A Simulation of the Fundamental Attributes of Autonomous Computing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 135 , Downloads: 120 | CTR: 89 % | Weekly Popularity: ⮙7

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 1, January 2014

A Simulation of the Fundamental Attributes of Autonomous Computing

Sugandh Shah, Hatib Zeeshan

Autonomous systems are able to adapt to changing environments (such as changes in the resource availability or component failures) in a way that preserves high level operational goals, such as service level objectives. This paper basically focuses on the fundamental attributes of Autonomous computing that are self-healing, self-configuring, self-optimizing and self-protecting. More specifically, the paper presents the detailed design of an Autonomic Download Manager (ADM) which simulates all the fundamental attributes of Autonomous Computing.

Keywords: Autonomous Computing AC, AC systems, self-healing, self-configuring, self-optimization, self-protection

Edition: Volume 3 Issue 1, January 2014

Pages: 257 - 259

Share this Article

How to Cite this Article?

Sugandh Shah, Hatib Zeeshan, "A Simulation of the Fundamental Attributes of Autonomous Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013775, Volume 3 Issue 1, January 2014, 257 - 259

135 PDF Views | 120 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'AC systems'

Views: 139 , Downloads: 108 | CTR: 78 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1779 - 1783

Malware Detection and Tracer Approach for Operating System

Dokuparthi Prasanthi, V. Rama Krishna

Share this Article

Views: 135 , Downloads: 120 | CTR: 89 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 257 - 259

A Simulation of the Fundamental Attributes of Autonomous Computing

Sugandh Shah, Hatib Zeeshan

Share this Article

Similar Articles with Keyword 'self-healing'

Views: 135 , Downloads: 120 | CTR: 89 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 257 - 259

A Simulation of the Fundamental Attributes of Autonomous Computing

Sugandh Shah, Hatib Zeeshan

Share this Article

Views: 150 , Downloads: 121 | CTR: 81 %

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 374 - 379

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Savithru Lokanath, Aravind Thayur

Share this Article

Similar Articles with Keyword 'self-configuring'

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 155 , Downloads: 103 | CTR: 66 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

Views: 124 , Downloads: 106 | CTR: 85 % | Weekly Popularity: ⮙3

Informative Article, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 74 - 79

Mobile Ad hoc Network

R. Marutha Veni, R. Latha

Share this Article

Views: 142 , Downloads: 108 | CTR: 76 % | Weekly Popularity: ⮙7

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2598 - 2605

Implementation of EAACK Secure Trespass on Detection System for MANETs

S. Krishna Priya, K. V. Srinivasa Rao

Share this Article

Views: 150 , Downloads: 108 | CTR: 72 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1215 - 1218

Performance Analysis and Comparison of Ad Hoc Routing Protocols by the Impact of Node Density

Neha Gandotra, Dr. Rajesh Singh

Share this Article

Similar Articles with Keyword 'self-protection'

Views: 135 , Downloads: 120 | CTR: 89 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 1, January 2014

Pages: 257 - 259

A Simulation of the Fundamental Attributes of Autonomous Computing

Sugandh Shah, Hatib Zeeshan

Share this Article

Views: 172 , Downloads: 139 | CTR: 81 %

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 1313 - 1318

Secure: Self-Protection Approach in Cloud Resource Management

Sangeetha G M, Lavanya S, Prashanth

Share this Article
Top