Proposed Heuristics Model Optimizing the Risk on RTS

Proposed Heuristics Model Optimizing the Risk on RTS

PL Pradhan (Computer Science & Engineering, GITAS Gokul Grp, VZM, AP, India)
Copyright: © 2017 |Pages: 21
DOI: 10.4018/IJSDA.2017040102
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The author's objective is resolve the unstable, uncertainty problems of complex technology on right time and right place of ever where & every time in around the globe. It should be more accountable for performance, fault tolerance, throughput, bench marking and risk assessment on any application on any time. This work would optimize the technology & resource cost and maximizes the business (throughput) based on dynamic heuristics model over a multiple business and location. The subject and object can able to integrate, synchronize, communicate and optimize through RTOS and optimizing them step by step of heuristic function, that have been highlighted in proposed pattern for development and production purpose. This work has to define, design, development and deployment this mechanism to prevent the data & services on RTOS from external hackers, theft, uncertainty, un-order, un-setup and unsafe environment. Therefore, this proposed dynamic heuristics pattern for risk optimization on RTOS based on available technology, business & resources for anti-fragile technology.
Article Preview

1. Introduction

Now a day increasing the use of clients, business and computer & communications system by IT industries has increased the risk of theft of proprietary information. The operating system control & audit is a primary method of protecting system resources (Processor, Memory & Encryption Key). The system control is probably the most important aspect of communications security and becoming increasingly important as basic building block for computer security. The preventive control is inversely proportional to the Risk & mean while control is directly proportional to the quality of standard(S).

There are various kinds of controls mechanism available and implemented on operating system to protect our IT assets for external & internal hacker. The operating system consists of three main components such as, file, shell & kernel. The processor & memory is the core component of any type operating system. The processor and kernel is fully functional dependency on each other, but file and shell is the communication components of the OS. We can improve the performance of OS by updating the kernel time to time. Kernel is the Nucleus of the operating system (O’ Reilly, 1995) (see Figure 1).

Figure 1.

TBR

The operating system (server system) is a large scale has even greater responsibilities and powers for large scale multiple business for multiple products & clients like web based and mobile computing. It is just like a traffic management system, it makes sure that different tools, application, programs and software packages, the users and clients running at the same time do not interfere with each other (Coriolis,2002; Kai, 2008; Stalling, 2006).

The multi programming, time shearing, parallel programming is solving our objective in right time and right way over a multiple Relation, Function, Operation & Services on heterogeneous complex infrastructure. The complex operating system is also responsible for risk and security ensuring that unauthorized users do not access the system (Kai, 2008).

All major computer platforms (hardware and software) require and sometimes include an operating system. HP_UX, Sun solaria, AIX, LINUX, WINDOW, NT, WIN2000, VME, OS/400, z/OS and VMware all examples of large scale operating systems.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 7: 4 Issues (2018): 1 Released, 3 Forthcoming
Volume 6: 4 Issues (2017)
Volume 5: 4 Issues (2016)
Volume 4: 4 Issues (2015)
Volume 3: 4 Issues (2014)
Volume 2: 4 Issues (2013)
Volume 1: 4 Issues (2012)
View Complete Journal Contents Listing