SlideShare a Scribd company logo
1 of 3
Download to read offline
Sandip Kailuke Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 6), September 2014, pp.97-99 
www.ijera.com 97 | P a g e 
Fast Synchronization In IVR Using REST API For HTML5 And AJAX Sandeep Kailuke, Nekita Chavhan Student IV Sem M.E.(Mobile Technology) Department of Computer Science & Engineering G.H.Raisoni College of Engineering Nagpur, India Assistant Professor Department of Computer Science & Engineering G.H.Raisoni College of Engineering Nagpur, India Abstract Need a web service is just a web page meant for a computer to request and process. IVR system uses REST API for data access while calling. When in call process user want to access data, server need to validate it and while validation data accessing must be synchronize with mysql server. For large data accessing API is essential. This method is for HTML5 and AJAX for fast data synchronization. REST can support any media type, but XML is expected to be the most popular transport for structured information. In IVR System problems with fast data access because before uses HTML4. Proposed work is for HTML5 with AJAX implementation. 
Keywords— interactive voice response, hypertext markup language 5.0, AJAX technology. 
I. INTRODUCTION 
Cloud computing environments provide on- demand resource supplying, allowing applications to elastically scale. However, application point of reference is currently being used to test cloud management systems are not designed for this purpose. This result in resource under provisioning and quality-of-service (QoS) violations when system is tested using these benchmarks are deployed in production environments. [2] We present C-MART, a benchmark designed to emulate a modern web application running in a cloud computing environment. Using cloud computing, it is designed paradigm of elastic scalability at every application tier and utilizes modern web-based technologies such as HTML5, AJAX and jQuery. C-MART consists of a web application, client emulator, server, and API. The deployment server automatically deploys and configures the test environment in orders of magnitude less time than current standard. The scaling API allows users to define and provision their own produced datacenter. The client emulator generates the web workload for the application by emulating complex and varied client behaviors, considering decisions based on page content and previous history. We show that C-MART can detect problems in management systems that previous benchmarks fail to identify, such as an increasing error in predicting server CPU utilization and resource under provisioning in 22 percent of QoS measurements. AJAX, jQuery and HTML5 are big buzz words in the web design/development community nowadays. While acquiring these web technologies to work together is exciting, the programming skills required to do this isn't new. 
AJAX, jQuery and HTML5 work together through the use of page tags, page IDsand page classes that exist between the two tags of a web page. The JavaScript functionality embedded in jQuery and AJAX finds these tags , IDs and classes (which we'll now call page elements) and "does" something to them; maybe it changes their background color, it may loading copy into them. Either end, it is doing something to them. This process of "finding and doing something" to these page elements with JavaScript is more commonly known as "traversing the DOM". Traversing the DOM is the way to getting AJAX, jQuery and HTML5 to work together. Web developers have used DOM traversal for many years, again, there really isn't that much new programming involved when it comes to synchronize AJAX, jQuery and HTML5. 
II. RELATED WORK 
In the global adversarial model, where the efficiency of accessing data from the database is normal but quite slow. Thus the different approaches carried were explored below- 
A. Syncronisation of IVR with HTML 5.0 
Short for interactive voice response, a telephony technology in which the one uses a touch-tone telephone to interact with a database to acquire information from or enter data into the database. IVR technology does not require human interaction over the telephone as the user's interaction with the database is predetermined by what the IVR system will allow every user access to. For example, banks and credit card companies use IVR systems so that 
RESEARCH ARTICLE OPEN ACCESS
Sandip Kailuke Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 6), September 2014, pp.97-99 
www.ijera.com 98 | P a g e 
their customers can receive up-to-date account information instantly and easily without having to speak directly to a user. IVR technology is used to gather information, as in the case of telephone surveys in which the user is prompted to answer questions by pushing the numbers on a touch-tone telephone. The new king on the hill is ―HTML5″ which has taken that exact mantle. One intense view is that the term is marketing drive. The other one is that it should ONLY be used to mean the W3C version of the HTML5 core specification. The main objective in system is to synchronize the IVR database with HTML 5. 
B. Security against attacks in HTML 5.0 
HTML5 is an emerging stack for next generation applications. HTML5 is intensifing browser capabilities and able to execute Rich Internet Applications in the context of modern browser architecture. Interestingly HTML5 can run on mobile devices as well and it makes even more complicated. HTML5 is not a single technology stack but combination of various components like XMLHttpRequest (XHR), Document Object model (DOM), Cross Origin Resource Sharing (CORS) and enhanced HTML/Browser rendering. It brings many new technologies to the browser which were not seen before like localstorage, webSQL, websocket, webworkers, intensify XHR, DOM based XPATH to name a few. It has enhanced attack surface and point of exploitations for attacker and malicious agents. By supplement these vectors one can craft stealth attacks and silent exploits, it’s very hard to detect and easy to compromise. HTML5 has several new components like XHR- Level2, DOM, Storage area, Application Cache, WebSQL etc. All these components are making fundamental backbone for HTML5 applications and by nature they look very still. It allows crafting stealth attack vectors and adding risk to end client. Structured layers as mentioned in the above section provide more clarity on a possible enhanced attack surface. This exposes browser components of an application to a set of possible threats which can be exploited. Hence the proposed system includes the security against attackers which can be controlled by HTML 5 and AJAX. The data in the database saved permanently in the web server for the use of IVR system. 
C. Persistent DummyTraffic 
Private Database Clouds are a proven model for the delivery of database services. Private database cloud servers allow customers to consolidate servers, storage, and database workloads onto a shared hardware and software substructure. By providing on- demand access to database services in a self-service, elastically scalable and metered manner, private database clouds offer conclusive advantages in cost, quality of service, and deftness. Accelerate and optimize deployment by leveraging Oracle Database, Oracle Real Application Clusters, and Oracle Servers & Storage servers. 
A database accessible to clients from the cloud and delivered to users on demand via the internet from a cloud database provider server. Also referred to as Database-as-a-Service (DBaaS), cloud databases can use cloud computing to achieve perfect scaling, high availability, multi-tenancy and effective resource allocation. While a cloud database can be a traditional database such as a MySQL or SQL Server database that has been adopted for cloud use, a native cloud database such as Xeround's MySQL Cloud database tends to better equipped to optimally use cloud resources and to guarantee scalability as well as availability and contancy. Cloud databases can offer significant advantages over their traditional equivalent, including increased approachability, automatic failover and fast automated recovery from failures, automated on-the-go scaling, minimal investment and maintenance of in-house hardware, and better performance. Simultaneously cloud databases have their share of potential drawbacks, including security and privacy issues as well as the potential loss of or inability to access critical data in the event of a disaster or bankruptcy of the cloud database service provider. Figure 1: Ajax output in calendar selection 
D. Efficiency in respose time 
Flooding or using dummy messages have the drawback of introducing a large amount of message overhead. Hence it is overcome by utilizing beacons at the MAC layer. Beacons are sent out regularly, which essentially forms a constant-rate of dummy messages. Using beacons may increase the delivery delay of event information as they are sent out at the predefined beacon interval only, but using this latency can be controlled. The cross layer where routing and MAC layer solutions are combined the naïve solution within MAC layer is used where solid square node detects an event and broadcast it to neighbors in 4 hops and node on 4th hop sends information to the base station [7]. Double cross layer solution also
Sandip Kailuke Int. Journal of Engineering Research and Applications www.ijera.com 
ISSN : 2248-9622, Vol. 4, Issue 9( Version 6), September 2014, pp.97-99 
www.ijera.com 99 | P a g e 
controls latency as Crosslayer solution but improving more privacy where random node is chosen to forward the information. A cross-layer relay-selection algorithm and a distributed beam forming protocol can also be used to increase BS anonymity [2]. 
III. PROPOSED METHODOLOGY 
This proposed system implements the fast synchronization between the database in an IVR system using HTML 5 and AJAX technologies. Previously the HTML 4 have same feature but the time taken to execute that command will take more time or some time the session will also expires due to asynchronization of database. The security against the attackers will have the main issue regarding software application. The response time of HTML5 page is much less than HTML4 page in both the servers. Because in HTML5 page, JavaScript code is replaced by HTML5 form tag, which reduces the HTTP request significantly. From the server point of view, response time required by HTML5 page for Apache is less than IIS. In Apache, for HTML4 page, mean value of response time was found to be 976.28 ms with variance 23.16 ms. While for HTML5 page, an average response time of 230.28 ms was observed with variance 51.37 ms. In case of IIS, a mean response time of 1506.13 ms with variance 16.19 ms was observed for HTML4 application. While for HTML5, mean response time and variance were calculated as 302.66 ms and 24.32 ms respectively. Figure 2: AJAX in HTML5 search box Figure 3: AJAX in HTML5 search box Figure 4: Date selection in HTML5 using AJAX 
IV. CONCLUSION 
In this paper we propose the IVR system will consume less time to switch divert the information from source to destination. The system will allow utilizing the best technology available not only languages, but to utilize the database to make the efficient use of the software. 
REFERENCES 
[1] M. Armbrust et al., ―Above the Clouds: A Berkeley View of Cloud Computing,‖ 2009. 
[2] ―RUBiS.‖ [Online]. http://rubis.ow2.org/. 
[3] C. Binnig, D. Kossmann, T. Kraska, and S. Loesing, ―How is the weather tomorrow? Towards a Benchmark for the Cloud,‖ in Proceedings of the Second International Workshop on Testing Data-base Systems - DBTest ’09, 2009 
[4] ―TPC Benchmark W (Web Commerce) Specification,” San Jose, CA, USA, 2002. 
[5] ―eBay.‖ [Online]. http://www.ebay.com 
[6] “Olio‖ [Online]. http://incubator.apache.org/olio/ 
[7] D. J. Abadi, M. Carey, S. Chaudhuri, H. Garcia-Molina, J. M. Patel, and R. Ramakrishnan, ―Cloud databases: what’s new?,‖ Proceedings of the VLDB Endowment, vol. 3, no. 1–2, Sep. 2010. 
[8] E. Cecchet, V. Udayabhanu, T. Wood, and P. Shenoy, ―Bench-Lab: An Open Testbed for Realistic Benchmarking of Web Ap- plications,‖ in Proceedings of 2nd USENIX Conference on Web Ap-plication Development, WebApps ’11, 2011. 
[9] A. Beitch, B. Liu, T. Yung, R. Griffith, A. Fox, and D. A. Patter-son, ―Rain: A Workload Generation Toolkit for Cloud Compu-ting Applications.‖ EECS Department, University of California at Berkeley, 2010. 
[10] B. Pugh and J. Spacco, ―RUBiS revisited,‖ in Companion to the 19th annual ACM SIGPLAN conference on Object-oriented pro-gramming systems, languages, and applications - OOPSLA ’04, 2004, p. 204.

More Related Content

What's hot

Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseijccsa
 
Access security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemAccess security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemJoão Gabriel Lima
 
Big Data Analytics and Ubiquitous computing
Big Data Analytics and Ubiquitous computingBig Data Analytics and Ubiquitous computing
Big Data Analytics and Ubiquitous computingAnimesh Chaturvedi
 
G07.2014 magic quadrant for enterprise file synchronization and sharing
G07.2014   magic quadrant for enterprise file synchronization and sharingG07.2014   magic quadrant for enterprise file synchronization and sharing
G07.2014 magic quadrant for enterprise file synchronization and sharingSatya Harish
 
Cloud Service Life-cycle Management
Cloud Service Life-cycle ManagementCloud Service Life-cycle Management
Cloud Service Life-cycle ManagementAnimesh Chaturvedi
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
CouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big DataCouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big DataDebajani Mohanty
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET Journal
 
Patterned De-Duplication On Dependable Data Subcontracting With Three Error ...
Patterned De-Duplication On Dependable Data Subcontracting  With Three Error ...Patterned De-Duplication On Dependable Data Subcontracting  With Three Error ...
Patterned De-Duplication On Dependable Data Subcontracting With Three Error ...IJMSIRJOURNAL
 
Prepare Your Data For The Cloud
Prepare Your Data For The CloudPrepare Your Data For The Cloud
Prepare Your Data For The CloudIndicThreads
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET Journal
 
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...IOSR Journals
 

What's hot (20)

Efficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big databaseEfficient and reliable hybrid cloud architecture for big database
Efficient and reliable hybrid cloud architecture for big database
 
Access security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop systemAccess security on cloud computing implemented in hadoop system
Access security on cloud computing implemented in hadoop system
 
Big Data Analytics and Ubiquitous computing
Big Data Analytics and Ubiquitous computingBig Data Analytics and Ubiquitous computing
Big Data Analytics and Ubiquitous computing
 
G07.2014 magic quadrant for enterprise file synchronization and sharing
G07.2014   magic quadrant for enterprise file synchronization and sharingG07.2014   magic quadrant for enterprise file synchronization and sharing
G07.2014 magic quadrant for enterprise file synchronization and sharing
 
Cloud Service Life-cycle Management
Cloud Service Life-cycle ManagementCloud Service Life-cycle Management
Cloud Service Life-cycle Management
 
E42053035
E42053035E42053035
E42053035
 
F1034047
F1034047F1034047
F1034047
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
D do s_white_paper
D do s_white_paperD do s_white_paper
D do s_white_paper
 
Unit 5
Unit  5Unit  5
Unit 5
 
CouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big DataCouchBase The Complete NoSql Solution for Big Data
CouchBase The Complete NoSql Solution for Big Data
 
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...IRJET-  	  Continuous Auditing Approach to the Cloud Service Addressing Attri...
IRJET- Continuous Auditing Approach to the Cloud Service Addressing Attri...
 
Patterned De-Duplication On Dependable Data Subcontracting With Three Error ...
Patterned De-Duplication On Dependable Data Subcontracting  With Three Error ...Patterned De-Duplication On Dependable Data Subcontracting  With Three Error ...
Patterned De-Duplication On Dependable Data Subcontracting With Three Error ...
 
Prepare Your Data For The Cloud
Prepare Your Data For The CloudPrepare Your Data For The Cloud
Prepare Your Data For The Cloud
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IRJET- Secured Hadoop Environment
IRJET- Secured Hadoop EnvironmentIRJET- Secured Hadoop Environment
IRJET- Secured Hadoop Environment
 
T04503113118
T04503113118T04503113118
T04503113118
 
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
Implementing SAAS: Cloud Computing and Android Based Application Framework fo...
 

Viewers also liked

Adicionar ou remover programas
Adicionar ou remover programasAdicionar ou remover programas
Adicionar ou remover programasjoaopriostexx
 
03. eletricidade e automação
03. eletricidade e automação03. eletricidade e automação
03. eletricidade e automaçãoMiguel Eletricista
 
Presentación para la romana
Presentación para  la romanaPresentación para  la romana
Presentación para la romanaJose Indraya
 
Manual tejeRedes parte III tecnologias sociales ver beta 1 final
Manual tejeRedes parte III tecnologias sociales ver beta 1 finalManual tejeRedes parte III tecnologias sociales ver beta 1 final
Manual tejeRedes parte III tecnologias sociales ver beta 1 finaltejeRedes
 
E acessibilidade e acesso a informação
E acessibilidade e acesso a informação E acessibilidade e acesso a informação
E acessibilidade e acesso a informação Valeria de Oliveira
 
Ciclos sistema operativo operativo de articulacion abril 2010
Ciclos sistema operativo operativo de articulacion  abril 2010Ciclos sistema operativo operativo de articulacion  abril 2010
Ciclos sistema operativo operativo de articulacion abril 2010María Eugenia Gallo Arbeláez
 
Chorizos de cerdo
Chorizos de cerdoChorizos de cerdo
Chorizos de cerdoKeretox
 
Nusai tecnologias de acesso à informação
Nusai   tecnologias de acesso à informaçãoNusai   tecnologias de acesso à informação
Nusai tecnologias de acesso à informaçãoValeria de Oliveira
 
Završni rad Mirza Kupusović
Završni rad Mirza KupusovićZavršni rad Mirza Kupusović
Završni rad Mirza KupusovićMirza Kupusović
 
Instrumentos slide share
Instrumentos slide shareInstrumentos slide share
Instrumentos slide shareaixarosa
 
Apresentação proinfo
Apresentação proinfoApresentação proinfo
Apresentação proinfopriscilarcanjo
 
Mantendo seu trabalho a salvo com git
Mantendo seu trabalho a salvo com gitMantendo seu trabalho a salvo com git
Mantendo seu trabalho a salvo com gitMatheus Pereira
 
Social E-handel - Social E-Commerce Conference
Social E-handel - Social E-Commerce ConferenceSocial E-handel - Social E-Commerce Conference
Social E-handel - Social E-Commerce ConferenceJudith Wolst
 

Viewers also liked (20)

Adicionar ou remover programas
Adicionar ou remover programasAdicionar ou remover programas
Adicionar ou remover programas
 
03. eletricidade e automação
03. eletricidade e automação03. eletricidade e automação
03. eletricidade e automação
 
Presentación para la romana
Presentación para  la romanaPresentación para  la romana
Presentación para la romana
 
Presentación1
Presentación1Presentación1
Presentación1
 
Manual tejeRedes parte III tecnologias sociales ver beta 1 final
Manual tejeRedes parte III tecnologias sociales ver beta 1 finalManual tejeRedes parte III tecnologias sociales ver beta 1 final
Manual tejeRedes parte III tecnologias sociales ver beta 1 final
 
E acessibilidade e acesso a informação
E acessibilidade e acesso a informação E acessibilidade e acesso a informação
E acessibilidade e acesso a informação
 
Ciclos sistema operativo operativo de articulacion abril 2010
Ciclos sistema operativo operativo de articulacion  abril 2010Ciclos sistema operativo operativo de articulacion  abril 2010
Ciclos sistema operativo operativo de articulacion abril 2010
 
Sketchup
SketchupSketchup
Sketchup
 
Chorizos de cerdo
Chorizos de cerdoChorizos de cerdo
Chorizos de cerdo
 
Nusai tecnologias de acesso à informação
Nusai   tecnologias de acesso à informaçãoNusai   tecnologias de acesso à informação
Nusai tecnologias de acesso à informação
 
doc03539820160629125303
doc03539820160629125303doc03539820160629125303
doc03539820160629125303
 
Síntesis del foro Unesco Escritura Creativas
Síntesis del foro Unesco Escritura CreativasSíntesis del foro Unesco Escritura Creativas
Síntesis del foro Unesco Escritura Creativas
 
Apostila adobe photo shop
Apostila adobe photo shopApostila adobe photo shop
Apostila adobe photo shop
 
Završni rad Mirza Kupusović
Završni rad Mirza KupusovićZavršni rad Mirza Kupusović
Završni rad Mirza Kupusović
 
FINAL_brochure
FINAL_brochureFINAL_brochure
FINAL_brochure
 
A 01 sinalizacao de seguranca.
A 01 sinalizacao de seguranca.A 01 sinalizacao de seguranca.
A 01 sinalizacao de seguranca.
 
Instrumentos slide share
Instrumentos slide shareInstrumentos slide share
Instrumentos slide share
 
Apresentação proinfo
Apresentação proinfoApresentação proinfo
Apresentação proinfo
 
Mantendo seu trabalho a salvo com git
Mantendo seu trabalho a salvo com gitMantendo seu trabalho a salvo com git
Mantendo seu trabalho a salvo com git
 
Social E-handel - Social E-Commerce Conference
Social E-handel - Social E-Commerce ConferenceSocial E-handel - Social E-Commerce Conference
Social E-handel - Social E-Commerce Conference
 

Similar to Fast Synchronization In IVR Using REST API For HTML5 And AJAX

Technology Overview
Technology OverviewTechnology Overview
Technology OverviewLiran Zelkha
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeYogeshIJTSRD
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Introduction to Cloud Application Platform
Introduction to Cloud Application PlatformIntroduction to Cloud Application Platform
Introduction to Cloud Application PlatformVMware vFabric
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud ComputingIJSRED
 
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...actualtechmedia
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Best Practices for Building Scalable Web Applications.pdf
Best Practices for Building Scalable Web Applications.pdfBest Practices for Building Scalable Web Applications.pdf
Best Practices for Building Scalable Web Applications.pdfIsabella Barry
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam mayNguyen Duong
 
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...IJERA Editor
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networksjayapal385
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmIRJET Journal
 

Similar to Fast Synchronization In IVR Using REST API For HTML5 And AJAX (20)

Technology Overview
Technology OverviewTechnology Overview
Technology Overview
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System Uptime
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Essay
Cloud Computing EssayCloud Computing Essay
Cloud Computing Essay
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Introduction to Cloud Application Platform
Introduction to Cloud Application PlatformIntroduction to Cloud Application Platform
Introduction to Cloud Application Platform
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
Conquering Disaster Recovery Challenges and Out-of-Control Data with the Hybr...
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Best Practices for Building Scalable Web Applications.pdf
Best Practices for Building Scalable Web Applications.pdfBest Practices for Building Scalable Web Applications.pdf
Best Practices for Building Scalable Web Applications.pdf
 
Cloud computing What Why How
Cloud computing What Why HowCloud computing What Why How
Cloud computing What Why How
 
Cloud computing - dien toan dam may
Cloud computing - dien toan dam mayCloud computing - dien toan dam may
Cloud computing - dien toan dam may
 
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
Distributed Large Dataset Deployment with Improved Load Balancing and Perform...
 
Mobile gis
Mobile gisMobile gis
Mobile gis
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
Privacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES AlgorithmPrivacy Preservation in cloud Environment using AES Algorithm
Privacy Preservation in cloud Environment using AES Algorithm
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Fast Synchronization In IVR Using REST API For HTML5 And AJAX

  • 1. Sandip Kailuke Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 6), September 2014, pp.97-99 www.ijera.com 97 | P a g e Fast Synchronization In IVR Using REST API For HTML5 And AJAX Sandeep Kailuke, Nekita Chavhan Student IV Sem M.E.(Mobile Technology) Department of Computer Science & Engineering G.H.Raisoni College of Engineering Nagpur, India Assistant Professor Department of Computer Science & Engineering G.H.Raisoni College of Engineering Nagpur, India Abstract Need a web service is just a web page meant for a computer to request and process. IVR system uses REST API for data access while calling. When in call process user want to access data, server need to validate it and while validation data accessing must be synchronize with mysql server. For large data accessing API is essential. This method is for HTML5 and AJAX for fast data synchronization. REST can support any media type, but XML is expected to be the most popular transport for structured information. In IVR System problems with fast data access because before uses HTML4. Proposed work is for HTML5 with AJAX implementation. Keywords— interactive voice response, hypertext markup language 5.0, AJAX technology. I. INTRODUCTION Cloud computing environments provide on- demand resource supplying, allowing applications to elastically scale. However, application point of reference is currently being used to test cloud management systems are not designed for this purpose. This result in resource under provisioning and quality-of-service (QoS) violations when system is tested using these benchmarks are deployed in production environments. [2] We present C-MART, a benchmark designed to emulate a modern web application running in a cloud computing environment. Using cloud computing, it is designed paradigm of elastic scalability at every application tier and utilizes modern web-based technologies such as HTML5, AJAX and jQuery. C-MART consists of a web application, client emulator, server, and API. The deployment server automatically deploys and configures the test environment in orders of magnitude less time than current standard. The scaling API allows users to define and provision their own produced datacenter. The client emulator generates the web workload for the application by emulating complex and varied client behaviors, considering decisions based on page content and previous history. We show that C-MART can detect problems in management systems that previous benchmarks fail to identify, such as an increasing error in predicting server CPU utilization and resource under provisioning in 22 percent of QoS measurements. AJAX, jQuery and HTML5 are big buzz words in the web design/development community nowadays. While acquiring these web technologies to work together is exciting, the programming skills required to do this isn't new. AJAX, jQuery and HTML5 work together through the use of page tags, page IDsand page classes that exist between the two tags of a web page. The JavaScript functionality embedded in jQuery and AJAX finds these tags , IDs and classes (which we'll now call page elements) and "does" something to them; maybe it changes their background color, it may loading copy into them. Either end, it is doing something to them. This process of "finding and doing something" to these page elements with JavaScript is more commonly known as "traversing the DOM". Traversing the DOM is the way to getting AJAX, jQuery and HTML5 to work together. Web developers have used DOM traversal for many years, again, there really isn't that much new programming involved when it comes to synchronize AJAX, jQuery and HTML5. II. RELATED WORK In the global adversarial model, where the efficiency of accessing data from the database is normal but quite slow. Thus the different approaches carried were explored below- A. Syncronisation of IVR with HTML 5.0 Short for interactive voice response, a telephony technology in which the one uses a touch-tone telephone to interact with a database to acquire information from or enter data into the database. IVR technology does not require human interaction over the telephone as the user's interaction with the database is predetermined by what the IVR system will allow every user access to. For example, banks and credit card companies use IVR systems so that RESEARCH ARTICLE OPEN ACCESS
  • 2. Sandip Kailuke Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 6), September 2014, pp.97-99 www.ijera.com 98 | P a g e their customers can receive up-to-date account information instantly and easily without having to speak directly to a user. IVR technology is used to gather information, as in the case of telephone surveys in which the user is prompted to answer questions by pushing the numbers on a touch-tone telephone. The new king on the hill is ―HTML5″ which has taken that exact mantle. One intense view is that the term is marketing drive. The other one is that it should ONLY be used to mean the W3C version of the HTML5 core specification. The main objective in system is to synchronize the IVR database with HTML 5. B. Security against attacks in HTML 5.0 HTML5 is an emerging stack for next generation applications. HTML5 is intensifing browser capabilities and able to execute Rich Internet Applications in the context of modern browser architecture. Interestingly HTML5 can run on mobile devices as well and it makes even more complicated. HTML5 is not a single technology stack but combination of various components like XMLHttpRequest (XHR), Document Object model (DOM), Cross Origin Resource Sharing (CORS) and enhanced HTML/Browser rendering. It brings many new technologies to the browser which were not seen before like localstorage, webSQL, websocket, webworkers, intensify XHR, DOM based XPATH to name a few. It has enhanced attack surface and point of exploitations for attacker and malicious agents. By supplement these vectors one can craft stealth attacks and silent exploits, it’s very hard to detect and easy to compromise. HTML5 has several new components like XHR- Level2, DOM, Storage area, Application Cache, WebSQL etc. All these components are making fundamental backbone for HTML5 applications and by nature they look very still. It allows crafting stealth attack vectors and adding risk to end client. Structured layers as mentioned in the above section provide more clarity on a possible enhanced attack surface. This exposes browser components of an application to a set of possible threats which can be exploited. Hence the proposed system includes the security against attackers which can be controlled by HTML 5 and AJAX. The data in the database saved permanently in the web server for the use of IVR system. C. Persistent DummyTraffic Private Database Clouds are a proven model for the delivery of database services. Private database cloud servers allow customers to consolidate servers, storage, and database workloads onto a shared hardware and software substructure. By providing on- demand access to database services in a self-service, elastically scalable and metered manner, private database clouds offer conclusive advantages in cost, quality of service, and deftness. Accelerate and optimize deployment by leveraging Oracle Database, Oracle Real Application Clusters, and Oracle Servers & Storage servers. A database accessible to clients from the cloud and delivered to users on demand via the internet from a cloud database provider server. Also referred to as Database-as-a-Service (DBaaS), cloud databases can use cloud computing to achieve perfect scaling, high availability, multi-tenancy and effective resource allocation. While a cloud database can be a traditional database such as a MySQL or SQL Server database that has been adopted for cloud use, a native cloud database such as Xeround's MySQL Cloud database tends to better equipped to optimally use cloud resources and to guarantee scalability as well as availability and contancy. Cloud databases can offer significant advantages over their traditional equivalent, including increased approachability, automatic failover and fast automated recovery from failures, automated on-the-go scaling, minimal investment and maintenance of in-house hardware, and better performance. Simultaneously cloud databases have their share of potential drawbacks, including security and privacy issues as well as the potential loss of or inability to access critical data in the event of a disaster or bankruptcy of the cloud database service provider. Figure 1: Ajax output in calendar selection D. Efficiency in respose time Flooding or using dummy messages have the drawback of introducing a large amount of message overhead. Hence it is overcome by utilizing beacons at the MAC layer. Beacons are sent out regularly, which essentially forms a constant-rate of dummy messages. Using beacons may increase the delivery delay of event information as they are sent out at the predefined beacon interval only, but using this latency can be controlled. The cross layer where routing and MAC layer solutions are combined the naïve solution within MAC layer is used where solid square node detects an event and broadcast it to neighbors in 4 hops and node on 4th hop sends information to the base station [7]. Double cross layer solution also
  • 3. Sandip Kailuke Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 9( Version 6), September 2014, pp.97-99 www.ijera.com 99 | P a g e controls latency as Crosslayer solution but improving more privacy where random node is chosen to forward the information. A cross-layer relay-selection algorithm and a distributed beam forming protocol can also be used to increase BS anonymity [2]. III. PROPOSED METHODOLOGY This proposed system implements the fast synchronization between the database in an IVR system using HTML 5 and AJAX technologies. Previously the HTML 4 have same feature but the time taken to execute that command will take more time or some time the session will also expires due to asynchronization of database. The security against the attackers will have the main issue regarding software application. The response time of HTML5 page is much less than HTML4 page in both the servers. Because in HTML5 page, JavaScript code is replaced by HTML5 form tag, which reduces the HTTP request significantly. From the server point of view, response time required by HTML5 page for Apache is less than IIS. In Apache, for HTML4 page, mean value of response time was found to be 976.28 ms with variance 23.16 ms. While for HTML5 page, an average response time of 230.28 ms was observed with variance 51.37 ms. In case of IIS, a mean response time of 1506.13 ms with variance 16.19 ms was observed for HTML4 application. While for HTML5, mean response time and variance were calculated as 302.66 ms and 24.32 ms respectively. Figure 2: AJAX in HTML5 search box Figure 3: AJAX in HTML5 search box Figure 4: Date selection in HTML5 using AJAX IV. CONCLUSION In this paper we propose the IVR system will consume less time to switch divert the information from source to destination. The system will allow utilizing the best technology available not only languages, but to utilize the database to make the efficient use of the software. REFERENCES [1] M. Armbrust et al., ―Above the Clouds: A Berkeley View of Cloud Computing,‖ 2009. [2] ―RUBiS.‖ [Online]. http://rubis.ow2.org/. [3] C. Binnig, D. Kossmann, T. Kraska, and S. Loesing, ―How is the weather tomorrow? Towards a Benchmark for the Cloud,‖ in Proceedings of the Second International Workshop on Testing Data-base Systems - DBTest ’09, 2009 [4] ―TPC Benchmark W (Web Commerce) Specification,” San Jose, CA, USA, 2002. [5] ―eBay.‖ [Online]. http://www.ebay.com [6] “Olio‖ [Online]. http://incubator.apache.org/olio/ [7] D. J. Abadi, M. Carey, S. Chaudhuri, H. Garcia-Molina, J. M. Patel, and R. Ramakrishnan, ―Cloud databases: what’s new?,‖ Proceedings of the VLDB Endowment, vol. 3, no. 1–2, Sep. 2010. [8] E. Cecchet, V. Udayabhanu, T. Wood, and P. Shenoy, ―Bench-Lab: An Open Testbed for Realistic Benchmarking of Web Ap- plications,‖ in Proceedings of 2nd USENIX Conference on Web Ap-plication Development, WebApps ’11, 2011. [9] A. Beitch, B. Liu, T. Yung, R. Griffith, A. Fox, and D. A. Patter-son, ―Rain: A Workload Generation Toolkit for Cloud Compu-ting Applications.‖ EECS Department, University of California at Berkeley, 2010. [10] B. Pugh and J. Spacco, ―RUBiS revisited,‖ in Companion to the 19th annual ACM SIGPLAN conference on Object-oriented pro-gramming systems, languages, and applications - OOPSLA ’04, 2004, p. 204.