Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824886
V. Narmadha, J. U. AJAY KRISHNAN, R. P. Kumar, R. Kumar
The purpose of our paper is to make the virtual assistant respond to the requests of the user which are by means of thoughts. The user thinks of the task and the personal assistant gets to process the request without any text or audio based inputs from the user. The thoughts of the user is fed to the virtual assistant by means of brain computer interface(BCI) with the help of devices like Electroencephalogram. This device helps in converting the thoughts of the user to signal which are then converted into text. The emotional classifierused in the system helps to understand the state of the user and help the virtual assistant to respond accordingly. The response of the virtual assistant is processed to the user in a much technological way via the Bone conduction technology which helps in perceiving for the people with auditory problems.
{"title":"Telepathic Virtual Assistant","authors":"V. Narmadha, J. U. AJAY KRISHNAN, R. P. Kumar, R. Kumar","doi":"10.1109/ICCCT2.2019.8824886","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824886","url":null,"abstract":"The purpose of our paper is to make the virtual assistant respond to the requests of the user which are by means of thoughts. The user thinks of the task and the personal assistant gets to process the request without any text or audio based inputs from the user. The thoughts of the user is fed to the virtual assistant by means of brain computer interface(BCI) with the help of devices like Electroencephalogram. This device helps in converting the thoughts of the user to signal which are then converted into text. The emotional classifierused in the system helps to understand the state of the user and help the virtual assistant to respond accordingly. The response of the virtual assistant is processed to the user in a much technological way via the Bone conduction technology which helps in perceiving for the people with auditory problems.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824973
M. Naik, P. Samundiswary
A Wireless Body Area Network (WBAN) is used to collect biological signals from human body with the help of medical equipment and sensors that are connected wirelessly and they are placed outside or inside the body for different no-nmedical and medical applications. The standard developed for WBAN is IEEE 802.15.6. The rapid enhancement of Body Sensor Networks (BSNs) provides continuous health monitoring to control patient’s life as they play important role for saving life of patient’s by utilizing several variety of sensors that are used in the health care applications. These sensors monitor continuously different biological functions such as blood pressure, temperature, Electrocardiogram(ECG), heart rate, Electroencephalogram (EEG) etc. The data which is collected are transmitted the information at regular intervals to a central hub. The patient’s health monitor in real-time is the primary goal as it helps to design and support several non-medical applications such as detection of gesture for interactive games, cognitive, movement and recognition of emotions during drive assistance etc. However, WBAN application concept is still a exigent post to be considered for several technical demands like energy efficiency, lifetime of network, security, criticality of data, network throughput and prioritization. Hence, most of the WBANs utilizes wireless channel for process of communication in which these typical sensors with single transceiver device transmits the information with low power by utilizing a single /multi-channel by game theoretic approach in WBAN. In this paper, an attempt has been made to explain different types of game theoretic approaches used in WBAN.
无线身体区域网络(Wireless Body Area Network, WBAN)是一种利用无线连接的医疗设备和传感器收集人体生物信号的技术,这些设备和传感器被放置在身体外部或内部,用于不同的非医疗和医疗应用。WBAN的标准是IEEE 802.15.6。身体传感器网络(BSNs)的快速发展提供了持续的健康监测来控制患者的生命,因为它们在医疗保健应用中使用的各种传感器对挽救患者的生命起着重要的作用。这些传感器连续监测不同的生物功能,如血压、体温、心电图、心率、脑电图等。收集到的数据每隔一段时间将信息传送到一个中央集线器。病人的实时健康监测是主要目标,因为它有助于设计和支持一些非医疗应用,如交互式游戏的手势检测,驾驶辅助过程中的认知,运动和情绪识别等。然而,由于能效、网络寿命、安全性、数据的关键性、网络吞吐量和优先级等方面的技术要求,无线宽带网络的应用概念仍然是一个亟待考虑的问题。因此,大多数WBAN采用无线信道进行通信过程,其中典型的传感器采用单收发器,利用WBAN中的博弈论方法以低功耗利用单/多信道传输信息。本文试图解释WBAN中使用的不同类型的博弈论方法。
{"title":"Survey on Game Theory Approach in Wireless Body Area Network","authors":"M. Naik, P. Samundiswary","doi":"10.1109/ICCCT2.2019.8824973","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824973","url":null,"abstract":"A Wireless Body Area Network (WBAN) is used to collect biological signals from human body with the help of medical equipment and sensors that are connected wirelessly and they are placed outside or inside the body for different no-nmedical and medical applications. The standard developed for WBAN is IEEE 802.15.6. The rapid enhancement of Body Sensor Networks (BSNs) provides continuous health monitoring to control patient’s life as they play important role for saving life of patient’s by utilizing several variety of sensors that are used in the health care applications. These sensors monitor continuously different biological functions such as blood pressure, temperature, Electrocardiogram(ECG), heart rate, Electroencephalogram (EEG) etc. The data which is collected are transmitted the information at regular intervals to a central hub. The patient’s health monitor in real-time is the primary goal as it helps to design and support several non-medical applications such as detection of gesture for interactive games, cognitive, movement and recognition of emotions during drive assistance etc. However, WBAN application concept is still a exigent post to be considered for several technical demands like energy efficiency, lifetime of network, security, criticality of data, network throughput and prioritization. Hence, most of the WBANs utilizes wireless channel for process of communication in which these typical sensors with single transceiver device transmits the information with low power by utilizing a single /multi-channel by game theoretic approach in WBAN. In this paper, an attempt has been made to explain different types of game theoretic approaches used in WBAN.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134212946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824943
Nimrita Koul, S. Manvi
In the treatment of cancers, the efficacy depends on the correct diagnosis of the nature of tumor as early as possible. Micro-array Gene expression data which contains the expression profiles of entire genome provides a source which can be analyzed to identify bio-markers of cancers. Micro-array data has a large number of features and very few number of samples. To make effective use of this data, it is very beneficial to select a reduced number of genes which can be used for tasks like classification. In this paper, we propose a two level scheme for feature selection and classification of cancers. First, the genes are ranked using Recursive Feature Elimination which uses Random Forest Classifier for evaluation of fitness of genes with five fold cross-validation , later these genes are used to pre-train an Unsupervised Deep Belief Network Classifier to classify the samples based on the selected genes. We compared the results in terms of cross validation matrix parameters viz. classification accuracy, precision and recall, obtained from our approach with the results obtained by using some standard feature selector-classifier combinations viz. Mutual Information with Support Vector Machines, Kernel Principal Component Analysis with Support Vector Machine, Support Vector Machine -Recursive Feature Elimination and Mutual Information with Random Forest Classifier. The results show that our scheme performs at par with standard methods used for feature selection from gene expression data.
{"title":"A Scheme for Feature Selection from Gene Expression Data using Recursive Feature Elimination with Cross Validation and Unsupervised Deep Belief Network Classifier","authors":"Nimrita Koul, S. Manvi","doi":"10.1109/ICCCT2.2019.8824943","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824943","url":null,"abstract":"In the treatment of cancers, the efficacy depends on the correct diagnosis of the nature of tumor as early as possible. Micro-array Gene expression data which contains the expression profiles of entire genome provides a source which can be analyzed to identify bio-markers of cancers. Micro-array data has a large number of features and very few number of samples. To make effective use of this data, it is very beneficial to select a reduced number of genes which can be used for tasks like classification. In this paper, we propose a two level scheme for feature selection and classification of cancers. First, the genes are ranked using Recursive Feature Elimination which uses Random Forest Classifier for evaluation of fitness of genes with five fold cross-validation , later these genes are used to pre-train an Unsupervised Deep Belief Network Classifier to classify the samples based on the selected genes. We compared the results in terms of cross validation matrix parameters viz. classification accuracy, precision and recall, obtained from our approach with the results obtained by using some standard feature selector-classifier combinations viz. Mutual Information with Support Vector Machines, Kernel Principal Component Analysis with Support Vector Machine, Support Vector Machine -Recursive Feature Elimination and Mutual Information with Random Forest Classifier. The results show that our scheme performs at par with standard methods used for feature selection from gene expression data.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133399607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824796
M. Yogesh, M. Balamurugan, S. Varun, M. Ananthi
A NEUROSCIENCE –informed mobile app intervention to treat schizophrenia by analyzing the data from sensors in headwear which is transferred via Bluetooth to the mobile. At the root of all our thoughts, emotions and behavior is the communication between neurons within our brains. Brain waves are detected using sensors (EEG electrode) placed on the scalp. They are divided into bandwidth to describe their functions. The EEG raw data are read through brain sense headwear and the data are transferred to mobile via Bluetooth (HC-06). And it automatically plays a depression control music (meditation music), notify the patient’s friends or relatives. Give some warning messages to user (patient). It is quite probable that in the future most of our appliances will be controlled directly through our wishes or the brain and this project stand as an affirmation to that vision. Our application analysis the present psychological state of the person in delusions or hallucinations which are the symptoms of schizophrenia and request them with some suggestions to follow. Signals from the brain can be further studied and the technology can be refined to bring about more specific results.
{"title":"MAITEMB (Mobile Application Intervention to Enhance Motivated Behavior)","authors":"M. Yogesh, M. Balamurugan, S. Varun, M. Ananthi","doi":"10.1109/ICCCT2.2019.8824796","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824796","url":null,"abstract":"A NEUROSCIENCE –informed mobile app intervention to treat schizophrenia by analyzing the data from sensors in headwear which is transferred via Bluetooth to the mobile. At the root of all our thoughts, emotions and behavior is the communication between neurons within our brains. Brain waves are detected using sensors (EEG electrode) placed on the scalp. They are divided into bandwidth to describe their functions. The EEG raw data are read through brain sense headwear and the data are transferred to mobile via Bluetooth (HC-06). And it automatically plays a depression control music (meditation music), notify the patient’s friends or relatives. Give some warning messages to user (patient). It is quite probable that in the future most of our appliances will be controlled directly through our wishes or the brain and this project stand as an affirmation to that vision. Our application analysis the present psychological state of the person in delusions or hallucinations which are the symptoms of schizophrenia and request them with some suggestions to follow. Signals from the brain can be further studied and the technology can be refined to bring about more specific results.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134072606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824891
S. Pavithra, S. Ramya, S. Prathibha
The need for cloud computing is gradually increasing day by day. The cloud computing security is the major difficulty. Since the data in the cloud has to be transferred through internet, the security of data becomes a major concern. The key mechanisms for data protections like integrity, accountability, privacy, access control, authentication, authorization must be maintained. Blockchain is a technology which makes cloud computing better. Blockchain overcomes the security issues in cloud computing. This survey aims at analyzing and comparing various issues in the cloud environment and security issues using blockchain.
{"title":"A Survey On Cloud Security Issues And Blockchain","authors":"S. Pavithra, S. Ramya, S. Prathibha","doi":"10.1109/ICCCT2.2019.8824891","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824891","url":null,"abstract":"The need for cloud computing is gradually increasing day by day. The cloud computing security is the major difficulty. Since the data in the cloud has to be transferred through internet, the security of data becomes a major concern. The key mechanisms for data protections like integrity, accountability, privacy, access control, authentication, authorization must be maintained. Blockchain is a technology which makes cloud computing better. Blockchain overcomes the security issues in cloud computing. This survey aims at analyzing and comparing various issues in the cloud environment and security issues using blockchain.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824878
B. Kamala
Process mining is a new emerging research trend over the last decade which focuses on analyzing the processes using event log and data. The raising integration of information systems for the operation of business processes provides the basis for innovative data analysis approaches. Process mining has the strong relationship between with data mining so that it enables the bond between business intelligence approach and business process management. It focuses on end-to-end processes and is possible because of the growing availability of event data and new process discovery and conformance checking techniques. Process mining aims to discover, monitor and improve real processes by extracting knowledge from event logs readily available in today’s information systems. The discovered process models can be used for a variety of analysis purposes. Many companies have adopted Process-aware Information Systems for supporting their business processes in some form. These systems typically have their log events related to the actual business process executions. Proper analysis of Process Aware Information Systems execution logs can yield important knowledge and help organizations improve the quality of their services. This paper reviews and compares various process mining algorithms based on their input parameters, the techniques used and the output generated by them.
{"title":"BAGH – Comparative Study","authors":"B. Kamala","doi":"10.1109/ICCCT2.2019.8824878","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824878","url":null,"abstract":"Process mining is a new emerging research trend over the last decade which focuses on analyzing the processes using event log and data. The raising integration of information systems for the operation of business processes provides the basis for innovative data analysis approaches. Process mining has the strong relationship between with data mining so that it enables the bond between business intelligence approach and business process management. It focuses on end-to-end processes and is possible because of the growing availability of event data and new process discovery and conformance checking techniques. Process mining aims to discover, monitor and improve real processes by extracting knowledge from event logs readily available in today’s information systems. The discovered process models can be used for a variety of analysis purposes. Many companies have adopted Process-aware Information Systems for supporting their business processes in some form. These systems typically have their log events related to the actual business process executions. Proper analysis of Process Aware Information Systems execution logs can yield important knowledge and help organizations improve the quality of their services. This paper reviews and compares various process mining algorithms based on their input parameters, the techniques used and the output generated by them.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824828
S. Ramamoorthy, B. Baranidharan
Data security and Storage Management becomes the most promising task for any IT operation in the future. The business and service provider’s mange to finds the technology like cloud computing for pooled computing resources. The enormous amounts of research works are initiated in parallel to protect data on the cloud environment. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Cloud computing model used as a primary technology in many IT business operations across the millions of users. To ensure the data security and modification over the data stored on the cloud considered as a major issue among the community cloud users. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. The Hybrid approach to combine the BlockChain(BC) Technology with cloud computing to ensure the data security among the community cloud users. is Hybrid approach will restrict the malicious data access and modification on the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.
{"title":"CloudBC-A Secure Cloud Data acess Management system","authors":"S. Ramamoorthy, B. Baranidharan","doi":"10.1109/ICCCT2.2019.8824828","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824828","url":null,"abstract":"Data security and Storage Management becomes the most promising task for any IT operation in the future. The business and service provider’s mange to finds the technology like cloud computing for pooled computing resources. The enormous amounts of research works are initiated in parallel to protect data on the cloud environment. This leads to the strong evidence of unanswered questions related to the data security over the cloud data centres. The Cloud computing model used as a primary technology in many IT business operations across the millions of users. To ensure the data security and modification over the data stored on the cloud considered as a major issue among the community cloud users. The Proposed research work aims to protect the cloud data by implementing the new approach using blockchain technology. The Hybrid approach to combine the BlockChain(BC) Technology with cloud computing to ensure the data security among the community cloud users. is Hybrid approach will restrict the malicious data access and modification on the cloud servers. The secure hash blocks are generated and maintained by the cloud storage devices enhance the data security on the cloud. The block chains allow the user to trace back the malicious data access and modifications.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824817
B. Renuka Devi, V. Srimathi, R. Suvethi, M. Akshaya
“The motive of “Tour Budget Analysis” application is to build easy travel assistant planning for the people who are new to the place and don’t know how to plan their tour. We are using greedy algorithm to calculate the shortest path between the two points i.e from the source to destination. Budget analysis plays the major role in this application, before analysing the budget it intakes the requirements from the users using filter. This application will be very useful for the people who would like to travel alone, especially for women as we have checkpoints indicator which indicates each and every checkpoint from their source to destination to their family members. In addition to it we have “Save Our Souls emergency” module which provides the state emergency numbers of the current location such as police, fire, ambulance and women safety numbers. This application also helps us to find the nearby restaurants, hotels, ATMs, banks etc...
{"title":"Jaunt India With Pre-Planned Budget","authors":"B. Renuka Devi, V. Srimathi, R. Suvethi, M. Akshaya","doi":"10.1109/ICCCT2.2019.8824817","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824817","url":null,"abstract":"“The motive of “Tour Budget Analysis” application is to build easy travel assistant planning for the people who are new to the place and don’t know how to plan their tour. We are using greedy algorithm to calculate the shortest path between the two points i.e from the source to destination. Budget analysis plays the major role in this application, before analysing the budget it intakes the requirements from the users using filter. This application will be very useful for the people who would like to travel alone, especially for women as we have checkpoints indicator which indicates each and every checkpoint from their source to destination to their family members. In addition to it we have “Save Our Souls emergency” module which provides the state emergency numbers of the current location such as police, fire, ambulance and women safety numbers. This application also helps us to find the nearby restaurants, hotels, ATMs, banks etc...","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127837079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ICCCT2.2019.8824950
B. Priya, T. Gnanasekaran
Cloud computing can be termed as provisioning of computing power, storage, Infrastructure and other resources over the internet as an on-demand pay service. Recent developments in the technological advancement are in the cloud storage, security, fault tolerances, load balancing and optimization. Cloud simulator is a tool that assists in modelling different cloud applications. Cloudism offers a simulation framework for modelling and simulation that emphasis more on exploring design issues without factoring cloud infrastructure and services. Load balancing in cloud is a method of allocation of workload across multiple nodes to obtain resource optimization with minimum response time. In this paper the state of the art of the cloud simulations along with an approach implemented using CloudSim3.0 is illustrated.
{"title":"Optimization of Cloud Data Center using CloudSim – A methodology","authors":"B. Priya, T. Gnanasekaran","doi":"10.1109/ICCCT2.2019.8824950","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824950","url":null,"abstract":"Cloud computing can be termed as provisioning of computing power, storage, Infrastructure and other resources over the internet as an on-demand pay service. Recent developments in the technological advancement are in the cloud storage, security, fault tolerances, load balancing and optimization. Cloud simulator is a tool that assists in modelling different cloud applications. Cloudism offers a simulation framework for modelling and simulation that emphasis more on exploring design issues without factoring cloud infrastructure and services. Load balancing in cloud is a method of allocation of workload across multiple nodes to obtain resource optimization with minimum response time. In this paper the state of the art of the cloud simulations along with an approach implemented using CloudSim3.0 is illustrated.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129580591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}