Notice Board :

Call for Paper
Vol. 4 Issue 8

Submission Start Date:
August 01, 2018

Acceptence Notification Start:
August 10, 2018

Submission End:
August 15, 2018

Final MenuScript Due:
August 25, 2018

Publication Date:
August 31, 2018


                         Notice Board: Call for PaperVol. 4 Issue 8      Submission Start Date: August 01, 2018      Acceptence Notification Start: August 10, 2018      Submission End: August 15, 2018      Final MenuScript Due: August 25, 2018      Publication Date: August 31, 2018




Volume II Issue XI

Author Name
Vaibhav Sharma, Prof. Ruchika Pachori
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 11
Abstract
Cloud computing is emerging at the following three major trends — service orientation, virtualization and standardization of computing through the Internet. Cloud computing enables users and developers to use services without knowledge of, nor control over the technology infrastructure that supports them. In this era, Private cloud is now became popular by achieving a great efficiency of resources as well as improved to manage IT resources and services within an enterprise or organization. Cloud Storage is an attractive concept in IT field since it allows the resources to be provisioned according to the user needs. In private cloud resources are provided over intranet within an organization. In the studied research paper the implementation steps of private cloud is given. In this Paper, first we have to establish a private cloud and then we are going to measure the performance factors that is CPU , Memory Usage using System monitoring tools so that it gives the better evaluation under
PaperID
2016/IJRRETAS/12/2016/15610

Author Name
Amit Gupta, Dr. Pankaj Dashore
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 11
Abstract
Abstract: As in today’s world, time is playing a crucial role while developing the applications. Reusing something will definitely increase the productivity of the application that is need to be developed. Reusing existing components not only save the time but also the efforts made by the development team and also the use of environment and other resources. It also helps us to reduce the cost of the product. In this paper, we are discussing the way through which we can able to identify whether the object oriented code of applications can be reuse in the future or not. We will also discuss the object oriented matrices that helps us to identify the reusable code.
PaperID
2016/IJRRETAS/12/2016/15611

Author Name
Karishma khatri, Prof. Ruchika Pachori
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 11
Abstract
Abstract: Privacy and security are the majority significant concern in cloud computing .allowing for the huge number of data customer and documents in the cloud exigent problem of privacy-preserving data encryption in cloud environment. To improve the privacy preserving consequence and they initiate dissimilar NTPP schemes. Customer who put their huge data files in the cloud storage can alleviate the weight of storage and computation. At the similar time, it is critically significant for Customer to make sure that their data are creature stored appropriately and securely. So, users must be prepared with convinced security means so that they can formulate convinced that their data is protected. The main apprehension is the security of data at have a rest and whilst moving. So to grip this problem it is necessary that data at together customer and server end have to be in encrypted form. To proposed Narrative Technique for Privacy Preserving (NTPP) of Data Encryption
PaperID
2016/IJRRETAS/12/2016/15612

Author Name
Avdhesh Singh Rajpoot, Prof. Kapil Sahu
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 11
Abstract
Abstract: -Wireless sensor network (WSN) is an ad hoc network in which each sensor is defined with their limited energy. In WSN nodes are deployed into the network to monitor the physical or environmental condition such as temperature, sound, vibration at different location. Each node receives the information (data) and then transmits to the base station. In this paper we are analyzing each sensor consumes some energy in receiving or sending the data over the network. The lifetime of the network depend on the energy spent in each transmission. So we need an energy efficient protocol that plays an important role in offering high energy efficiency and long span of network lifetime. One of such protocols is PEGASIS; it is a near optimal chain-based routing protocol. This protocol starts forming a chain using Greedy algorithm then randomly selects a chain leader for the formed chain after that data transmission takes place. In PEGASIS, it takes the advantage of sending data to its closest
PaperID
2017/IJRRETAS/1/2017/15613