The fog computing models are getting popular as the demand and capacity of data processing is rising for the various applications every year. The fog computing models incorporate the various task scheduling algorithms for the resource selection among the given list of virtual machines (VMs). The task scheduling models are designed around the various task metrics, which include the task length (time), energy, processing cost etc. for the various purposes. The cost oriented scheduling models are primarily built for the customer's perspectives, and saves them a handful amount of money by efficiently assigning the resources for the tasks. In this paper, we have worked upon the multiple task scheduling models based upon the Local Regression (LR), Inter Quartile Range (IQR), Local Regression Robust (LRR), Non-Power Aware (NPA), Median Absolute Deviation (MAD), Dynamic Voltage and Frequency Scheduling (DVFS) and The Static Threshold (THR) methods using the ifogsim simulation designed with the 50 nodes and 50 virtual machines, i.e. 1 virtual machine per node. All of the models have been implemented using the standard input simulation parameters for the purpose of performance assessment in the various domains, specifically in the time domain and effective consumption of energy. The results obtained from the experiments have shown the overall time of 86,400 seconds during the simulation, where the DVFS has been recorded with the 52.98 kWh consumption of energy, which shows the efficient processing in comparison to the 150.68 kWh of energy consumption in the NPA model. Also, there are no SLA violations recorded during both of the simulation, because no VM migration model has been utilized among both of the implemented models, which clearly shows that the VM migrations are the major cause of SLA violation cases. The LRR (2520 VMs) has been observed as best contender on the basis of mean of number of VM migrations in comparison with LR (2555 VMs), THR (4769 VMs), MAD (5138 VMs) and IQR (5352 VMs).
-Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is the technology that attempts to ruin the Steganography by detecting the hidden information and extracting. Steganography is the process of Data embedding in the images, text/documented, audio and video files. The paper also highlights the security improved by applying various techniques of video steganography.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.