A Comparative Survey of Algorithm used in Cloud ComputingNowshad.M.U, T.Sivakumar
8. The objective of this study is to build the base of the scheduling algorithm used in cloud computing to carry out research in this area. Further scheduling algorithm is categorized into two parts based upon upcoming tasks (applications) as: independent tasks and dependent tasks (realistic ...
Data has been pivotal to all facets of human life in the last decades. In recent years, the massive growth of data as a result of the development of various applications. This data needs to be secured and stored in secure sites. Cloud computing is the technology can be used to store tho...
The experimental results of the suggested SGD-LSTM algorithm indicated a high level of protection, as well as a considerable improvement in security and execution speed when compared to algorithms that are often used in cloud computing. Similar content being viewed by others Hybrid semantic deep ...
In: Proceedings of IEEE Fourth International Conference on Networked Computing and Advanced Information Management, pp. 28–31 (2008) Pan, Y., Xiaolin, G., Jian, A., Jing, Y., Jiancai, L., Feng, T.: A retrievable data perturbation method used in privacy-preserving in cloud computing....
Is there a specific environment for implementing the algorithms, like embedded systems, web platforms, or a high-performance computing setup? Which programming languages are predominantly used in the company? Are there specific languages (like Python for machine learning or C++ for high-performance ...
An efficient simulation model is used to demonstrate how mobile cloud computing might be used to handle various emergency situations. The cloud nodes in the proposed approach can extend their assistance in times of need at an affordable operating and maintenance cost. ...
The consensus mechanism is the core of the blockchain system, which plays an important role in the performance and security of the blockchain system . The Practical Byzantine Fault Tolerance (PBFT) algorithm is a widely used consensus algorithm, but the
In recent years, the XACML (eXtensible Access Control Markup Language) is widely used in a variety of research fields, especially in access control. However, when policy sets defined by the XACML become large and complex, the policy evaluation time incre
Hence numerous meta-heuristic, sub optimal, heuristic approaches have been proposed in previous years. The algorithms are used in cluster, grid or cloud based on few changes. Min–Min is a famous heuristic based scheduling method, which allocates the VM with possible speed to the task which ...