2017
DOI: 10.22266/ijies2017.0831.26
|View full text |Cite
|
Sign up to set email alerts
|

An Approach to Evaluate the Availability of System in Cloud Computing Using Fault Tree Technique

Abstract: Abstract:The Fault tree furnishes an engraving and analytical structure to dissect the dependability of systems. A fault tree gives an abstractly essential demonstrating schema to embody the level of system communications among all the component reliabilities in cloud computing environment. Fault tree Investigation is that fundamental technique which concentrates on failure modes for whatever system and the probabilities for occurrence/ likelihood risk dissection connected with it. Fault Tree Analysis signifie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Although these studies have their contributions, we can improve some of the shortcomings. Researchers focus only on image denoising, but finding the position of the QR code is an important part of QR decoding [13,14,15,16,17] They did not propose their method for dealing with this problem. Previous work requires a great deal of calculation.…”
Section: Related Workmentioning
confidence: 99%
“…Although these studies have their contributions, we can improve some of the shortcomings. Researchers focus only on image denoising, but finding the position of the QR code is an important part of QR decoding [13,14,15,16,17] They did not propose their method for dealing with this problem. Previous work requires a great deal of calculation.…”
Section: Related Workmentioning
confidence: 99%
“…The different operations include to manage devices, creation of rest layers to return the information fetched from these devices, creation of CLI functionality and Automation scripts that test the developed functionality. The objective is achieved when the code makes it to the release of the product [3]. IBM PurePower provides prebuilt and pre-integrated security at several levels, from the hardware architecture to the software stack [13].…”
Section: Literature Surveymentioning
confidence: 99%
“…Arrangements and instruments inside this new mechanical worldview can catch, oversee and examine enormous measurements of organized and shapeless information to expand transportation area and to fathom the difficulties presented previously [4,5,6]. The end amusement is to guarantee that the vehicle business gets an incentive from its information, which for the specific instance of transportation will convert into future advancements concentrating on approaches to give more secure, cleaner and increasingly effective transport strategies and charming transportation encounters to its end clients [7,8,9]. Among this arrangement of information serious applications, traffic the executives can be viewed by way of one of the conditions inside transport and portability wherever information have assumed a focal job even formerly the coming of Vast Data [10,11,12].…”
Section: Introductionmentioning
confidence: 99%