Learn More
Cloud data centres improve CPU utilization of their servers (physical machines or PMs) through Virtualization (virtual machines or VMs). Over virtualised and under virtualized PMs suffer performance degradation and power dissipation respectively. This work presents a stochastic modular scheme for allocating VM requests to a PM by avoiding overloading of PM(More)
Geographically distributed data centers of cloud provider incur heavy electricity costs due to high prices as well as inefficient workload management among the data centers. To bring down the operational costs dynamic power management is used as the basic approach where different power modes exist for a server. However the air flow pattern of the cooling(More)
In cloud computing environment there are so many resources, these resources are differ each other in terms of bandwidth, RAM, memory etc. In cloud environment the main objective is how to allocate these resources in an efficient way in order to get minimum or optimal cost. For allocating resources efficiently we need assignment problem and there are various(More)
In the modern technology of communication architecture, network on chip is widely used as communication architecture. Network on chip topologies are becoming a backbone of communication architectures. Network on chip provides a good integration of huge amount of storage on chip blocks as well as computational also. Network on chip handled the unfavorable(More)
In recent years, the advent of latest web and data technologies has encouraged massive data growth in almost every sector. Businesses and leading industries are viewing these huge data repositories as a tool to design future strategies, prediction models by analyzing patterns and gaining knowledge from this unstructured data by applying different data(More)
For secure and reliable data transmission over the network from unauthorized users in a Communication system, there are various type of cryptographic algorithm has been introduced but RSA is the most famous cryptographic algorithm in these entire cryptographic algorithm. It involves the encryption decryption key generation. In this paper we provide a modify(More)
In the modern era, internet plays crucial role in the human life. Now that time it is a backbone of human life. In Twenty-first century criminals increasingly rely on these technologies and these advance technologies are also increase day by day criminals and their criminals operations. These criminals can easily lift to Internet to carry out such type of(More)