Volume-15 ~ Issue-2
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Vehicular communication is considered to be a backbone for many critical safety applications. In order to achieve a better implementation of any vehicular communication scenario, an efficient, accurate and reliable simulator is essential. Various open source and commercial simulating tools are available for this purpose. One of the key issues in this regard is the selection of a reliable simulator which implements all standard algorithms and paradigms giving accurate results. In this paper, we first present IEEE standard and protocols for vehicular communication, IEEE 802.11p and IEEE 1609.x, also known as WAVE protocol stack. The paper then discusses the necessary requirements for a generic discrete event simulator which can be used to simulate Vehicular Ad-hoc Networks. Since not all the network simulators can be used in the scenario of vehicular communication, we highlight the key features of some network simulators in the context of vehicular ad-hoc networks. The paper also highlights some of the implementation limitations in these simulators. Furthermore, the paper presents a discussion on traffic simulators by emphasizing on the underlying mobility models used in order to generate the realistic traffic patterns. A comparative study of both network and traffic simulators show the pros and cons of these simulation tools. The paper suggests the appropriate choice of a network simulator to be used as a VANET simulator.
Keywords: VANET, IEEE 802.11p, WAVE-PHY, WAVE-MAC, Simulators, Modeling
[1] "World Health Organization - Global Plan for the Decade of Action for Road Safety," http:www.who.int/roadsafety/decade of action/, 2010.
[2] "World Health Organization - Global Status Report on Road Safety: Time for Action," http://www.who.int/violence injury prevention/road safety status/2009/, 2009.
[3] ITS - Intelligent Transport Systems, http://www.its-australia. com.au, 2004.
[4] M. Watfa, "Advances in Vehicular Ad-Hoc Networks: Developments and Challenges", Intelligent Transport Systems. IGI Global, 2010.
[5] U. Lee, J. Lee, J. S. Park, and M. Gerla, "FleaNet: A Virtual Market Place on Vehicular Networks," IEEE Transactions on Vehicular Technology, vol. 59, no. 1, pp. 344–355, Jan. 2010.
[6] "Ford Accelerates Intelligent Vehicle Research, Creating 'Talking' Vehicle to Make Roads Safer," http://media.ford.com/ , 2010.
[7] X. Xian, W. Shi, and H. Huang, "Comparison of OMNET++ and other simulator for WSN simulation," 2008 3rd IEEE Conference on Industrial Electronics and Applications, pp. 1439–1443, Jun. 2008.
[8] K. Shafiee, J. B. Lee, V. C. M. Leung, and G. Chow, "Modeling and Simulation of Vehicular Networks," Network, pp. 77–85, 2011.
[9] F. J. Martinez, C. K. Toh, J.C. Cano, C. T. Calafate, and P. Manzoni, "A Survey and Comparative Study of Simulators for Vehicular ad hoc Networks ( VANETs )," Transportation, 2009.
[10] "IEEE STANDARD - Wireless Access in Vehicular Environments," http://grouper.ieee.org/groups/802/11.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate precisely as location map to regulate the data-veiling locations. Thus, we look flipping an edge pixel in binate images as deviating the edge location one pixel horizontally ,one vertically. Positioned on this conclusion, we propose an interlaced morphological binate wavelet transform to path the alter edges, which thus ease blind watermark drawing and fusion of cryptographic indication.Unlike current block-based approach, in that the block size is given as 3 x 3 pixels and larger, we establish the image in 2 x 2 pixel blocks. It allows resilience in discovering the edges and also gets the low computational complication. There are two case that twisting the candidates of one do not change the flippability circumstances of other are engaged for orthogonal embedding, that deliver more relevant candidates can be determined so that a larger quqntity can be accomplished.A contemporary effective Backward-Forward Minimization method is suggested, which acknowledge the back-ward i.e enclose candidates and forward those twisted candidates that may be concerned by spining the present pixel. By this way, the complete visual bias can be minimized. Experimental results determine the validity of our arguments.
Keywords: Verification, binate images, data cloaking, mor- phological binate wavelet transform, Quadrate embedding.
[1]. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Mateo, CA: Morgan Kaufmann, 2001.
[2]. B. Furht and D. Kirovski, Multimedia Security Handbook, B. Furht and D. Kirovski, Eds. Boca Raton, FL: CRC, 2005.
[3]. Y. Liu, J. Mant, E. Wong, and S. H. Low, "Marking and detection of text documents using transform-domain techniques," in Proc. SPIE, San Jose, CA, 1999, vol. 3657, pp. 317–328.
[4]. Q. Mei, E. K. Wong, and N. Memon, "Data hiding in binary text doc- ument," in Proc. SPIE, 2001, vol. 4314, pp. 369–375.
[5]. Y. C. Tseng and H.-K. Pan, "Data hiding in 2-color images," IEEE Trans. Comput., vol. 51, no. 7, pp. 873–878, Jul. 2002.
[6]. K.-F. Hwang and C.-C. Chang, "A run-length mechanism for hiding data into binary images," in Proc. Pacific Rim Workshop on DigitalSteganography, Kitakyushu, Japan, Jul. 2002, pp. 71–74.
[7]. H. Lu, X. Shi, Y. Q. Shi, A. C. Kot, and L. Chen, "Watermark embedding in DC components of DCT for binary images," in Proc.,IEEE Workshop on Multimedia Signal Processing.
[8]. Ming-Shi Wang and Wei-Che Chen, "Digital image copyright protection scheme based on visual cryptography and singular value decomposition", Optical Engineering,Vol. 46, No. 6, 2007.
[9]. Zhe-Ming Lu, Wei-Min Zheng, Jeng-Shyang Pan and Zhen Sun, "Multipurpose Image Watermarking Method Based on Mean-removed Vector Quantization", Journal of Information Assurance and Security, Vol. 1, pp. 33-42-2006
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Load Balancing In Cloud Computing:A Review |
| Country | : | India |
| Authors | : | Shiny |
| : | 10.9790/0661-1522229 ![]() |
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this increasing mass of data requires more computer equipment to meet the various needs of the organizations. To better capitalize their investment, the over-equipped organizations open their infrastructures to others by exploiting the Internet and other important technologies such as virtualization by creating a new computing model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources which includes software and infrastructure with the help of virtualization. This paper presents a brief review of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
[1] A.T. Velte, T.J. Veltey and R. Elsenpeter, Cloud Computing: A Practical Approach (Tata McGraw-Hill Education Private Limited, New Delhi, Edition 2010).
[2] Y. Jadeja and K. Modi, "Cloud Computing-Concepts, Architecture and Challenges", International Conference on Computing, Electronics and Electrical Technologies, 2012, 877-880.
[3] F.B. Shaikh and S. Haider, "Security Threats in Cloud Computing", Internet Technology and Secured Transactions,2011, 214-219.
[4] J. Srinivas, K.V.S.Reddy and A.M. Qyser, "Cloud Computing Basics", International Journal of Advanced Research in Computer and Communication Engineering, 1(5), July 2012. [5] S. Ray and A.D. Sarkar, "Execution Analysis of Load Balancing Algorithms in Cloud Computing Environment",International Journal on Cloud Computing Services and Architecture, 2(5), October 2012.
[6] e2networks.com/cloud-servers-india/cloud-computing-architecture/
[7] D.K. Kumar, G.V. Rao and G.S. Rao, "Cloud Computing: An Analysis of Its Challenges and Security Issues", International Journal of Computer Science and Network, 1(5), October 2012.
[8] K. Jamsa, Cloud Computing (Jones & Bartlett Learning, 5 Wall Street, Burlington, USA, 2013).
[9] http://cloud.siliconindia.com/forum/Cloud-Computing-Basic-Components-qid-7970-catid-39.html
[10] http://blog.appcore.com/blog/bid/167543/Types-of-Cloud-Computing-Private-Public-and-Hybrid-Clouds
