays remarkable role only when the system under stress. Figure 4 presents that the main server is utilized at least 30% more than the clouds based server. This results is helpful is sizing the hardware of load balanced main-cloud server system under certain workload. VII CONCLUSION We evaluated the performance of a load balanced cloud server system under different offered loads. The results show that the buffer of the load balance plays marginal role except at very high loads. It also show that the main server handle at least 30% as much requests at the cloud based server. It will be very informative to pursue the study of optimizing the buffer size that meets the minimal rejection probability. The future work is to compare the performance evaluation of systems considering different combinations of service time and interarrival time distributions.
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 9 VIII. REFERENCES [1] R. Buyy, R. Ranjan, R. Calheiros, "Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities". Proceedings of the Conference on High Performance Computing and Simulation (HPCS 2009), June 2009 [2] J. Cao , G. Bennett , K. Zhang, "Direct execution simulation of load balancing algorithms with real workload distributed", Journal of Systems and Software, vol. 54, no. 3, p.227- 237, November 2000 [3] Y. Cheng; K. Wang; R. Jan; C. Chen; C. Huang; ``Efficient failover and Load Balancing for dependable SIP proxy servers", IEEE Symposium on Computers and Communications, pp. 1153 - 1158, 2008 [4] A. Downey, ``Evidence for long-tailed distributions in the internet," Proceedings of the 1st ACM IGCOMM Workshop on Internet Measurement, pp. 229-241, 2001. [5] A. Downey,``Lognormal and Pareto distributions in the Internet," Computer Communications, vol. 28, no. 7, pp. 790-801, 2005. [6] D. Ersoz, M. S. Yousif, and C. Das, "Characterizing network traffic in a clusterbased, multi-tier data center," Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS'07), pp. 59-68, 2007. [7] Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Rajkumar Buyya,“CloudAnalyst: A CloudSim-based Visual Modeller for Analysing Cloud Computing Environments and Applications”, 20-23, April 2010, pp. 446-452. [8] Cloud computing insights from 110 implementation projects; IBM Academy of TechnologyThought Leadership White Paper, October 2010. [9] IoannisPsoroulas,IoannisAnagnostopoulos,VassiliLoumos, Eleftherios Kayafas, “A Study of the Parameters Concerning Load Balancing Algorithms”, IJCSNS International Journal of Computer Science and Network Security, Vol. 7, No. 4, 2007, pp. 202-214 . [10] Sandeep Sharma, Sarabjit Singh, Meenakshi Sharma “Performance Analysis of Load Balancing Algorithms”, World Academy of Science, Engineering and Technology, 38, 2008 pp. 269- 272. [11] D.Asir, Shamila Ebenezer and Daniel.D, “Adaptive Load Balancing Techniques in Global Scale Grid Environment”, International Journal of Computer Engineering & Technology (IJCET), Volume 1, Issue 2, 2010, pp. 85 - 96, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [12] Abhishek Pandey, R.M.Tugnayat and A.K.Tiwari, “Data Security Framework for Cloud Computing Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 178 - 181, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [13] Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in Cloud Computing”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2013, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.