2022
DOI: 10.11591/eei.v11i2.3286
|View full text |Cite
|
Sign up to set email alerts
|

Cloud resources modelling using smart cloud management

Abstract: Cloud computing complexity is growing rapidly with the advancements that it is witnessing. It has created a requirement to simplify the process of configuring cloud and re-configuring it when required, it also involves tasks like auto scaling of infrastructure, elastic computing and maintaining the health of the servers. The proposed method introduces a smart cloud management using knowledge base, which models the resources of cloud; it handles service level agreement and its evaluations. The proposed knowledg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…26, No. 3, June 2022: 1747-1757 1748 [1]- [6]. Results show that the privacy preservation scheme that has been proposed in this research manages to protect the privacy, but those algorithms involve creation of fake transaction and the algorithm also fails to maintain the privacy related to data frequency.…”
Section: Introductionmentioning
confidence: 89%
“…26, No. 3, June 2022: 1747-1757 1748 [1]- [6]. Results show that the privacy preservation scheme that has been proposed in this research manages to protect the privacy, but those algorithms involve creation of fake transaction and the algorithm also fails to maintain the privacy related to data frequency.…”
Section: Introductionmentioning
confidence: 89%
“…This is accomplished by combining cybersecurity techniques with machine learning approaches. In the early discovery and diagnosis of any medical issues, this is very helpful [10,11,12,13].…”
Section: Accept/ Rejectmentioning
confidence: 99%
“…Machine learning emphasizes generalization and empirical data, but deep learning uses artificial neural networks designed to mimic the cognitive procedures of individuals [9] Up until recently, the complexity of neural networks was constrained by the computing power available Businesses can better deploy their resources because it cuts down on the time spent on repetitive tasks. In summary, deep learning can improve cybersecurity by making it simpler, more preventative, less expensive, and more efficient [10]. This, however, will only be feasible if the machine learning data supports a precise representation of the environment.…”
Section: Introductionmentioning
confidence: 99%