2 research outputs found

    A study of packet scheduling algorithms in long term evolution-advanced

    Get PDF
    The allocation of radio resources is one of the most critical functions performed by the Radio Resource Management (RRM) mechanisms in the downlink Long Term Evolution-Advanced (LTE-Advanced). Packet scheduling concerns itself with allocation of these radio resources in an intelligent manner such that system throughput/capacity can be maximized whilst the required multimedia Quality of Service (QoS) is met. Majority of the previous studies of packet scheduling algorithms for LTE-Advanced did not take the effect of channel impairments into account. However, in real world the channel impairments cannot be obliterated completely and have a direct impact on the packet scheduling performance. As such, this work studies the impact of channel impairments on packet scheduling performance in a practical downlink LTE-Advanced. The simulation results obtained demonstrate the efficacy of RM2 scheduling algorithm over other scheduling algorithms in maximizing the system capacity and is more robust on the effect of the cellular channel impairments

    Critical security challenges in cloud computing environment: An appraisal

    No full text
    This paper mainly contributes a comprehensive survey on the climacteric security challenges imposed by cloud computing. The paper highlights the challenges/loopholes existing in cloud environment despite all the efforts adopted by organizations, and offers the recommendations for cloud providers as well as users. In this paper, more than 20 research papers pertaining to cloud security, in the span of past 5 years, have been studied and analyzed and twelve most important security threats to organizations have been identified that need attention by research community for encouraging their cloud adoption. This review concludes that some measures have to be adopted for accomplishing complete security in all aspects in the cloud environment. Unlike previous approaches, this effort is directed towards providing a thorough and inclusive review of the security vulnerabilities in cloud. Furthermore, this paper tries to suggest means how cloud federations can enhance security while mitigating risk and building customer trust at the same time
    corecore