The first one involves a full copy of the data being sent to each CSP. Another is to divide the data into several blocks; sub-blocks are then sent to each CSP, and to retrieve all the data it is necessary to obtain all the blocks from all the CSPs. Both of these strategies can be efficient for lock-in or downtime problems in a single CSP. On the other hand, the second strategy can be more secure against a dishonest CSP. The CSP cannot retrieve the full original data and breach its privacy and confidentiality.
D. S. Pacifico and T. B. Ludermir are introduce a novel GSO approach based on cooperative behavior among groups, called Cooperative Group Search Optimizer (CGSO). The cooperative behavior is obtained by a divide-and-conquer strategy, where each group is responsible for a limited set of the problem variables, and the final solution is found by combining solutions found by each group. In CGSO, the population members are divided in k independent groups. Each group is associated with d dimensions from the search space (where d x k = n). Each group will execute local searches seeing to minimize its own set of variables.
The value chain can be reconfigured by relocating, reordering, regrouping or eliminating activities that are part of the major improvement in competitive position . The value chain system can provide input on how to effectively and efficiently distribute resources throughout the chain . A value chain can be defined as a framework for describing the activities that are required to convey a product or service from beginning throughout the different stages of production, delivery to the final customer, and last disposal after use . As shown below the figure represents the inter-chain linked within a value chain Figure 1: Links in a value chain  How is a value chain defined? The concept of the value chain was introduced in 1985, its aim is to identify how the business processes can be improved and grow the competitive advantage.
In  white box classification techniques are used to predict the dropouts. Decision trees and rules induction algorithms and evolutionary algorithms are mainly used as the “white box” classification techniques. White box classification algorithms obtain models that can explain their predictions at a higher level of abstraction by IF-THEN rules. A decision tree is a set of conditions organized in a hierarchical structure. An instance can be classified by following the path of satisfied conditions from the root of the tree until a leaf is reached, which corresponds to a class label.
Association Rule Learning (Dependency modeling) is a method that describes associated features in data, searching for relationships between variables. As an example, Web pages that are accessed together can be identified by association analysis. Anomaly Detection (Outlier/change/deviation detection), this class identifies anomalies or outlier data records which cause errors, or might be of interest and requires further investigation. Another class is Clustering, which is the task to discover groups and structures in the data which in some aspect is “similar” or “dissimilar”, without using known structures in the data And the last class, Summarization, attempts to provide a more compact representation of the data set, including visualization and report
Naturally an agent is influenced by many factors other than visible surrounding environment, for example, the personality traits, past memories or experiences etc. Our proposed model is event based considering the visible happened event. In this paper, we have proposed a domain independent emotion elicitation and emotion transition model called EmET. The model is based upon well known appraisal theories of emotions. Moreover, if no external event occurs, the intensity of emotion decays with time.
The attributes function is used for users to focus on defect & classification. Other functions of the statistical process control system are the “In control” & “Out of control” status options. If data listed on the control chart are within the upper & lower limit lines, the process is listed to be “In control” and is capable of producing within the control limits. If the data is plotted outside of either the upper limit or lower limit lines, it is process is listed to be “Out of control”. The In control & Out of control status can also be viewed as functions due to the fact that users can manually change the status of a process
PRINCE2 shares more of the functional and financial authority with senior manager and not solely with project manager. This is a method which provides single standard approach to the management projects and it is very easy to
These activities are divided in two categories Environmental agnostic activities and Environmental specific activities. Now individual activities of these services are depend upon certain factors like automation, technological influence, application size, volume and self-services. For primarily study we considered three services incident management, problem management and change management. Incident Management Incident management is defined as any event that is not the part of the standard operation of service. The objective of Incident management is to maintain and restore the agreed service level agreement as soon as possible and respond to service requests.