Fuzzy Based Algorithm for Cloud Resource Management and Task Scheduling ijtsrd
This paper presents a Fuzzy Logic based approach to manage VM status and VM configuration within the cloud environment. The aim of the approach is to serve task requests efficiently with minimal use of resource and power. The proposed technique uses Fuzzy based approach to calculate the VM’s status and VMs configurations, depending upon the […]
Design and Implementation of Electronic Payment Gateway for Secure Online Payment System ijtsrd
In e commerce, main problem is to be more secure for payment systems and disputation between online merchant and customer. To solve this problem, this paper presents design and implementation of Electronics Payment Gateway for online payment system. In this system, a customer’s financial information credit or debit card information is sent directly to a […]
Performance Analysis between H.323 and SIP over VoIP ijtsrd
There are a number of protocols that may be employed in order to provide the Voice over IP VoIP communication services. In VoIP system, H.323 and Session Initiation Protocol SIP are the two major standards. Both of these signaling protocols provide mechanisms for multimedia teleconferencing services. Although the two protocols architecture is quite similar, they […]
Traffic Engineering in Software Defined Networking SDN ijtsrd
The traditional single path routing can cause imbalanced link utilization and is not efficient for all traffic types such as long lived large flows. Moreover, it can lead to low network throughput and high network latency. Traffic engineering TE is a key solution to solve these problems of single path. The main purpose of TE […]
Risk Management of Secure Cloud in Higher Educational Institution ijtsrd
Cloud Computing is one of the most widely used today in higher educational institutions and other business organizations. It provides many advantages for higher educational institutions by sharing IT services on cloud. However, a cloud provider needs to manage the cloud computing environment risks in order to identify, assess, and prioritize the risks in order […]