318 research outputs found

    A novel method to discover datacenter hardware instantly using software defined grid model

    Get PDF
    Hardware (Servers, Storage, Switches) in Research & Development (R&D) datacenters may be used for ongoing research, development, testing, build, qualification and certification, performance, regression testing, resolving customer issues, and the like. Engineers may move the hardware frequently without involving the IT department to meet project requirements and may shutdown the hardware whenever not in use. Currently, there are no solutions available to locate the hardware when it is powered off. It may be useful to detect datacenter hardware instantly, even if the hardware is shutdown, powered off, or exists in an isolated private network. Further, a reporting module capable of reporting hardware location, serial number, configuration details, and the like may also be useful

    Leaf Classification Based on GLCM Texture and SVM

    Get PDF
    This paper involves classification of leaves using GLCM (Gray Level Co-occurrence matrix) texture and SVM (Support Vector Machines). GLCM is used for extracting texture feature of leaves. Creating a plant database for quick and efficient classification and recognition is an important step for their conservation. This approach would help to extract useful features of leaf and improve the accuracy of leaf classification. The standard leaf images are subjected to pre-processing. Feature values are extracted from pre-processed image and they are trained and classified. Standard data sets are used for enhancing the properties of the image

    Security Enhancement using Color Based Alphanumeric on Cloud

    Get PDF
    Cloud computing is where computing resources are accessed from a virtual machine ?cloud? rather than a local desktop or organizational data center. While enjoying the convenience brought by this cloud, users also start worrying about losing control of their own data. The only solution is authentication. The password is the most common authentication method. Text based, patterns, pictographic and graphical passwords are suffering from some security attacks. This paper uses color code authentication in which the OTP is generated after the two steps of authentication. This color scheme tests with different kinds of security attacks. It is used for secure authentication for data protection in the cloud

    A New Computing Envornment Using Hybrid Cloud

    Get PDF
    Cloud computing is commonly used for the delivery of software, infrastructure and storage services over the internet. The delivery of services can be done in the private cloud or public cloud. Private cloud resources will be within our data center and it is a secure environment where only specified client can operate. Public cloud resources are provided in a virtualized environment, which provides a pool of shared resources. Hybrid cloud is integration of private, public and in some cases community cloud to perform unique functions within the same organization. Small and medium scale organizations cannot effort to setup IT infrastructure so hybrid cloud is the solution for them. This paper deals with the hybrid cloud computing and architecture of the hybrid cloud computing, advantages, disadvantages and differences of hybrid cloud computing. This paper also tells about the challenges of the hybrid cloud computing
    • …
    corecore