scholarly journals Priority based clustering the service providers in federated cloud

2018 ◽  
Vol 7 (2.8) ◽  
pp. 697
Author(s):  
G S Mayuri ◽  
M Saravanan

Cloud is a trending technology now a days. In this technology world now everyone are moving with the cloud. A cloud federation technique is one of the best ways to select any services from the service providers by the user at any time. As large number of service providers in the federation, user need to be select best service provider and the selection of service provider get delayed in the federation. We proposed the cluster based approach to select the best service provider for user request and reducing the selection time of service provider. In previous papers there is no Automated Selection for the selection of best service provider. Our proposed work is based on Automated Selection model i.e., we applied k-means algorithm for grouping the similar services and categorizing the service providers into three groups. Such as Cluster-1, Cluster -2 and Cluster -3, after cluster these cluster sorted in order based on the final centroid of each cluster. Now user request to be compared with the middle cluster centroid and directed to respective cluster for service selection. If more than one service provider offers similar services in the cluster then priority decision tree to be invoked for tie break. This technique works better than existing algorithms and time also to be saved in selection of service.

2021 ◽  
Vol 11 (1) ◽  
pp. 21-51
Author(s):  
Rohit Kumar Tiwari ◽  
Rakesh Kumar

Cloud computing has become a business model and organizations like Google, Amazon, etc. are investing huge capital on it. The availability of many organizations in the cloud has posed a challenge for cloud users to choose a best cloud service. To assist the cloud users, we have proposed a MCDM-based cloud service selection framework to choose a best service provider based on QoS requirement. The cloud service selection methods based on TOPSIS suffers from rank reversal problem as it ranks optimal service provider to non-optimal on addition or removal of a service provider and deludes the cloud user. Therefore, a robust and efficient TOPSIS (RE-TOPSIS)-based novel framework has been proposed to rank the cloud service providers using QoS provided by them and cloud user's priority for each QoS. The proposed framework is robust to rank reversal problem and its effectiveness has been demonstrated through a case study performed on a real dataset. Sensitivity analysis has also been performed to show the robustness against the rank reversal phenomenon.


1977 ◽  
Vol 30 (2) ◽  
pp. 115-119 ◽  
Author(s):  
R. Frankham

SUMMARYAn experimental evaluation of Robertson's (1970) theory concerning optimum intensities of selection for selection of varying durations has been carried out using published results from a long term selection study in Drosophila. Agreement of predicted rankings of treatments with expectations was excellent for low values of t/T (generations/total number scored) but poor for larger values of t/T. This was due to the 20% selection intensity treatments responding worse than expected and the 40% treatments relatively better than expected. Several possible reasons for the discrepancies exist but the most likely explanation is considered to be the greater reduction in effective population size due to selection in treatments with more intense selection.


Author(s):  
Sebastian Stein ◽  
Terry R. Payne ◽  
Nicholas R. Jennings

As grids become larger and more interconnected in nature, scientists can benefit from a growing number of distributed services that may be invoked on demand to complete complex computational workflows. However, it also means that these scientists become dependent on the cooperation of third-party service providers, whose behaviour may be uncertain, failure prone and highly heterogeneous. To address this, we have developed a novel decision-theoretic algorithm that automatically selects appropriate services for the tasks of an abstract workflow and deals with failures through redundancy and dynamic re-invocation of functionally equivalent services. In this paper, we summarize our approach, describe in detail how it can be applied to a real-world bioinformatics workflow and show that it offers a significant improvement over current service selection techniques.


Author(s):  
Shih-Ming Ou

Compared with general commercial reverse logistics operators, the recovery and treatment of expired drugs and medical waste is a complex and highly technically difficult project. The qualifications required by the relevant service providers are also more stringent. For medical institutions, the selection of reverse logistics operators is always a critical issue. On the perspective of sustainability, this paper aims to investigate and explore the critical factors of selecting a medical reverse logistics service provider. Through the process of the Delphi method, the experts’ assessments were collected, and 24 factors affecting the selection of medical reverse logistics service provider were screened and summarized. Then, Decision-Making Trial and Evaluation Laboratory (DEMATEL) was employed to calculate the total influence values and net influence values between factors that could be used to draw the visual causal map. Referring the causal map, “Green process operation level” and “Recycling process greening degree” are significantly higher than other factors in terms of total influence value and net influence value. Therefore, they can be regarded as crucial factors. This finding implies that medical reverse logistics providers must have the ability to improve the greening of facilities, as well as equipment, integrating existing processes to make it greener and environmentally friendly.


2020 ◽  
Vol 31 (4) ◽  
pp. 411-424
Author(s):  
Han Lai ◽  
Huchang Liao ◽  
Zhi Wen ◽  
Edmundas Kazimieras Zavadskas ◽  
Abdullah Al-Barakati

With the rapid growth of available online cloud services and providers for customers, the selection of cloud service providers plays a crucial role in on-demand service selection on a subscription basis. Selecting a suitable cloud service provider requires a careful analysis and a reasonable ranking method. In this study, an improved combined compromise solution (CoCoSo) method is proposed to identify the ranking of cloud service providers. Based on the original CoCoSo method, we analyze the defects of the final aggregation operator in the original CoCoSo method which ignores the equal importance of the three subordinate compromise scores, and employ the operator of “Linear Sum Normalization” to normalize the three subordinate compromise scores so as to make the results reasonable. In addition, we introduce a maximum variance optimization model which can increase the discrimination degree of evaluation results and avoid inconsistent ordering. A numerical example of the trust evaluation of cloud service providers is given to demonstrate the applicability of the proposed method. Furthermore, we perform sensitivity analysis and comparative analysis to justify the accuracy of the decision outcomes derived by the proposed method. Besides, the results of discrimination test also indicate that the proposed method is more effective than the original CoCoSo method in identifying the subtle differences among alternatives.


Author(s):  
Aimrudee Jongtaveesataporn ◽  
Shingo Takada

The selection of services is a key part of Service Oriented Architecture (SOA). Services are primarily selected based on function, but Quality of Service (QoS) is an important factor when choosing among several services with the same function. But current service selection approaches often takes time to unnecessarily recompute requests. Furthermore, if the same service is chosen as having the "best" QoS for multiple selections, this may result in that service having too much load. We thus propose the FASICA (FAst service selection for SImilar constraints with CAche) Framework which chooses a service with satisfactory QoS as quickly as possible. The key points are (1) to use a cache which stores previous search results, (2) to use K-Nearest Neighbor (K-NN) algorithm with K-d tree when a satisfactory service does not exist in the cache, and (3) to distribute the service request according to a distribution policy. Results of simulations show that our framework can rapidly select a service compared to a conventional approach.


2013 ◽  
Vol 10 (3) ◽  
pp. 1-23 ◽  
Author(s):  
Elisa Costante ◽  
Federica Paci ◽  
Nicola Zannone

Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers. Most existing service selection schemas only focus on QoS properties of services such as throughput, latency and response time, or on their trust and reputation level. By contrast, the risk of privacy breaches arising from the selection of component services whose privacy policy is not compliant with customers’ privacy preferences is largely ignored. In this paper, the authors propose a novel privacy-preserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users’ privacy requirements and providers’ privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer. The authors illustrate their approach using an eCommerce Web service as an example of service composition. Moreover, the authors present a possible Java-based implementation of the proposed approach and present an extension to WS-Policy standard to specify privacy related assertions.


2015 ◽  
pp. 1653-1675
Author(s):  
Elisa Costante ◽  
Federica Paci ◽  
Nicola Zannone

Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers. Most existing service selection schemas only focus on QoS properties of services such as throughput, latency and response time, or on their trust and reputation level. By contrast, the risk of privacy breaches arising from the selection of component services whose privacy policy is not compliant with customers' privacy preferences is largely ignored. In this paper, the authors propose a novel privacy-preserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users' privacy requirements and providers' privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer. The authors illustrate their approach using an eCommerce Web service as an example of service composition. Moreover, the authors present a possible Java-based implementation of the proposed approach and present an extension to WS-Policy standard to specify privacy related assertions.


2020 ◽  
Vol 1 (7) ◽  
pp. 36-41
Author(s):  
P. Yu. GROSHEVA ◽  
◽  
Yu. D. MYAKISHEV ◽  
A. A. KHAKHALINA ◽  
E. S. KAPLUN ◽  
...  

In the context of the impending economic crisis, the issue of choosing a service provider by high-tech organizations is becoming significant. To solve this issue, the article proposes an author's method of evaluating service providers, which can find practical application in the activities of modern high-tech organizations. The approach proposed by the authors allows the selection of service providers based on a number of criteria confirming the reliability and competence of the provider.


2019 ◽  
Vol 3 (2) ◽  
pp. 108-109
Author(s):  
Muhammad Shoaib Akhtar ◽  
Taslim Rubab ◽  
Ummair Mehmood

Primary and Secondary Healthcare Department of Punjab, Pakistan has outsourced its clinical laboratory services at various secondary level hospitals in the province. Methodology adapted to outsource these facilities was based on phasing out the process. While methodology adapted to selection of service provider was on the basis of bidding. Two service providers contracted the procuring agency to deliver services to general public. In the first phase, clinical laboratory services of DHQ Hospital Chakwal were outsourced to a private laboratory service of the country. This communication aims on the methods adopted by Pathology Department of the hospital to evaluate the technical efficiency of the service.


Sign in / Sign up

Export Citation Format

Share Document