IJEARST Volume 1, Issue 4, SEPTEMBER 2017 Edition


Pages [1]


A FRAMEWORK TO FACILITATE DECISION OF CLOUD CARRIER VENDORS []


cloud marketplace witnessed regularly occurring emergence of new carrier vendors with an identical offerings. However, provider stage agreements (SLAs), which record assured exceptional of carrier phases, have now not been found to be regular amongst providers, even though they offer services with identical performance. In service outsourcing environments, like cloud, the excellent of service levels are of top importance to customers, as they use 1/3-party cloud offerings to retailer and procedure their consumers’ knowledge. If loss of knowledge happens because of an outage, the patron’s trade will get affected. Consequently, the predominant undertaking for a patron is to pick an proper carrier supplier to ensure guaranteed carrier first-class. To aid patrons in reliably deciding upon superb carrier provider, this work proposes a framework, SelCSP, which mixes trustworthiness and competence to estimate threat of interaction. Trustworthiness is computed from private experiences gained by means of direct interactions or from feedbacks concerning reputations of providers. Competence is assessed headquartered on transparency in provider’s SLA guarantees. A case be taught has been offered to demonstrate the appliance of our method. Experimental outcome validate the practicability of the proposed estimating mechanisms.

BEHAVOIR RULE BASED ON MEDICAL CYBER PHYSICAL SYSTEMS []


We propose and analyze a behavior-rule specification-based technique for intrusion detection of medical devices embedded in a medical cyber physical system (MCPS) in which the patient’s safety is of the utmost importance. We propose a methodology to transform behavior rules to a state machine, so that a device that is being monitored for its behavior can easily be checked against the transformed state machine for deviation from its behavior specification. Using vital sign monitor medical devices as an example, we demonstrate that our intrusion detection technique can effectively trade false positives off for a high detection probability to cope with more sophisticated and hidden attackers to support ultra safe and secure MCPS applications. Moreover, through a comparative analysis, we demonstrate that our behavior-rule specification-based IDS technique outperforms two existing anomaly-based techniques for detecting abnormal patient behaviors in pervasive healthcare applications.

DESIGN OF UNMANNED PETROL BUNK SYSTEM USING RFID TECHNOLOGY []


Today almost all petrol pumps havea microcontroller to control the electrical pump,drive the display,measure the flow & accordingly turnOFF the electrical pump.Butstillapersonisrequiredtocollectthemoney.Ourprojectisdesignedtoeliminatethishumaninteractionsothatthereisnoneedofworkerstofillthepetrol;Ingeneral,asmartcardisanintegratedcircuitcardwithmemorycapableofmakingdecisions.Thisprojectcanbeusedforrecordingtheattendanceofanemployeeinanorganizationorastudentinaclass.ThesmartcardcontainsanARM7 microcontroller, a voltageregulator, serialcableconnections, and an LED which glows whenever a car disinserted into the reader and also it glowswheneveritissuesanycommandorreceivesanycommand.TheSmartCardReaderisinterfacedwiththemicrocontrollerthroughserialinterface.

A STUDY ON SUCCESSFUL STORY OF PATANJALI AYURVEDA IN THE MARKET []


Patanjali Ayurved Limited (Patanjali) was incorporated in 2006 to manufacture, process, refine, formulate, import, export and deal in all kinds of Ayurvedic and Herbal products, Life Savings Drugs etc. The company‘s main promoter is Shri Acharya Balkrishnan, who owns 93% of the company and the remaining is owned by Sarwan and Sunita Poddar, an NRI couple

VIDEO TRAFFIC IN WIRELESS MULTI HOP NETWORKS USING DISTORTION-RESISTANT ROUTING FRAMEWORK []


Traditional routing metrics designed for wireless networks are application-agnostic. In this paper, we consider a wireless network where the application flows consist of video traffic. From a user perspective, reducing the level of video distortion is critical. We ask the question “Should the routing policies change if the end-to-end video distortion is to be minimized?” Popular link- quality-based routing metrics (such as ETX) do not account for dependence (in terms of congestion) across the links of a path; as a result, they can because video flows to converge onto a few paths and, thus, cause high video distortion. To account for the evolution of the video frame loss process, we construct an analytical framework to, first, understand and, second, assess the impact of the wireless network on video distortion. The framework allows us to formulate a routing policy for minimizing distortion, based on which we design a protocol for routing video traffic. We find via simulations and test-bed experiments that our protocol is efficient in reducing video distortion and minimizing the user experience degradation.


Pages [1]

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

© 2011 - 2012 International Journal of Engineering In Advanced Research Science and Technology
Managed By IJEARST Foundation

International Journal of Engineering In Advanced Research Science and Technology ISSN : 2278-2566 (Online)
All rights reserved witheditor@IJEARST.COM.

To make sure that you can receive messages from us, please add the 'IJEARST.COM' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

For any Technical Support contact @complaint@IJEARST.COM