SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1433
A RESEARCH ON ELOQUENT SALVATION AND PRODUCTIVE
OUTSOURCING OF MASSIVE DATA
PA. Dhakshayeni1, P. Parameshwari2, R. Patchaiyammal3
1
Assistant Professor, Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu
2,3B.TECH., Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract:-
Big statistics is predicted to deliver a great impact within the coming years. Towards this purpose, a critical underlying
task is to resolve a series of large-scale fundamental problems. The end aim is to help businesses make better, more
informed decisions, permitting them to faucet into a variety of advantages. The applications and practices which make
sense and use of all this information, growing a new era of clever farming for the world to behold. Conducting such big-
scale facts analytics in a timely manner calls for a big range of computing resources, which might not be available for
individuals and small companies in practice. By outsourcing their computations, we can solve such troubles in a cost-
powerful way. We gift an efficient, secure outsourcing scheme for convex separable programming troubles. In particular,
we first develop green matrix and vector transformation schemes excellent based totally on mathematics operations
which may be computationally indistinguishable each in price and inside the structure below a chosen-plain textual
content attack (CPA). Then, we layout a constant outsourcing scheme where in the client and the cloud collaboratively
remedy the converted problems.The purchaser can correctly affirm the correctness of returned outcomes to prevent any
malicious conduct of the cloud. Technical correctness and privacy evaluation together show that the proposed scheme
obtains optimal results and that the cloud cannot analyze private records from the customer’s hid statistics.
Index Terms — Convex separable programming, cloud computing, information safety and privacy, massive facts
1 INTRODUCTION:
The amount of knowledge in our world has grown tremendously and double every two years, increasing from 4.4
zetabytes (million terabytes) in 2013 to 44 zetabytes by 2020. The large-scale data sets, referred to as big data, became a
key basis of innovation and intelligence. they carry new oppor-tunities to several areas like research project, business
innovations, human well-being, etc. for instance, biomed-ical researchers develop personalized medicine programs to
significantly improve patient care by finding patterns in large-scale genomic databases; e-commerce companies, like
Amazon and eBay, provide accurate merchandise recommendations for patrons by analyzing billions of transactions;
power grid engineers perform real-time analysis and operations supported the huge amount of knowledge collected from
smart meters .
A critical underlying task of the aforementioned appli-cations is to unravel a series of large-scale fundamental prob- lems.
We note that convex separable programming (CSP) is one among them that's involved in various real-world applica- tions,
including industrial control systems, time-dependent cost optimization, resource allocation, etc. for instance, within the
industry of water resource planning, sources that emits pollutants are required to get rid of waste from water system
The decision makings are often formulated as CSPs where the pounds of biological oxygen demands are variables and
therefore the objective is to minimize total costs to the region while meeting specified pollution standards [8]. Another
example is sensible grid operations. Particularly, the target function are often maximizing the revenue of an enormous
company with regards to monthly energy consumptions at different sub-companies, while the entire energy cost in
monthly is upper-bounded. Obviously, these problems are often formulated as a CSP also. additionally, it's a useful math-
ematical tool as we will convert general nonlinear program-ming problems into CSP problems . as an example , with the
assistance of feedforward neural networks, general non-separable functions are often approximated as convex separable
func-tions and therefore the original problems are often transformed into CSP problems. Therefore, solutions to CSPs are
very useful to several complex scientific and engineering problems.
However, solving CSPs is difficult, and becomes tougher in big data. Specifically, large-scale CSPs are often too
computationally complex to be solved by resource- limited users thanks to their limited computing capability and random
access memory (RAM). to deal with this issue, many big companies and governments need to build supercom-puter
centers to conduct such heavy computation tasks. However, the expenditure is just too high for people or small companies
to afford. As a result, it's in dire got to find effective approaches to research large-scale data sets during a more efficient
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1434
and economical way. Recently, researchers have suggested that cloud computing, which is character- ized by robust
computation power and pay-per-use manner.
2. LIMITATION OF EXISTING SYSTEM:
• Storing a huge number of knowledge within the cloud may pose severe challenges of data theft and data manipulation
since all the info is usually online, and this results in a big problem as its data might be altered for the harmful causes.
• To account for these challenges, there are a bunch of works studying privacy issues in cloud computing. However, the
present literature overlooks secure outsourcing schemes for large-scale CSPs. it's indeed challenging and different from
before since clients only allow only a few local computing and storage resources, which significantly limits the amount of
computations which will be operated by themselves to preserve the privacy of the info.
3. SCOPE OF THE PROJECT:
Researchers have estimated that by 2050, the world’s population will reach 10 billion. This clearly means food
consumption are going to be double to satisfy the necessity for such a big number of populations. Almost 40% of the
earth’s surface is already in use for agriculture, and surprisingly an incredible amount of production goes within the waste
throughout the method. Big Data provides a hand for each problem and complexities in agriculture. It plays an important
role in establishing a complicated and smart agricultural system. Farmers round the world may often get confused in
deciding regarding the sort of crop to be harvested. With the assistance of massive Data analytics, predictions are drawn
from the previous year’s climate, the nutrients of the soil, rainfall, etc. These wise decisions with Big Data help to yield
maximum production and help to grow the economic sector for the assembly of food.
4. PROPOSED SYSTEM :
We suggest an efficient, secure outsourcing set of rules for solving large-scale CSPs. Individually, we do not forget a CSP
wherein the objective feature and constraints are composed of convex features. Firstly, we broaden an efficient
transformation scheme to preserve the privacy of vectors and matrices. We show that the secure transformation of vector
and matrices is computationally indistinguishable each in cost and structure below a chosen-plaintext attack (CPA). Then,
we make use of the traits of CSPs and linearize the convex features within the CSP problem with arbitrary accuracy, which
results in solving a chain of secure large-scale linear programming (LP) problems in the cloud. Next, we securely outsource
the LP troubles to the cloud for solutions. To make certain the returned results’ integrity, we adopt a light-weight scheme
to verify the correctness of the final results effectively.
5. SYSTEM DESIGN :
The proposed architectural model of this project is as shown in the figure 1.
figure 1
The proposed model of this project is as shown in the figure 1 which consists of four main phases as follows,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1435
5.1 Data Upload:
The user will register the information and upload land details. All facts and data are saved in cloud. Personal important
points are all saved underneath every consumer data for convenient reference. Highly configurable get admission to level
and security settings give peace of idea that consumer records is saved secure, while staying available to licensed users.
5.2 Convex Separable Programming:
Separable programming is an algorithm that allows a convex nonlinear software to be approximated with arbitrary
accuracy with a linear programming model. two The concept is to exchange every nonlinear feature with a piecewise
linear approximation. Global solutions can then be received with any wide variety of environment friendly LP codes. For
non-convex problems, the approach is nevertheless valid, however extra work needs to be done. Either a mixed-integer
linear programming trouble should be solved or a modified version of the simplex algorithm with a restricted groundwork
entry rule can be applied to the mannequin directly. The candidates for the getting into variable should be restricted to
hold the validity of the LP approximation. In this case, a local optimum is obtained, but it is possible to discover the world
most advantageous with the assist of department and bound. A nonlinear programming trouble in which the objective
characteristic and constraints can be expressed as a linear combination of several one of a kind one-variable functions, of
which some or all are nonlinear, is referred to as a separable programming problem. When objective feature and
constraints are separable in a Non-Linear Programming Problem, such a trouble is acknowledged as separable
programming. Separable programming, which has the problem of minimizing a Convex objective characteristic (or
maximizing a concave goal function) in a convex set of points, is called separable convex programming.
5.3 Securing the Information:
Security is consists of a group of policies, controls, procedures and technologies that job along to safeguard cloud-based
systems, knowledge and infrastructure.
These security measures ar designed to safeguard knowledge, support regulative compliance and shield customers'
privacy similarly as setting authentication rules for individual users and devices.
From authenticating access to filtering traffic, cloud security is designed to the precise desires of the business.
And since these rules is designed and managed in one place, administration overheads ar reduced and IT groups sceptered
to target different areas of the business.
The means cloud security is delivered can rely on the individual cloud supplier or the cloud security solutions in situ.
However, implementation of cloud security processes ought to be a joint responsibility between the business owner and
resolution supplier.
5.4 Data Retrieve:
The operations on the information retrieving are performed best by way of the idea of key, that is delegated to unswerving
authority. A key is simplest handy with the aid of an administrator for the authorized users. The key era to get entry to the
records by way of an entity inside an company is to be maintained by means of the administrator level.
5.5 Analyze:
The admin view the user uploads and analyze about the land resources like sand, water resources and also analyze which
is best to make the harvest of farms by the given land. After that admin will provide all resources to farmer for develop
farming.
6. ALGORITHM OR METHODOLOGY:
Separable programming is vital because it allows a convex nonlinear program to be approximated with arbitrary accuracy
with a applied mathematics model. The thought is to exchange each nonlinear function with a piecewise linear
approximation. Global solutions can then be obtained with any number efficient LP code. For nonconvex problems, the
approach remains valid but more work must be done. Either a mixed-integer applied mathematics problem must be solved
as discussed in Section 8.8, or a modified version of the simplex algorithm with a limited basis entry rule are often applied
to the model directly. The candidates for the entering variable must be restricted to take care of the validity of the LP
approximation. during this case an area optimum is obtained but it's possible to seek out the worldwide optimum with the
assistance of branch and bound. Problem Statement Consider again the overall nonlinear programming problem
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1436
Minimize{f(x) : gi (x) £ bi , i = 1, . . . , m} with two additional provisions: (i) the target function and every one constraints are
separable, and (ii) each decision variable x j is bounded below by 0 and above by an known constant uj , j = 1, . . . , n. Recall
that a function, f(x), is separable if it are often expressed because the sum of functions of the individual decision variables.
f(x) = å j=1 n f j (x j ) The separable nonlinear programming problem has the subsequent structure. Minimize å j=1 n f j (x j
) subject to å j=1 n gij(x j ) £ bi , i = 1, . . . , m 0 £ x j £ uj , j =1, . . . , n The key advantage of this formulation is that the non
linearities are mathematically independent.This property in conjunction with the finite Separable Programming 2 bounds
on the selection variables permits the event of a piecewise linear approximation for each function within the matter .
Linearization Consider the overall nonlinear function f(x) depicted in Fig. 5. to make a piecewise linear approximation
using, say, r line segments, we must first select r+1 values of the scalar x within its range 0 £ x £ u and let f k = f( - x k ) for k
= 0, 1 , . . . , r. At the boundaries we've - x 0 = 0 and - x r = u. Notice that the values of - x k don't need to be evenly spaced. x
f(x) x = 0 x x x - x - - - - x = u - 0 1 2 3 4 5 Piecewise linear approximation Figure 5. Piecewise linear approximation of a
nonlinear function Recall that any value of x lying between the 2 endpoints of the kth line segment could also be expressed
as x = a - x k+1 + (1 – a) - x k or x – - x k = a( - k+1 – - x k ) for 0 £ a £ 1. where - x k (k = 0 , 1 , . . . , r) are data and a is that the
decision variable. This relationship leads on to an expression for the kth line segment. ^ f(x) = f k + f k+1 – f k - x k+1 – - x k
(x – - x k ) = af k+1 – (1 – a)f k for 0 £ a £ 1 Separable Programming 3 The approximation ^ f(x) becomes increasingly more
accurate as r gets larger. Unfortunately, there's a corresponding growth within the size of the resultant problem.For the
kth segment, let a= ak+1 and (1 – a) = ak . As for - x k £ x £ - x k+1, the above expresses is x = ak+1 - x k+1 + ak - x k and ^
f(x) = ak+1f k+1 + ak f k where ak + ak+1 = 1 and ak ³ 0, ak+1 ³ 0. Generalizing this procedure to hide the whole range over
which x is defined gives x = å k=0 r ak - x k , ^ f(x) = å k=0 r ak f k , å k=0 r ak = 1, ak ³ 0, k = 0, . . . , r such a minimum of one
and no quite two ak are often greater than zero. Further, we require that if two ak are greater than zero, their indices must
differ by exactly 1. In other words, if as is bigger than zero then just one of either as+1 or as-1 are often greater than zero.
If the last condition, referred to as the adjacency criterion, isn't satisfied, the approximation to f(x) won't lie on ^ f(x). to
use the above transformations, a grid of r j + 1 points must be defined for every variable x j over its range. this needs the
utilization of a further index for every variable and performance . For the jth variable, for instance , f j + 1 data points
result: - x 1j , - x 2 , . . . , - x r j j .
This requires the use of an extra index for each variable and performance . For the jth variable, as an example , f j + 1 data
points result: - x 1j , - x 2 , . . . , - x r j j . With this notation in mind, the separable programming problem in x becomes the
next "almost" linear program in . Minimize f( ) = å j=1 n å k=0 r j akjf kj( - x kj) subject to gi ( ) =å j=1 n å k=0 r j akjgkij£ bi ,
i = 1, . . . , m å k=0 r j akj = 1 Separable Programming 4 akj ³ 0, k = 0, . . . , r j , j =1, . . . , n.
the rationale that this is often often an "almost" applied math problem is that the adjacency criterion must be imposed on
the new decision variables akj when any of the functions are nonconvex. this could also be accomplished with a restricted
basis entry rule. When all the functions are convex, the adjacency criterion will automatically be satisfied so no
modifications. Note that the approximate problem has m + n constraints and Sj r j + n variables.
7. CONCLUSION :
The promise of massive Data in future is alluring, but the challenges above need to be addressed for increased uptake of
massive Data applications. Although there are indeed technical issues to be resolved, we recommend focusing first on the
governance issues that were identified and style suitable business models because these are currently the foremost
inhibiting factors. Big Data is changing the scope and organization of farming through a pull-push mechanism. Global
issues like food security and safety, sustainability, and, as a result, efficiency improvement is tried to be addressed by Big
Data applications. These issues make that the scope of massive Data applications extends far beyond farming alone, but
covers the whole supply chain. In future enhancements, the outsourcing of CSPs also can be avoided the client's
involvement within the process, making it more convenient for them to handle. It also can be developed safer than before
by implementing complex encryption algorithms within the system. Implementing a classy encryption algorithm improves
the safety of the system and protects the vast amount of sensitive data from unauthorized access.
8. REFERENCES:
[1] W. Liao, W. Du, S. Salinas, and P. Li, “Efficient privacy-preserving outsourcing of large-scale convex separable
programming for smart cities,” in IEEE 14th International Conference on Smart City. IEEE, Dec. 2016.
[2] W. Liao, M. Li, S. Salinas, P. Li, and M. Pan, “Energy-sourceaware cost optimization for green cellular networks with
strong stability,” IEEE Trans. on Emerging Topics in Computing, vol. 4, no. 4, pp. 541–555, 2016.
[3] I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan, “The rise of “big data” on cloud computing:
Review and open research issues,” Information Systems, vol. 47, pp. 98–115, Jan. 2015.
[4] E. Bender, “Big data in biomedicine,” Nature, vol. 527, no. 7576, pp. S1–S1, Apr. 2015.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1437
[5]V. Turner, J. F. Gantz, D. Reinsel, and S. Minton, “The digital universe of opportunities: rich data and the increasing value
of the internet of things,” IDC Analyze the Future, Apr. 2014.
[6] S. M. Stefanov, Separable programming: theory and methods. Springer Science & Business Media, Nov. 2013.
[7] A. Ipakchi and F. Albuyeh, “Grid of the future,” IEEE Power and Energy Magazine, vol. 7, no. 2, pp. 52–62, Mar. 2009.
[8] G. Adomavicius and A. Tuzhilin, “Toward the next generation of recommender systems: A survey of the state-of-the-art
and possible extensions,” IEEE Trans. on knowledge and data engineering, vol. 17, no. 6, pp. 734–749, Jun. 2005.
[9] B.-L. Lu and K. Ito, “Converting general nonlinear programming problems into separable programming problems with
feedforward neural networks,” Neural networks, vol. 16, no. 7, pp. 1059–1074, Sep. 2003
[10] D. P. Bertsekas, Nonlinear programming. Athena scientific Belmont, Sep. 1999.

More Related Content

What's hot

International Journal of Computer Science, Engineering and Information Techn...
International Journal of Computer Science, Engineering and  Information Techn...International Journal of Computer Science, Engineering and  Information Techn...
International Journal of Computer Science, Engineering and Information Techn...ijcseit
 
Benefits of big data analytics in Smart Metering, ADEPT, WICKED and beyond
Benefits of big data analytics in Smart Metering,  ADEPT, WICKED and beyondBenefits of big data analytics in Smart Metering,  ADEPT, WICKED and beyond
Benefits of big data analytics in Smart Metering, ADEPT, WICKED and beyondDavid Wallom
 
UK Data Centre Capabilty Presentation Rev.A
UK Data Centre Capabilty Presentation Rev.AUK Data Centre Capabilty Presentation Rev.A
UK Data Centre Capabilty Presentation Rev.AGary Marshall
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceMichelle Holley
 
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET Journal
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
 
Generating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentGenerating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentDavid Wallom
 
Green & Beyond: Data Center Actions to Increase Business Responsiveness and R...
Green & Beyond: Data Center Actions to Increase Business Responsiveness and R...Green & Beyond: Data Center Actions to Increase Business Responsiveness and R...
Green & Beyond: Data Center Actions to Increase Business Responsiveness and R...IBMAsean
 
Towards Cyber-Physical System technologies over Apache VCL
Towards Cyber-Physical System technologies over Apache VCLTowards Cyber-Physical System technologies over Apache VCL
Towards Cyber-Physical System technologies over Apache VCLImre Kocsis
 
Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT EnergyTech2015
 
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...Schneider Electric
 
What’s new in the smart grid - Latest developments and trends and what it mea...
What’s new in the smart grid - Latest developments and trends and what it mea...What’s new in the smart grid - Latest developments and trends and what it mea...
What’s new in the smart grid - Latest developments and trends and what it mea...Schneider Electric
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET Journal
 
Business Intelligence and Data Analytics in Renewable Energy Sector
Business Intelligence and Data Analytics in Renewable Energy SectorBusiness Intelligence and Data Analytics in Renewable Energy Sector
Business Intelligence and Data Analytics in Renewable Energy SectorDarshit Paun
 
How to integrate operational and information technologies
How to integrate operational and information technologies How to integrate operational and information technologies
How to integrate operational and information technologies Anastasia Govan Kuusk
 
Data Science for Energy Efficiency (Dmytro Mindra Technology Stream)
Data Science for Energy Efficiency (Dmytro Mindra Technology Stream)Data Science for Energy Efficiency (Dmytro Mindra Technology Stream)
Data Science for Energy Efficiency (Dmytro Mindra Technology Stream)IT Arena
 
Optimized Energy Management and Planning Tools for the Iron and Steel Industry
Optimized Energy Management and Planning Tools for the Iron and Steel IndustryOptimized Energy Management and Planning Tools for the Iron and Steel Industry
Optimized Energy Management and Planning Tools for the Iron and Steel IndustrySchneider Electric
 
Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...nexgentechnology
 

What's hot (20)

International Journal of Computer Science, Engineering and Information Techn...
International Journal of Computer Science, Engineering and  Information Techn...International Journal of Computer Science, Engineering and  Information Techn...
International Journal of Computer Science, Engineering and Information Techn...
 
Benefits of big data analytics in Smart Metering, ADEPT, WICKED and beyond
Benefits of big data analytics in Smart Metering,  ADEPT, WICKED and beyondBenefits of big data analytics in Smart Metering,  ADEPT, WICKED and beyond
Benefits of big data analytics in Smart Metering, ADEPT, WICKED and beyond
 
UK Data Centre Capabilty Presentation Rev.A
UK Data Centre Capabilty Presentation Rev.AUK Data Centre Capabilty Presentation Rev.A
UK Data Centre Capabilty Presentation Rev.A
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT Convergence
 
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
IRJET- Cyber Physical Systems (CPS) and Design Automation for Healthcare Syst...
 
IRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of ThingsIRJET- Smart Home Application using Internet of Things
IRJET- Smart Home Application using Internet of Things
 
Generating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the EnvironmentGenerating Insight from Big Data in Energy and the Environment
Generating Insight from Big Data in Energy and the Environment
 
Green & Beyond: Data Center Actions to Increase Business Responsiveness and R...
Green & Beyond: Data Center Actions to Increase Business Responsiveness and R...Green & Beyond: Data Center Actions to Increase Business Responsiveness and R...
Green & Beyond: Data Center Actions to Increase Business Responsiveness and R...
 
Cyber-Physical Systems
Cyber-Physical SystemsCyber-Physical Systems
Cyber-Physical Systems
 
Towards Cyber-Physical System technologies over Apache VCL
Towards Cyber-Physical System technologies over Apache VCLTowards Cyber-Physical System technologies over Apache VCL
Towards Cyber-Physical System technologies over Apache VCL
 
Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT
 
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
 
What’s new in the smart grid - Latest developments and trends and what it mea...
What’s new in the smart grid - Latest developments and trends and what it mea...What’s new in the smart grid - Latest developments and trends and what it mea...
What’s new in the smart grid - Latest developments and trends and what it mea...
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
 
Business Intelligence and Data Analytics in Renewable Energy Sector
Business Intelligence and Data Analytics in Renewable Energy SectorBusiness Intelligence and Data Analytics in Renewable Energy Sector
Business Intelligence and Data Analytics in Renewable Energy Sector
 
How to integrate operational and information technologies
How to integrate operational and information technologies How to integrate operational and information technologies
How to integrate operational and information technologies
 
Big Data Analytics at Vestas Wind Systems
Big Data Analytics at Vestas Wind SystemsBig Data Analytics at Vestas Wind Systems
Big Data Analytics at Vestas Wind Systems
 
Data Science for Energy Efficiency (Dmytro Mindra Technology Stream)
Data Science for Energy Efficiency (Dmytro Mindra Technology Stream)Data Science for Energy Efficiency (Dmytro Mindra Technology Stream)
Data Science for Energy Efficiency (Dmytro Mindra Technology Stream)
 
Optimized Energy Management and Planning Tools for the Iron and Steel Industry
Optimized Energy Management and Planning Tools for the Iron and Steel IndustryOptimized Energy Management and Planning Tools for the Iron and Steel Industry
Optimized Energy Management and Planning Tools for the Iron and Steel Industry
 
Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...Industrial big data analytics for prediction of remaining useful life based o...
Industrial big data analytics for prediction of remaining useful life based o...
 

Similar to IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massive Data

Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...IRJET Journal
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET Journal
 
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.IRJET Journal
 
IRJET - Eloquent Salvation and Productive Outsourcing of Big Data
IRJET -  	  Eloquent Salvation and Productive Outsourcing of Big DataIRJET -  	  Eloquent Salvation and Productive Outsourcing of Big Data
IRJET - Eloquent Salvation and Productive Outsourcing of Big DataIRJET Journal
 
IRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET Journal
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
 
Advance autonomous billing system in the EB meter with GSM technology
Advance autonomous billing system in the EB meter with GSM technologyAdvance autonomous billing system in the EB meter with GSM technology
Advance autonomous billing system in the EB meter with GSM technologyIRJET Journal
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
 
Sustainable Development using Green Programming
Sustainable Development using Green ProgrammingSustainable Development using Green Programming
Sustainable Development using Green ProgrammingIRJET Journal
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMIRJET Journal
 
Green Computing for Internet of Things
Green Computing for Internet of ThingsGreen Computing for Internet of Things
Green Computing for Internet of ThingsIRJET Journal
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISIRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET Journal
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET Journal
 
IRJET - Energy Efficient Approach for Data Aggregation in IoT
IRJET -  	  Energy Efficient Approach for Data Aggregation in IoTIRJET -  	  Energy Efficient Approach for Data Aggregation in IoT
IRJET - Energy Efficient Approach for Data Aggregation in IoTIRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
Efficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingEfficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingIRJET Journal
 
Network performance - skilled craft to hard science
Network performance - skilled craft to hard scienceNetwork performance - skilled craft to hard science
Network performance - skilled craft to hard scienceMartin Geddes
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...IRJET Journal
 

Similar to IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massive Data (20)

Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
Secure Storage Auditing with Efficient Key Update for Cognitive Industrial IO...
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
 
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
 
IRJET - Eloquent Salvation and Productive Outsourcing of Big Data
IRJET -  	  Eloquent Salvation and Productive Outsourcing of Big DataIRJET -  	  Eloquent Salvation and Productive Outsourcing of Big Data
IRJET - Eloquent Salvation and Productive Outsourcing of Big Data
 
IRJET - An Overview of Edge Computing
IRJET - An Overview of Edge ComputingIRJET - An Overview of Edge Computing
IRJET - An Overview of Edge Computing
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
 
Advance autonomous billing system in the EB meter with GSM technology
Advance autonomous billing system in the EB meter with GSM technologyAdvance autonomous billing system in the EB meter with GSM technology
Advance autonomous billing system in the EB meter with GSM technology
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big data
 
Sustainable Development using Green Programming
Sustainable Development using Green ProgrammingSustainable Development using Green Programming
Sustainable Development using Green Programming
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 
Green Computing for Internet of Things
Green Computing for Internet of ThingsGreen Computing for Internet of Things
Green Computing for Internet of Things
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for DetectingIRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
 
IRJET - Energy Efficient Approach for Data Aggregation in IoT
IRJET -  	  Energy Efficient Approach for Data Aggregation in IoTIRJET -  	  Energy Efficient Approach for Data Aggregation in IoT
IRJET - Energy Efficient Approach for Data Aggregation in IoT
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
Efficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingEfficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data Processing
 
Network performance - skilled craft to hard science
Network performance - skilled craft to hard scienceNetwork performance - skilled craft to hard science
Network performance - skilled craft to hard science
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 

IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massive Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1433 A RESEARCH ON ELOQUENT SALVATION AND PRODUCTIVE OUTSOURCING OF MASSIVE DATA PA. Dhakshayeni1, P. Parameshwari2, R. Patchaiyammal3 1 Assistant Professor, Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu 2,3B.TECH., Dept. of IT, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract:- Big statistics is predicted to deliver a great impact within the coming years. Towards this purpose, a critical underlying task is to resolve a series of large-scale fundamental problems. The end aim is to help businesses make better, more informed decisions, permitting them to faucet into a variety of advantages. The applications and practices which make sense and use of all this information, growing a new era of clever farming for the world to behold. Conducting such big- scale facts analytics in a timely manner calls for a big range of computing resources, which might not be available for individuals and small companies in practice. By outsourcing their computations, we can solve such troubles in a cost- powerful way. We gift an efficient, secure outsourcing scheme for convex separable programming troubles. In particular, we first develop green matrix and vector transformation schemes excellent based totally on mathematics operations which may be computationally indistinguishable each in price and inside the structure below a chosen-plain textual content attack (CPA). Then, we layout a constant outsourcing scheme where in the client and the cloud collaboratively remedy the converted problems.The purchaser can correctly affirm the correctness of returned outcomes to prevent any malicious conduct of the cloud. Technical correctness and privacy evaluation together show that the proposed scheme obtains optimal results and that the cloud cannot analyze private records from the customer’s hid statistics. Index Terms — Convex separable programming, cloud computing, information safety and privacy, massive facts 1 INTRODUCTION: The amount of knowledge in our world has grown tremendously and double every two years, increasing from 4.4 zetabytes (million terabytes) in 2013 to 44 zetabytes by 2020. The large-scale data sets, referred to as big data, became a key basis of innovation and intelligence. they carry new oppor-tunities to several areas like research project, business innovations, human well-being, etc. for instance, biomed-ical researchers develop personalized medicine programs to significantly improve patient care by finding patterns in large-scale genomic databases; e-commerce companies, like Amazon and eBay, provide accurate merchandise recommendations for patrons by analyzing billions of transactions; power grid engineers perform real-time analysis and operations supported the huge amount of knowledge collected from smart meters . A critical underlying task of the aforementioned appli-cations is to unravel a series of large-scale fundamental prob- lems. We note that convex separable programming (CSP) is one among them that's involved in various real-world applica- tions, including industrial control systems, time-dependent cost optimization, resource allocation, etc. for instance, within the industry of water resource planning, sources that emits pollutants are required to get rid of waste from water system The decision makings are often formulated as CSPs where the pounds of biological oxygen demands are variables and therefore the objective is to minimize total costs to the region while meeting specified pollution standards [8]. Another example is sensible grid operations. Particularly, the target function are often maximizing the revenue of an enormous company with regards to monthly energy consumptions at different sub-companies, while the entire energy cost in monthly is upper-bounded. Obviously, these problems are often formulated as a CSP also. additionally, it's a useful math- ematical tool as we will convert general nonlinear program-ming problems into CSP problems . as an example , with the assistance of feedforward neural networks, general non-separable functions are often approximated as convex separable func-tions and therefore the original problems are often transformed into CSP problems. Therefore, solutions to CSPs are very useful to several complex scientific and engineering problems. However, solving CSPs is difficult, and becomes tougher in big data. Specifically, large-scale CSPs are often too computationally complex to be solved by resource- limited users thanks to their limited computing capability and random access memory (RAM). to deal with this issue, many big companies and governments need to build supercom-puter centers to conduct such heavy computation tasks. However, the expenditure is just too high for people or small companies to afford. As a result, it's in dire got to find effective approaches to research large-scale data sets during a more efficient
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1434 and economical way. Recently, researchers have suggested that cloud computing, which is character- ized by robust computation power and pay-per-use manner. 2. LIMITATION OF EXISTING SYSTEM: • Storing a huge number of knowledge within the cloud may pose severe challenges of data theft and data manipulation since all the info is usually online, and this results in a big problem as its data might be altered for the harmful causes. • To account for these challenges, there are a bunch of works studying privacy issues in cloud computing. However, the present literature overlooks secure outsourcing schemes for large-scale CSPs. it's indeed challenging and different from before since clients only allow only a few local computing and storage resources, which significantly limits the amount of computations which will be operated by themselves to preserve the privacy of the info. 3. SCOPE OF THE PROJECT: Researchers have estimated that by 2050, the world’s population will reach 10 billion. This clearly means food consumption are going to be double to satisfy the necessity for such a big number of populations. Almost 40% of the earth’s surface is already in use for agriculture, and surprisingly an incredible amount of production goes within the waste throughout the method. Big Data provides a hand for each problem and complexities in agriculture. It plays an important role in establishing a complicated and smart agricultural system. Farmers round the world may often get confused in deciding regarding the sort of crop to be harvested. With the assistance of massive Data analytics, predictions are drawn from the previous year’s climate, the nutrients of the soil, rainfall, etc. These wise decisions with Big Data help to yield maximum production and help to grow the economic sector for the assembly of food. 4. PROPOSED SYSTEM : We suggest an efficient, secure outsourcing set of rules for solving large-scale CSPs. Individually, we do not forget a CSP wherein the objective feature and constraints are composed of convex features. Firstly, we broaden an efficient transformation scheme to preserve the privacy of vectors and matrices. We show that the secure transformation of vector and matrices is computationally indistinguishable each in cost and structure below a chosen-plaintext attack (CPA). Then, we make use of the traits of CSPs and linearize the convex features within the CSP problem with arbitrary accuracy, which results in solving a chain of secure large-scale linear programming (LP) problems in the cloud. Next, we securely outsource the LP troubles to the cloud for solutions. To make certain the returned results’ integrity, we adopt a light-weight scheme to verify the correctness of the final results effectively. 5. SYSTEM DESIGN : The proposed architectural model of this project is as shown in the figure 1. figure 1 The proposed model of this project is as shown in the figure 1 which consists of four main phases as follows,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1435 5.1 Data Upload: The user will register the information and upload land details. All facts and data are saved in cloud. Personal important points are all saved underneath every consumer data for convenient reference. Highly configurable get admission to level and security settings give peace of idea that consumer records is saved secure, while staying available to licensed users. 5.2 Convex Separable Programming: Separable programming is an algorithm that allows a convex nonlinear software to be approximated with arbitrary accuracy with a linear programming model. two The concept is to exchange every nonlinear feature with a piecewise linear approximation. Global solutions can then be received with any wide variety of environment friendly LP codes. For non-convex problems, the approach is nevertheless valid, however extra work needs to be done. Either a mixed-integer linear programming trouble should be solved or a modified version of the simplex algorithm with a restricted groundwork entry rule can be applied to the mannequin directly. The candidates for the getting into variable should be restricted to hold the validity of the LP approximation. In this case, a local optimum is obtained, but it is possible to discover the world most advantageous with the assist of department and bound. A nonlinear programming trouble in which the objective characteristic and constraints can be expressed as a linear combination of several one of a kind one-variable functions, of which some or all are nonlinear, is referred to as a separable programming problem. When objective feature and constraints are separable in a Non-Linear Programming Problem, such a trouble is acknowledged as separable programming. Separable programming, which has the problem of minimizing a Convex objective characteristic (or maximizing a concave goal function) in a convex set of points, is called separable convex programming. 5.3 Securing the Information: Security is consists of a group of policies, controls, procedures and technologies that job along to safeguard cloud-based systems, knowledge and infrastructure. These security measures ar designed to safeguard knowledge, support regulative compliance and shield customers' privacy similarly as setting authentication rules for individual users and devices. From authenticating access to filtering traffic, cloud security is designed to the precise desires of the business. And since these rules is designed and managed in one place, administration overheads ar reduced and IT groups sceptered to target different areas of the business. The means cloud security is delivered can rely on the individual cloud supplier or the cloud security solutions in situ. However, implementation of cloud security processes ought to be a joint responsibility between the business owner and resolution supplier. 5.4 Data Retrieve: The operations on the information retrieving are performed best by way of the idea of key, that is delegated to unswerving authority. A key is simplest handy with the aid of an administrator for the authorized users. The key era to get entry to the records by way of an entity inside an company is to be maintained by means of the administrator level. 5.5 Analyze: The admin view the user uploads and analyze about the land resources like sand, water resources and also analyze which is best to make the harvest of farms by the given land. After that admin will provide all resources to farmer for develop farming. 6. ALGORITHM OR METHODOLOGY: Separable programming is vital because it allows a convex nonlinear program to be approximated with arbitrary accuracy with a applied mathematics model. The thought is to exchange each nonlinear function with a piecewise linear approximation. Global solutions can then be obtained with any number efficient LP code. For nonconvex problems, the approach remains valid but more work must be done. Either a mixed-integer applied mathematics problem must be solved as discussed in Section 8.8, or a modified version of the simplex algorithm with a limited basis entry rule are often applied to the model directly. The candidates for the entering variable must be restricted to take care of the validity of the LP approximation. during this case an area optimum is obtained but it's possible to seek out the worldwide optimum with the assistance of branch and bound. Problem Statement Consider again the overall nonlinear programming problem
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1436 Minimize{f(x) : gi (x) £ bi , i = 1, . . . , m} with two additional provisions: (i) the target function and every one constraints are separable, and (ii) each decision variable x j is bounded below by 0 and above by an known constant uj , j = 1, . . . , n. Recall that a function, f(x), is separable if it are often expressed because the sum of functions of the individual decision variables. f(x) = å j=1 n f j (x j ) The separable nonlinear programming problem has the subsequent structure. Minimize å j=1 n f j (x j ) subject to å j=1 n gij(x j ) £ bi , i = 1, . . . , m 0 £ x j £ uj , j =1, . . . , n The key advantage of this formulation is that the non linearities are mathematically independent.This property in conjunction with the finite Separable Programming 2 bounds on the selection variables permits the event of a piecewise linear approximation for each function within the matter . Linearization Consider the overall nonlinear function f(x) depicted in Fig. 5. to make a piecewise linear approximation using, say, r line segments, we must first select r+1 values of the scalar x within its range 0 £ x £ u and let f k = f( - x k ) for k = 0, 1 , . . . , r. At the boundaries we've - x 0 = 0 and - x r = u. Notice that the values of - x k don't need to be evenly spaced. x f(x) x = 0 x x x - x - - - - x = u - 0 1 2 3 4 5 Piecewise linear approximation Figure 5. Piecewise linear approximation of a nonlinear function Recall that any value of x lying between the 2 endpoints of the kth line segment could also be expressed as x = a - x k+1 + (1 – a) - x k or x – - x k = a( - k+1 – - x k ) for 0 £ a £ 1. where - x k (k = 0 , 1 , . . . , r) are data and a is that the decision variable. This relationship leads on to an expression for the kth line segment. ^ f(x) = f k + f k+1 – f k - x k+1 – - x k (x – - x k ) = af k+1 – (1 – a)f k for 0 £ a £ 1 Separable Programming 3 The approximation ^ f(x) becomes increasingly more accurate as r gets larger. Unfortunately, there's a corresponding growth within the size of the resultant problem.For the kth segment, let a= ak+1 and (1 – a) = ak . As for - x k £ x £ - x k+1, the above expresses is x = ak+1 - x k+1 + ak - x k and ^ f(x) = ak+1f k+1 + ak f k where ak + ak+1 = 1 and ak ³ 0, ak+1 ³ 0. Generalizing this procedure to hide the whole range over which x is defined gives x = å k=0 r ak - x k , ^ f(x) = å k=0 r ak f k , å k=0 r ak = 1, ak ³ 0, k = 0, . . . , r such a minimum of one and no quite two ak are often greater than zero. Further, we require that if two ak are greater than zero, their indices must differ by exactly 1. In other words, if as is bigger than zero then just one of either as+1 or as-1 are often greater than zero. If the last condition, referred to as the adjacency criterion, isn't satisfied, the approximation to f(x) won't lie on ^ f(x). to use the above transformations, a grid of r j + 1 points must be defined for every variable x j over its range. this needs the utilization of a further index for every variable and performance . For the jth variable, for instance , f j + 1 data points result: - x 1j , - x 2 , . . . , - x r j j . This requires the use of an extra index for each variable and performance . For the jth variable, as an example , f j + 1 data points result: - x 1j , - x 2 , . . . , - x r j j . With this notation in mind, the separable programming problem in x becomes the next "almost" linear program in . Minimize f( ) = å j=1 n å k=0 r j akjf kj( - x kj) subject to gi ( ) =å j=1 n å k=0 r j akjgkij£ bi , i = 1, . . . , m å k=0 r j akj = 1 Separable Programming 4 akj ³ 0, k = 0, . . . , r j , j =1, . . . , n. the rationale that this is often often an "almost" applied math problem is that the adjacency criterion must be imposed on the new decision variables akj when any of the functions are nonconvex. this could also be accomplished with a restricted basis entry rule. When all the functions are convex, the adjacency criterion will automatically be satisfied so no modifications. Note that the approximate problem has m + n constraints and Sj r j + n variables. 7. CONCLUSION : The promise of massive Data in future is alluring, but the challenges above need to be addressed for increased uptake of massive Data applications. Although there are indeed technical issues to be resolved, we recommend focusing first on the governance issues that were identified and style suitable business models because these are currently the foremost inhibiting factors. Big Data is changing the scope and organization of farming through a pull-push mechanism. Global issues like food security and safety, sustainability, and, as a result, efficiency improvement is tried to be addressed by Big Data applications. These issues make that the scope of massive Data applications extends far beyond farming alone, but covers the whole supply chain. In future enhancements, the outsourcing of CSPs also can be avoided the client's involvement within the process, making it more convenient for them to handle. It also can be developed safer than before by implementing complex encryption algorithms within the system. Implementing a classy encryption algorithm improves the safety of the system and protects the vast amount of sensitive data from unauthorized access. 8. REFERENCES: [1] W. Liao, W. Du, S. Salinas, and P. Li, “Efficient privacy-preserving outsourcing of large-scale convex separable programming for smart cities,” in IEEE 14th International Conference on Smart City. IEEE, Dec. 2016. [2] W. Liao, M. Li, S. Salinas, P. Li, and M. Pan, “Energy-sourceaware cost optimization for green cellular networks with strong stability,” IEEE Trans. on Emerging Topics in Computing, vol. 4, no. 4, pp. 541–555, 2016. [3] I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan, “The rise of “big data” on cloud computing: Review and open research issues,” Information Systems, vol. 47, pp. 98–115, Jan. 2015. [4] E. Bender, “Big data in biomedicine,” Nature, vol. 527, no. 7576, pp. S1–S1, Apr. 2015.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1437 [5]V. Turner, J. F. Gantz, D. Reinsel, and S. Minton, “The digital universe of opportunities: rich data and the increasing value of the internet of things,” IDC Analyze the Future, Apr. 2014. [6] S. M. Stefanov, Separable programming: theory and methods. Springer Science & Business Media, Nov. 2013. [7] A. Ipakchi and F. Albuyeh, “Grid of the future,” IEEE Power and Energy Magazine, vol. 7, no. 2, pp. 52–62, Mar. 2009. [8] G. Adomavicius and A. Tuzhilin, “Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions,” IEEE Trans. on knowledge and data engineering, vol. 17, no. 6, pp. 734–749, Jun. 2005. [9] B.-L. Lu and K. Ito, “Converting general nonlinear programming problems into separable programming problems with feedforward neural networks,” Neural networks, vol. 16, no. 7, pp. 1059–1074, Sep. 2003 [10] D. P. Bertsekas, Nonlinear programming. Athena scientific Belmont, Sep. 1999.