Cloud Computing is an awesome technology which have go ahead and annex the computing world. The development of cloud computing embed its sprouting continually in the recent era. Cloud Computing have contrived clan very lavish comfortable to perform their chore. As its fundamental defnition says that As You Pay As You Go. In this delving work talk about the cloud simulator working in our algorithm which is prepared with the help of rough set theory. The algorithm is implemented in the cloud simulator in which cloudlets, datacenters, cloud brokers are created to perform the algorithms with the help of rough sets. The Ontology is the system consists of cloud services in which cloud service discovery system is maintained. At last there is the implementation of work done using the rough set in cloud simulator using net beans and sql as back end. The net beans is loaded with the cloud Sim packages in which some of the packages are prepared according to our algorithm and gives the expected output of the optimization using rough set as a new concept.
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...IJECEIAES
The purpose of this paper is to provision the on demand resources to the end users as per their need using prediction method in cloud computing environment. The provisioning of virtualized resources to cloud consumers according to their need is a crucial step in the deployment of applications on the cloud. However, the dynamical management of resources for variable workloads remains a challenging problem for cloud providers. This problem can be solved by using a prediction based adaptive resource provisioning mechanism, which can estimate the upcoming resource demands of applications. The present research introduces a prediction based resource provisioning model for the allocation of resources in advance. The proposed approach facilitates the release of unused resources in the pool with quality of service (QoS), which is defined based on prediction model to perform the allocation of resources in advance. In this work, the model is used to determine the future workload prediction for user requests on web servers, and its impact toward achieving efficient resource provisioning in terms of resource exploitation and QoS. The main contribution of this paper is to develop the prediction model for efficient and dynamic resource provisioning to meet the requirements of end users.
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
Cloud represents an important change in the way information technology is used. Cloud makes it possible
to access work anywhere anytime and to share it with anyone [1]. It is changing the way people
communicate, work and learn [2]. In this changing environment, it is important to think about the
opportunities and risks of using the cloud in the education field, and the lessons we can learn from the
previous uses of this technology in the education field. In order to gain the benefits of the cloud to be used
in educational system in KSA, a comprehensive study on scientific literatures in this paper. This paper also
presents the significant information such as the findings, the case studies, related frameworks and
supporting also the tools associated to the migration of organizational resources to cloud
Differentiating Algorithms of Cloud Task Scheduling Based on various Parametersiosrjce
Cloud computing is a new design structure for large, distributed data centers. Cloud computing
system promises to offer end user “pay as go” model. To meet the expected quality requirements of users, cloud
computing need to offer differentiated services to users. QoS differentiation is very important to satisfy
different users with different QoS requirements. In this paper, various QoS based scheduling algorithms,
scheduling parameters and the future scope of discussed algorithms have been studied. This paper summarizes
various cloud scheduling algorithms, findings of algorithms, scheduling factors, type of scheduling and
parameters considered
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Role of Operational System Design in Data Warehouse Implementation: Identifyi...iosrjce
Data warehouse designing process takes input from operational system of the organization. Quality
of data warehousing solution depends on design of operational system. Often, operational system
implementations of organizations have some limitations. Thus, we cannot proceed for data warehouse
designing so easily. In this paper, we have tried to investigate operational system of the organization for
identifying such limitations and determine role of operational system design in the process of data warehouse
design and implementation. We have worked out to find possible methods to handle such limitations and have
proposed techniques to get a quality data warehousing solution under such limitations. To make the work based
on live example, National Rural Health Mission (NRHM) Project has been taken. It is a national project of
health sector, managed by Indian Government across the country. The complex structure and high volume of
data makes it an ideal case for data warehouse implementation.
RSDC (Reliable Scheduling Distributed in Cloud Computing)IJCSEA Journal
In this paper we will present a reliable scheduling algorithm in cloud computing environment. In this algorithm we create a new algorithm by means of a new technique and with classification and considering request and acknowledge time of jobs in a qualification function. By evaluating the previous algorithms, we understand that the scheduling jobs have been performed by parameters that are associated with a failure rate. Therefore in the roposed algorithm, in addition to previous parameters, some other important parameters are used so we can gain the jobs with different scheduling based on these parameters. This work is associated with a mechanism. The major job is divided to sub jobs. In order to balance the jobs we should calculate the request and acknowledge time separately. Then we create the scheduling of each job by calculating the request and acknowledge time in the form of a shared job. Finally efficiency of the system is increased. So the real time of this algorithm will be improved in comparison with the other algorithms. Finally by the mechanism presented, the total time of processing in cloud computing is improved in comparison with the other algorithms.
INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...IAEME Publication
Cloud computing has been incorporated in almost every fold of customer’s world today. As more challenging becomes the world of a resource consumer, so does the plethora of numerous cloud vendors. Every vendor tries to sell off their ser-vices with different attractions. Some of them are free, some as pay-as-you-go services and some at rented structures. With so many choices avail-able to a random user, making the right choice about the type of vendor is a crucial decision. We present in this paper novel methods for cloud ser-vice selection. The methods derives from the traditional selection methods with emphasis on user criteria weights. Inherent comparisons have been conducted amongst the various methods to help in analyzing and finalizing a broker architecture for selection of the best service provider among the contending cloud vendors.
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...IJECEIAES
The purpose of this paper is to provision the on demand resources to the end users as per their need using prediction method in cloud computing environment. The provisioning of virtualized resources to cloud consumers according to their need is a crucial step in the deployment of applications on the cloud. However, the dynamical management of resources for variable workloads remains a challenging problem for cloud providers. This problem can be solved by using a prediction based adaptive resource provisioning mechanism, which can estimate the upcoming resource demands of applications. The present research introduces a prediction based resource provisioning model for the allocation of resources in advance. The proposed approach facilitates the release of unused resources in the pool with quality of service (QoS), which is defined based on prediction model to perform the allocation of resources in advance. In this work, the model is used to determine the future workload prediction for user requests on web servers, and its impact toward achieving efficient resource provisioning in terms of resource exploitation and QoS. The main contribution of this paper is to develop the prediction model for efficient and dynamic resource provisioning to meet the requirements of end users.
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
Cloud represents an important change in the way information technology is used. Cloud makes it possible
to access work anywhere anytime and to share it with anyone [1]. It is changing the way people
communicate, work and learn [2]. In this changing environment, it is important to think about the
opportunities and risks of using the cloud in the education field, and the lessons we can learn from the
previous uses of this technology in the education field. In order to gain the benefits of the cloud to be used
in educational system in KSA, a comprehensive study on scientific literatures in this paper. This paper also
presents the significant information such as the findings, the case studies, related frameworks and
supporting also the tools associated to the migration of organizational resources to cloud
Differentiating Algorithms of Cloud Task Scheduling Based on various Parametersiosrjce
Cloud computing is a new design structure for large, distributed data centers. Cloud computing
system promises to offer end user “pay as go” model. To meet the expected quality requirements of users, cloud
computing need to offer differentiated services to users. QoS differentiation is very important to satisfy
different users with different QoS requirements. In this paper, various QoS based scheduling algorithms,
scheduling parameters and the future scope of discussed algorithms have been studied. This paper summarizes
various cloud scheduling algorithms, findings of algorithms, scheduling factors, type of scheduling and
parameters considered
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
Role of Operational System Design in Data Warehouse Implementation: Identifyi...iosrjce
Data warehouse designing process takes input from operational system of the organization. Quality
of data warehousing solution depends on design of operational system. Often, operational system
implementations of organizations have some limitations. Thus, we cannot proceed for data warehouse
designing so easily. In this paper, we have tried to investigate operational system of the organization for
identifying such limitations and determine role of operational system design in the process of data warehouse
design and implementation. We have worked out to find possible methods to handle such limitations and have
proposed techniques to get a quality data warehousing solution under such limitations. To make the work based
on live example, National Rural Health Mission (NRHM) Project has been taken. It is a national project of
health sector, managed by Indian Government across the country. The complex structure and high volume of
data makes it an ideal case for data warehouse implementation.
RSDC (Reliable Scheduling Distributed in Cloud Computing)IJCSEA Journal
In this paper we will present a reliable scheduling algorithm in cloud computing environment. In this algorithm we create a new algorithm by means of a new technique and with classification and considering request and acknowledge time of jobs in a qualification function. By evaluating the previous algorithms, we understand that the scheduling jobs have been performed by parameters that are associated with a failure rate. Therefore in the roposed algorithm, in addition to previous parameters, some other important parameters are used so we can gain the jobs with different scheduling based on these parameters. This work is associated with a mechanism. The major job is divided to sub jobs. In order to balance the jobs we should calculate the request and acknowledge time separately. Then we create the scheduling of each job by calculating the request and acknowledge time in the form of a shared job. Finally efficiency of the system is increased. So the real time of this algorithm will be improved in comparison with the other algorithms. Finally by the mechanism presented, the total time of processing in cloud computing is improved in comparison with the other algorithms.
INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...IAEME Publication
Cloud computing has been incorporated in almost every fold of customer’s world today. As more challenging becomes the world of a resource consumer, so does the plethora of numerous cloud vendors. Every vendor tries to sell off their ser-vices with different attractions. Some of them are free, some as pay-as-you-go services and some at rented structures. With so many choices avail-able to a random user, making the right choice about the type of vendor is a crucial decision. We present in this paper novel methods for cloud ser-vice selection. The methods derives from the traditional selection methods with emphasis on user criteria weights. Inherent comparisons have been conducted amongst the various methods to help in analyzing and finalizing a broker architecture for selection of the best service provider among the contending cloud vendors.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
In this paper we propose a new cloud computing environment where we approach a trusted
cloud environment which is controlled by both the client and the cloud environment. Our
approach is mainly divided into two parts. First part is controlled by the normal user which gets
permission by the cloud environment for performing operation and for loading data. Second
part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the
data then it take permission from the client environment. This provides a way to hide the data
and normal user can protect their data from the cloud provider. This provides a two way
security which helps both the cloud and the normal user. For the above concept we propose a
java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
In this study, a mobile cloud offloading system has been developed to decide that a process run on the cloud or on the mobile platform. A context-aware decision algorithm has been developed. The low performance and problem of battery consumption of mobile devices have been fundamental challenges on the mobile computing. To overcome this kind of challenges, recent advances towards mobile cloud computing propose a selective mobile-to-cloud offloading service by moving a mobile application from a slow mobile device to a fast server in the cloud during run time. Determine whether a process running on cloud or not is an important issue. Power consumption and time limits are vitally important for decision. In this study we used PowerTutor application which is a dynamic power measurement modelling tool. Another important factor is the process completion time. Calculate the power consumption is very difficult
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
Abstract
Spatial big data acts as a important key role in wireless networks applications. In that spatial and spatio temporal problems contains the distinct role in big data and it’s compared to common relational problems. If we are solving those problems means describing the three applications for spatial big data. In each applications imposing the specific design and we are developing our work on highly scalable parallel processing for spatial big data in Hadoop frameworks by using map reduce computational model. Our results show that enables highly scalable implementations of algorithms using Hadoop for the purpose of spatial data processing problems. Inspite of developing these implementations requires specialized knowledge and user friendly.
Keywords: Spatial Big Data, Hadoop, Wireless Networks, Map reduce
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
My presentation in "ICT in our lives" in Faculty of Commerce, Alexandria University, Dec 2013
Trying to understand the IT industry trends in the lights of the game theory, with a focus on cloud computing and FOSS.
7th International Workshop on Semantic Sensor Networks, in conjunction with the 13th International Semantic Web Conference (ISWC) October 19-23, 2014, Riva del Garda, Trentino Italy
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
DESIGNING ASPECT AND FUNCTIONALITY ISSUES OF CLOUD BROKERING SERVICE IN CLOUD...Souvik Pal
Cloud brokering service is an intermediate service which enables the producer-consumer business model
enforcing the easy access to cloud services from Cloud Service Providers (CSPs). Cloud broker is to
provide a platform where broker collects the information from the user, analyze the data, and sends those
data to the CSPs. Cloud broker also provides data integration services and modeling the data across all the
components or units of the cloud services. This paper deals with designing criteria and issues of cloud
broker, system activity of broker, and sequence diagram of system design with implementation procedure.
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
In this paper we propose a new cloud computing environment where we approach a trusted
cloud environment which is controlled by both the client and the cloud environment. Our
approach is mainly divided into two parts. First part is controlled by the normal user which gets
permission by the cloud environment for performing operation and for loading data. Second
part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the
data then it take permission from the client environment. This provides a way to hide the data
and normal user can protect their data from the cloud provider. This provides a two way
security which helps both the cloud and the normal user. For the above concept we propose a
java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
In this study, a mobile cloud offloading system has been developed to decide that a process run on the cloud or on the mobile platform. A context-aware decision algorithm has been developed. The low performance and problem of battery consumption of mobile devices have been fundamental challenges on the mobile computing. To overcome this kind of challenges, recent advances towards mobile cloud computing propose a selective mobile-to-cloud offloading service by moving a mobile application from a slow mobile device to a fast server in the cloud during run time. Determine whether a process running on cloud or not is an important issue. Power consumption and time limits are vitally important for decision. In this study we used PowerTutor application which is a dynamic power measurement modelling tool. Another important factor is the process completion time. Calculate the power consumption is very difficult
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
Abstract
Spatial big data acts as a important key role in wireless networks applications. In that spatial and spatio temporal problems contains the distinct role in big data and it’s compared to common relational problems. If we are solving those problems means describing the three applications for spatial big data. In each applications imposing the specific design and we are developing our work on highly scalable parallel processing for spatial big data in Hadoop frameworks by using map reduce computational model. Our results show that enables highly scalable implementations of algorithms using Hadoop for the purpose of spatial data processing problems. Inspite of developing these implementations requires specialized knowledge and user friendly.
Keywords: Spatial Big Data, Hadoop, Wireless Networks, Map reduce
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
My presentation in "ICT in our lives" in Faculty of Commerce, Alexandria University, Dec 2013
Trying to understand the IT industry trends in the lights of the game theory, with a focus on cloud computing and FOSS.
7th International Workshop on Semantic Sensor Networks, in conjunction with the 13th International Semantic Web Conference (ISWC) October 19-23, 2014, Riva del Garda, Trentino Italy
Using the Cloud for Mobile, Social, and Games - RightScale Compute 2013RightScale
Speaker: Ronnie Regev - Product Manager, RightScale
Many organizations get started in the cloud by developing new, fast-to-market, customer-facing applications. Often these are mobile, social, and gaming applications. We will talk about how to build a repeatable, cost-efficient, and scalable infrastructure platform to deliver a portfolio of mobile, social, and games apps.
An initial work on coming out with specialized postgraduate programme focusing on software testing and quality, both for full-time and part-time studies. Presented at Malaysian Software Engineering Conference 2014 (MySEC14) in Langkawi, Malaysia.
Mobile Cloud Computing for Games - Gamelet Anand Bhojan
In recent years, cloud computing services have been increasing in greater pace. High penetration rate of mobile devices and resource limited devices escalate the demand for cloud services further. Even though the cloud industry continues to grow exponentially, the cloud gaming service has been left behind due to the limitations in today's technology. There are three well known reasons for the slower growth - latency, server scalability (esp. bandwidth) and lack of game data at client side to use latency hiding and synchronisation techniques such as Dead-reckoning. In this paper, we propose a novel distributed micro-cloud infrastructure with a next generation device called Gamelet to mitigate the limitations in traditional cloud system for multiplayer cloud gaming on resource limited mobile devices. The paper also investigates the opportunities, issues and possible solutions for Gamelet infrastructure for mobile games with a demonstrable prototype.
Designing Serious Game for Behavioral Change in HealthcareAntonio Grillo
DESIGNING SERIOUS GAMES FOR BEHAVIORAL CHANGE IN HEALTHCARE USING CONNECTED OBJECTS.
Game Design tools, how to Design an efficient Motivational Framework, Examples of Game Mechanics, Pervasive solutions vs. Intrusive Solutions, the role of the Artificial Intelligence as main engine, the Internet of Caring Things to shape a better world for YOU.
Everything I have experienced in designing an IA based digital companion to treat chronicle disease by changing behavior.
Digital Railways presentation by Technology Strategy BoardKTN
Technology Strategy Board presentation at Transport KTN's information and consortia-building event in Coventry on 25th March 2013 supporting the £5million Digital Railways r&d competition
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...Veselin Pizurica
The First International Conference on Cognitive Internet of Things Technologies
Talk: A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applications
Authors: Veselin Pizurica, Piet Vandaele
Company: waylay
Website: http://coiot.org/2014/show/program-final
The Enterprise Internet of Things: Think Security FirstDell World
The proliferation of connected products and equipment creates an almost limitless combination of physical-cyber intersections and opportunities for security breaches. Designing enterprise Internet of Things (IoT) ecosystems must start with identifying potential security vulnerabilities and developing a unified security approach to keep a step ahead of threats and maintain a predictive, proactive security posture. Securing IoT ecosystems is complex but with the industry's broadest portfolio of security tools and expertise—and a holistic approach—Dell helps reduce security risk to ensure your enterprise infrastructure and data remain safe, secure and private. This session will discuss the unique security risks in IoT ecosystems and the strategies and tools for addressing them.
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
The present research focuses on ranking cloud services by using the k-means algorithm with multi-criteria decision-making (MCDM) approaches that are the prime factor in the decision-making process and have been used to choose cloud services. The tools offered by MCDM can solve almost any decision-making problem. When faced with a selection challenge in the cloud environment, the trusted party would need to weigh the client’s choice against a predetermined list of criteria. There is a wide range of approaches to evaluating the quality of cloud services. The deep learning model has been considered a branch of artificial intelligence that assesses datasets to perform training and testing and makes decisions accordingly. This paper presents a concise overview of MCDM approaches and discusses some of the most commonly used MCDM methods. Also, a model based on deep learning with the k-means algorithm based decision-making trial and evaluation laboratory (kDE-MATEL) and analytic network process (ANP) is proposed as k-means algorithm based decision-making trial and evaluation laboratory with analytic network process (kD-ANP) for selecting cloud services. The proposed model uses the k-means algorithm and gives different levels of priority and weight to a set of criteria. A traditional model is also compared with a proposed model to reflect the efficiency of the proposed approach.
Cloud computing is the fastest emerging technology and a novel buzzword in the field of IT domain that offer distinct services, applications and focuses on providing sustainable, reliable, scalable and virtualized resources to its consumer. The main aim of cloud computing is to enhance the use of distributed resources to achieve higher throughput and resource utilization in large-scale computation problems. Scheduling affects the efficiency of cloud and plays a significant role in cloud computing to create high performance environment. The Quality of Service (QoS) requirements of user application define the scheduling of resources. Numbers of researchers have tried to solve these scheduling problems using different QoS based scheduling techniques. In this paper, a detail analysis of resource scheduling methodology is presented, with different types of scheduling based on soft computing techniques, their comparisons, benefits and results are discussed. Major finding of this paper helps researchers to decide suitable approach for scheduling user’s applications considering their QoS requirements.
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...ijccsa
Cloud collaboration is an emerging technology which enables sharing of computer files using cloud
computing. Here the cloud resources are assembled and cloud services are provided using these resources.
Cloud collaboration technologies are allowing users to share documents. Resource allocation in the cloud
is challenging because resources offer different Quality of Service (QoS) and services running on these
resources are risky for user demands. We propose a solution for resource allocation based on multi
attribute QoS Scoring considering parameters such as distance to the resource from user site, reputation of
the resource, task completion time, task completion ratio, and load at the resource. The proposed algorithm
referred to as Multi Attribute QoS scoring (MAQS) uses Neuro Fuzzy system. We have also included a
speculative manager to handle fault tolerance. In this paper it is shown that the proposed algorithm
perform better than others including power trust reputation based algorithms and harmony method which
use single attribute to compute the reputation score of each resource allocated.
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...neirew J
Cloud collaboration is an emerging technology which enables sharing of computer files using cloud
computing. Here the cloud resources are assembled and cloud services are provided using these resources.
Cloud collaboration technologies are allowing users to share documents. Resource allocation in the cloud
is challenging because resources offer different Quality of Service (QoS) and services running on these
resources are risky for user demands. We propose a solution for resource allocation based on multi
attribute QoS Scoring considering parameters such as distance to the resource from user site, reputation of
the resource, task completion time, task completion ratio, and load at the resource. The proposed algorithm
referred to as Multi Attribute QoS scoring (MAQS) uses Neuro Fuzzy system. We have also included a
speculative manager to handle fault tolerance. In this paper it is shown that the proposed algorithm
perform better than others including power trust reputation based algorithms and harmony method which
use single attribute to compute the reputation score of each resource allocated.
ESTIMATING CLOUD COMPUTING ROUND-TRIP TIME (RTT) USING FUZZY LOGIC FOR INTERR...IJCI JOURNAL
Cloud computing is widely considered a transformative force in the computing world and is poised to
replace the traditional office setup as an industry standard. However, given the relative novelty of these
services and challenges such as the impact of physical distance on round-trip time (rtt), questions have
arisen regarding system performance and associated billing structures. The primary objective of this study
is to address these concerns. We aim to alleviate doubts by leveraging a fuzzy logic system to classify
distances between regions that support computing services and compare them with the conventional web
hosting format. To achieve this, we analyse the responses of one of these services, like amazon web
services, across different distance categories (near, medium, and far) between regions and strive to
conclude overall system performance. Our tests reveal that significant data is consistently lost during
customer transmission despite exhibiting superior round-trip times. We delve into this issue and present
our findings, which may illuminate the observed anomalous behaviour.
Improved quality of service-based cloud service ranking and recommendation modelTELKOMNIKA JOURNAL
One of the ongoing technologies which are used by large number of companies and users is cloud computing environment. This computing technology has proved that it provides certainly a different level of efficiency, security, privacy, flexibility and availability to its users. Cloud computing delivers on demand services to the users by using various service-based models. All these models work on utility-based computing such that users pay for their used services. Along with the various advantages of the cloud computing environment, it has its own limitations and problems such as efficient resource identification or discovery, security, task scheduling, compliance and sustainability. Among these resource identification and scheduling plays an important role because users always submits their jobs and expects responses in least possible time. Research is happening all around the world to optimize the response time, make span so as to reduce the burden on the cloud resources. In this paper, QoS based service ranking model is proposed for cloud computing environment to find the essential top ranked services. Proposed model is implemented in two phases. In the first phase, similarity computation between the users and their services is considered. In the second phase, computing the missing values based on the computed similarity measures is calculated. The efficiency of the proposed ranking is measured and the average precision correlation of the proposed ranking measure is showing better results than the existing measures.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
A distributed system can be viewed as an environment in which, number of computers/nodes are connected and resources are shared among these computers/nodes. But unfortunately, distributed systems often face the problem of traffic, which can degrade the performance of the system. Traffic management is used to improve scalability and overall system throughput in distributed systems using Software Defined Network (SDN) based systems. Traffic management improves system performance by dividing the work traffic effectively among the participating computers/nodes. Many algorithms were proposed for traffic management and their performance is measured based on certain parameters such as response time, resource utilization, and fault tolerance. Traffic management algorithms are broadly classified into two categories- scheduling and machine learning traffic management. This work presents the study of performance analysis of traffic management algorithms. This analysis can further help in the design of new algorithms. However, when multiple servers are assigned to compile the mysterious code, different kinds of techniques are used. One common example is traffic management. The processes are managed based on power efficiency, networking bandwidth, Processor speed. The desired output will again send back to the developer. If multiple programs have to be compiled then appropriate technique such as scheduling algorithm is used. So the compilation process becomes faster and also the other process can get a chance to compile. SDN based clustering algorithm based on Simulated Annealing whose main goal is to increase network lifetime while maintaining adequate sensing coverage in scenarios where sensor nodes produce uniform or non-uniform data traffic.
A survey on various resource allocation policies in cloud computing environmenteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A survey on various resource allocation policies in cloud computing environmenteSAT Journals
Abstract Cloud computing is bringing a revolution in computing environment replacing traditional software installations, licensing issues into complete on-demand services through internet. In Cloud computing multiple cloud users can request number of cloud services simultaneously. So there must be a provision that all resources are made available to requesting user in efficient manner to satisfy their need. Resource allocation is based on quality of service and service level agreement. In cloud computing environment, to allocate resources to the user there are several methods but provider should consider the efficient way to guarantee that the applications’ requirements are attended to correctly and satisfy the user’s need This paper survey different resource allocation policies used in cloud computing environment. Keywords: Cloud computing, Resource allocation
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingIOSRjournaljce
Cloud computing environment provides the cost efficient solution to customers by the resource provisioning and flexible customized configuration. The interest of cloud computing is growing around the globe at very fast pace because it provides scalable virtualized infrastructure by mean of which extensive computing capabilities can be used by the cloud clients to execute their submitted jobs. It becomes challenge for the cloud infrastructure to manage and schedule these jobs originated by different cloud users to available resources in such a manner to strengthen the overall performance of the system. As the number of user increases the job scheduling become an intensive task. Energy efficient job scheduling is one constructive solution to streamline the resource utilization as well as to reduce the energy consumption. Though there are several scheduling algorithms available, this paper intends to present job scheduling based on two Heuristic approaches i.e. Efficient MQS (Multi-queue job scheduling) and ACO (Ant colony optimization) and further evaluating the effectiveness of both approaches by considering the parameter of energy consumption and time in cloud computing.
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these „clouds‟ are the natural evolution of traditional clusters and data centers, they are distinguished by following a pricing model where customers are charged based on their utilization of computational resources, storage and transfer of data. They offer subscription-based access to infrastructure, platforms, and applications that are popularly termed as IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). In order to improve the profit of service providers we implement a technique called hybrid pricing , where this hybrid pricing model is a pooled with fixed and spot pricing techniques.
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Eswar Publications
Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the
most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging technology for the next generation of IT applications. This paper presents the evolution, history, and definition of cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and deployment models, and identifying various characteristics of concern.
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
Cloud computing facilitates service providers to rent their computing capabilities for deploying
applications depending on user requirements. Applications of cloud have diverse composition,
configuration and deployment requirements. Quantifying the performance of applications in Cloud
computing environments is a challenging task. In this paper, we try to identify various parameters
associated with performance of cloud applications and analyse the impact of resource management and
scalability among them.
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
Cloud computing facilitates service providers to rent their computing capabilities for deploying
applications depending on user requirements. Applications of cloud have diverse composition,
configuration and deployment requirements. Quantifying the performance of applications in Cloud
computing environments is a challenging task. In this paper, we try to identify various parameters
associated with performance of cloud applications and analyse the impact of resource management and
scalability among them.
IMPACT OF RESOURCE MANAGEMENT AND SCALABILITY ON PERFORMANCE OF CLOUD APPLICA...IJCSEA Journal
Cloud computing facilitates service providers to rent their computing capabilities for deploying applications depending on user requirements. Applications of cloud have diverse composition, configuration and deployment requirements. Quantifying the performance of applications in Cloud computing environments is a challenging task. In this paper, we try to identify various parameters associated with performance of cloud applications and analyse the impact of resource management and scalability among them.
Hybrid Based Resource Provisioning in CloudEditor IJCATR
The data centres and energy consumption characteristics of the various machines are often noted with different capacities.
The public cloud workloads of different priorities and performance requirements of various applications when analysed we had noted
some invariant reports about cloud. The Cloud data centres become capable of sensing an opportunity to present a different program.
In out proposed work, we are using a hybrid method for resource provisioning in data centres. This method is used to allocate the
resources at the working conditions and also for the energy stored in the power consumptions. Proposed method is used to allocate the
process behind the cloud storage.
Similar to A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH ONTOLOGY IN CLOUD SIMULATOR (20)
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. 2 Computer Science & Information Technology (CS & IT)
space and performance etc. This increment done is due to the people requirements in the web
applications, by these application they are enjoying the life and consuming the time and money.
This may increment in the field of ebusiness by see the demand of people. In this world Cloud
Computing is spreading very rapidly through internet. So from all over analysis the basic
definition of the cloud computing can be given as the computing which tells about both the
applications providing services with the help of internet and available scalable hardware and the
software running on the systems may provide the services.[1] [2] Its basic definition tells as you
pay as you go manner. There are many computing present in the clouds like public, private and
hybrid. These computing play an important role in cloud computing concept. Here the cloud
computing is dealing with the cloud service providers which play an vital role for the formation
of the scheduling performed in the cloud computing.[4]
Fig. 1. Basic Structure of Cloud Computing.
There is a advanced study of the various cloud service providers and the parameters found after
the survey may play an important role for the formulation. The Deep study of the standard
organizations which are providing the various certification and protocols to perform their tasks in
well ordered and organized manner.[3]
Cloud Ontology is the system that is maintained to determine the similarities between and among
services.[9] Ontology when retrieving information about Cloud services. The relations among the
different types of Cloud services and determining which service(s) would be the best or most
appropriate service for meeting consumers service requirements.[7][8] On the calculated
parameters there is the working of the cloud service providers and standard organizations are
helping the services on that basis.
Fig. 2. Cloud Ontology System
3. Computer Science & Information Technology (CS & IT) 3
2. PROBLEM STATEMENTS
The problem in cloud computing here deals with the cloud service providers selection of the
formulated parameters. For some CSPs there may be certain services or activity that may be
declining and not possible to be accessed at certain points during the day. This kind of unwanted
selections defeats the purpose of the cloud. If we are investing a lot of projects in the cloud, then
we expect the cloud service to be reliable. Even the top CSPs in the market have been facing the
similar problems in the cloud environment. Here we have seen a lot of importance of CSPs for
taking in account the features or characteristics such as Infrastructure, Platform, and Services.
The method of selecting a Cloud Service Provider is evaluated on the basis of Which-Cloud
Provider-Provides- What. The Basic Questions which comes in mind for the selection process are
as follows.
• Why we will use this Provider?
• Does it satisfy our problems?
• How Costly It is May to Me?
• Is Data or information is safe in it?
• What Security features they are providing with it?
• What should be the limit of storage and Recovery of Data if Cloud or Office Destroyed as
per act of God or Different accidents?
• Which type of access control is provided to the user as per safety purpose?
• How we can give the payments and at that level which security is applied?
• How will cloud Provider Checks that the user added in its Cloud is valid or not?
3. RELATED WORK
In this survey be having taken various parameters for the resource managements and users in
benefits in terms of time and money.We have collected a set of parameter requirements and
guidelines devised for cloud platform and service. The conformance of the cloud service platform
and service considered for evaluation, with the requirements and guidelines is done by doing
manual assessment. The algorithm internally calculates two scores based on the assessment
results. One score is denotes the strength of parameter architecture of the cloud service, the
second score denotes the fuzzy value associated with each service provider's. The requirements
and guidelines has been collected in a technology and implementation through agnostic way.
Proper scheduling can have significant impact on the performance of the system. However, in
general, the problem of mapping tasks on distributed services belongs to a class of problems
known as NP-hard problems. For such problems, no known algorithms are able to generate the
optimal solution within polynomial time. Even though the workflow scheduling problem can be
solved by using exhaustive search, the complexity of the methods for solving it is very high. Upto
now there are two major types of workflow scheduling, best-effort based and Quality of Services
constraint based scheduling.
The idea of Adaptive Scheduling Algorithm is to divide the scheduling process into 2 phases: (1)
a logical partition step and (2) a physical allocation step. The key motivation behind this
multistage procedure is to reduce the complexity of scheduling problem. The Adaptive
Scheduling Algorithm (ASA) [11] is proposed to find a suitable execution sequence for work
4. 4 Computer Science & Information Technology (CS & IT)
flow activities by additionally considering resource allocation constraints and dynamic topology
changes. This algorithm utilises a multistage distribution algorithm to cope with network
dynamics. [11]
The two major challenges exist in multimedia cloud are the resource cost and the service response
time. [13] The author proposed queuing model to optimize the resource allocation for multimedia
cloud in priority service scheme. There is also the formulation and solution of the resource cost
minimization problem and the service response time minimization problem. The author has the
priority service scheme in multimedia cloud datacenter as three concatenated queuing systems,
which are schedule queue, computation queue and transmission queue. [13]
4. TECHNIQUES USED
Now the techniques of job scheduling and allocation to the cloud service providers gains a lot of
attraction of the cloud researchers. The algorithms for task ordering on the basis of their arrival
and task mapping are already proposed. We are proposing a similar kind of approach but to a
level above that of job scheduling. It is a responsibility of the cloud computing service provider to
provide the adequate service level satisfaction, so we are proposing to devise an algorithm which
made possible the cloud middleware to determine capability of CSP by using Rough Set analysis
on the basis of level of satisfaction of service. Rough set model can handle with objects and its
characteristics.
Fig. 3. Cloud Ontology System
4.1 Cloud Computing Parameters
On the above mentioned CSPs we have noticed out some of the important Services and the
parameters according to that services? The Services and parameters are explained with its
importance are as follows. The first one is Data Operation which deals with the different data
operation such as searching of data either on the basis of content or location. Moreover some
security and access mechanism issues are also discussed. Lastly, it also touches the data
persistance methods. The second is Legal Issues in which we have found that it deals with the
legal issues that could be generated when data is moved to the cloud, issues regarding NDA and
other agreements between CSP and the customer and other issues that are resolved under laws
and litigations of a country. The Third one is Risk Management in which we may deal about
5. Computer Science & Information Technology (CS & IT) 5
Organizations shall develop and maintain a cloud oriented risk management framework to
manage risk as defined in the master agreement or industry best practices and standards. The
Fourth one is the Compliance And Audit in which Customer and provider both must understand
the importance and should follow the implications on existing compliances, audits and other best
practices. The fifth one is the Inter-portability and Portability is explained to interoperability
features provided shall support security of the data exchanges and messages at protocol level,
policy level and identity level. There shall be a mechanism to support integration of services,
each of which has a different security mechanism. There are many more parameters found out but
from all these are the best surved in our survey.
4.2 Cloud Service Providers
As per the Survey we have studied more than 30 CSPs and now going to represent the study on
that CSP in detailed manner which are on the top of the levels according to the survey of Users
and Functionalities given by gaining mind share. The Cloud Service providers are as follows
according to their rating are as follows. Amazon Web Services (AWS), Second is Google Apps
(AppEngine), Third VMWare vSphere (Virtualization), Fourth Rackspace Mosso, Fifth Cisco and
so on.
4.3 Standard Organization
There are many standard organizations for cloud management and certifications provided by them
for the safety purpose. Some of the Organizations are explained in detailed manner as follows.
The Cloud Security Alliance is made to provide the excellent security in Cloud Computing. The
main aim is to make proper researches, Understanding, awareness, Education and many more
functionalities. According to Cloud Security Alliance mission statement is "To promote the use of
best practices for providing security assurance within Cloud Computing, and provide education
on the uses of Cloud Computing to help secure all other forms of computing."
The Distributed Management Task Force (DMTF) it is an organization built in 1992 whose aim
was on IaaS (Infrastructure as a Service) which is giving high performance, scalable, flexible
infrastructure.
The National Institute of Standards and Technology (NIST) NIST is a non-regulatory federal
agency whose goal is to promote innovation and United States competitiveness by advancing
standards, measurement science, and technology. They are focused on helping federal agencies
understand cloud computing. There are many more organizations in which we have gone through
the survey and got help.
5. ROUGH SET MODEL
Rough set theory is a new mathematical approach to imperfect knowledge. The problem of
imperfect knowledge has been tackled for a long time by philosophers, logicians and
mathematicians. Recently it became also a crucial issue for computer scientists, particularly in the
area of artificial intelligence.[14] The rough set approach seems to be of fundamental importance
to AI and cognitive sciences, especially in the areas of machine learning, knowledge acquisition,
decision analysis, knowledge discovery from databases, expert systems, inductive reasoning and
6. 6 Computer Science & Information Technology (CS & IT)
pattern recognition.[15] The formulation of upper and lower approximation are under Crisp Sets.
The approximation of set may be Fuzzy Sets. The equivalence class of R determined by element
x will be denoted by R(x). The indiscernibility relation in certain sense describes our lack of
knowledge about the universe. Equivalence classes of the indiscernibility relation, called granules
generated by R, represent elementary portion of knowledge we are able to perceive due to R.
Formal definitions of approximations and the boundary region are as follows:
1. R-lower approximation of X
2. R-upper approximation of X
3. R-boundary region of X
Rough set analysis will be on the basis of level of satisfaction of service Parameters. We know
that all service providers are not all-rounder's i.e. they cannot be counted non-stop utilization for
all kind of services. By applying Rough set model we are able to categorize each CSP on the
basis of its speciality in service providing.
For each attribute the value of
The value 1 and 0 above represents that either a CSP is specialized in a particular service or not.
If the resultant value is 1 that means the CSP can be considered for the request otherwise not. We
also categorise the attributes on the basis of relevance to tenant and CSP's. The relevance
generates a threshold value for each attribute out of a scale of 10.
6. METHODOLOGY
As per the Rough Set representation, we have represented the CSP and their attributes in a tabular
form called Information System. The rows of the table contain the list of cloud service providers
and the columns consist of the attributes of the respective cloud service provider. When we talk
about attributes that means the parameters we have identified in our study (Data Operations, Risk
Management etc.)
7. Computer Science & Information Technology (CS & IT) 7
Fig. 4. Algorithm Proposed by Us.
In rough set model we represent the CSP and their attributes in a tabular form. The rows of the
table contain the list of cloud service providers and the columns consist of the attributes of the
respective cloud service provider. This table 1 is converted into table 2. As per the rough set
analysis processes table 2 is divided into lower and upper approximations. The lower one we
cannot consider for assigning to the jobs because these are not suitable according to user
standards. A very simple information system is shown in the following table 1, which contains
rating of CSPs attributes ratings in a Cloud environment. These rating are just for example, as we
can find the original ratings for original CSPs by performing some surveys. Here we considered
seven service providers with four attributes: Application Security, Legal Issues, Virtualization
and Compliance Audit.
8. 8 Computer Science & Information Technology (CS & IT)
Fig. 5. Information System Table 1
Fig. 6. Information System Table 2
Fig. 7. Fuzzy Cost Value.
7. CONCLUSION AND FUTURE WORK
In this research work we have proposed the scheduling for cloud service providers. After
identifying the service requirements, the user can submit their job to the cloud and there the
middleware can implement this mathematical model to rate CSPs and on the basis of their
capabilities. In this system we are trying to develop the Ontology system which may give the
actual values of the CSPs on the basis of the parameters taken for more efficient scheduling. The
scope of this research can be extend further, in which apart from taking the cumulative cost
function, we can also generate the cost on the basis of individual capability of CSP for an
individual attribute. For example if a user needs a cloud that CSP whose cost function is
maximum for security attribute rather than maximum value from the fuzzy costs.
REFERENCES
[1] J. Octavio, Gutierrez-Garcia, Kwang Mong Sim: A family of heuristics for agent based elastic Cloud
bag of tasks concurrent scheduling. Future Generation Computer Systems, SciVerse Science Direct,
doi:10.1016/j.future.2012.01.005.
[2] Daji Ergu, Gang Kou ,Yi Peng ,Yong Shi, Yu Shi on Pipeline: The analytic hierarchy process: task
scheduling and resource allocation in cloud computing environment. In: Springer Science+Business
Media, LLC 2011.
9. Computer Science & Information Technology (CS & IT) 9
[3] Jan Komorowski: Rough Sets: A Tutorial In .Department of Computer and Information Science
Norwegian University of Science and Technology (NTNU) 7034 Trondheim, Norway.
[4] Rodrigo N. Calheiros: CloudSim: A Novel Framework for Modeling and Simulation of Cloud
Computing Infrastructures and Services. In: Computing and Distributed Systems (GRIDS) Laboratory
Department of Computer Science and Software Engineering The University of Melbourne, Australia.
[5] Ashish Tiwari,Dr.A.Nagaraju and Mehul Mahrishi : An Optimized Scheduling Algorithm for Cloud
Broker using Adaptive Cost Model: 3rd IEEE (International Advanced Computing Conference-2013).
[6] Smitha Sundareswaran : A Brokerage-Based Approach for Cloud Service Selection In : 2012 IEEE
Fifth International Conference on Cloud Computing.
[7] Taekgyeong Han and Kwang Mong Sim : An Ontology-enhanced Cloud Service Discovery System :
Proceedings of the International MultiConference of Enginers and Computer Scientists 2010 Vol I,
IMECS 2010,March 17-19,2010,Hong kong .
[8] Haytham Tawfeek al Feel : OCSS: Ontology Cloud Storage System : 2011 First International
Symposium on Network Cloud Computing and Applications.
[9] Use of Ontology in Cloud Computing,
http://cloudontology.wikispaces.asu.edu/Use+of+Ontology+in+Cloud+Computing.
[10] Fangpeng Dong and Akl, S.G. : An Adaptive Double-layer Work
ow Scheduling Approach for Grid Computing In : High Performance Computing Systems and
Applications, 2007. HPCS 2007. 21st International Symposium on.
[11] A. Avanes and J. Freytag : Adaptive Workflow Scheduling under Resource Allocation Constraints
and Network Dynamics In : Proc. VLDB Endow, 1(2), 1631-1637,2008.
[12] Radulescu, A. and Van Gemund, A. J C : Low-cost task scheduling for distributed memory machines
In : Parallel and Distributed Systems, IEEE Transactions 2002.
[13] Nan, Xiaoming and Yifeng He and Ling Guan : Optimal resource allocation for multimedia cloud in
priority service scheme In : Circuits and Systems (ISCAS), 2012 IEEE International Symposium.
[14] Rough Set Theory, http://www.en.wikipedia.org/wiki/Rough-set
[15] Rough sets, http://rst2009.disco.unimib.it/.
[16] Jan Komorowski ,Rough Sets: A Tutorial , Department of Computer and Information Science
Norwegian University of Science and Technology (NTNU) 7034 Trondheim, Norway.
[17] Amit Kumar Sharma ,MADAM ID FOR INTRUSION DETECTION USING DATA MINING
,IJRIM , Volume 2, Issue 2 (February 2012).
[18] Mehul Mahrishi and Dr.A.Nagaraju ,Optimizing Cloud Service Provider Scheduling by Rough Set
model,International Conference on Cloud Computing Techno and Management (ICCEAM-12).
[19] Mehul Mahrishi and Dr.A.Nagaraju ,Rating Based Formulation for Scheduling of Cloud Service
Providers , National Confrance on Emerging treands in IT.
[20] Z. Pawlak, Rough sets, International Journal of Computer and Information Sciences, 11(5):341356,
1982.
[21] Mehul Mahrishi ,Globally Recorded binary encoded Domain Compression algorithm in Column
Oriented Databases,Global Journals of Computer Science and technology Vol. 11 issue 23, Page 27-
30.
[22] Amit Nathani, Sanjay Chaudharya, Gaurav Somani ,Policy based resource allocation in IaaS Cloud,
Generation Computer Systems 28 (2012) 94103 doi:10.1016/j.future.2011.05.016.
[23] Daji Ergu, Gang Kou ,Yi Peng ,Yong Shi, Yu Shi ,The analytic hierarchy process: task scheduling
and resource allocation in cloud computing environment, Springer Science+Business Media, LLC
2011.