Published August 30, 2024 | Version CC-BY-NC-ND 4.0
Journal article Open

Dynamic Load Balancing and Service Prioritization Algorithm for Cloud Computing Environments

  • 1. Govind Ballabh Pant University of Agriculture and Technology, Pantnagar (Uttarakhand), India.

Description

Abstract: Bridge infrastructure plays a critical role in ensuring the safe and efficient transportation of goods and people. This research paper investigates the strength characteristics of bridges with a focus on understanding the factors influencing their structural integrity and resilience. The study employs a comprehensive methodology that includes field inspections, laboratory testing, and advanced computational modeling techniques to assess the performance of various bridge types under different loading conditions. Findings reveal the complex interplay between design parameters, material properties, and environmental factors in determining bridge strength and durability. Moreover, the research highlights the importance of proactive maintenance strategies and innovative engineering solutions to enhance the resilience of bridge infrastructure against aging, deterioration, and extreme events. The insights gained from this study have significant implications for bridge design, maintenance practices, and public safety, ultimately contributing to the sustainability and reliability of transportation networks.

Files

H992913080724.pdf

Files (349.9 kB)

Name Size Download all
md5:db933be9599b5fa075ff891bcacd73b9
349.9 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2024-08-15
Manuscript received on 24 June 2024 | Revised Manuscript received on 05 August 2024 | Manuscript Accepted on 15 August 2024 | Manuscript published on 30 August 2024.

References

  • Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing. Future Generation Computer Systems, 28(5), 755-768. https://doi.org/10.1016/j.future.2011.04.017
  • Liu, X., He, K., Li, X., Jiang, Z., & Li, H. (2015). A survey on resource allocation strategies in cloud computing. In 2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA) (pp. 27-34). IEEE.
  • Garg, S. K., Versteeg, S., & Buyya, R. (2013). SMICloud: A framework for comparing and ranking cloud services. Future Generation Computer Systems, 29(4), 1012-1023. https://doi.org/10.1016/j.future.2012.06.006
  • Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications, 1(1), 7-18. https://doi.org/10.1007/s13174-010-0007-6
  • Singh, S., Chana, I., & Garg, S. (2018). An overview of load balancing techniques in cloud computing. In 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (pp. 56-59). IEEE.
  • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing (Special Publication 800-145). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-145
  • Mastroianni, C., Meo, M., & Papuzzo, G. (2015). A survey of techniques for managing and scheduling data-intensive application workflows in the cloud. Journal of Network and Computer Applications, 52, 5-18.
  • Wang, G., Laszewski, G., & Younge, A. (2010). Cloud computing: a perspective study. New Generation Computing, 28(2), 137-146. https://doi.org/10.1007/s00354-008-0081-5
  • Li, X., Li, B., & Wang, W. (2014). A Survey on the Security of Cloud Computing. Journal of Software, 25(1), 142-165.
  • Buyya, R., Broberg, J., & Goscinski, A. M. (2010). Cloud computing: principles and paradigms. John Wiley & Sons. https://doi.org/10.1002/9780470940105
  • Priya, Dr. R. (2020). The Estimation of Risk on Cloud Computing Framework. In International Journal of Innovative Science and Modern Engineering (Vol. 6, Issue 4, pp. 5–10). https://doi.org/10.35940/ijisme.d1188.016420
  • Goyal, Ms. P., & Deora, Dr. S. S. (2022). Reliability of Trust Management Systems in Cloud Computing. In Indian Journal of Cryptography and Network Security (Vol. 2, Issue 1, pp. 1–5). https://doi.org/10.54105/ijcns.c1417.051322
  • Karthiga, S., & Velmurugan, Dr. T. (2020). Enhancing Security in Cloud Computing using Playfair and Ceasar Cipher in Substitution Techniques. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 4, pp. 912–920). https://doi.org/10.35940/ijitee.d1363.029420
  • Radhamani, V., & Dalin, G. (2019). Significance of Artificial Intelligence and Machine Learning Techniques in Smart Cloud Computing: A Review. In International Journal of Soft Computing and Engineering (Vol. 9, Issue 3, pp. 1–7). https://doi.org/10.35940/ijsce.c3265.099319
  • Mishra, J. P., Panda, S. R., Mishra, S. K., & Pati, B. (2019). A Novel Observation on Cloud Computing in Education. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 5262–5274). https://doi.org/10.35940/ijrte.c5910.098319