International Journal of Security and Privacy in Pervasive Computing, volume 14, issue 1, pages 1-21

A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology

Publication typeJournal Article
Publication date2022-10-26
SJR
CiteScore
Impact factor
ISSN26437937, 26437945
General Materials Science
Abstract

In reality, the most appropriate cloud standards are significant ideas for application administrations. OSCCS technique calculation gives a spot-like market in virtual space to the end clients. The OSCCS gives an on-spot showcasing framework in the virtual universe of processing. As fluffy hypothesis is giving the specific outcomes and close to correct outcomes that is the reason that authors have taken the idea of fluffy unpleasant set hypothesis in their OSCCS approach. This sort of approach depends on the determination of the best ideal cost and season of asset allotment to an end client by the suppliers in virtual advertising. The allotments of assets depend on powerful on-request demand upkeep so the end-client gets the cloud administration on a business premise like in continuous shopping advertising on events. By the OSCCS deals approach framework, an end client can get the assistance at the ideal expense. The OSCCS calculation is mimicked in cloud test systems.

Tiwari A., Garg R.
2022-09-09 citations by CoLab: 46 Abstract  
The eagle expresses of cloud computing plays a pivotal role in the development of technology. The aim is to solve in such a way that it will provide an optimized solution. The key role of allocating these efficient resources and making the algorithms for its time and cost optimization. The approach of the research is based on the rough set theory RST. RST is a great method for making a large difference in qualitative analysis situations. It's a technique to find knowledge discovery and handle the problems such as inductive reasoning, automatic classification, pattern recognition, learning algorithms, and data reduction. The rough set theory is the new method in cloud service selection so that the best services provide for cloud users and efficient service improvement for cloud providers. The simulation of the work is finished at intervals with the merchandise utilized for the formation of the philosophy framework. The simulation shows the IoT services provided by the IoT service supplier to the user are the best utilization with the parameters and ontology technique.
Li Z., Liu J., Qin Y., Gao T.
2022-06-09 citations by CoLab: 1 Abstract  
To enable the mass adoption of electric vehicles, the charging performance of Li-ion batteries needs to be significantly enhanced. The development of novel electrolytes with enhanced transport properties and faster interfacial reaction is one critical approach to realize fast charging within 10 minutes. Most current electrolyte studies are focusing on ester-based electrolytes. In this work, an ether-based electrolyte is reported, which shows remarkably better-charging performance than commercial carbonate electrolytes and other reported ester-based electrolytes in both half and full cells. Electrochemical and spectroscopic characterization shows the superior charging performance of the reported electrolyte is due to significantly reduced SEI resistance and charge transfer resistance. Cycling tests show remarkable stability in Li||graphite(gr) half cells, suggesting the potential of the electrolytes to enhance battery charging performance. LiFePO4 (LFP) ||gr full cells were further tested, and it is found that the resistance of cells builds up during cycling due to gelation of the electrolyte, which limits the cycling performance of full cells. Potential strategies to address this limitation are discussed.
Kamble S., Saini D.K., Kumar V., Gautam A.K., Verma S., Tiwari A., Goyal D.
2022-05-19 citations by CoLab: 24
Tiwari A., Garg R.
2022-03-04 citations by CoLab: 21 Abstract  
In the computing world, every company is focusing on the early reservation system. In the early reservation the price, quality of service, time, and everything is maintained and reserved for the user on the due interval. ORRS is a step toward this global vision and specifically designed to act as a flexible reservation supporting multiple services according to user's need and pricing (such as traditional immediate reservation (TIR) request and ORRS reservation. Thus, it is both important and challenging to reserve computing services and the cost of the services in an efficient manner. In the ORRS reservation system, the fuzzy rough set feature selection decreases the dimensional structure and problems of a large database in the computing world. The researcher is now going at a rapid speed in the field of maintaining cost based on decision making like on-demand, reserved, the spot to increase resources utilization and profit. The implementation had done in our research work by the use of cloud simulator.
Gaurav A., Gupta B.B., Panigrahi P.K.
Enterprise Information Systems scimago Q1 wos Q1
2022-01-07 citations by CoLab: 128
OCC
Tiwari A., Sharma R.M.
2021-05-17 citations by CoLab: 14 Abstract  
In the recent trends, cloud computing service users agreed on the concept of pay and use model by accessing all the best services provided by the providers. The major problem here is that there is no standardization so that not everyone coming into the same platform. Now cloud computing efficiently uses time, cost, and effort. In this internet, speed is playing an important role. With the development of each and every field with its proper limitations, the researchers come into the picture that the ontology concept is playing a vital role in the field of computing. The key role of ontology is supporting the knowledge sharing activities. It is giving the set of criteria to prove the use of ontology in the computing world. In the design and development of ontology for computing and mathematics, the information from data centers is very important. The selected design and decisions give efficient and effective results to prove how ontology is playing a vital role in the computing system.
Tiwari A., Sharma R.M., Garg R.
2020-02-24 citations by CoLab: 17 Abstract  
Tiwari, Ashish Sharma, R. M. Garg, RituThe eagle expresses of cloud computing plays a pivotal role in the development of technology. The technology momentum is gaining cloud system environment across the emerging computational intelligence as artificial intelligence in IOTs. It works on the concept of everywhere, everything, and every time service on demand for end users. Developers with innovative ideas for greenhorn Web services do not want the massive capital outlays in hardware to deploy their service or the human expense to regulate it. Cloud computing playing a pivotal role in providing the optimized algorithms for the issues in cloud computing which are the global challenges. The problem aims to solve in such a way that it will provide an optimized solution. Among all these research areas, the works are developing at a rapid speed. The rapid vision, models, and challenges for efficient optimization of resource are in cloud computing world. The key role is of allocating these efficient resources and making the algorithms for its time and cost optimization keeping in consideration of its quality of services and characteristics. These both affecting the performance of these techniques is a major drawback due to low accuracy and large computational complexity of the algorithms. Therefore, the concept of fuzzy system is playing a pivotal role in designing such strategies in which it makes use of the concept fuzzy sets, fuzzy logic and reasoning, fuzzy controllers, rough sets, etc. As per the scenario, the approach of the research is based on technology acceptance model (TAM) and the rough set theory (RST). RST is a great method for making a large difference in qualitative analysis situations. It is a technique to find the knowledge discovery and handle the problems such as inductive reasoning, automatic classification, pattern recognition, learning algorithms, and data reduction. The rough set theory is the new method in cloud service selection so that the best services are provided for cloud users and efficient service improvement for cloud providers. There square measure numerous routes by that its measured, the variety of them square measure as per the following: Feature alternative, security services, algorithmic, mathematical, etc. The simulation of the work is finished at intervals the merchandise utilized for the formation of philosophy framework. The simulation that deals with the IoT services provided by the IoT service supplier to the user is the best utilization with the parameters and ontology technique.
Tiwari A., Sharma R.M.
2019-05-31 citations by CoLab: 6 Abstract  
The continuing innovation across new and existing wireless technologies presents challenges in designing and testing of features, modules, and devices that makes the connected world possible. In computing system, the end users have to follow the basic idea of cloud computing, i.e., pay and use. The most vital continues to be at the forefront offering a full portfolio of test and designing ways that defines the overall process of the computing and its simulation. According to research and development teams, the overall view is verified and issued with all the computing service level agreements. The concept of scheduling is being achieved by the high-performance computing and efficient throughput. Computing system is a heterogeneous view, and the increasing speed of the computer systems and services is increasing rapidly. Cloud computing is the best viral technology which is increasing drastically. The best effective working of cloud computing for the job scheduling is to provide maximum profit to cloud service providers. This algorithm is the future proof, making it easier to evolve with changing technologies and stay on the leading edge. This algorithm efficiency design and test are available to advise, assist, and augment cloud computing all around the world. Fundamentally, the arrangement of standards works for the extraordinary bolstered booking between cloud benefit bearers and cloud clients. The cloud brokers are betting a basic part inside the offerings outfitted by methods for the CSPs.
Tiwari A., Sharma R.M.
2019-04-29 citations by CoLab: 12 Abstract  
Fog Computing provides resources as a service. Various providers are providing the best form of Quality of Services (QoS) which works in the principal of pay per use. Now it is important to connect the Internet of Things (IoT) services in fog computing. The strategy for choosing a service provider is assessed by which cloud provider provides what.
Dhargupta S., Chakraborty A., Ghosal S.K., Saha S., Sarkar R.
2019-01-09 citations by CoLab: 27 Abstract  
This paper proposes a fuzzy edge detection based steganography approach to effectively hide data within images. Instead of applying conventional edge detection algorithms, the method uses a fuzzy edge detection approach in order to estimate more number of pixels where the data can be hidden. At the outset, the cover image is masked and the fuzzy edge detection is performed on the masked image thus retaining edge information. The number of bits to be embedded in a particular pixel is dependent on whether the pixel is an edge pixel, where more bits are embedded. In case the pixel is not an edge pixel and also not a background pixel then the amount of data that is to be embedded depends on the Euclidean distance of the respective pixel from the nearest edge pixel and is determined by the Gaussian function. Experimental results ensure that the scheme offers variable payload with acceptable quality distortion in the stego-image.
Plageras A.P., Psannis K.E., Stergiou C., Wang H., Gupta B.B.
2018-05-01 citations by CoLab: 481 Abstract  
Internet of Things (IoT) provides to everyone new types of services in order to improve everyday life. Through this new technology, other recently developed technologies such as Big Data, Cloud Computing, and Monitoring could take part. In this work, we survey the four aforementioned technologies in order to find out their common operations, and combine their functionality, in order to have beneficial scenarios of their use. Despite the boarder concept of a smart city, we will try to investigate new systems for collecting and managing sensors’ data in a smart building which operates in IoT environment. As a bases technology for the proposed sensor management system, a cloud server would be used, collecting the data that produced from each sensor in the smart building. These data are easy to be managed and controlled from distance, by a remote (mobile) device operating on a network set up in IoT technology. As a result, the proposed solutions for collecting and managing sensors’ data in a smart building could lead us in an energy efficient smart building, and thus in a Green Smart Building.
Stergiou C., Psannis K.E., Kim B., Gupta B.
2018-01-01 citations by CoLab: 798 Abstract  
Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wireless telecommunications. The main goal of the interaction and cooperation between things and objects which sent through the wireless networks is to fulfill the objective set to them as a combined entity. In addition, there is a rapid development of both technologies, Cloud Computing and Internet of Things, regard the field of wireless communications. In this paper, we present a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Specifically, we combine the two aforementioned technologies (i.e Cloud Computing and IoT) in order to examine the common features, and in order to discover the benefits of their integration. Concluding, we present the contribution of Cloud Computing to the IoT technology. Thus, it shows how the Cloud Computing technology improves the function of the IoT. Finally, we survey the security challenges of the integration of IoT and Cloud Computing.
Kumar D., Baranwal G., Raza Z., Vidyarthi D.P.
2017-12-06 citations by CoLab: 41 Abstract  
Amazon offers spot instances to cloud customers using an auction-like mechanism. These instances are dynamically priced and offered at a lower price with less guarantee of availability. Observing the popularity of Amazon spot instances among the cloud users, research has intensified on defining the users’ and providers’ behavior in the spot market. This work presents an exhaustive survey of spot pricing in cloud ecosystem. An insight into the Amazon spot instances and its pricing mechanism has been presented for better understanding of the spot ecosystem. Spot pricing and resource provisioning problem, modeled as a market mechanism, is discussed from both computational and economics perspective. A significant amount of important research papers related to price prediction and modeling, spot resource provisioning, bidding strategy designing etc. are summarized and categorized to evaluate the state of the art in the context. All theoretical frameworks, developed for cloud spot market, are illustrated and compared in terms of the techniques and their findings. Finally, research gaps are identified and various economic and computational challenges in cloud spot ecosystem are discussed as a guide to the future research.
Reddy K.H., Mudali G., Sinha Roy D.
Journal of Cloud Computing scimago Q1 wos Q2 Open Access
2017-03-31 citations by CoLab: 17 PDF Abstract  
Cloud computing has been the enabling technology for shifting mass scale computation and storage requirements from individually owned clients towards an on-demand and utility styled alternative that provides many services. However, cost of maintaining datacenters, keeping the environmental ramifications of data centers at check, providing affordable computation alternative to users still needs to be addressed in a wholesome manner. One of the most exciting and recent research areas in cloud computing has been cloud federations that can mitigate the aforesaid problems. The past decade has seen immense efforts towards interoperability of clouds leading to realistic cloud federations. Motivated by these advancements and equipped with available technologies, this paper presents a detailed account of a cooperative cloud market. It delineates trading mechanisms of such cloud markets, extent of coordination among market players with illustrative examples. It also presents a novel two-phase coordinated resource reservation and provisioning (CRRP) approach that allocates cloud resources to users to meet the goal of minimizing users’ cost. To that end, this paper proposes a novel Most Cost Effective Providers’ Resources First (MCEPRF) algorithm. The efficiency of the proposed algorithm has been tested using synthetic data and the simulation results presented herein demonstrate the superiority of the proposed approach over its non-coordinated counterparts.
Wei L., Cai J., Foh C.H., He B.
2017-01-01 citations by CoLab: 58 Abstract  
As the biggest big data, video data streaming in the network contributes the largest portion of global traffic nowadays and in the future. Due to heterogeneous mobile devices, networks, and user preferences, the demands of transcoding source videos into different versions have increased significantly. However, video transcoding is a time-consuming task, and how to guarantee quality-of-service (QoS) for large video data is very challenging, particularly for those real-time applications that hold strict delay requirement such as live TV. In this paper, we propose a cloud-based online video transcoding (COVT) system aiming to offer economical and QoS guaranteed solution for online large-volume video transcoding. COVT utilizes the performance profiling technique to obtain the different performances of transcoding tasks in different infrastructures. Based on the profiles, we model the cloud-based transcoding system as a queue and derive the QoS values of the system based on the queuing theory. With the analytically derived relationship between QoS values and the number of CPU cores required for transcoding workloads, COVT is able to solve the optimization problem and obtain the minimum resource reservation for specific QoS constraints. A task scheduling algorithm is further developed to dynamically adjust the resource reservation and schedule the tasks so as to guarantee the QoS in runtime. We implement a prototype system of COVT and experimentally study the performance on real-world workloads. Experimental results show that the COVT effectively provisions a minimum number of resources for predefined QoS. To validate the effectiveness of our proposed method under large-scale video data, we further perform simulation evaluation, which again shows that the COVT is capable of achieving economical and QoS-aware video transcoding in cloud environment.
Singh S., Tiwari A.
2025-02-07 citations by CoLab: 0
Sharma H., Singh A.K., Prakash Srivastava M., Katiyar D., Tiwari S., Singh P.
2022-12-23 citations by CoLab: 0
Dora Pravina C.T., Buradkar M.U., Jamal M.K., Tiwari A., Mamodiya U., Goyal D.
2022-12-23 citations by CoLab: 17 Abstract  
An organization can be created through the Industrial Internet of Things (IIoT), which can transform an existing bound structure. The Industrial Internet of Things (IIoT) and its remote organization requirements for current sensors are very productive. The IIoT's introduced sensors monitor the conditions of contemporary machines and devices. Silicon Cloud demonstrated the advantages of modern distributed computing advancements for intelligent and planning applications. As a result, constant quality and security have emerged as the primary concerns in the IIoT. This presents several distinct and consistently increasing wagers on the advanced system. The research deals with the aim of cutting-edge handheld GPS devices. In a similar vein, recent region-based organizations make use of regional data. There is enough fragile data in the region data provided to these area-based expert communities to warrant overemphasis. As a result, experts are working on finding a solution for safe regional data. Most of the investigation frameworks that were suggested were designed to make them believe that the research objectives are fulfilled rather than precise headings of the client's region.
Koppaiyan R.S., Pallivalappil A.S., Singh P., Tabassum H., Tewari P., Sweeti M., Kumar S.
2022-12-23 citations by CoLab: 9 Abstract  
Cryptosystems are getting fascination because of numerous regular likenesses between these two-region disorder hypothesis and cryptography. In symmetric cryptosystems, the same key is utilized for both encryption and decoding reason. By going through these refinements some security aws were observed in these cryptosystems. To overcome these aws an improved scheme is proposed that is resist against the brute force attack, behavior analysis attack and key recovery attack. The proposed plot has a two-venture calculated map that is an input instrument utilizing a critical factor. Finally, there is a correlation between the proposed conspire and one more form of Baptista type cryptosystem, which shows that the proposed plot is superior to the past ones.

Top-30

Publishers

1
2
1
2
  • We do not take into account publications without a DOI.
  • Statistics recalculated only for publications connected to researchers, organizations and labs registered on the platform.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Share
Cite this
GOST | RIS | BibTex | MLA
Found error?