Cloud computing and service oriented architecture (SOA) are the dominant computing paradigm. Since past few years Robotics applications have also started to build around these paradigms. This paper presents entrance of robotic services in SOA and cloud computing. Where a client/user can opt for the robotic services present at the cloud like navigation, map building, object recognition etc. Map-reduce computing cluster is also facilitated at the cloud to process large amount of data for the cloud robotic services. The whole system follows the Web 2.0 standard. We also reported the simulation results for service based speech controlled robots with visual programming language (VPL) of Microsoft Development Robotics Studio (MDRS) and implementation of map-reduce computing cluster in robotic cloud.
{"title":"Robotic Services in Cloud Computing Paradigm","authors":"R. Doriya, P. Chakraborty, G. Nandi","doi":"10.1109/ISCOS.2012.24","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.24","url":null,"abstract":"Cloud computing and service oriented architecture (SOA) are the dominant computing paradigm. Since past few years Robotics applications have also started to build around these paradigms. This paper presents entrance of robotic services in SOA and cloud computing. Where a client/user can opt for the robotic services present at the cloud like navigation, map building, object recognition etc. Map-reduce computing cluster is also facilitated at the cloud to process large amount of data for the cloud robotic services. The whole system follows the Web 2.0 standard. We also reported the simulation results for service based speech controlled robots with visual programming language (VPL) of Microsoft Development Robotics Studio (MDRS) and implementation of map-reduce computing cluster in robotic cloud.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134205813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Grid computing systems provide a virtual framework for sharing resources across organizational boundaries. Nowadays OGSA(Open Grid Services Architecture) is the most common adopted grid system architecture. This architecture adopts standardized service pattern, which means it views all resources as services and shares all resources through sharing services. With the increasing use of Grid system, service user is in a fix when having to make a choice from a set of services offering the same functionality. Hence service selection is one of the challenges to be addressed in Service Oriented Grid (SOG). In this paper we propose a recommendation system based on trust, reputation and QoS for the SOG. This novel approach uses computation of trustworthiness of services by the mechanism of similarity computation and ranking service providers based on feedback of users.
{"title":"Optimal Service Selection Using Trust Based Recommendation System for Service-Oriented Grid","authors":"N. Nagarathna, M. Indiramma, J. S. Nayak","doi":"10.1109/ISCOS.2012.22","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.22","url":null,"abstract":"Grid computing systems provide a virtual framework for sharing resources across organizational boundaries. Nowadays OGSA(Open Grid Services Architecture) is the most common adopted grid system architecture. This architecture adopts standardized service pattern, which means it views all resources as services and shares all resources through sharing services. With the increasing use of Grid system, service user is in a fix when having to make a choice from a set of services offering the same functionality. Hence service selection is one of the challenges to be addressed in Service Oriented Grid (SOG). In this paper we propose a recommendation system based on trust, reputation and QoS for the SOG. This novel approach uses computation of trustworthiness of services by the mechanism of similarity computation and ranking service providers based on feedback of users.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132686983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is the rapidly evolving area that offers the potential for federal agencies of all the sizes to increase flexibility and efficiency. A cloud broker acts as an intermediary between various service providers and the cloud users. It will take responsibility in handling the services offered by cloud service providers (CSP). Any requests from the users will be processed by the cloud broker and the services are allocated to the users according to their requirements. In this paper, we are proposing a cloud broker service framework to decide on an appropriate service offered by different CSPs depending on the QoS requirements from the users. The framework incorporates multi-criteria optimization technique to analyze the non dominant or Pareto optimal sets. The Pareto optimization technique is used to find the non dominated set from the available n number of service providers.
{"title":"An Efficient QoS Framework for Cloud Brokerage Services","authors":"M. Usha, J. Akilandeswari, A. Fiaz","doi":"10.1109/ISCOS.2012.10","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.10","url":null,"abstract":"Cloud computing is the rapidly evolving area that offers the potential for federal agencies of all the sizes to increase flexibility and efficiency. A cloud broker acts as an intermediary between various service providers and the cloud users. It will take responsibility in handling the services offered by cloud service providers (CSP). Any requests from the users will be processed by the cloud broker and the services are allocated to the users according to their requirements. In this paper, we are proposing a cloud broker service framework to decide on an appropriate service offered by different CSPs depending on the QoS requirements from the users. The framework incorporates multi-criteria optimization technique to analyze the non dominant or Pareto optimal sets. The Pareto optimization technique is used to find the non dominated set from the available n number of service providers.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129582633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is an exponential increase in the demand for the online-only courses and this demand is recorded by several higher educational institutions. E-learning using traditional computing is not a sufficient solution against this voluminous demand of learning content sharing. It requires large storage space and the overhead of a high speed network infrastructure. Cloud computing is the composition of computing resources and the high performance network. It can easily provide the improved computing environment with less overhead as the computation and network are not treated as two separate things to manage. This paper proposes the advantages of an Mobile (M)-learning model with cloud computing support over the traditional computing based E-learning, based on some parameters like service acquisition, technical and commercial overhead required. M-learning is proposed as a software service, at the service delivery layer of the cloud. The basic components of different layers which are required to form an M-learning cloud computing environment are also discussed. M-learning will enhance the capability of learning management, operate at low risk and low cost, and is a secure and scalable medium.
{"title":"University Wide M-Learning Using Cloud Environment","authors":"A. Kumar, E. Pilli","doi":"10.1109/ISCOS.2012.26","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.26","url":null,"abstract":"There is an exponential increase in the demand for the online-only courses and this demand is recorded by several higher educational institutions. E-learning using traditional computing is not a sufficient solution against this voluminous demand of learning content sharing. It requires large storage space and the overhead of a high speed network infrastructure. Cloud computing is the composition of computing resources and the high performance network. It can easily provide the improved computing environment with less overhead as the computation and network are not treated as two separate things to manage. This paper proposes the advantages of an Mobile (M)-learning model with cloud computing support over the traditional computing based E-learning, based on some parameters like service acquisition, technical and commercial overhead required. M-learning is proposed as a software service, at the service delivery layer of the cloud. The basic components of different layers which are required to form an M-learning cloud computing environment are also discussed. M-learning will enhance the capability of learning management, operate at low risk and low cost, and is a secure and scalable medium.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. Data transmission between two nodes in MANET's may be requires multiple hops as the nodes transmission range is limited. Mobility of the different nodes makes the situation even more complicated. Multiple routing protocols, especially in these conditions have been developed during the last few years, to find optimized routes from a source to some destination.Ad-hoc network suffer from the lot of issues and congestion and security are the major issues of ongoing research, which leads to severe degradation of network throughput and increases the routing overheads. This survey gives a comprehensive overview of AODV (Ad-hoc On demand Distance Vector Routing) in the presence of black hole attack with a detailed comparison of different research on AODV has been presented. Open research direction is also discussed to serve as a starting point to future protocol design and evaluation.
移动自组织网络(MANET)是无线移动节点的集合,形成临时网络,不使用任何集中接入点、基础设施或集中管理。在MANET中,由于节点的传输范围有限,两个节点之间的数据传输可能需要多跳。不同节点的移动性使情况更加复杂。在过去几年中,特别是在这些条件下,已经开发了多种路由协议,以找到从源到某个目的地的最佳路由。Ad-hoc网络存在许多问题,其中拥塞和安全性是目前研究的主要问题,这导致网络吞吐量严重下降,路由开销增加。本文对存在黑洞攻击的AODV (Ad-hoc On demand Distance Vector Routing)进行了全面的概述,并对AODV的不同研究进行了详细的比较。讨论了开放的研究方向,为今后的协议设计和评估提供了一个起点。
{"title":"Optimized and Executive Survey on Mobile Ad-hoc Network","authors":"P. Lalwani, S. Silakari, P. Shukla","doi":"10.1109/ISCOS.2012.37","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.37","url":null,"abstract":"A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. Data transmission between two nodes in MANET's may be requires multiple hops as the nodes transmission range is limited. Mobility of the different nodes makes the situation even more complicated. Multiple routing protocols, especially in these conditions have been developed during the last few years, to find optimized routes from a source to some destination.Ad-hoc network suffer from the lot of issues and congestion and security are the major issues of ongoing research, which leads to severe degradation of network throughput and increases the routing overheads. This survey gives a comprehensive overview of AODV (Ad-hoc On demand Distance Vector Routing) in the presence of black hole attack with a detailed comparison of different research on AODV has been presented. Open research direction is also discussed to serve as a starting point to future protocol design and evaluation.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131550513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing offers computing and storage services which can be dynamically developed, composed and deployed on virtualized infrastructure. Cloud providers holding excess spare capacity, incentivize customers to purchase it by selling them in a market (spot market), where the prices are derived dynamically based on supply and demand. The cloud providers allow clients to bid on this excess capacity by allocating resources to bidders while their bids exceed a intermittently changing dynamic spot price. In this paper we have used game theory to model the bidding strategies of bidders in a spot market who are attempting to procure the cloud instances, as a prisoner dilemma game. We then analyze real time data from Amazon EC2 spot market to validate this model. In a single shot prisoner dilemma game mutual defection is the Nash equilibrium. We find that a majority (approx. 85%) of bidders choose to Defect which is in-line with the single shot classical prisoner dilemma game. However considering that most bidders in a spot market are repetitive bidders, we propose a Co-operation strategy which is in-line with the Iterated Prisoner Dilemma Game.
{"title":"Strategic Bidding for Cloud Resources under Dynamic Pricing Schemes","authors":"K. Sowmya, R. Sundarraj","doi":"10.1109/ISCOS.2012.28","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.28","url":null,"abstract":"Cloud computing offers computing and storage services which can be dynamically developed, composed and deployed on virtualized infrastructure. Cloud providers holding excess spare capacity, incentivize customers to purchase it by selling them in a market (spot market), where the prices are derived dynamically based on supply and demand. The cloud providers allow clients to bid on this excess capacity by allocating resources to bidders while their bids exceed a intermittently changing dynamic spot price. In this paper we have used game theory to model the bidding strategies of bidders in a spot market who are attempting to procure the cloud instances, as a prisoner dilemma game. We then analyze real time data from Amazon EC2 spot market to validate this model. In a single shot prisoner dilemma game mutual defection is the Nash equilibrium. We find that a majority (approx. 85%) of bidders choose to Defect which is in-line with the single shot classical prisoner dilemma game. However considering that most bidders in a spot market are repetitive bidders, we propose a Co-operation strategy which is in-line with the Iterated Prisoner Dilemma Game.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134249947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart grid technologies promotes renewable energy source integration. This results in huge data handling and processing issues, due to the dynamic and distributed nature of sources and loads. The coordinated operation of generating sources and loads in such environment is challenging and requires substantial support for meeting the distributed storage and processing requirements. The immense potential of cloud computing technology can be utilized to address these issues. The proposed architecture for smart grid data storage applications has been realized in the open source cloud platform. Open stack cloud test bed has been set up for the deployment of applications and tested the performance under varying workload conditions.
{"title":"Operational Flexibility in Smart Grid through Cloud Computing","authors":"T. Rajeev, S. Ashok","doi":"10.1109/ISCOS.2012.23","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.23","url":null,"abstract":"Smart grid technologies promotes renewable energy source integration. This results in huge data handling and processing issues, due to the dynamic and distributed nature of sources and loads. The coordinated operation of generating sources and loads in such environment is challenging and requires substantial support for meeting the distributed storage and processing requirements. The immense potential of cloud computing technology can be utilized to address these issues. The proposed architecture for smart grid data storage applications has been realized in the open source cloud platform. Open stack cloud test bed has been set up for the deployment of applications and tested the performance under varying workload conditions.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116703694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The inherent broadcast nature of wireless signals, is responsible for causing interference in various data transmissions. But, when this nature is exploited, the neighboring stations can overhear the data transmissions destined for a particular node. When these neighboring stations help the transmissions by taking a high data rate path instead of the low data rate path, then such a scheme is called a co-operative transmission scheme. The co-operative scheme always promises a higher throughput and lower delay performances. This paper throws a light on the various medium access control (MAC) cooperative protocols developed and at the end, a rigorous comparative study of the features is performed to give a better understanding.
{"title":"Comparative Analysis of Co-operative MAC Schemes","authors":"N. Newalkar, S. Silakari, P. Shukla","doi":"10.1109/ISCOS.2012.40","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.40","url":null,"abstract":"The inherent broadcast nature of wireless signals, is responsible for causing interference in various data transmissions. But, when this nature is exploited, the neighboring stations can overhear the data transmissions destined for a particular node. When these neighboring stations help the transmissions by taking a high data rate path instead of the low data rate path, then such a scheme is called a co-operative transmission scheme. The co-operative scheme always promises a higher throughput and lower delay performances. This paper throws a light on the various medium access control (MAC) cooperative protocols developed and at the end, a rigorous comparative study of the features is performed to give a better understanding.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Sunilkumar, K. Shivaprakash, J. Thriveni, K. Venugopal, L. Patnaik
Cognitive wireless networks are the solution for the existing networks Infrastructure and security problems for all applications. Cognitive techniques adopted in this paper, monitor the transactions among the nodes in the network and detects the malicious nodes and takes preventive measures. To achieve high detection rate, single-sensing with cognition is adopted and training of network is done using artificial neural network based Supervised learning technique. The proposed concept is implemented for homogeneous and heterogeneous wireless networks. Detection probability is calculated based on the network parameters like, sensing range, node density and broadcast reach ability. As compared with the existing approaches, our proposed approach yielded efficient results.
{"title":"Adoption of Cognition for Malicious Node Detection in Homogeneous and Heterogeneous Wireless Networks","authors":"G. Sunilkumar, K. Shivaprakash, J. Thriveni, K. Venugopal, L. Patnaik","doi":"10.1109/ISCOS.2012.20","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.20","url":null,"abstract":"Cognitive wireless networks are the solution for the existing networks Infrastructure and security problems for all applications. Cognitive techniques adopted in this paper, monitor the transactions among the nodes in the network and detects the malicious nodes and takes preventive measures. To achieve high detection rate, single-sensing with cognition is adopted and training of network is done using artificial neural network based Supervised learning technique. The proposed concept is implemented for homogeneous and heterogeneous wireless networks. Detection probability is calculated based on the network parameters like, sensing range, node density and broadcast reach ability. As compared with the existing approaches, our proposed approach yielded efficient results.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130587218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Health Care System of a nation is the contribution of different areas like medical sciences, Biomedical engineering and Information Technology. Telemedicine is a promising technology which combines telecommunication and Information Technology for health care management. Telemedicine provides quality health care irrespective of socio economic and geographical constraints. It delivers health care services between remote patients and doctors. There is a huge demand for automating the patient's data gathering, building it to access in real-time by achieving reliability. With the advent of gaining popularity in cloud computing, the way data is shared and exchanged in healthcare systems is changed. It provides leasing model, scalability and data access capability without geographical limitations. In this paper, we focus on the design of a Cloud framework for Health Monitoring System (CHMS). It collects patients health data and publishes them to a Cloud information repository. Further it facilitates analysis of the data using services hosted in the Cloud.
{"title":"An Efficient Cloud Framework for Health Care Monitoring System","authors":"B. E. Reddy, T. Kumar, G. Ramu","doi":"10.1109/ISCOS.2012.11","DOIUrl":"https://doi.org/10.1109/ISCOS.2012.11","url":null,"abstract":"The Health Care System of a nation is the contribution of different areas like medical sciences, Biomedical engineering and Information Technology. Telemedicine is a promising technology which combines telecommunication and Information Technology for health care management. Telemedicine provides quality health care irrespective of socio economic and geographical constraints. It delivers health care services between remote patients and doctors. There is a huge demand for automating the patient's data gathering, building it to access in real-time by achieving reliability. With the advent of gaining popularity in cloud computing, the way data is shared and exchanged in healthcare systems is changed. It provides leasing model, scalability and data access capability without geographical limitations. In this paper, we focus on the design of a Cloud framework for Health Monitoring System (CHMS). It collects patients health data and publishes them to a Cloud information repository. Further it facilitates analysis of the data using services hosted in the Cloud.","PeriodicalId":138078,"journal":{"name":"2012 International Symposium on Cloud and Services Computing","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120931893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}