Narander Kumar

Learn More
To find the unknown and hidden pattern from large amount of data of insurance organizations. There are strong customer base required with the help of large database. Cluster Analysis is an excellent statistical tool for a large and multivariate database. The clusters analysis with K-Means method may be used to develop the model which is useful to find the(More)
Cloud data centres improve CPU utilization of their servers (physical machines or PMs) through Virtualization (virtual machines or VMs). Over virtualised and under virtualized PMs suffer performance degradation and power dissipation respectively. This work presents a stochastic modular scheme for allocating VM requests to a PM by avoiding overloading of PM(More)
Geographically distributed data centers of cloud provider incur heavy electricity costs due to high prices as well as inefficient workload management among the data centers. To bring down the operational costs dynamic power management is used as the basic approach where different power modes exist for a server. However the air flow pattern of the cooling(More)
In cloud computing environment there are so many resources, these resources are differ each other in terms of bandwidth, RAM, memory etc. In cloud environment the main objective is how to allocate these resources in an efficient way in order to get minimum or optimal cost. For allocating resources efficiently we need assignment problem and there are various(More)
In the modern technology of communication architecture, network on chip is widely used as communication architecture. Network on chip topologies are becoming a backbone of communication architectures. Network on chip provides a good integration of huge amount of storage on chip blocks as well as computational also. Network on chip handled the unfavorable(More)
For secure and reliable data transmission over the network from unauthorized users in a Communication system, there are various type of cryptographic algorithm has been introduced but RSA is the most famous cryptographic algorithm in these entire cryptographic algorithm. It involves the encryption decryption key generation. In this paper we provide a modify(More)
An association rule is a method to find out the frequent hidden relationship from a large amount of datasets in a database. Association analysis into existing database technology is very useful for indexing and query processing capabilities of database system and developing efficient and scalable mining algorithms as well as handling user specified or(More)