Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668103
P. Sadhukhan
Smart city is an emerging concept that aims to improve the quality of city life, to enhance the efficiency of urban operations and services as well as to create a sustainable economic growth of the city. Internet-of-Things (IoT) and big data have emerged as key enabling technologies for smart city services infrastructure. A major issue in the design of smart city services is the provision of Internet connectivity anywhere within the cities through some suitable network infrastructure. Although the use cases for various smart city services and business models for delivering smart city services have been proposed in the literature over the past few years, none of them attempts to address the problem of dealing with heterogeneous technologies required for collecting and processing data to offer such services. Thus, this paper proposes a suitable framework for smart city services based on IoT to address the above-mentioned issues.
{"title":"An IoT based Framework for Smart City Services","authors":"P. Sadhukhan","doi":"10.1109/IC3IOT.2018.8668103","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668103","url":null,"abstract":"Smart city is an emerging concept that aims to improve the quality of city life, to enhance the efficiency of urban operations and services as well as to create a sustainable economic growth of the city. Internet-of-Things (IoT) and big data have emerged as key enabling technologies for smart city services infrastructure. A major issue in the design of smart city services is the provision of Internet connectivity anywhere within the cities through some suitable network infrastructure. Although the use cases for various smart city services and business models for delivering smart city services have been proposed in the literature over the past few years, none of them attempts to address the problem of dealing with heterogeneous technologies required for collecting and processing data to offer such services. Thus, this paper proposes a suitable framework for smart city services based on IoT to address the above-mentioned issues.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127817757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668170
N. Ramya, U. Sandhya, L. Gayathri
Biometric passports are widely being employed in most of the countries to certify that the passport and its holder are genuine and to eliminate fraudulent activities like border crossing, passport cloning, fake passports etc. Biometric passports, also called ePassports contain a RFID (Radio Frequency Identification) chip embedded in the passport which carries certain biometric information, along with the information available in the data page of the passport. Currently used ePassports use PKI (Public Key Infrastructure) to authenticate the information stored in the chip. But the protection mechanisms used in this authentication method has some shortcomings like Skimming, Eavesdropping, Clandestine scanning etc. The proposed model will overcome the above issues by authenticating the traveler by their fingerprint (biometric information) and securing the tag information through an irrevocable hash function.
{"title":"Biometric Authentication to ensure security in ePassports","authors":"N. Ramya, U. Sandhya, L. Gayathri","doi":"10.1109/IC3IOT.2018.8668170","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668170","url":null,"abstract":"Biometric passports are widely being employed in most of the countries to certify that the passport and its holder are genuine and to eliminate fraudulent activities like border crossing, passport cloning, fake passports etc. Biometric passports, also called ePassports contain a RFID (Radio Frequency Identification) chip embedded in the passport which carries certain biometric information, along with the information available in the data page of the passport. Currently used ePassports use PKI (Public Key Infrastructure) to authenticate the information stored in the chip. But the protection mechanisms used in this authentication method has some shortcomings like Skimming, Eavesdropping, Clandestine scanning etc. The proposed model will overcome the above issues by authenticating the traveler by their fingerprint (biometric information) and securing the tag information through an irrevocable hash function.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668123
P. Kavitha, B. Krishna Moorthy, P. Sudharshan, T. Aarthi
Education plays a predominant role in today’s modern technological world. It opens various doors for achieving better prospects in life and also promotes career growth. The various pedagogical methods used in the field of teaching produces a new quality that favors the task of generating, transmitting and sharing knowledge among students. The capability to facilitate learning and improving performance using appropriate technological processes, would enhance the educational qualities. Artificial Intelligence is one such emergent technology that could be leveraged to create learning tools which are more flexible and efficient. This paper is an attempt to characterize the integration of education and artificial intelligence to streamline the learning process through adaptive learning technique with the help of Bayesian student model, based on clustering methods and interaction traces. Hence the system proposed would help to improvise the user by identifying their strengths and weaknesses.
{"title":"Mapping Artificial Intelligence and Education","authors":"P. Kavitha, B. Krishna Moorthy, P. Sudharshan, T. Aarthi","doi":"10.1109/IC3IOT.2018.8668123","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668123","url":null,"abstract":"Education plays a predominant role in today’s modern technological world. It opens various doors for achieving better prospects in life and also promotes career growth. The various pedagogical methods used in the field of teaching produces a new quality that favors the task of generating, transmitting and sharing knowledge among students. The capability to facilitate learning and improving performance using appropriate technological processes, would enhance the educational qualities. Artificial Intelligence is one such emergent technology that could be leveraged to create learning tools which are more flexible and efficient. This paper is an attempt to characterize the integration of education and artificial intelligence to streamline the learning process through adaptive learning technique with the help of Bayesian student model, based on clustering methods and interaction traces. Hence the system proposed would help to improvise the user by identifying their strengths and weaknesses.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133986012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668150
Dakshit Chalagulla, Jeevanigi Jayateertha, Charishma Reddy Kudimi, P. Manitha, M. Sujith
In the past two decades there is a drastic improvement in the technology. The most common word is IOT (Internet of Things) which leads to improvement of Home automation. Switching ON the appliances at home and forgetting to turn them OFF leads to an increase in the daily power consumption. This paper presents the controlling of home appliances on the basis of pre-specified time which is defined from the user’s device; Arduino Ethernet shield, real-time clock, sensors and MOSFET keeping the internet as the medium of communication. This enables the user to monitor the energy usage and assists in minimizing the energy wastage. This prototype is designed for a low cost such that it satisfies the need of different classes of people by notifying them about their consumption by the means of an alert message. The message is sent when power consumption exceeds the limit set by the user making it more user-friendly. An additional task performed by the system is to isolate the load during the fault condition.
{"title":"Efficient Energy Utilization Control with Remote Network Access","authors":"Dakshit Chalagulla, Jeevanigi Jayateertha, Charishma Reddy Kudimi, P. Manitha, M. Sujith","doi":"10.1109/IC3IOT.2018.8668150","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668150","url":null,"abstract":"In the past two decades there is a drastic improvement in the technology. The most common word is IOT (Internet of Things) which leads to improvement of Home automation. Switching ON the appliances at home and forgetting to turn them OFF leads to an increase in the daily power consumption. This paper presents the controlling of home appliances on the basis of pre-specified time which is defined from the user’s device; Arduino Ethernet shield, real-time clock, sensors and MOSFET keeping the internet as the medium of communication. This enables the user to monitor the energy usage and assists in minimizing the energy wastage. This prototype is designed for a low cost such that it satisfies the need of different classes of people by notifying them about their consumption by the means of an alert message. The message is sent when power consumption exceeds the limit set by the user making it more user-friendly. An additional task performed by the system is to isolate the load during the fault condition.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132555245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668105
S. Sreeraj, G. Santhosh Kumar
An extensive collection of communication protocols were developed to support efficient communication of IoT devices. IoT applications are intended to run with constrained resources. Since IoT systems need wireless connectivity, and the devices often are remote, they have to manage with connections which are likely unreliable, irregular and inferior bandwidth to access the network. A quantitative assessment of IoT protocols in such situations remains unexplored. The objective of the present work is to assess the performance of IoT messaging protocols under restricted wireless access network based on Use Cases published by oneM2M specifications.
{"title":"Performance of IoT protocols under constrained network, a Use Case based approach","authors":"S. Sreeraj, G. Santhosh Kumar","doi":"10.1109/IC3IOT.2018.8668105","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668105","url":null,"abstract":"An extensive collection of communication protocols were developed to support efficient communication of IoT devices. IoT applications are intended to run with constrained resources. Since IoT systems need wireless connectivity, and the devices often are remote, they have to manage with connections which are likely unreliable, irregular and inferior bandwidth to access the network. A quantitative assessment of IoT protocols in such situations remains unexplored. The objective of the present work is to assess the performance of IoT messaging protocols under restricted wireless access network based on Use Cases published by oneM2M specifications.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129294427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668182
Priyanka Sudhakara, V. Ganapathy, K. Sundaran
Trajectory planning is a prime method in the research on mobile robot navigation. Sampling-based algorithms can generate trajectories and reach the target avoiding obstacles. In this proposed work, an Enhanced Artificial Potential Field (E-APF) generates the trajectories for navigation of mobile robots and simultaneously guarantees the effectiveness and continuity of the trajectory. Aiming at the problem that the classical APF cannot adapt to the complex trajectory planning and fall as prey into the local optimal solution, this E-APF method is proposed for Wheeled Mobile Robot (WMR) route planning. In this research work, this method does not consider the influence of traditional attraction and repulsive force. The repulsive potential is built by repulsive function for discretizing outline of an arbitrarily shaped obstacle with points. This describes the workspace of the wheeled mobile robot more precisely. The reliability is proved for most of the cases by discussing the convergence of this proposed technique. Finally, an efficient obstacles avoidance based action has been performed in the chosen navigable trajectory. Trajectories that have been generated using the proposed E-APF satisfy constraints approach of the direction on both the starting and goal points. Consequently, the trajectories that are generated by the Wheeled Mobile Robot (WMR) are geometrically and dynamically feasible. Simulation results performed confirms the viability of the proposed E-APF algorithm that it can be effectively utilized in trajectory planning of wheeled mobile robots and can be applied in real-time scenarios.
{"title":"Route Planning of a Wheeled Mobile Robot (WMR) using Enhanced Artificial Potential Field (E-APF) Method","authors":"Priyanka Sudhakara, V. Ganapathy, K. Sundaran","doi":"10.1109/IC3IOT.2018.8668182","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668182","url":null,"abstract":"Trajectory planning is a prime method in the research on mobile robot navigation. Sampling-based algorithms can generate trajectories and reach the target avoiding obstacles. In this proposed work, an Enhanced Artificial Potential Field (E-APF) generates the trajectories for navigation of mobile robots and simultaneously guarantees the effectiveness and continuity of the trajectory. Aiming at the problem that the classical APF cannot adapt to the complex trajectory planning and fall as prey into the local optimal solution, this E-APF method is proposed for Wheeled Mobile Robot (WMR) route planning. In this research work, this method does not consider the influence of traditional attraction and repulsive force. The repulsive potential is built by repulsive function for discretizing outline of an arbitrarily shaped obstacle with points. This describes the workspace of the wheeled mobile robot more precisely. The reliability is proved for most of the cases by discussing the convergence of this proposed technique. Finally, an efficient obstacles avoidance based action has been performed in the chosen navigable trajectory. Trajectories that have been generated using the proposed E-APF satisfy constraints approach of the direction on both the starting and goal points. Consequently, the trajectories that are generated by the Wheeled Mobile Robot (WMR) are geometrically and dynamically feasible. Simulation results performed confirms the viability of the proposed E-APF algorithm that it can be effectively utilized in trajectory planning of wheeled mobile robots and can be applied in real-time scenarios.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/ic3iot.2018.8668109
B. Rajalakshmi, S. Sumathi
Todays world threats to personal data is imminent so identity of a person is important. With the increased battle against cybercrimes, person identification has given rise to biometric authentication system. Human identification has been subjected to intensive research due to their application in all aspects of security surveillance. Biometric is a mechanism to recognize a person by physical or behavioral traits such as face, fingerprint, signature, iris, palmprint, hand geometry, ear, finger knuckle print. To overcome the limitation of Uni Biometric by Multimodal Biometric has been developed. This paper provides an overview of Ear and Finger Knuckle Biometric recognition with different fusion technique to authenticate a person. The Ear and Finger Knuckle biometric are recently developing technique which are non-invasive method of Person identification. The Ear Biometric are unique since it is stable from birth. The image pattern from Finger Knuckle bending is highly unique and rich in texture patterns. It shows that the performance of different Biometric system varies according to application.
{"title":"Survey Of Multimodal Biometric Using Ear And Finger Knuckle Image","authors":"B. Rajalakshmi, S. Sumathi","doi":"10.1109/ic3iot.2018.8668109","DOIUrl":"https://doi.org/10.1109/ic3iot.2018.8668109","url":null,"abstract":"Todays world threats to personal data is imminent so identity of a person is important. With the increased battle against cybercrimes, person identification has given rise to biometric authentication system. Human identification has been subjected to intensive research due to their application in all aspects of security surveillance. Biometric is a mechanism to recognize a person by physical or behavioral traits such as face, fingerprint, signature, iris, palmprint, hand geometry, ear, finger knuckle print. To overcome the limitation of Uni Biometric by Multimodal Biometric has been developed. This paper provides an overview of Ear and Finger Knuckle Biometric recognition with different fusion technique to authenticate a person. The Ear and Finger Knuckle biometric are recently developing technique which are non-invasive method of Person identification. The Ear Biometric are unique since it is stable from birth. The image pattern from Finger Knuckle bending is highly unique and rich in texture patterns. It shows that the performance of different Biometric system varies according to application.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124266612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668164
Pratham Sharma, T. Choudhury, A. Sabitha, G. Raj
The new branch of science which aims on getting the computers process data and become more learned without the use of explicit programming is termed as Machine Learning. The most premier task of Natural Language processing (NLP) is Sentiment analysis or opinion mining. The need for Sentimental Analysis has gained much popularity over the recent years. Through the paper, we target to deal with the problem of Review System, an utmost important part of any organizational CRM.. Data inflow in this project is through the twitter API supplying live stream of tweets.. Finally we would set a stage to provide insights into our future work on sentiment analysis and using this Smart Agent Analysis on existing CRM in order to improve their existing Feedback structure. Answers to these questions are provided by statistical analysis on keyword.
{"title":"Smart Sentimental Agent Analysis through Live Streaming Data","authors":"Pratham Sharma, T. Choudhury, A. Sabitha, G. Raj","doi":"10.1109/IC3IOT.2018.8668164","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668164","url":null,"abstract":"The new branch of science which aims on getting the computers process data and become more learned without the use of explicit programming is termed as Machine Learning. The most premier task of Natural Language processing (NLP) is Sentiment analysis or opinion mining. The need for Sentimental Analysis has gained much popularity over the recent years. Through the paper, we target to deal with the problem of Review System, an utmost important part of any organizational CRM.. Data inflow in this project is through the twitter API supplying live stream of tweets.. Finally we would set a stage to provide insights into our future work on sentiment analysis and using this Smart Agent Analysis on existing CRM in order to improve their existing Feedback structure. Answers to these questions are provided by statistical analysis on keyword.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"20 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120917374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668102
S. Patel, C. Saravanan
Steganography is a technique used for hiding the secret information inside other information which is not secret. Detection of the secret data is challenging if the data first encrypted using cryptographic algorithm before performing stego operation of the secret data into the carrier. In this research article, a performance analysis on two novel steganography techniques used for achieving high payload for the information hiding using the carrier digital image. The research articles which are used for performance analysis are “High payload steganography mechanism using hybrid edge detector” [1] published in 2010 and the other one is “A magic cube based information hiding scheme of large payload” [2] published in 2016 respectively. The schemes discussed in these papers are used for achieving high embedding payload, better quality of stego image using the LSB steganography technique which is based on statistical analysis. In the performance analysis, it is noticed that the magic cube based information hiding scheme is outperforming hybrid edge detector scheme.
{"title":"Performance Analysis of Hybrid Edge Detector Scheme and Magic Cube Based Scheme for Steganography Application","authors":"S. Patel, C. Saravanan","doi":"10.1109/IC3IOT.2018.8668102","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668102","url":null,"abstract":"Steganography is a technique used for hiding the secret information inside other information which is not secret. Detection of the secret data is challenging if the data first encrypted using cryptographic algorithm before performing stego operation of the secret data into the carrier. In this research article, a performance analysis on two novel steganography techniques used for achieving high payload for the information hiding using the carrier digital image. The research articles which are used for performance analysis are “High payload steganography mechanism using hybrid edge detector” [1] published in 2010 and the other one is “A magic cube based information hiding scheme of large payload” [2] published in 2016 respectively. The schemes discussed in these papers are used for achieving high embedding payload, better quality of stego image using the LSB steganography technique which is based on statistical analysis. In the performance analysis, it is noticed that the magic cube based information hiding scheme is outperforming hybrid edge detector scheme.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124756843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-01DOI: 10.1109/IC3IOT.2018.8668163
R. Madhumathi, N. Kalaiyarasi
Cloud computing is an IT paradigm, a model for enabling access to shared huge configurable resources, which is provisioned with minimal management effort, often over the web. Users access the cloud applications through a browser or a mobile app while the software and data are stored on servers at a remote location. The benefits of using the cloud are storage, security, cost, accessibility, flexibility, maintenance, backup and recovery etc. It also provides easy access to data at any time. Cloud application providers strive to give the better service and performance as if the software programs were installed locally on end-users system. One of major issue in cloud computing is resource allocation. Resource allocation is difficult to solve, especially in case of complex task and performance computing. To satisfy the performance, mapping the tasks to processor is done, which helps in resource utilization in the process efficiently. The existing Shortest Job First (SJF) algorithm uses the CPU processing time and memory size to perform the shortest job scheduling first. The starvation in SJF exists only if processes with low burst time appears in queue before the processes with the high burst time is executed. Since this algorithm always chooses the process with low burst time, the process with the high burst time will never get the share of CPU. So, in order to avoid starvation, the proposed system combines the SJF and the Multilevel Queue (MQ) Scheduling based on credit.
{"title":"Credit Based Multilevel Queue Scheduling in Cloud Environment","authors":"R. Madhumathi, N. Kalaiyarasi","doi":"10.1109/IC3IOT.2018.8668163","DOIUrl":"https://doi.org/10.1109/IC3IOT.2018.8668163","url":null,"abstract":"Cloud computing is an IT paradigm, a model for enabling access to shared huge configurable resources, which is provisioned with minimal management effort, often over the web. Users access the cloud applications through a browser or a mobile app while the software and data are stored on servers at a remote location. The benefits of using the cloud are storage, security, cost, accessibility, flexibility, maintenance, backup and recovery etc. It also provides easy access to data at any time. Cloud application providers strive to give the better service and performance as if the software programs were installed locally on end-users system. One of major issue in cloud computing is resource allocation. Resource allocation is difficult to solve, especially in case of complex task and performance computing. To satisfy the performance, mapping the tasks to processor is done, which helps in resource utilization in the process efficiently. The existing Shortest Job First (SJF) algorithm uses the CPU processing time and memory size to perform the shortest job scheduling first. The starvation in SJF exists only if processes with low burst time appears in queue before the processes with the high burst time is executed. Since this algorithm always chooses the process with low burst time, the process with the high burst time will never get the share of CPU. So, in order to avoid starvation, the proposed system combines the SJF and the Multilevel Queue (MQ) Scheduling based on credit.","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128711394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}