2021
DOI: 10.1007/s12652-021-03005-2
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Multi-parameter optimization for load balancing with effective task scheduling and resource sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
16
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 29 publications
0
16
0
Order By: Relevance
“…Here, these two software are integrated and provides a bridge using API. On the other hand, it needs effective accessing control as well as various authorization strategies containing policies and rules involved in the delivery of services and software development 7–23 …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, these two software are integrated and provides a bridge using API. On the other hand, it needs effective accessing control as well as various authorization strategies containing policies and rules involved in the delivery of services and software development 7–23 …”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, it needs effective accessing control as well as various authorization strategies containing policies and rules involved in the delivery of services and software development. [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] The public API is established in such a way that the software can be accessed by anyone. In addition to this, the public API comprises limited capabilities that provide a security threat to the rear end-system.…”
mentioning
confidence: 99%
“…This step also minimizes the monetary cost and maximizes availability. When hosting the data in the cloud, providing high data availability and minimizing the expense is the main problem that is not focused on by the state‐of‐art techniques 1,10–15 . The existing techniques also fail to incorporate different important metrics such as data availability, storage cost, network cost and so forth.…”
Section: Introductionmentioning
confidence: 99%
“…When hosting the data in the cloud, providing high data availability and minimizing the expense is the main problem that is not focused on by the state-of-art techniques. 1,[10][11][12][13][14][15] The existing techniques also fail to incorporate different important metrics such as data availability, storage cost, network cost and so forth. To overcome the vendor lock-in problem various optimization techniques are used and the major contributions proposed in this article are presented as follows:…”
Section: Introductionmentioning
confidence: 99%
“…4 The traditional machine learning methods had higher dimensionality; higher execution time for data classification, most of the authors failed to describe different kinds of attacks, higher cost, speed, and time omitting important features in data and so forth. 2,[6][7][8][9][10][11][12] The conventional deep learning techniques like deep feed-forward neural network (DNN), long short term memory (LSTM), and convolutional neural network (CNN), and so on met fewer performances in terms of feature selection, poor hardware infrastructure, higher computational complexities and so forth. 13 To tackle these challenges, we proposed convolutional neural network-based Hybrid Whale Tabu Optimization (CNN-HWTO) algorithm for intrusion detection.…”
mentioning
confidence: 99%