International Journal of Computer Networks and Communications Security

Volume 3, Issue 7, July 2015

 

 

 

Efficient Cloud Computing Scheduling: Comparing Classic Algorithms with Generic Algorithm

Pages: 271-276 (6) | [Full Text] PDF (371 KB)
M Alipori, HHS JAVADI
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Boroujerd, Iran
Department of Computer Engineering, Boroujerd Branch, Islamic Azad University, Boroujerd, Iran
Department of Applied Mathematics, Faculty of Mathematics and Computer Science, Shahed University, Tehran, Iran

Abstract -
One of the most important indexes of using cloud services in that this technology is far from the user. In cloud computing systems, computing resources are presented as virtual machines. In such a scenario, scheduling algorithm plays a very important role because the purpose of scheduling is tasks efficiency so that time is reduced, and resources utilization can be improved. A user may use hundreds of computing resources in a cloud environment, so it is not possible to perform scheduling manually. This can be done by using classic algorithms whose results have been studied and compared with our proposed algorithm, genetic algorithm. Selecting an appropriate and efficient algorithm for resources scheduling is required due to dynamic feature of resources and various requests of users in cloud technology to increase efficiency. In this research, our purpose is to perform and obtain an optimal scheduling by using genetic algorithm to reach the main purpose of finding an optimum scheduling to execute tasks graph in a multi-processor structure so that total execution time or ending time of the last work unit is minimized.
 
Index Terms - Cloud Computing, Scheduling Algorithm, Genetic Algorithm, Classic Algorithms

Citation - M Alipori, HHS JAVADI. "Efficient Cloud Computing Scheduling: Comparing Classic Algorithms with Generic Algorithm." International Journal of Computer Networks and Communications Security 3, no. 7 (2015): 271-276.

 

Evaluation of BER and PAPR by using Different Modulation Schemes in OFDM System

Pages: 277-282 (6) | [Full Text] PDF (575 KB)
JP Panwar and YK Jain
Department of Technical Education, Haryana, India
Prof. Mewar University, Rajasthan

Abstract -
There are various issues related to OFDM such as dispersion (ICI), external interference (crosstalk) and nonlinearities (PAPR). OFDM suffers from a high Peak to Average Power Ratio (PAPR), caused by the addition of a large number of independently modulated sub-carriers in parallel at the transmitter. When subject to a non-linear power amplifier, these signals may undergo significant spectral distortion, leading to interference both in-band and out-of-band and an associated degradation in system performance. In this paper, the main focus is on the comparative performance evaluation of OFDM system in terms of PAPR and BER. Later in this paper, simulation result shows the PAPR and BER performance to observe the effect of IFFT size on PAPR without any reduction technique, with clipping technique and with companding technique for different modulation schemes such as BPSK, QPSK and 16PSK with 256 subcarriers.
 
Index Terms - Orthogonal Frequency Division Multiplexing (OFDM), Inverse Fast Fourier Transform (IFFT), Signal-to-Noise Ratio (SNR), Bit Error Rate (BER)

Citation - JP Panwar and YK Jain. "Evaluation of BER and PAPR by using Different Modulation Schemes in OFDM System." International Journal of Computer Networks and Communications Security 3, no. 7 (2015): 277-282.

 

Expand the Quantum Cipher-text Space by Using a Superposition Key

Pages: 283-290 (8) | [Full Text] PDF (360 KB)
AA Abdullah, RZ Khalaf, M Riza
Department of Computer Engineering, Eastern Mediterranean University, Gazimagusa, North Cyprus, Turkey
Department of Mathematics, Eastern Mediterranean University, Gazimagusa, North Cyprus, Turkey
Department of Pysics, Eastern Mediterranean University, Gazimagusa, North Cyprus, Turkey

Abstract -
In this paper an improvement of quantum encryption algorithm based on superposition state is proposed. The whole process including the encryption algorithm where the superposition state and bit-swapping are introduced, makes the quantum ciphertext space to expand broadly and allows the transmission of the necessary information and the decryption that is illustrated here. Finally, a short security analysis is given to show the difference between the proposed algorithm and its classical counterpart.
 
Index Terms - Quantum Cryptography, Quantum Computation, Quantum Encryption Algorithm, Superposition

Citation - AA Abdullah, RZ Khalaf, M Riza. "Expand the Quantum Cipher-text Space by Using a Superposition Key." International Journal of Computer Networks and Communications Security 3, no. 7 (2015): 283-290.

 

Attribute Based Secure Query Processing in Cloud with Privacy Homomorphism

Pages: 291-297 (7) | [Full Text] PDF (594 KB)
RS KHACHANE, PK DESHMUKH
Dept. of Computer Engineering, RajarshiShahu College of Engineering, Tathawde, Pune, India
Affiliated To SavitribaiPhule Pune University

Abstract -
Different types of business organizations are benefitted due to convenient as well as secure working of Cloud Computing and Data Outsourcing. A cloud, data owner and client are intrinsic part of the system. Hence, secure query of users with privacy of data owners received a worldwide importance in modern days cloud computing and data management. A research had been carried out by many people in cloud computing and its security to preserve query processing data, privacy of data owners and its clients. A Privacy Homomorphism (PH) Technique is being used in the system to provide prominent security features to client. Here, PH emphasise to resolve the security of query processing from client side, cloud, with the k-NN on R-tree index query and distance re-coding algorithm. PH technique support to leverage performance parameter in cloud computing.
 
Index Terms - Privacy Homomorphism, Encrypted data, Decryption Data, K-Nearest Neighbour, Cipher Text, Plaintext, Cloud Security

Citation - RS KHACHANE, PK DESHMUKH. "Attribute Based Secure Query Processing in Cloud with Privacy Homomorphism." International Journal of Computer Networks and Communications Security 3, no. 7 (2015): 291-297.

 

Dynamic Optimization of Power Consumption and Response Time in Multiprocessors by Turning Processors Off

Pages: 298-304 (7) | [Full Text] PDF (249 KB)
SJ JASSBI, JR KHORSAND
PhD. Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Tehran, Iran
Msc. Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Tehran, Iran

Abstract -
The importance of energy and ways of managing it, because of the cost of unnecessary usage, mobile technologies and battery lifetime sensitivity, is increasing daily. In the last decade most of systems use multiprocessor computer systems to increase the performance. Hence, managing power consumption under time limitations present an important challenge. Using any scheduling algorithm, there are some gaps, in which no process is assigned to a certain processor. Furthermore, if response time of a process is less than a maximum value, the response time is acceptable and there is no need for the response time to be least possible. In this condition, we can use some of processors instead of all of them to help reducing power consumption. As a hypothesis, turning processors with low processing load off can reduce the power consumption in such a way that response time of processes stay acceptable. In this paper, we discuss about a new policy to manage turning processors on/off during run time of system to examine the mentioned hypothesis. Simulations show that in most of the cases this policy optimizes the power consumption of system better than other usable methods.
 
Index Terms - Multiprocessor, Response Time, Power Consumption, Energy Consumption, Processing Power

Citation - SJ JASSBI, JR KHORSAND. "Dynamic Optimization of Power Consumption and Response Time in Multiprocessors by Turning Processors Off." International Journal of Computer Networks and Communications Security 3, no. 7 (2015): 298-304.

 

MPLS Recovery Schemes: An Experimental Evaluation

Pages: 305-313 (9) | [Full Text] PDF (692 KB)
SA Ladhe, VT Raisinghani
School of Engineering, NMIMS University, Mumbai, India

Abstract -
Multiprotocol Label Switching (MPLS) is widely used in large Internet backbone because of its traffic engineering capabilities. One of the key features of MPLS Traffic Engineering (MPLS-TE) is fast recovery in case of failure of link or node. MPLS-TE is mainly used to improve network survivability and quality of service (QoS). The aim of this paper is to analyze MPLS-based recovery schemes and evaluate the work done by various authors for MPLS-based recovery. This paper also provides an experimental evaluation of MPLS-based recovery schemes (dedicated path-based, link-based and one-to-one) using ns-2 on a synthetic network topology.
 
Index Terms - MPLS, Quality of Service, Dedicated Path-Based, Link-Based, Traffic Engineering

Citation - SA Ladhe, VT Raisinghani. "MPLS Recovery Schemes: An Experimental Evaluation." International Journal of Computer Networks and Communications Security 3, no. 7 (2015): 305-313.

 

Resource Allocation Strategy on the Basis of Particles Swarm and Intelligent Water Drops Algorithms in Cloud Computing Environment

Pages: 314-321 (8) | [Full Text] PDF (329 KB)
SAH Abadi, HHS Javadi
Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Boroujerd, Iran
Department of Computer Engineering, Boroujerd Branch, Islamic Azad University, Boroujerd, Iran
Department of Applied Mathematics, Faculty of Mathematics and Computer Science, Shahed University, Tehran, Iran

Abstract -
Cloud computing points to programs and services executed in a distributed network and using virtual resources. As the result of this virtualization, it is felt that the resources are unlimited, but this is not true. In addition, these resources are accessible through common internet protocols and network standards. The purpose of most studies and researches carried out in this regard is to obtain an efficient model of resource allocation in cloud computing environment. In fact, resource allocation is a hierarchical and analytical process, and is a process performed after resource scheduling. Since cloud computing is a commercial field, the price and service quality is the main factor of this field. Our purpose is to dedicate resources to the users of cloud environment in a way that when a resource is available, no user waits for that resource. This dedication is considered with high precision and processing speed. This study is compared with genetic algorithm whose results are investigated and studied, and with our proposed algorithm, particles swarm algorithm that is one of the nature oriented algorithms. In this study, our purpose is to distribute interfaces in cloud computing environment in a way that they are useful to optimize resource allocation and to reach the main purpose of this research; that is, to reduce energy consumption. By creating an abstract layer on all physical resources, resources can be managed dynamically by the help of virtualization. Selecting an appropriate and efficient algorithm is required for resource allocation due to dynamic resources and various user requests in cloud technology to increase efficiency.
 
Index Terms - Cloud Computing, Resource Allocation, Nature-Oriented Algorithm, Interface Energy

Citation - SAH Abadi, HHS Javadi. "Resource Allocation Strategy on the Basis of Particles Swarm and Intelligent Water Drops Algorithms in Cloud Computing Environment." International Journal of Computer Networks and Communications Security 3, no. 7 (2015): 314-321.

 

The Training Quality Research: A Case of Lac Hong University (LHU) in Dong Nai Province

Pages: 322-328 (7) | [Full Text] PDF (237 KB)
T Dung, PT Tam
The managing of the enterprise cooperate center at LHU
Lecturer at Lac Hong University

Abstract -
In this paper, the authors use analytical method of explore factor analysis to determining factors that are components of the training quality (by service quality) at Lac Hong University (LHU) in Dong Nai province. This paper conducted during the period from from June 2012 to June, 2015. The exploratory factor analysis result showed that there were four factors, which included of factors following Teaching (Lecturers); Facilities; Training program and Science research that are components of the training quality of Lac Hong University in Dong Nai province with significance level 5 %. In addition, the research result processed from SPSS 20.0 software. The research result showed that there were 550 enterprises who to be interviewed and answered nearly 30 questions. The researcher had analyzed KMO test. enterprise responses measured through an adapted questionnaire on a 5-point Likert scale. Hard copy and interview postgraduate student by questionnaire distributed among enterprises relating with LHU in Dong Nai province. At the same time, the result was also a scientific evidence and important for researchers, and policy makers who apply them for improving the training quality at the Lac Hong University in the future. The researcher had obtained the main objectives of this study were to: 1. The first objective, the researcher had to conduct a survey to find factors that are components of the training quality of LHU in Dong Nai province. 2. The second objective, the researcher had to identify some factors that are components in the training quality LHU in Dong Nai province.
 
Index Terms - LHU, quality, training quality, service quality and LHU students

Citation - T Dung, PT Tam. "The Training Quality Research: A Case of Lac Hong University (LHU) in Dong Nai Province." International Journal of Computer Networks and Communications Security 3, no. 7 (2015): 322-328.