Cloud infrastructure planning: models considering an optimisation method, cost and performance requirements
This paper proposes a methodology and models to support planning and selecting a cloud infrastructure according to availability, COA, performance and cost requirements. An optimisation model based on the GRASP metaheuristic is used to generate a cloud ...
QoS-driven hybrid task scheduling algorithm in a cloud computing environment
Cloud computing environment is a growing technology of distributed computing. Typically using cloud computing the services are deployed with individuals or organisations and allow sharing of resources, services, and information based on the demand of ...
Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme
Cloud computing is gaining increasing popularity among enterprises, universities, government departments, and end-users. Geographically distributed users can collaborate by sharing files through the cloud. Ciphertext-Policy attribute-based (CP-ABE) access ...
On generating Pareto optimal set in bi-objective reliable network topology design
This paper considers an NP-hard network topology design (NTD) problem called NTD-CB/R. A key challenge when solving the bi-objective optimisation problem is to simultaneously minimise cost while maximising bandwidth. This paper aims to generate the best ...
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment
Cloud computing provides delivery of computing resources as a service on a pay-as-you-go basis. It represents a shift from products being purchased, to products being subscribed as a service, delivered to consumers over the internet from a large scale ...
Dynamic Bayesian network based prediction of performance parameters in cloud computing
Resource prediction is an important task in the cloud computing environment. It can become more effective and practical for large Cloud Service Providers (CSPs) with a deeper understanding of their Virtual Machines (VM) workload's key characteristics. ...
Handwritten Odia numeral recognition using combined CNN-RNN
Detection and recognition of handwritten characters play a vital role in natural language processing. In this work, authors have taken an approach for Odia handwritten numbers recognition. A little work has been done in Odia numeral recognition. IIT-...
Jaya-based CAViaR: Hadamard product and key matrix for privacy preservation and data sharing in cloud computing environment
Cloud computing system is a powerful computing resource mainly used for data publication and data subscription. Because cloud environment handles a large volume of information, privacy becomes a challenging task during data sharing. Hence, an effective ...
New principles of finding and removing elements of mathematical model for reducing computational and time complexity
The original principle of removing elements of a mathematical model based on its parametric identification of neural network is proposed in the paper. The essence of proposed method is to find a functional subset with less variable results and higher ...