2021
DOI: 10.3390/app11209394
|View full text |Cite
|
Sign up to set email alerts
|

Energy-Efficient Cloud Service Selection and Recommendation Based on QoS for Sustainable Smart Cities

Abstract: The growing demand for cloud technology brings several cloud service providers and their diverse list of services in the market, putting a challenge for the user to select the best service from the inventory of available services. Therefore, a system that understands the user requirements and finds a suitable service according to user-customized requirements is a challenge. In this paper, we propose a new cloud service selection and recommendation system (CS-SR) for finding the optimal service by considering t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 60 publications
0
7
0
Order By: Relevance
“…DATA MINING: The process of discovering hidden patterns, trends, and relationships in large amounts of data [65]. It uses techniques and algorithms to analyse large data sets so that valuable information can be discovered to make strategic decisions and improve an organisation's performance [10,40,52,65].…”
Section: Analysis Of the Structure And Evolution Of Recommender Syste...mentioning
confidence: 99%
“…DATA MINING: The process of discovering hidden patterns, trends, and relationships in large amounts of data [65]. It uses techniques and algorithms to analyse large data sets so that valuable information can be discovered to make strategic decisions and improve an organisation's performance [10,40,52,65].…”
Section: Analysis Of the Structure And Evolution Of Recommender Syste...mentioning
confidence: 99%
“…Recent crowd density estimation methodologies are primarily dependent on regression or identification. Detection approaches can be implemented in cases that have a minimum number of persons and no occlusion-like detectors depending on closer frames [11,12]. Other methodologies that depend on regression are of two categories.…”
Section: Introductionmentioning
confidence: 99%
“…The intruder might alter this information, resulting in the misguidance of the receivers. However, IoD access management is a significant variable, and security problems regarding authorization and accessibilities must be emphasized [8,9]. This applies to the data in transfer, which should be protected for confidentiality, authenticity, and integrity.…”
Section: Introductionmentioning
confidence: 99%