2 research outputs found
A study of packet scheduling algorithms in long term evolution-advanced
The allocation of radio resources is one of the most critical functions
performed by the Radio Resource Management (RRM) mechanisms in the
downlink Long Term Evolution-Advanced (LTE-Advanced). Packet
scheduling concerns itself with allocation of these radio resources in an
intelligent manner such that system throughput/capacity can be maximized
whilst the required multimedia Quality of Service (QoS) is met. Majority of
the previous studies of packet scheduling algorithms for LTE-Advanced did
not take the effect of channel impairments into account. However, in real world
the channel impairments cannot be obliterated completely and have a direct
impact on the packet scheduling performance. As such, this work studies the
impact of channel impairments on packet scheduling performance in a
practical downlink LTE-Advanced. The simulation results obtained
demonstrate the efficacy of RM2 scheduling algorithm over other scheduling
algorithms in maximizing the system capacity and is more robust on the effect
of the cellular channel impairments
Critical security challenges in cloud computing environment: An appraisal
This paper mainly contributes a comprehensive survey on the climacteric security challenges imposed by
cloud computing. The paper highlights the challenges/loopholes existing in cloud environment despite all
the efforts adopted by organizations, and offers the recommendations for cloud providers as well as users.
In this paper, more than 20 research papers pertaining to cloud security, in the span of past 5 years, have
been studied and analyzed and twelve most important security threats to organizations have been identified
that need attention by research community for encouraging their cloud adoption. This review concludes that
some measures have to be adopted for accomplishing complete security in all aspects in the cloud
environment. Unlike previous approaches, this effort is directed towards providing a thorough and inclusive
review of the security vulnerabilities in cloud. Furthermore, this paper tries to suggest means how cloud
federations can enhance security while mitigating risk and building customer trust at the same time