Karunya University

Displaying 1-35 of 35 results

  • White Papers // Dec 2013

    A Survey on Clustering Approaches for Gene Expression Patterns

    Clustering is the process of organizing objects into groups whose members are similar in some way, and different from members of other groups. Clustering is an efficient data mining technique that finds its usage in various fields. Clustering and Classification can be merged for better result solutions and also they...

    Provided By Karunya University

  • White Papers // Oct 2013

    Smart Card Based Time Efficient Authentication Scheme for Global Grid Computing

    Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs for a secure Grid Environment is a strong authentication for users. Since Authentication is the entry point into...

    Provided By Karunya University

  • White Papers // Jul 2013

    EPSDA: Energy Efficient Privacy preserving Secure Data Aggregation for Wireless Sensor Networks

    The privacy preserving data aggregation protocols in wireless sensor networks have many applications in security critical areas, since it hides individual nodes' data from adversaries. The existing hop by hop and shuffling based privacy preserving protocols does not provide an energy efficient, accurate and secure data aggregation result in base...

    Provided By Karunya University

  • White Papers // Apr 2013

    Towards a Trust Envisioned Cyber Security

    Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and...

    Provided By Karunya University

  • White Papers // Mar 2013

    Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing

    Cloud computing is increasingly been used in enterprises and business markets for serving demanding jobs. The performance of resource scheduling in cloud computing is important due to the increase in number of users, services and type of services. Resource scheduling is influenced by many factors such as CPU speed, memory,...

    Provided By Karunya University

  • White Papers // Mar 2013

    Round Robin Based Secure-Aware Packet Scheduling in Wireless Networks

    Packet scheduling algorithms enhances the packet delivery rate effectively in wireless networks; it helps to improve the quality of service of the wireless networks. Many algorithms had been deployed in the area of packet scheduling in wireless networks but less attention is paid to security. Some algorithms which offer security...

    Provided By Karunya University

  • White Papers // Mar 2013

    Position Aware and QoS Based Service Discovery Using TOPSIS for Vehicular Network

    Vehicular network is a challenging research area due to the wide variety of applications to provide driving comfort and road safety for the passengers. It is one of the building blocks of intelligent transportation system that helps to take decisions while travelling. There are numerous services provided by different service...

    Provided By Karunya University

  • White Papers // Mar 2013

    Real Time Monitoring of Daily Calorie Expenditure Using Smart Phone

    On a growing scale the authors use mobile phones for diverse activities in their daily life, such as entertainment, education or information purposes. The main objective of the project is to develop an android application to track the user physical activity and estimate his energy expenditure using 3axis accelerometer and...

    Provided By Karunya University

  • White Papers // Mar 2013

    Individual Mining and Prediction of Patterns for Improving Mobile Commerce

    Mobile commerce is a new frontier. It involves the purchase transactions based on a mobile device. The mining and prediction of patterns can suggest stores that are more similar to his/her previous patterns mined and unknown to a customer. In this paper, the authors propose a framework for pattern mining...

    Provided By Karunya University

  • White Papers // Mar 2013

    A RBRM Approach for Virtual Desktop Cloud Computing

    The speciality of virtual desktop cloud computing is that user applications are executed in virtual desktops on remote servers. Resource management and resource utilization are very much significant in the area of virtual desktop cloud computing. Handling a large amount of clients in most efficient manner is the main challenge...

    Provided By Karunya University

  • White Papers // Mar 2013

    Energy Efficient Virtual Machine Monitoring Architecture for Green Cloud Computing

    Now-a-days Technology is growing faster; peoples started using tablets, laptops & mobile on the move. Cloud is the basic platform for everything. Using the concept of virtualization one can access others computer virtually through the cloud. As many of the users started using this virtualization, Kernel attacks and other malicious...

    Provided By Karunya University

  • White Papers // Feb 2013

    EECP: Energy Efficient and Congestion-Aware Protocol in a Wireless Sensor Network

    In this paper, the authors propose a protocol namely EECP which helps to achieve accurate event detection, energy efficiency and less traffic. With the help of a program or software namely Mobile Agent (MA), EECP choose one CH based on initial energy and the data aggregation taking place only in...

    Provided By Karunya University

  • White Papers // Feb 2013

    ROI and Seam-SPIHT Based Efficient Image Compression for Mobile Multimedia and Medical Applications

    There is an increasing demand on content based color image compression in resource limited mobile multimedia devices. Multimedia applications gained popularity in the recent years, but these devices restricted by their display sizes and resource. Most of the devices share the same content on the internet. The size of the...

    Provided By Karunya University

  • White Papers // Feb 2013

    Cloud based Scaling of Grid Resources Through Grid Middleware

    In Grid computing, a common task is performed by combining the resources from different locations or domains. It will use only the fixed number of resources available in different locations. It doesn't scale the resources according to the users' demand. On the other hand cloud computing provides resources to users...

    Provided By Karunya University

  • White Papers // Feb 2013

    A Reliable Schedule with Budget Constraints in Grid Computing

    The application system while executing in a Grid environment may encounter a failure. This phenomenon can be overcome by a reliable scheduler who plays the major role of allocating the applications to the reliable resources based on the reliability requirement of the applications given by the users. The reliability requirement...

    Provided By Karunya University

  • White Papers // Jan 2013

    Survey: Resource Management Strategies in Cloud Environment

    Cloud computing is an on demand technology as it offers dynamic and supple resource allocation for trustworthy and guaranteed services in pay as-you-use way to public. The speciality of this technology is that the any number of cloud services can be concurrently accessed by any number of users. So it...

    Provided By Karunya University

  • White Papers // Jan 2013

    A Novel Approach for Energy Aware Resource Allocation Using Hybrid Heuristics in Cloud Computing

    Cloud computing is a major technological advancement in the field of computing and it is very advantageous to the user. It offers various computing utility services to the day to day life but the demand of Cloud infrastructure has greatly increased the energy consumption of data centers, which is a...

    Provided By Karunya University

  • White Papers // Dec 2012

    Anypath Routing in Wireless Networks - A Review

    The advent of wireless mesh networks has augmented the provision of internet access at discounted tariffs. On the contrast, lossy links and interferences give way to depraved quality of service. Even at this standpoint a wireless mesh network affords to deliver reliable output using novel approaches like Anypath routing that...

    Provided By Karunya University

  • White Papers // Dec 2012

    A Survey on Sink Based Multipath Routing Protocols in WSN

    Wireless Sensor Networks are the large collection of sensor networks which used to sense the physical and environmental condition and send the sensed data to the base station to the relay nodes. After sensing the data, data aggregation is the next phase of a WSN. Data aggregation is used for...

    Provided By Karunya University

  • White Papers // Dec 2012

    A Survey on Encryption Schemes in the Clouds for Access Control

    In this era, even sensitive data is stored and shared on the internet using trusted third parties and service providers. Cloud computing is one of the emerging technologies that is being used widely on these days. It makes use of the computing resources such as hardware and software that is...

    Provided By Karunya University

  • White Papers // Dec 2012

    A Survey on Routing Protocols in MANETS

    MANETs (Mobile Ad-hoc NETworks) are used in very suspicious and critical scenarios such as military, disaster relief operations, mine site operations, emergency rescue operations etc. while operating in such critical situations it needs security and privacy. MANET uses location-centric paradigm rather than identity-centric paradigm that are used in most of...

    Provided By Karunya University

  • White Papers // Dec 2012

    A Survey on Adaptive Query Optimization Over Data Stream

    Data streams are Continuous, unbounded, rapid, time-varying streams of data elements and it Occur in a variety of modern applications such as Network monitoring and traffic engineering, Sensor networks, Telecom call records, Financial applications, Web logs and click-streams, Manufacturing processes. These stream processing applications present new challenges that are not...

    Provided By Karunya University

  • White Papers // Dec 2012

    Survey on Cloud Computing Resource Allocation Models & Methods

    The cloud computing is a very popular field at present which is growing very fast and the futures of the field seems really wide and drastic. To provide quality of service in the cloud environment there are lot of research is being done all over the world. The cloud clients...

    Provided By Karunya University

  • White Papers // Dec 2012

    Inter-Actor Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks: A Survey

    Wireless Sensor and Actor Networks (WSANs) refer to a group of sensors and actors linked by wireless medium. In WSANs, sensors gather information and actors take decisions and then perform appropriate actions. Maintaining inter-actor connectivity in wireless sensor and actor networks is very important in mission-critical applications. Failure of one...

    Provided By Karunya University

  • White Papers // Nov 2012

    A Survey on Security Assurance Architecture in Virtualization Implementation on Cloud

    Cloud computing is a natural extension of virtualization technologies that enable scalable management of virtual machines over a massive physically connected systems. The virtualization-based cloud computing paradigm offers a practical approach to green IT/clouds, which emphasize the construction and deployment of scalable, energy-efficient Network software Applications (NetApp) by virtue of...

    Provided By Karunya University

  • White Papers // Nov 2012

    A Survey on Resources Discovery Approaches in Distributed Computational Grids

    Grid computing enables systems to share geographically distributed resources as they pursue common goals. In a large-scale Grid systems discovery of heterogeneous resources is crucial to achieving scalable performance. The Grid resources need to be discovered, selected and invoked quickly and efficiently in order to satisfy the needs of a...

    Provided By Karunya University

  • White Papers // Nov 2012

    Survey on Scheduling in Cloud Computing System

    The most important factors that affect the performance of the nodes present in a Heterogeneous Computing System (HCS) are the Energy and Completion time. The problem of achieving these two performance factor is a major issue, various technique have been emerged to accomplish these aspect. A brief overview of some...

    Provided By Karunya University

  • White Papers // Nov 2012

    A Survey on Need for Semantic Web

    The emerging trends of Semantic web attract the attention of researchers, due to the increased level of machine understandability which could offer an enhanced approach of acquiring more relevant results. It leads to redefining of the existing conventional web services (Web 2.0) into semantic web services (Web 3.0).The Conventional WSDL...

    Provided By Karunya University

  • White Papers // Oct 2012

    A Survey on Intrusion Response Mechanism for MANET Routing Attacks

    Mobile Ad Hoc NETwork (MANET) is distinguished from other networks mainly by its self configuring and optimizing nature. Being the flexible network, MANET is exposed to various kinds of attacks especially the routing attacks. Attack prevention methods such as intrusion detection system, intrusion prevention, authentication and encryption can be used...

    Provided By Karunya University

  • White Papers // Oct 2012

    Survey on Network Anomaly Detection

    The Usefulness of the internet does not need any introduction. Security on the internet has always been a major challenge and wide area of research. A successful Denial of Service Attack will result in Loss in Millions. And once the adversary pulls off the attack successfully the result is devastating,...

    Provided By Karunya University

  • White Papers // Sep 2012

    Architectural Optimization of AES Transformations and Keyexpansion

    Advanced Encryption Standard (AES), is a cryptographic algorithm used for data protection. Designing an efficient hardware architecture for AES with small hardware resource usage is a challenge. Many works are going on for the efficient implementation of AES. The cost and power consumption of the AES can be reduced considerably...

    Provided By Karunya University

  • White Papers // Jul 2012

    U-Tube Manometer Calibration Using ANFIS

    This paper deals with the implementation of the Adaptive Neuro Fuzzy Inference System (ANFIS) on a Xilinx based Field Programmable Gate Array Spartan-3E. The implemented hardware is then used to efficiently calibrate the U-Tube manometer, in which the relation between the level of mercury and the Capacitance developed across the...

    Provided By Karunya University

  • White Papers // Mar 2012

    Controlled Multimedia Cloud Architecture And Advantages

    Cloud computing is the next generation computing platform that offers many applications to the users in seamless way and access the resources across the network without any boundary. Multimedia content management and processing is among the important aspect of the cloud and it brings the advantages of processing and delivering...

    Provided By Karunya University

  • White Papers // Dec 2011

    Interference Estimation in Cellular Systems

    CDMA is the most efficient multiple access scheme since it has neither frequency limitation like FDMA nor time limitation as in TDMA. Since all the users in CDMA uses the same frequency it is highly prone to interference. Interference decreases the capacity of the system. Estimation of the amount of...

    Provided By Karunya University

  • White Papers // Jan 2011

    Low Power Consumption With Optimal Two Hop in Wireless Sensor Networks

    This paper presents a routing scheme in wireless sensor networks. The objective of the paper is to select the next hop for data forwarding, which increase the lifetime of wireless sensor network. The main constraint in wireless sensor network is energy. The network energy can be increased by a proper...

    Provided By Karunya University

  • White Papers // Sep 2012

    Architectural Optimization of AES Transformations and Keyexpansion

    Advanced Encryption Standard (AES), is a cryptographic algorithm used for data protection. Designing an efficient hardware architecture for AES with small hardware resource usage is a challenge. Many works are going on for the efficient implementation of AES. The cost and power consumption of the AES can be reduced considerably...

    Provided By Karunya University

  • White Papers // Feb 2013

    EECP: Energy Efficient and Congestion-Aware Protocol in a Wireless Sensor Network

    In this paper, the authors propose a protocol namely EECP which helps to achieve accurate event detection, energy efficiency and less traffic. With the help of a program or software namely Mobile Agent (MA), EECP choose one CH based on initial energy and the data aggregation taking place only in...

    Provided By Karunya University

  • White Papers // Jan 2013

    Survey: Resource Management Strategies in Cloud Environment

    Cloud computing is an on demand technology as it offers dynamic and supple resource allocation for trustworthy and guaranteed services in pay as-you-use way to public. The speciality of this technology is that the any number of cloud services can be concurrently accessed by any number of users. So it...

    Provided By Karunya University

  • White Papers // Jan 2013

    A Novel Approach for Energy Aware Resource Allocation Using Hybrid Heuristics in Cloud Computing

    Cloud computing is a major technological advancement in the field of computing and it is very advantageous to the user. It offers various computing utility services to the day to day life but the demand of Cloud infrastructure has greatly increased the energy consumption of data centers, which is a...

    Provided By Karunya University

  • White Papers // Dec 2012

    Anypath Routing in Wireless Networks - A Review

    The advent of wireless mesh networks has augmented the provision of internet access at discounted tariffs. On the contrast, lossy links and interferences give way to depraved quality of service. Even at this standpoint a wireless mesh network affords to deliver reliable output using novel approaches like Anypath routing that...

    Provided By Karunya University

  • White Papers // Dec 2012

    A Survey on Sink Based Multipath Routing Protocols in WSN

    Wireless Sensor Networks are the large collection of sensor networks which used to sense the physical and environmental condition and send the sensed data to the base station to the relay nodes. After sensing the data, data aggregation is the next phase of a WSN. Data aggregation is used for...

    Provided By Karunya University

  • White Papers // Dec 2012

    A Survey on Encryption Schemes in the Clouds for Access Control

    In this era, even sensitive data is stored and shared on the internet using trusted third parties and service providers. Cloud computing is one of the emerging technologies that is being used widely on these days. It makes use of the computing resources such as hardware and software that is...

    Provided By Karunya University

  • White Papers // Dec 2012

    A Survey on Routing Protocols in MANETS

    MANETs (Mobile Ad-hoc NETworks) are used in very suspicious and critical scenarios such as military, disaster relief operations, mine site operations, emergency rescue operations etc. while operating in such critical situations it needs security and privacy. MANET uses location-centric paradigm rather than identity-centric paradigm that are used in most of...

    Provided By Karunya University

  • White Papers // Dec 2012

    A Survey on Adaptive Query Optimization Over Data Stream

    Data streams are Continuous, unbounded, rapid, time-varying streams of data elements and it Occur in a variety of modern applications such as Network monitoring and traffic engineering, Sensor networks, Telecom call records, Financial applications, Web logs and click-streams, Manufacturing processes. These stream processing applications present new challenges that are not...

    Provided By Karunya University

  • White Papers // Dec 2012

    Survey on Cloud Computing Resource Allocation Models & Methods

    The cloud computing is a very popular field at present which is growing very fast and the futures of the field seems really wide and drastic. To provide quality of service in the cloud environment there are lot of research is being done all over the world. The cloud clients...

    Provided By Karunya University

  • White Papers // Feb 2013

    ROI and Seam-SPIHT Based Efficient Image Compression for Mobile Multimedia and Medical Applications

    There is an increasing demand on content based color image compression in resource limited mobile multimedia devices. Multimedia applications gained popularity in the recent years, but these devices restricted by their display sizes and resource. Most of the devices share the same content on the internet. The size of the...

    Provided By Karunya University

  • White Papers // Feb 2013

    Cloud based Scaling of Grid Resources Through Grid Middleware

    In Grid computing, a common task is performed by combining the resources from different locations or domains. It will use only the fixed number of resources available in different locations. It doesn't scale the resources according to the users' demand. On the other hand cloud computing provides resources to users...

    Provided By Karunya University

  • White Papers // Feb 2013

    A Reliable Schedule with Budget Constraints in Grid Computing

    The application system while executing in a Grid environment may encounter a failure. This phenomenon can be overcome by a reliable scheduler who plays the major role of allocating the applications to the reliable resources based on the reliability requirement of the applications given by the users. The reliability requirement...

    Provided By Karunya University

  • White Papers // Mar 2013

    Efficient Qos Based Resource Scheduling Using PAPRIKA Method for Cloud Computing

    Cloud computing is increasingly been used in enterprises and business markets for serving demanding jobs. The performance of resource scheduling in cloud computing is important due to the increase in number of users, services and type of services. Resource scheduling is influenced by many factors such as CPU speed, memory,...

    Provided By Karunya University

  • White Papers // Mar 2013

    Round Robin Based Secure-Aware Packet Scheduling in Wireless Networks

    Packet scheduling algorithms enhances the packet delivery rate effectively in wireless networks; it helps to improve the quality of service of the wireless networks. Many algorithms had been deployed in the area of packet scheduling in wireless networks but less attention is paid to security. Some algorithms which offer security...

    Provided By Karunya University

  • White Papers // Mar 2013

    Position Aware and QoS Based Service Discovery Using TOPSIS for Vehicular Network

    Vehicular network is a challenging research area due to the wide variety of applications to provide driving comfort and road safety for the passengers. It is one of the building blocks of intelligent transportation system that helps to take decisions while travelling. There are numerous services provided by different service...

    Provided By Karunya University

  • White Papers // Mar 2013

    Real Time Monitoring of Daily Calorie Expenditure Using Smart Phone

    On a growing scale the authors use mobile phones for diverse activities in their daily life, such as entertainment, education or information purposes. The main objective of the project is to develop an android application to track the user physical activity and estimate his energy expenditure using 3axis accelerometer and...

    Provided By Karunya University

  • White Papers // Nov 2012

    A Survey on Security Assurance Architecture in Virtualization Implementation on Cloud

    Cloud computing is a natural extension of virtualization technologies that enable scalable management of virtual machines over a massive physically connected systems. The virtualization-based cloud computing paradigm offers a practical approach to green IT/clouds, which emphasize the construction and deployment of scalable, energy-efficient Network software Applications (NetApp) by virtue of...

    Provided By Karunya University

  • White Papers // Oct 2013

    Smart Card Based Time Efficient Authentication Scheme for Global Grid Computing

    Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs for a secure Grid Environment is a strong authentication for users. Since Authentication is the entry point into...

    Provided By Karunya University

  • White Papers // Apr 2013

    Towards a Trust Envisioned Cyber Security

    Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and...

    Provided By Karunya University

  • White Papers // Jul 2013

    EPSDA: Energy Efficient Privacy preserving Secure Data Aggregation for Wireless Sensor Networks

    The privacy preserving data aggregation protocols in wireless sensor networks have many applications in security critical areas, since it hides individual nodes' data from adversaries. The existing hop by hop and shuffling based privacy preserving protocols does not provide an energy efficient, accurate and secure data aggregation result in base...

    Provided By Karunya University

  • White Papers // Dec 2013

    A Survey on Clustering Approaches for Gene Expression Patterns

    Clustering is the process of organizing objects into groups whose members are similar in some way, and different from members of other groups. Clustering is an efficient data mining technique that finds its usage in various fields. Clustering and Classification can be merged for better result solutions and also they...

    Provided By Karunya University

  • White Papers // Jan 2011

    Low Power Consumption With Optimal Two Hop in Wireless Sensor Networks

    This paper presents a routing scheme in wireless sensor networks. The objective of the paper is to select the next hop for data forwarding, which increase the lifetime of wireless sensor network. The main constraint in wireless sensor network is energy. The network energy can be increased by a proper...

    Provided By Karunya University

  • White Papers // Mar 2012

    Controlled Multimedia Cloud Architecture And Advantages

    Cloud computing is the next generation computing platform that offers many applications to the users in seamless way and access the resources across the network without any boundary. Multimedia content management and processing is among the important aspect of the cloud and it brings the advantages of processing and delivering...

    Provided By Karunya University

  • White Papers // Oct 2012

    A Survey on Intrusion Response Mechanism for MANET Routing Attacks

    Mobile Ad Hoc NETwork (MANET) is distinguished from other networks mainly by its self configuring and optimizing nature. Being the flexible network, MANET is exposed to various kinds of attacks especially the routing attacks. Attack prevention methods such as intrusion detection system, intrusion prevention, authentication and encryption can be used...

    Provided By Karunya University

  • White Papers // Dec 2012

    Inter-Actor Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks: A Survey

    Wireless Sensor and Actor Networks (WSANs) refer to a group of sensors and actors linked by wireless medium. In WSANs, sensors gather information and actors take decisions and then perform appropriate actions. Maintaining inter-actor connectivity in wireless sensor and actor networks is very important in mission-critical applications. Failure of one...

    Provided By Karunya University

  • White Papers // Nov 2012

    A Survey on Resources Discovery Approaches in Distributed Computational Grids

    Grid computing enables systems to share geographically distributed resources as they pursue common goals. In a large-scale Grid systems discovery of heterogeneous resources is crucial to achieving scalable performance. The Grid resources need to be discovered, selected and invoked quickly and efficiently in order to satisfy the needs of a...

    Provided By Karunya University

  • White Papers // Nov 2012

    Survey on Scheduling in Cloud Computing System

    The most important factors that affect the performance of the nodes present in a Heterogeneous Computing System (HCS) are the Energy and Completion time. The problem of achieving these two performance factor is a major issue, various technique have been emerged to accomplish these aspect. A brief overview of some...

    Provided By Karunya University

  • White Papers // Oct 2012

    Survey on Network Anomaly Detection

    The Usefulness of the internet does not need any introduction. Security on the internet has always been a major challenge and wide area of research. A successful Denial of Service Attack will result in Loss in Millions. And once the adversary pulls off the attack successfully the result is devastating,...

    Provided By Karunya University

  • White Papers // Nov 2012

    A Survey on Need for Semantic Web

    The emerging trends of Semantic web attract the attention of researchers, due to the increased level of machine understandability which could offer an enhanced approach of acquiring more relevant results. It leads to redefining of the existing conventional web services (Web 2.0) into semantic web services (Web 3.0).The Conventional WSDL...

    Provided By Karunya University

  • White Papers // Dec 2011

    Interference Estimation in Cellular Systems

    CDMA is the most efficient multiple access scheme since it has neither frequency limitation like FDMA nor time limitation as in TDMA. Since all the users in CDMA uses the same frequency it is highly prone to interference. Interference decreases the capacity of the system. Estimation of the amount of...

    Provided By Karunya University

  • White Papers // Jul 2012

    U-Tube Manometer Calibration Using ANFIS

    This paper deals with the implementation of the Adaptive Neuro Fuzzy Inference System (ANFIS) on a Xilinx based Field Programmable Gate Array Spartan-3E. The implemented hardware is then used to efficiently calibrate the U-Tube manometer, in which the relation between the level of mercury and the Capacitance developed across the...

    Provided By Karunya University

  • White Papers // Mar 2013

    Individual Mining and Prediction of Patterns for Improving Mobile Commerce

    Mobile commerce is a new frontier. It involves the purchase transactions based on a mobile device. The mining and prediction of patterns can suggest stores that are more similar to his/her previous patterns mined and unknown to a customer. In this paper, the authors propose a framework for pattern mining...

    Provided By Karunya University

  • White Papers // Mar 2013

    A RBRM Approach for Virtual Desktop Cloud Computing

    The speciality of virtual desktop cloud computing is that user applications are executed in virtual desktops on remote servers. Resource management and resource utilization are very much significant in the area of virtual desktop cloud computing. Handling a large amount of clients in most efficient manner is the main challenge...

    Provided By Karunya University

  • White Papers // Mar 2013

    Energy Efficient Virtual Machine Monitoring Architecture for Green Cloud Computing

    Now-a-days Technology is growing faster; peoples started using tablets, laptops & mobile on the move. Cloud is the basic platform for everything. Using the concept of virtualization one can access others computer virtually through the cloud. As many of the users started using this virtualization, Kernel attacks and other malicious...

    Provided By Karunya University