Skip to main content
Top

2018 | OriginalPaper | Chapter

Erudition of Transcendence of Service and Load Scrutinizing of Cloud Services Through Nodular Approach, Rough Clairvoyance Fuzzy C-means Clustering and Ad-judicature Tactic Method

Authors : N. V. Satya Naresh Kalluri, Divya Vani Yarlagadda, Srikanth Sattenapalli, Lavendra S. Bothra

Published in: Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 2

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing is a facsimile for enabling ubiquitous, on-demand access to a shared pool of configurable reckoning resources which can be rapidly provisioned and released with minimal management effort. The services accorded by cloud are benevolent to many patrons. They are many new fangled ways to exert services of cloud but the prominent thing here is transcendence of service of service exerted by patron and the time spend by the patron for using the service. In cloud computing it is very important that patrons should be able to exert the service with exquisite transcendence and also patron should exert the service that he desires without waiting for long time. So the concept induced in this paper is new-fangled method for forthcoming patrons to exert service of desired transcendence and service which has fewer loads among the services available in cloud. Rough Clairvoyance Fuzzy C-means clustering (RCFCM) algorithm is exerted for clustering the services based on service transcendence by congregating feedback testimony from patrons who exerted the service. This RCFCM algorithm helps in giving testimony to forthcoming patrons regarding service transcendence of services available in cloud. While congregating feedback testimony and storing feedback testimony lot of security, fidelity issues arises, so in this paper decision trait is included therefore only valid feedback testimony from patrons is cogitated. Collateral method provides security while congregating feedback testimony. If patrons know which service transcendence is best then everyone tries to ingress only the services with exquisite transcendence and load of services with exquisite transcendence increases. As load increases again it takes lot of time for the patrons to access the service to solve this load predicament ad-judicature is exerted. Unfeigned and proficient co-conspirators are recruited for accomplishing complex and secure tasks in methodology by using nodular method. Therefore the methods induced in this paper are benevolent for the forthcoming patron’s to gain erudition about services transcendence and to exert desired service by patrons that having less load among available services in cloud so that patrons feel ecstatic and satiated by using the cloud services.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Satya Naresh, K.N.V., Yarlagadda, D.V.: Cognizance and ameliorate of quality of service using aggregated intutionistic fuzzy C-means algorithm, abettor-based model, corroboration method and pandect method in cloud computing. In: 2016 IEEE 6th International Conference on Advanced Computing Conference. ISBN 978-1-4673-8286-1 Satya Naresh, K.N.V., Yarlagadda, D.V.: Cognizance and ameliorate of quality of service using aggregated intutionistic fuzzy C-means algorithm, abettor-based model, corroboration method and pandect method in cloud computing. In: 2016 IEEE 6th International Conference on Advanced Computing Conference. ISBN 978-1-4673-8286-1
2.
go back to reference Attanasov, K.T.: Intutionistic fuzzy sets. Fuzzy Sets Syst. 20, 87–96 (1986)CrossRef Attanasov, K.T.: Intutionistic fuzzy sets. Fuzzy Sets Syst. 20, 87–96 (1986)CrossRef
3.
go back to reference Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum, New York (1981)CrossRefMATH Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum, New York (1981)CrossRefMATH
4.
5.
go back to reference Kim, D.W., Lee, K.W., Lee, D.: A novel initialization scheme for the Fuzzy C-means algorithm for colour clustering. Pattern Recogn. Lett. 25, 227–237 (2004)CrossRef Kim, D.W., Lee, K.W., Lee, D.: A novel initialization scheme for the Fuzzy C-means algorithm for colour clustering. Pattern Recogn. Lett. 25, 227–237 (2004)CrossRef
6.
go back to reference Mitra, S., Acharya, T.: Data Mining: Multimedia, Soft Computing, and Bioinformatics. Wiley, New York (2003) Mitra, S., Acharya, T.: Data Mining: Multimedia, Soft Computing, and Bioinformatics. Wiley, New York (2003)
7.
go back to reference Soh, B., Pardede, E., AlZain, M.A.: MCDB: using multi-clouds to ensure security in cloud computing. In: 2011 Ninth IEEE International Conference on Dependable Autonomic and Secure Computing Soh, B., Pardede, E., AlZain, M.A.: MCDB: using multi-clouds to ensure security in cloud computing. In: 2011 Ninth IEEE International Conference on Dependable Autonomic and Secure Computing
8.
go back to reference Wu, M.N., Lin, C.C., Chang, C.C.: Brain tumor detection using color-based k-means clustering segmentation. In: Proceedings of IEEE Third International Conference on Information Hiding and Multimedia Signal Processing, IEEE Explore, California (2007) Wu, M.N., Lin, C.C., Chang, C.C.: Brain tumor detection using color-based k-means clustering segmentation. In: Proceedings of IEEE Third International Conference on Information Hiding and Multimedia Signal Processing, IEEE Explore, California (2007)
10.
go back to reference Xiaoping, X., Junhu, Y.: Research on cloud computing security platform. In: 2012 Fourth International Conference on Computational and Information Science Xiaoping, X., Junhu, Y.: Research on cloud computing security platform. In: 2012 Fourth International Conference on Computational and Information Science
11.
go back to reference Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)CrossRef Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)CrossRef
Metadata
Title
Erudition of Transcendence of Service and Load Scrutinizing of Cloud Services Through Nodular Approach, Rough Clairvoyance Fuzzy C-means Clustering and Ad-judicature Tactic Method
Authors
N. V. Satya Naresh Kalluri
Divya Vani Yarlagadda
Srikanth Sattenapalli
Lavendra S. Bothra
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-63645-0_60

Premium Partner