Work place: PGDAV College, University of Delhi, India
Research Interests: Information Security, Network Security, Cloud Computing
Jitendra Singh born and brought up in Kanpur, India. He has completed his masters in computer science from Madurai Kamaraj University and „C‟ Level (M. Tech) from National Institute of Electronics and Information technology (NIELIT) India. It is followed by PhD (Computer Science) in the area of cloud computing. He has also qualified the prestigious UGC-NET examination conducted by the UGC of India in the year 2006.
He has over 13 years of teaching experience during which he has taught to the students of Bachelor and Master level. He is also engaged with the Stratford University, USA, India Campus, as a part time faculty from over five years. Currently, he is teaching to the students of IMT-CDL, India. During his teaching career, he has taught various subjects that include Data Structure, C++, Java Core, Networking, Routers, Virtual Private Network and firewalls, DBMS, Data analytics with machine learning, etc. He has contributed around 20 articles in leading refereed journals. In addition, he has also written a book titling „Cloud computing for beginner to researcher‟ that can be accessed from Amazon.
He is member of various associations that include Institute of Electronics and Telecommunication Engineers, International Association of Engineers, The Society of Digital Information and Wireless Communications (SDIWC). His research interests include cloud computing, Networking, Network Security, etc.
DOI: https://doi.org/10.5815/ijmecs.2017.03.03, Pub. Date: 8 Mar. 2017
Cloud computing is transforming the way IT is owned and utilized in the present day business scenario. Several predictions by the researchers and analytical enterprises have predicted unprecedented growth for this emerging paradigm. This work is an attempt to analyze the cloud future based on the various reports and predictions published recently. We have explored the various opportunities that will drive the cloud growth. We have also highlighted the effect of cloud in Indian and US market. Significance of the study is validated by conducting the Strength, weakness, opportunity, and Threat (SWOT) analysis. Based on the findings, we have identified the intensity of challenges faced by the various types of cloud deployment model. Correspondingly, we have recommended the critical challenges that need to be addressed first, in order to facilitate the cloud in gaining further momentum.[...] Read more.
DOI: https://doi.org/10.5815/ijeme.2016.02.01, Pub. Date: 8 Mar. 2016
Information technology (IT) is indispensable in the present day business scenario and equally sought by established as well as the new enterprises. Consequently, need is to democratize the IT resources in order to offer enough opportunities to everyone to grow. A new emerging paradigm termed as cloud computing is attempting to democratize the IT procurement and usage. This work has proposed a framework that maps the democratic values offered with the help of cloud computing. Various key features are mapped that are enablers in the proliferation of the democratic values including equal opportunity, share-ability and minimum upfront cost. Finally, this article also highlights the key initiatives by the various governments in order to promote democratic values through the cloud computing.[...] Read more.
DOI: https://doi.org/10.5815/ijieeb.2014.05.06, Pub. Date: 8 Oct. 2014
Performance of a cloud is a critical issue and dependent on various factors that include load balancing used to distribute the load at data center. Proliferation of the cloud paradigm is profoundly dependent on the performance of the cloud. Therefore, to examine the cloud performance, it is significant to identify the factors that govern cloud performance. This work is focused to identify the factors that may have significant impact on the cloud performance. To identify the performance factors, we have reviewed the major publications of the last five years as well as the major real time cloud performance tools offered. Study revealed that response time is the major factor that has the significant impact on cloud computing performance. Finally, we have conducted an experiment to establish the dependency of response time on various load balancing techniques and number of data center. Experiment revealed that the round robin is directly proportional to the number of data center[...] Read more.
DOI: https://doi.org/10.5815/ijcnis.2014.05.03, Pub. Date: 8 Apr. 2014
The purpose of paper is to compute reliability of Digital Tele-Protection System employing Digital Microwave Radio Link. In this paper, the whole Tele-Protection system is divided into six subsystems. The first subsystem is digital relaying equipment. Second subsystem is the tale-protection signaling equipment where the timing to sample line power currents is synchronized. Both relaying and Tele-Protection signaling equipments, are now assemble three-phase current data, sampled at 600 Hz for 50 Hz EHV systems and some control data into a 90 bit frame format at a transmission rate of 54 Kb/s. A frame consists of a frame synchronization field and some information fields including a cycle’s redundancy check field. The third subsystem, Tele-Protection signed multiplexing equipment generates a super frame by multiplexing the seven, 54 Kb/s Tele-Protection signals into a 1.544 Mb/s stage using multi-point sampling technique to minimize the delay time variation and send them to the subsystem four, which is radio equipment, from here the data is transmitted with the help of the channel (subsystem 5) to the repeater station (subsystem 6). The subsystem six is used to remove the noise and to improve the power of the data. In this paper, we have taken standby digital relaying equipment and that can be online through an imperfect switching device. Also parallel redundant Tele-Protection signaling equipment is taken to improve system’s overall performance.[...] Read more.
Subscribe to receive issue release notifications and newsletters from MECS Press journals