Keeping critical data safe and accessible from several locations has become a global preoccupation, either being this data personal, organizational or from applications. As a consequence of this issue, we verify the emergence of on-line storage services. In addition, there is the new paradigm of Cloud Computing, which brings new ideas to build services that allow users to store their data and run their applications in the Cloud. By doing a smart and efficient management of these services's storage, it is possible to improve the quality of service ordered, as well as to optimize the usage of the infrastructure where the services run. This management is even more critical and complex when the infrastructure is composed by thousand of nodes running several virtual machines and sharing the same storage. The elimination of redundant data at these services's storage can be used to simplify and enhance this management. This review study presents a solution to detect and eliminate duplicated data between virtual machines that run on the same physical host and write their virtual disks data to a shared storage. Finally, a study that compares the efficiency of two different approaches used to eliminate redundant data in a personal data set is described.
Keyword: - Cloud Computing; Data Redundancy; Virtual machines.
[1]. M. Armbrust, A. Fox, R. Grifith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A Berkeley view of cloud computing.Technical report, University of California at Berkeley, 2009.
[2]. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xian and the art of virtualization. In SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pages 164-177. ACM, 2003.
[3]. M. Brantner, D. Florescu, D. Graf, D. Kossmann, and T. Kraska. Building a database on s3. In SIGMOD '08: Pro-ceedings of the 2008 ACM SIGMOD international conference on Management of data, pages 251_264. ACM, 2008.
[4]. A. Z. Broder. Some applications of Rabin's fingerprinting method. In Sequences II: Methods in Communications, Secu- rity, and Computer Science, pages 143_152. Springer-Verlag, 1993.
[5]. R. Buyya, C. S. Yeo, and S. Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In HPCC '08: Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications, pages 5_13. IEEE Computer Society, 2008.
Crime investigation in the web environment is a tedious job. Event logging and event logs play an important role in modern IT systems criminal investigation which is generated when end user with each other in web environment and stored in various logs like firewall log file at side ,network log file at gateway and web log file at server side. But log file is not to be over emphasized as a source of information in systems and network management. Whereas conduct efficient investigation and gathering of use full information need to correlate different log file. Task of analyzing event log files with the ever-increasing size and complexity of today's event logs has become cumbrous to carry out manually. Nowadays latest spotlighted is automatic analysis of these logs files. In this paper a novel methodologies based on relational algebra to build the chain of evidence and used to preprocess the real generated data from logs and classify the user based on markov model.
Keywords: - cyber forensic; log file correlation; markov chain ,cyber crime;
The necessity for clean electric power without any power quality problems has persuaded distribution companies to overcome these issues. Sag/swell, flicker and harmonics are these ones. Among them, voltage sag is one of the most important problems. This phenomenon imposes a bad effect on domestic and industrial loads, especially on sensitive ones. An alternative is use of distributed generation (DG) because of its positive impacts such as voltage support, improved reliability, small size and losses reduction, together with improving voltage sag. An approach is proposed based on Particle Swarm Optimization (PSO), capable to establish the optimal DG allocation and sizing on a distribution network. The objective function is the summation of cost of injecting energy of DGs, fixed installation cost of DGs and number of percentage of buses Experiencing voltage sag in a vulnerable zone that multi plied by number of faults for every kind of faults. The results show that the appropriate placement of DG results in improvement of the aforementioned indices.
Keywords: - Distribution Networks, PSO Algorithm, Voltage Sag, Optimal DG Placement and Sizing
[1]. Lalitha M. Padma, Reddy V. C. Veera,Usha V., Reddy N. Sivarami, Application Of Fuzzy and PSO for DG Placement for Minimum Loss in Radial Distribution System, ARPN Journal of Engineering and Applied Sciences 2010, Vol. 5, No. 4, pp. 30-37
[2]. Walid El-Khattam, Hegazy Y. G.,Salama M. M. A., Investigating Distributed Generation Systems Performance Using Monte Carlo Simulation, IEEE Transactions On Power Systems 2006, Vol. 21, No. 2, pp. 524-532.
[3]. Mithulananthan N., Oo Than, Phu Le Van, Distributed Generation Placement in Power Distribution System Using Genetic Algorithm to Reduce Losses, Thammasat Int. Journal of Science and Technology, Vol.9, No. 3, pp. 55-62.
[4]. Hajizadeh Amin, Hajizadeh Ehsan, PSOBased Planning of Distribution Systems with Distributed Generations, International Journal of Electrical, Computer, and Systems Engineering, 2008, pp. 33-38.
[5]. Shayeghi H., Bagheri A., Considering DG in Expansion Planning of Subtransmission System, International Conference on Advanced Science, Engineering and Information Technology 2011, pp. 357-362.
Text summarization is a data mining process of extracting the summary or zest from one or more documents. A summary is nothing but the actual theme of the document or set of documents. Most commonly document summery is considered to be the sentences or words from set of documents or a single document that appear more number of times in the document with corresponding to the other words. But a report on solar power may emphasis on several aspects of solar energy and may not actually have the term solar power repeated many a times. Therefore sophisticated algorithms are needed to extract the summary from the documents. There have been several algorithms on Text and Document summarizations, utilization various aspects of similarity measures, clustering, lexical rules and distance measures. It is understood from the literature that no single technique can give best interpretation or desired result in the summarization process. Therefore in this work we propose a summarization technique with document clustering and to improve its efficiency we will include demographic algorithm in this technique.
Keywords: - Demographic Algorithm, Condorcet, Sentence clustering, Similarity Measures, summarization, content-based searching, Entropy etc.
This paper presents a novel configuration of separate zigzag transformers based 18-pulse AC –DC converter for improving the ripple factor & isolation of three phase uncontrolled rectifier, this approach eliminates the complexity required to design a complicated auto transformers or isolated multi winding transformer as used with other systems. The paper also presents the comparison among 12 pulse and 6 pulse AC - DC converter for different parameters like ripple factor, harmonic distortion in input current for unbalanced supply voltage, efficiency of the converters, power factor variations of input power supply all these parameters are compared for no load light loads & full load conditions we further extend our simulation for measuring the effects of different type of filters like L, C & LC the simulation results shows some useful & interesting results which can be used for developing or selecting the best configuration for practical developers.
Keywords: - 18-Pulse ac–dc converter, zigzag transformer, three phase rectifier.
Traffic congestion problem is a phenomena which contributed huge impact to the transportation system in country. This causes many problems especially when there are emergency cases at traffic light intersections which are always busy with many vehicles. A traffic light controller system is designed in order to solve these problems. This system was designed to be operated when it received signal from emergency vehicles based on radio frequency (RF) transmission and used the Programmable Integrated Circuit (PIC) 16F877A microcontroller to change the sequence back to the normal sequence before the emergency mode was triggered. This system will reduce accidents which often happen at the traffic light intersections because of other vehicle had to huddle for given a special route to emergency vehicle. As the result, this project successful analyzing and implementing the wireless communication; the radio frequency (RF) transmission in the traffic light control system for emergency vehicles. The prototype of this project is using the frequency of 434 MHz and function with the sequence mode of traffic light when emergency vehicles passing by an intersection and changing the sequence back to the normal sequence before the emergency mode was triggered. In future, this prototype system can be improved by controlling the real traffic situation, in fact improving present traffic light system technology.
Keywords: - PIC 16F877A, Radio Frequency (RF), Sequence Control, Traffic Light
The Textile Sector has been modernized by different ways. Much more production facilities are increasing day by day to meet the present demand of textile goods. Worldwide use of textile has taken a new dimension. On this prospect textile buyers & producers are making sure of good quality of their products. The fabric swatch analysis is done the important role in this sector. All types of fabric can be analyzed by this way. Here, Swatch analysis has been used for defining woven & denim fabric. The difference between fabrics comes out by this way. Here shows how to identify fabric easily by different tasks with simple mathematical formula.
Keywords:- Swatch Analysis, Fabrication, Construction & Weave Plan.
© 2019 All Rights Reserved | Design by iosrjen