Energy usage of data centers is a challenging and complex issue because computing applications and data are growing so quickly that increasingly larger servers and disks are needed to process them fast enough within the required time period. In the past few years, many approaches to virtual machine placement have been proposed. This study proposes a new approach for virtual machine allocation to physical hosts. Either minimizes the physical hosts and avoids the SLA violation. The proposed method in comparison to the other algorithms achieves better results.
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environmentrahulmonikasharma
Cloud computing is an incipient and quickly evolving model, with new expenses and capabilities being proclaimed frequently. The increases of user on cloud with the expansion of variety of services, with that the complete allocation of resource with the minimum latent time for Virtual machine is necessary. To allocate this virtual cloud computing resources to the cloud user is a key technical issue because user demand is dynamic in nature that required dynamic allocation of resource too. To improve the allocation there must be a correct balanced algorithmic scheduling for Resource Allocation Technique. The aim of this work is to allocate resource to scientific experiment request coming from multiple users, wherever customized Virtual machines (VM) are aloft in applicable host out there in cloud. Therefore, properly programmed scheduling cloud is extremely vital and it’s significant to develop efficient scheduling methods for appropriately allocation of VMs into physical resource. The planned formulas minimize the time interval quality so as of O (Log n) by adopting KD-Tree.
An Approach to Reduce Energy Consumption in Cloud data centers using Harmony ...ijccsa
Fast development of knowledge and communication has established a new computational style which is
known as cloud computing. One of the main issues considered by the cloud infrastructure providers, is to
minimize the costs and maximize the profitability. Energy management in the cloud data centers is very
important to achieve such goal. Energy consumption can be reduced either by releasing idle nodes or by
reducing the virtual machines migrations. To do the latter, one of the challenges is to select the placement
approach of the migrated virtual machines on the appropriate node. In this paper, an approach to reduce
the energy consumption in cloud data centers is proposed. This approach adapts harmony search
algorithm to migrate the virtual machines. It performs the placement by sorting the nodes and virtual
machines based on their priority in descending order. The priority is calculated based on the workload.
The proposed approach is simulated. The evaluation results show the reduction in the virtual machine
migrations, the increase of efficiency and the reduction of energy consumption.
KEYWORDS
Energy Consumption, Virtual Machine Placement, Harmony Search Algorithm, Server Consolidati
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Energy-Aware Adaptive Four Thresholds Technique for Optimal Virtual Machine P...IJECEIAES
With the increasing expansion of cloud data centers and the demand for cloud services, one of the major problems facing these data centers is the “increasing growth in energy consumption ". In this paper, we propose a method to balance the burden of virtual machine resources in order to reduce energy consumption. The proposed technique is based on a four-adaptive threshold model to reduce energy consumption in physical servers and minimize SLA violation in cloud data centers. Based on the proposed technique, hosts will be grouped into five clusters: hosts with low load, hosts with a light load, hosts with a middle load, hosts with high load and finally, hosts with a heavy load. Virtual machines are transferred from the host with high load and heavy load to the hosts with light load. Also, the VMs on low hosts will be migrated to the hosts with middle load, while the host with a light load and hosts with middle load remain unchanged. The values of the thresholds are obtained on the basis of the mathematical modeling approach and the 퐾-Means Clustering Algorithm is used for clustering of hosts. Experimental results show that applying the proposed technique will improve the load balancing and reduce the number of VM migration and reduce energy consumption.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Time Efficient VM Allocation using KD-Tree Approach in Cloud Server Environmentrahulmonikasharma
Cloud computing is an incipient and quickly evolving model, with new expenses and capabilities being proclaimed frequently. The increases of user on cloud with the expansion of variety of services, with that the complete allocation of resource with the minimum latent time for Virtual machine is necessary. To allocate this virtual cloud computing resources to the cloud user is a key technical issue because user demand is dynamic in nature that required dynamic allocation of resource too. To improve the allocation there must be a correct balanced algorithmic scheduling for Resource Allocation Technique. The aim of this work is to allocate resource to scientific experiment request coming from multiple users, wherever customized Virtual machines (VM) are aloft in applicable host out there in cloud. Therefore, properly programmed scheduling cloud is extremely vital and it’s significant to develop efficient scheduling methods for appropriately allocation of VMs into physical resource. The planned formulas minimize the time interval quality so as of O (Log n) by adopting KD-Tree.
An Approach to Reduce Energy Consumption in Cloud data centers using Harmony ...ijccsa
Fast development of knowledge and communication has established a new computational style which is
known as cloud computing. One of the main issues considered by the cloud infrastructure providers, is to
minimize the costs and maximize the profitability. Energy management in the cloud data centers is very
important to achieve such goal. Energy consumption can be reduced either by releasing idle nodes or by
reducing the virtual machines migrations. To do the latter, one of the challenges is to select the placement
approach of the migrated virtual machines on the appropriate node. In this paper, an approach to reduce
the energy consumption in cloud data centers is proposed. This approach adapts harmony search
algorithm to migrate the virtual machines. It performs the placement by sorting the nodes and virtual
machines based on their priority in descending order. The priority is calculated based on the workload.
The proposed approach is simulated. The evaluation results show the reduction in the virtual machine
migrations, the increase of efficiency and the reduction of energy consumption.
KEYWORDS
Energy Consumption, Virtual Machine Placement, Harmony Search Algorithm, Server Consolidati
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Energy-Aware Adaptive Four Thresholds Technique for Optimal Virtual Machine P...IJECEIAES
With the increasing expansion of cloud data centers and the demand for cloud services, one of the major problems facing these data centers is the “increasing growth in energy consumption ". In this paper, we propose a method to balance the burden of virtual machine resources in order to reduce energy consumption. The proposed technique is based on a four-adaptive threshold model to reduce energy consumption in physical servers and minimize SLA violation in cloud data centers. Based on the proposed technique, hosts will be grouped into five clusters: hosts with low load, hosts with a light load, hosts with a middle load, hosts with high load and finally, hosts with a heavy load. Virtual machines are transferred from the host with high load and heavy load to the hosts with light load. Also, the VMs on low hosts will be migrated to the hosts with middle load, while the host with a light load and hosts with middle load remain unchanged. The values of the thresholds are obtained on the basis of the mathematical modeling approach and the 퐾-Means Clustering Algorithm is used for clustering of hosts. Experimental results show that applying the proposed technique will improve the load balancing and reduce the number of VM migration and reduce energy consumption.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Load shedding in power system using the AHP algorithm and Artificial Neural N...IJAEMSJORNAL
This paper proposes the load shedding method based on considering the load importance factor, primary frequency adjustment, secondary frequency adjustment and neuron network. Consideration the process of primary frequency control, secondary frequency control helps to reduce the amount of load shedding power and restore the system’s frequency to the permissible range. The amount of shedding power of each load bus is distributed based on the load importance factor. Neuron network is applied to distribute load shedding strategies in the power system at different load levels. The experimental and simulated results on the IEEE 37- bus system present the frequency can restore to allowed range and reduce the damage compared to the traditional load shedding method using under frequency relay- UFLS.
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKijwmn
Wireless Sensor Networks (WSN) have extensively deployed in a wide range of applications. However, WSN still faces several limitations in processing capabilities, memory, and power supply of sensor nodes. It is required to extend the lifetime of WSN. Mainly this is achieved by routing protocols choosing the best transmission path in-network with desired power conservation.This cause is developing a generic protocol framework for WSNa big challenge. This work proposed a new routing technique, described as Hybrid Routing-Clustering (HRC) model. This new approach takes advantage of clustering and routing procedures defined in K-Mean clustering and AODV routing, which constituted of three phases. This development aims to achieve enhanced power conservation rate in consequence network lifetime. An extensive evaluation methodology utilized to measure the performance of the proposed model in simulated scenarios.The results categorized in terms of the average amount of packet received and power conservation rate. The Hybrid Routing-Clustering (HRC) model was determined, showed enhanced results regarding both parameters. In the end, they are comparing these results with well-known routing and well-known clustering algorithms.
Tremendous usage of internet has made huge data on the network, without compromising on the
performance of network the end-users must obtain best service. As cloud provides different services on
leasing basis many companies are migrating from their own Infrastructure to cloud,This migration should
not compromise on performance of the cloud, The performance of the cloud can be improved by having
excellent load balancing strategy such that the end user is satisfied. The paper reveals the method by which
a cloud can be partitioned and a study of different algorithm with comparative study to balance the
dynamic load. The comparative study between Ant Colony and Honey Bee algorithm gives the result which
algorithm is optimal in normal load condition also the simplest round robin algorithm is applied when the
partition are in Idle state
PROCESS OF LOAD BALANCING IN CLOUD COMPUTING USING GENETIC ALGORITHMecij
The running generation of world, cloud computing has become the most powerful, chief and also lightning technology. IT based companies has already changed their way to buy and design hardware through this technology. It is a high utility which can also make software more attractive. Load balancing research in
cloud technology is one of the burning technologies in modern time. In this paper, pointing various proposed algorithms, the topic of load balancing in Cloud Computing are researched and compared to provide a gist of the latest way in this research area. By using Genetic Algorithm the balance is most
flexible which is represented here.
A SURVEY ON REDUCING ENERGY SPRAWL IN CLOUD COMPUTINGaciijournal
Cloud computing is the cluster of autonomic computing, grid computing and utility computing. Cloud
providers are there to rescue their customers from the problem of dynamism. The providers focus on
resource sharing and in improving the performance. Energy consumption is the major factor to degrade the
performance. Reducing energy sprawl will bloom the performance. This paper delineates the different
techniques involved in scheduling the workload of the servers in order to minimize the energy sprawl.
UnaCloud is an opportunistic based cloud infrastructure
(IaaS) that allows to access on-demand computing
capabilities using commodity desktops. Although UnaCloud
tried to maximize the use of idle resources to deploy virtual
machines on them, it does not use energy-efficient resource
allocation algorithms. In this paper, we design and implement
different energy-aware techniques to operate in an energyefficient
way and at the same time guarantee the performance
to the users. Performance tests with different algorithms and
scenarios using real trace workloads from UnaCloud, show how
different policies can change the energy consumption patterns
and reduce the energy consumption in opportunistic cloud
infrastructures. The results show that some algorithms can
reduce the energy-consumption power up to 30% over the
percentage earned by opportunistic environment.
Genetic related clustering for reducing energy consumption in wireless sensor...eSAT Journals
Abstract A wireless sensor network is made up of large number of mote (sensor node). Mote has limited battery power. Mote need to perform different type of task like monitor an area, sense the data, collect this data and send this data to base station. As mote (sensor node) need to do such a task it requires more battery power.so it is necessary to save energy of mote by reducing energy consumption.one can use clustering to reduce energy consumption. Clustering is grouping of mote. Energy consumption can be reduced by using intelligent hierarchical techniques for clustering. Various artificial intelligent techniques can be integrated with clustering better result can be achieved. Key Words: Wireless sensor network, Genetic algorithm, Clustering
A Survey of Job Scheduling Algorithms Whit Hierarchical Structure to Load Ba...Editor IJCATR
Due to the advances in human civilization, problems in science and engineering are becoming more complicated than ever
before. To solve these complicated problems, grid computing becomes a popular tool. a grid environment collects, integrates, and uses
heterogeneous or homogeneous resources scattered around the globe by a high-speed network. Scheduling problems are at the heart of
any Grid-like computational system. a good scheduling algorithm can assign jobs to resources efficiently and can balance the system
load. in this paper we survey three algorithms for grid scheduling and compare benefit and disadvantages of their based on makespan.
Proposing a New Job Scheduling Algorithm in Grid Environment Using a Combinat...Editor IJCATR
Grid computing is a hardware and software infrastructure and provides affordable, sustainable, and reliable access. Its aim is
to create a supercomputer using free resources. One of the challenges to the Grid computing is scheduling problem which is regarded
as a tough issue. Since scheduling problem is a non-deterministic issue in the Grid, deterministic algorithms cannot be used to improve
scheduling. In this paper, a combination of imperialist competition algorithm (ICA) and gravitational attraction is used for to address the
problem of independent task scheduling in a grid environment, with the aim of reducing the makespan and energy. Experimental results
compare ICA with other algorithms and illustrate that ICA finds a shorter makespan and energy relative to the others. Moreover, it
converges quickly, finding its optimum solution in less time than the other algorithms.
An enhanced adaptive scoring job scheduling algorithm with replication strate...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...IDES Editor
Cross-layer design is important in wireless ad hoc
network and the power control methods. Power control is the
intelligent selection of transmit power in a communication to
achieve the better performance within the system. Cross-layer
is used to sharing the information between the layers. CLD
using LOADPOWER (LOADPOW) control protocol is reduce
the overall end-end delay in transmission power. So many
power control schemes are dealt in network layer but this
work Power control protocol was done in MAC layer and it
plays a vital role. A MAC approach to power control only does
a local optimization whereas network layer is capable of a
global optimization. Simulation was done in NS-2 simulator
with the performance metrics as throughput, and energy
consumption and end-end delay. The key concept is to improve
the throughput, saves energy by sending all the packets with
optimal transmit power according to the network load,
transmission power was given, when the network load is low,
higher transmission power gives lower end-end delay and viceversa.
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...IJECEIAES
Cloud Computing is the most powerful computing model of our time. While the major IT providers and consumers are competing to exploit the benefits of this computing model in order to thrive their profits, most of the cloud computing platforms are still built on operating systems that uses basic CPU (Core Processing Unit) scheduling algorithms that lacks the intelligence needed for such innovative computing model. Correspdondingly, this paper presents the benefits of applying Artificial Neural Networks algorithms in regards to enhancing CPU scheduling for Cloud Computing model. Furthermore, a set of characteristics and theoretical metrics are proposed for the sake of comparing the different Artificial Neural Networks algorithms and finding the most accurate algorithm for Cloud Computing CPU Scheduling.
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETScsandit
The ability to mine and extract useful information automatically, from large datasets, is a
common concern for organizations (having large datasets), over the last few decades. Over the
internet, data is vastly increasing gradually and consequently the capacity to collect and store
very large data is significantly increasing.
Existing clustering algorithms are not always efficient and accurate in solving clustering
problems for large datasets.
However, the development of accurate and fast data classification algorithms for very large
scale datasets is still a challenge. In this paper, various algorithms and techniques especially,
approach using non-smooth optimization formulation of the clustering problem, are proposed
for solving the minimum sum-of-squares clustering problems in very large datasets. This
research also develops accurate and real time L2-DC algorithm based with the incremental
approach to solve the minimum
A hybrid algorithm to reduce energy consumption management in cloud data centersIJECEIAES
There are several physical data centers in cloud environment with hundreds or thousands of computers. Virtualization is the key technology to make cloud computing feasible. It separates virtual machines in a way that each of these so-called virtualized machines can be configured on a number of hosts according to the type of user application. It is also possible to dynamically alter the allocated resources of a virtual machine. Different methods of energy saving in data centers can be divided into three general categories: 1) methods based on load balancing of resources; 2) using hardware facilities for scheduling; 3) considering thermal characteristics of the environment. This paper focuses on load balancing methods as they act dynamically because of their dependence on the current behavior of system. By taking a detailed look on previous methods, we provide a hybrid method which enables us to save energy through finding a suitable configuration for virtual machines placement and considering special features of virtual environments for scheduling and balancing dynamic loads by live migration method.
A load balancing strategy for reducing data loss risk on cloud using remodif...IJECEIAES
Cloud computing always deals with new problems to fulfill the demand of the challenging organizations around the whole world. Reducing response time without the risk of data loss is a very critical issue for the user requests on cloud computing. Load balancing ensures quick response of virtual machine (VM), proper usage of VMs, throughput, and minimal cost of VMs. This paper introduces a re-modified throttled algorithm (RTMA) that reduces the risk of data hampering and data loss considering the availability of VM which increases system’s performance. Response time of virtual machines have been considered in our work, so that when migration process is running, data will not be overflowed in the VMs. Thus, the data migration process becomes high and reliable. We have completed the overall simulation of our proposed algorithm on the cloud analyst tool and successfully reduced the risk of data loss as well as maintains the response time.
A survey to harness an efficient energy in cloud computingijujournal
Cloud computing affords huge potential for dynamism, flexibility and cost-effective IT operations. Cloud computing requires many tasks to be executed by the provided resources to achieve good performance, shortest response time and high utilization of resources. To achieve these challenges there is a need to develop a new energy aware scheduling algorithm that outperform appropriate allocation map of task to
optimize energy consumption. This study accomplished with all the existing techniques mainly focus on reducing energy consumption.
Load shedding in power system using the AHP algorithm and Artificial Neural N...IJAEMSJORNAL
This paper proposes the load shedding method based on considering the load importance factor, primary frequency adjustment, secondary frequency adjustment and neuron network. Consideration the process of primary frequency control, secondary frequency control helps to reduce the amount of load shedding power and restore the system’s frequency to the permissible range. The amount of shedding power of each load bus is distributed based on the load importance factor. Neuron network is applied to distribute load shedding strategies in the power system at different load levels. The experimental and simulated results on the IEEE 37- bus system present the frequency can restore to allowed range and reduce the damage compared to the traditional load shedding method using under frequency relay- UFLS.
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKijwmn
Wireless Sensor Networks (WSN) have extensively deployed in a wide range of applications. However, WSN still faces several limitations in processing capabilities, memory, and power supply of sensor nodes. It is required to extend the lifetime of WSN. Mainly this is achieved by routing protocols choosing the best transmission path in-network with desired power conservation.This cause is developing a generic protocol framework for WSNa big challenge. This work proposed a new routing technique, described as Hybrid Routing-Clustering (HRC) model. This new approach takes advantage of clustering and routing procedures defined in K-Mean clustering and AODV routing, which constituted of three phases. This development aims to achieve enhanced power conservation rate in consequence network lifetime. An extensive evaluation methodology utilized to measure the performance of the proposed model in simulated scenarios.The results categorized in terms of the average amount of packet received and power conservation rate. The Hybrid Routing-Clustering (HRC) model was determined, showed enhanced results regarding both parameters. In the end, they are comparing these results with well-known routing and well-known clustering algorithms.
Tremendous usage of internet has made huge data on the network, without compromising on the
performance of network the end-users must obtain best service. As cloud provides different services on
leasing basis many companies are migrating from their own Infrastructure to cloud,This migration should
not compromise on performance of the cloud, The performance of the cloud can be improved by having
excellent load balancing strategy such that the end user is satisfied. The paper reveals the method by which
a cloud can be partitioned and a study of different algorithm with comparative study to balance the
dynamic load. The comparative study between Ant Colony and Honey Bee algorithm gives the result which
algorithm is optimal in normal load condition also the simplest round robin algorithm is applied when the
partition are in Idle state
PROCESS OF LOAD BALANCING IN CLOUD COMPUTING USING GENETIC ALGORITHMecij
The running generation of world, cloud computing has become the most powerful, chief and also lightning technology. IT based companies has already changed their way to buy and design hardware through this technology. It is a high utility which can also make software more attractive. Load balancing research in
cloud technology is one of the burning technologies in modern time. In this paper, pointing various proposed algorithms, the topic of load balancing in Cloud Computing are researched and compared to provide a gist of the latest way in this research area. By using Genetic Algorithm the balance is most
flexible which is represented here.
A SURVEY ON REDUCING ENERGY SPRAWL IN CLOUD COMPUTINGaciijournal
Cloud computing is the cluster of autonomic computing, grid computing and utility computing. Cloud
providers are there to rescue their customers from the problem of dynamism. The providers focus on
resource sharing and in improving the performance. Energy consumption is the major factor to degrade the
performance. Reducing energy sprawl will bloom the performance. This paper delineates the different
techniques involved in scheduling the workload of the servers in order to minimize the energy sprawl.
UnaCloud is an opportunistic based cloud infrastructure
(IaaS) that allows to access on-demand computing
capabilities using commodity desktops. Although UnaCloud
tried to maximize the use of idle resources to deploy virtual
machines on them, it does not use energy-efficient resource
allocation algorithms. In this paper, we design and implement
different energy-aware techniques to operate in an energyefficient
way and at the same time guarantee the performance
to the users. Performance tests with different algorithms and
scenarios using real trace workloads from UnaCloud, show how
different policies can change the energy consumption patterns
and reduce the energy consumption in opportunistic cloud
infrastructures. The results show that some algorithms can
reduce the energy-consumption power up to 30% over the
percentage earned by opportunistic environment.
Genetic related clustering for reducing energy consumption in wireless sensor...eSAT Journals
Abstract A wireless sensor network is made up of large number of mote (sensor node). Mote has limited battery power. Mote need to perform different type of task like monitor an area, sense the data, collect this data and send this data to base station. As mote (sensor node) need to do such a task it requires more battery power.so it is necessary to save energy of mote by reducing energy consumption.one can use clustering to reduce energy consumption. Clustering is grouping of mote. Energy consumption can be reduced by using intelligent hierarchical techniques for clustering. Various artificial intelligent techniques can be integrated with clustering better result can be achieved. Key Words: Wireless sensor network, Genetic algorithm, Clustering
A Survey of Job Scheduling Algorithms Whit Hierarchical Structure to Load Ba...Editor IJCATR
Due to the advances in human civilization, problems in science and engineering are becoming more complicated than ever
before. To solve these complicated problems, grid computing becomes a popular tool. a grid environment collects, integrates, and uses
heterogeneous or homogeneous resources scattered around the globe by a high-speed network. Scheduling problems are at the heart of
any Grid-like computational system. a good scheduling algorithm can assign jobs to resources efficiently and can balance the system
load. in this paper we survey three algorithms for grid scheduling and compare benefit and disadvantages of their based on makespan.
Proposing a New Job Scheduling Algorithm in Grid Environment Using a Combinat...Editor IJCATR
Grid computing is a hardware and software infrastructure and provides affordable, sustainable, and reliable access. Its aim is
to create a supercomputer using free resources. One of the challenges to the Grid computing is scheduling problem which is regarded
as a tough issue. Since scheduling problem is a non-deterministic issue in the Grid, deterministic algorithms cannot be used to improve
scheduling. In this paper, a combination of imperialist competition algorithm (ICA) and gravitational attraction is used for to address the
problem of independent task scheduling in a grid environment, with the aim of reducing the makespan and energy. Experimental results
compare ICA with other algorithms and illustrate that ICA finds a shorter makespan and energy relative to the others. Moreover, it
converges quickly, finding its optimum solution in less time than the other algorithms.
An enhanced adaptive scoring job scheduling algorithm with replication strate...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...IDES Editor
Cross-layer design is important in wireless ad hoc
network and the power control methods. Power control is the
intelligent selection of transmit power in a communication to
achieve the better performance within the system. Cross-layer
is used to sharing the information between the layers. CLD
using LOADPOWER (LOADPOW) control protocol is reduce
the overall end-end delay in transmission power. So many
power control schemes are dealt in network layer but this
work Power control protocol was done in MAC layer and it
plays a vital role. A MAC approach to power control only does
a local optimization whereas network layer is capable of a
global optimization. Simulation was done in NS-2 simulator
with the performance metrics as throughput, and energy
consumption and end-end delay. The key concept is to improve
the throughput, saves energy by sending all the packets with
optimal transmit power according to the network load,
transmission power was given, when the network load is low,
higher transmission power gives lower end-end delay and viceversa.
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...IJECEIAES
Cloud Computing is the most powerful computing model of our time. While the major IT providers and consumers are competing to exploit the benefits of this computing model in order to thrive their profits, most of the cloud computing platforms are still built on operating systems that uses basic CPU (Core Processing Unit) scheduling algorithms that lacks the intelligence needed for such innovative computing model. Correspdondingly, this paper presents the benefits of applying Artificial Neural Networks algorithms in regards to enhancing CPU scheduling for Cloud Computing model. Furthermore, a set of characteristics and theoretical metrics are proposed for the sake of comparing the different Artificial Neural Networks algorithms and finding the most accurate algorithm for Cloud Computing CPU Scheduling.
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETScsandit
The ability to mine and extract useful information automatically, from large datasets, is a
common concern for organizations (having large datasets), over the last few decades. Over the
internet, data is vastly increasing gradually and consequently the capacity to collect and store
very large data is significantly increasing.
Existing clustering algorithms are not always efficient and accurate in solving clustering
problems for large datasets.
However, the development of accurate and fast data classification algorithms for very large
scale datasets is still a challenge. In this paper, various algorithms and techniques especially,
approach using non-smooth optimization formulation of the clustering problem, are proposed
for solving the minimum sum-of-squares clustering problems in very large datasets. This
research also develops accurate and real time L2-DC algorithm based with the incremental
approach to solve the minimum
A hybrid algorithm to reduce energy consumption management in cloud data centersIJECEIAES
There are several physical data centers in cloud environment with hundreds or thousands of computers. Virtualization is the key technology to make cloud computing feasible. It separates virtual machines in a way that each of these so-called virtualized machines can be configured on a number of hosts according to the type of user application. It is also possible to dynamically alter the allocated resources of a virtual machine. Different methods of energy saving in data centers can be divided into three general categories: 1) methods based on load balancing of resources; 2) using hardware facilities for scheduling; 3) considering thermal characteristics of the environment. This paper focuses on load balancing methods as they act dynamically because of their dependence on the current behavior of system. By taking a detailed look on previous methods, we provide a hybrid method which enables us to save energy through finding a suitable configuration for virtual machines placement and considering special features of virtual environments for scheduling and balancing dynamic loads by live migration method.
A load balancing strategy for reducing data loss risk on cloud using remodif...IJECEIAES
Cloud computing always deals with new problems to fulfill the demand of the challenging organizations around the whole world. Reducing response time without the risk of data loss is a very critical issue for the user requests on cloud computing. Load balancing ensures quick response of virtual machine (VM), proper usage of VMs, throughput, and minimal cost of VMs. This paper introduces a re-modified throttled algorithm (RTMA) that reduces the risk of data hampering and data loss considering the availability of VM which increases system’s performance. Response time of virtual machines have been considered in our work, so that when migration process is running, data will not be overflowed in the VMs. Thus, the data migration process becomes high and reliable. We have completed the overall simulation of our proposed algorithm on the cloud analyst tool and successfully reduced the risk of data loss as well as maintains the response time.
A survey to harness an efficient energy in cloud computingijujournal
Cloud computing affords huge potential for dynamism, flexibility and cost-effective IT operations. Cloud computing requires many tasks to be executed by the provided resources to achieve good performance, shortest response time and high utilization of resources. To achieve these challenges there is a need to develop a new energy aware scheduling algorithm that outperform appropriate allocation map of task to
optimize energy consumption. This study accomplished with all the existing techniques mainly focus on reducing energy consumption.
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGijujournal
Cloud computing affords huge potential for dynamism, flexibility and cost-effective IT operations. Cloud computing requires many tasks to be executed by the provided resources to achieve good performance, shortest response time and high utilization of resources. To achieve these challenges there is a need to develop a new energy aware scheduling algorithm that outperform appropriate allocation map of task to optimize energy consumption. This study accomplished with all the existing techniques mainly focus on reducing energy consumption.
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGijujournal
Cloud computing affords huge potential for dynamism, flexibility and cost-effective IT operations. Cloud
computing requires many tasks to be executed by the provided resources to achieve good performance,
shortest response time and high utilization of resources. To achieve these challenges there is a need to
develop a new energy aware scheduling algorithm that outperform appropriate allocation map of task to
optimize energy consumption. This study accomplished with all the existing techniques mainly focus on
reducing energy consumption
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGijujournal
Cloud computing affords huge potential for dynamism, flexibility and cost-effective IT operations. Cloud
computing requires many tasks to be executed by the provided resources to achieve good performance,
shortest response time and high utilization of resources. To achieve these challenges there is a need to
develop a new energy aware scheduling algorithm that outperform appropriate allocation map of task to
optimize energy consumption. This study accomplished with all the existing techniques mainly focus on
reducing energy consumption.
AUTO RESOURCE MANAGEMENT TO ENHANCE RELIABILITY AND ENERGY CONSUMPTION IN HET...IJCNCJournal
A classic information processing has been replaced by cloud computing in more studies where cloud computing becomes more popular and growing than other computing models. Cloud computing works for providing on-demand services for users. Reliability and energy consumption are two hot challenges and tradeoffs problem in the cloud computing environment that requires accurate attention and research. This paper proposes an Auto Resource Management (ARM) scheme to enhance reliability by reducing the Service Level Agreement (SLA) violation and reduce energy consumed by cloud computing servers. In this context, the ARM consists of three compounds, they are static/dynamic threshold, virtual machine selection policy, and short prediction resource utilization method. The Minimum Utilization Non-Negative (MUN) virtual machine selection policy and Rate of Change (RoC) dynamic threshold present in this paper. Also, a method of choosing a value as the static threshold is proposed. To improve ARM performance, the paper proposes a Short Prediction Resource Utilization (SPRU) that aims to improve the process of decision making by including the resources utilization of future time and the current time. The output results show that SPRU enhanced the decision-making process for managing cloud computing resources and reduced energy consumption and the SLA violation. The proposed scheme tested under real workload data over the CloudSim simulator.
A Prolific Scheme for Load Balancing Relying on Task Completion Time IJECEIAES
In networks with lot of computation, load balancing gains increasing significance. To offer various resources, services and applications, the ultimate aim is to facilitate the sharing of services and resources on the network over the Internet. A key issue to be focused and addressed in networks with large amount of computation is load balancing. Load is the number of tasks„t‟ performed by a computation system. The load can be categorized as network load and CPU load. For an efficient load balancing strategy, the process of assigning the load between the nodes should enhance the resource utilization and minimize the computation time. This can be accomplished by a uniform distribution of load of to all the nodes. A Load balancing method should guarantee that, each node in a network performs almost equal amount of work pertinent to their capacity and availability of resources. Relying on task subtraction, this work has presented a pioneering algorithm termed as E-TS (Efficient-Task Subtraction). This algorithm has selected appropriate nodes for each task. The proposed algorithm has improved the utilization of computing resources and has preserved the neutrality in assigning the load to the nodes in the network.
A Survey on Reducing Energy Sprawl In Cloud Computingaciijournal
Cloud computing is the cluster of autonomic computing, grid computing and utility computing. Cloud
providers are there to rescue their customers from the problem of dynamism. The providers focus on
resource sharing and in improving the performance. Energy consumption is the major factor to degrade the
performance. Reducing energy sprawl will bloom the performance. This paper delineates the different
techniques involved in scheduling the workload of the servers in order to minimize the energy sprawl.
Public Cloud Partition Using Load Status Evaluation and Cloud Division RulesIJSRD
with growth of cloud computing load balancing is important impact on performance. Cloud computing efficiency depends on good load balancer. Many type of situation occur that time cloud partitioning is done by load balancer. Different type of situation needed different type of strategies for public cloud portioning using load balancer.in this paper we work on, partition of public cloud using two type of situation first is load status evaluation and second is cloud division rules. Load status evaluation is measure in number of cloudlets arrives at datacenter and cloud divisions rules are based on cloudlet come from which geographical location. On the basis of geographical location we partition public cloud and improve performance of load balancing in cloud computing. We implement proposed system with help of cloudsim3.0 simulator.
An optimized cost-based data allocation model for heterogeneous distributed ...IJECEIAES
Continuous attempts have been made to improve the flexibility and effectiveness of distributed computing systems. Extensive effort in the fields of connectivity technologies, network programs, high processing components, and storage helps to improvise results. However, concerns such as slowness in response, long execution time, and long completion time have been identified as stumbling blocks that hinder performance and require additional attention. These defects increased the total system cost and made the data allocation procedure for a geographically dispersed setup difficult. The load-based architectural model has been strengthened to improve data allocation performance. To do this, an abstract job model is employed, and a data query file containing input data is processed on a directed acyclic graph. The jobs are executed on the processing engine with the lowest execution cost, and the system's total cost is calculated. The total cost is computed by summing the costs of communication, computation, and network. The total cost of the system will be reduced using a Swarm intelligence algorithm. In heterogeneous distributed computing systems, the suggested approach attempts to reduce the system's total cost and improve data distribution. According to simulation results, the technique efficiently lowers total system cost and optimizes partitioned data allocation.
Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A survey on energy efficient with task consolidation in the virtualized cloud...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A survey on energy efficient with task consolidation in the virtualized cloud...eSAT Journals
Abstract Cloud computing is a new model of computing that is widely used in today’s industry, organizations and society in information technology service delivery as a utility. It enables organizations to reduce operational expenditure and capital expenditure. However, cloud computing with underutilized resources still consumes an unacceptable amount of energy than fully utilized resource. Many techniques for optimizing energy consumption in virtualized cloud have been proposed. This paper surveys different energy efficient models with task consolidation in the virtualized cloud computing environment. Keywords: Cloud computing, Virtualization, Task consolidation, Energy consumption, Virtual machine
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Energy efficiency in virtual machines allocation for cloud data centers with lottery algorithm (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Energy efficiency in virtual machines allocation for cloud data centers with lottery… (Mehran Tarahomi)
547
To fine the solution to the virtual machine allocation to physical host, three sub-issue should be
addressed. The [5] study has divided the main challenges of this problem to three sub-issues.
a. When a virtual machine should be migrated?
There are two conditions to migration. When a physical host is over-loaded or under-loaded.
For this purpose, various algorithms have been introduced.
b. Which virtual machine should be migrated?
When one physical host is under-loaded, some of its virtual machined should be selected for
migration.
c. Where virtual machine should be migrated?
The destination should be chosen for second’s virtual machines.
The virtual machine allocation to physical hosts or the third problem is similar to classic bin packing
that is a NP-hard problem. Heuristic algorithms are one of the first methods that attempt to minimize the
energy consumption. One of this algorithm’s major problem is their time and are not suitable for big
problems, because of their nature these algorithms are not able to search extendable space. One of the other
methods for minimizing the energy consumption in data centers is using evolutionary algorithms.
Evolutionary algorithms can search better the problem space so that ensures QoS and also reduces the energy
consumption.
In this paper new approach based on lottery algorithm is proposed for virtual machine allocation to
physical hosts. The results show decreasing 31.25 percent in energy consumption in comparison to PSO and
genetic algorithms. The purpose of this study is achieving a pattern for virtual machine allocation to physical
hosts by lottery algorithm. In other words a new approach for solving the third-issue has been proposed in
this paper to minimize the switch on physical hosts and minimize the energy consumption.
In the next section the related works has reviewed, the third section describes the problem in detail.
The proposed algorithms is proposed in the four section. The evaluation parameters and simulation and the
setting for simulation is described in section 5. The analyzing the performance of proposed algorithm is
described in section 6, section 7 is conclusion of this study.
2. THE RELATED WORKS
The allocation of virtual machines to physical hosts problem is divided to three sub-issues. This
section discuss about the previous works for each sub-issues.
2.1. When a virtual machine should migrate?
The first issue is related to the migration time of virtual machine to physical host. There are two
conditions for this placement. The first condition is when the physical host is over-loaded. In other words
when the load of physical host exceeds the determined threshold, to avoid the risk of SLA’s violation because
of lake of physical host’s resources, the virtual machine should migrate to other physical host. The second
condition is for migrating the virtual machine is when a physical host is under-loaded. When a load of virtual
machine decreases its total processing is moved to one switched on physical hosts and switch it off. Existing
algorithms for detecting over-load physical host are as follows:
2.1.1. Local regression algorithm
The next heuristic is based on the Loess method (from the German l¨oss–short for local regression)
proposed by Cleveland [6]. The main idea of the local regression method is fitting simple models to localized
subsets of data to build up a curve that approximates the original data. The observations (xi, yi) are assigned
neighborhood weights using the tricube weight function shown in (1)
(1)
2.1.2. Median absolute deviation algorithm [7]
The MAD is a robust statistic, being more resilient to outliers in a data set than the standard
deviation. In standard deviation, the distances from the mean are squared leading to large deviations being on
average weighted more heavily. This means that outliers may significantly influence the value of standard
deviation. In the MAD, the magnitude of the distances of a small number of outliers is irrelevant. For a
univariate data set X1, X2, ..., Xn, the MAD is defined as the median of the absolute deviations from the
median of the data set:
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 546 - 553
548
(2)
2.1.3. Local regression robust algorithm
The version of Loess described in Section 4.3.2 is vulnerable to outliers that can be caused by
leptokurtic or heavy-tailed distributions. To make Loess robust, Cleveland proposed the addition of the
robust estimation method bisquare to the least-squares method for fitting a parametric family [6]. This
modification transforms Loess into an iterative method. The initial fit is carried out with weights defined
using the tricube weight function. The fit is evaluated at the xi to get the fitted values byi, and the residuals
bei=yi-byi. At the next step, each observation (xi, yi) is assigned an additional robustness weight ri, whose
value depends on the magnitude of bei. Each observation is assigned the weight riwi(x), where ri is defined
as in (3).
(3)
2.1.4. Interquartile range algorithm [7]
In descriptive statistics, the Interquartile Range (IQR), also called the midspread or middle fifty, is a
measure of statistical dispersion. It is equal to the difference between the third and first quartiles:
IQR=Q3-Q1. Unlike the (total) range, the interquartile range is a robust statistic, having a breakdown point of
25%, and thus, is often preferred to the total range. For a symmetric distribution (i.e., such that the median
equals the average of the first and third quartiles), half of the IQR equals the MAD. Using IQR, similarly
to (3) the CPU utilization threshold is defined in (4).
(4)
The known algorithm for detecting under-load physical hosts is single-threshold algorithm [8].
2.2. Which virtual machine should migrate?
The second sub-issue, after determining the migration time, if the physical host is under loaded, the
total virtual machines should be migrate until physical host is switched off, and if the physical host is over
loaded, it should be identify which virtual machine from physical host should be migrate?. Three policy for
selecting the virtual machines to migration [7] in over-load condition is RS, MMT and MC algorithms.
2.2.1. Minimal migration time algorithm [9]
The minimum migration time [9] policy migrates a VM v that requires the minimum time to
complete a migration relatively to the other VMs allocated to the host. The migration time is estimated as the
amount of RAM utilized by the VM divided by the sparse network bandwidth available for the host j [9].
Since the virtual machine with minimum Memory and CPU could migrate faster, so in this policy the small
virtual machine are chosen to migration. This policy makes if the more amount of CPU or memory is needed
to be free, so a lot of the virtual machines could be migrated.
2.2.2. The random selection policy
The random selection [10] policy selects a VM to be migrated according to a uniformly distributed
discrete variable. This policy is suitable for the data centers with large number of virtual machines or in other
words can be a good job for a public cloud computing center.
2.2.3. The maximum correlation policy [MC]
The idea is that the higher the correlation between the resource usage by applications running on an
oversubscribed server, the higher the probability of the server overloading [9]. This policy is in contrary to
the view point of MMT method. In fact, in this policy, instead of migrating multiple small virtual machines,
one large virtual machine is migrated. This causes saving time in packing the virtual machines.
2.3. Where virtual machines should be migrated?
The third issue is about where virtual machines should be migrated? After diagnosis migration time
and choosing witch virtual machine should be migrated? The third issue determines the destination of each
virtual machine. The algorithms are called virtual machine placement algorithm. The large number of virtual
4. Int J Elec & Comp Eng ISSN: 2088-8708
Energy efficiency in virtual machines allocation for cloud data centers with lottery… (Mehran Tarahomi)
549
machines and physical makes the idea of using evolutionary algorithms for virtual machine allocation to
physical host problem.
Improving energy efficiency has become increasingly important in data centers in recent years. The
paper [11] proposed a simulated annealing virtual machine placement algorithm, which is based on simulated
annealing theory. Experimental results show that this SA algorithm can generate better results, saving up 25
percentage more energy than First fit decreasing in acceptable time frame.
The paper [12] proposes novel self adaptive particle swarm optimization SAPSO algorithm to solve
the intractable nature of the mapping the a set of VM instances onto a set of servers from dynamic resource
pool so that the total incremental power drawn upon the mapping is minimal and does not compromise the
performance objectives. The experimental results of SAPSO was compared with multi-strategy MEPSO and
the result show that SAPSO outperforms the latter for power aware adaptive VM provisioning in a large
scale, heterogeneous and dynamic cloud environment.
3. RESULTS AND ANALYSIS
The problem is mapping the virtual machines to physical hosts, so that each virtual machines is
allocated to only one physical host and the minimum number of physical hosts are switched on. In other
words, consider the number of virtual machines is M and the number of physical hosts is N (M> N). V is set
of virtual machine which Vi is a sample of virtual machine. Also P is set of physical hosts and Pj represents
sample of physical host.
V={v1,v2,…,vm}
P={p1,p2,…,pn}
Lets define:
Vi
cpu
: the CPU requirement of Vi
Vi
mem
: the memory requirement of Vi
Pj: a physical machine in P
Pj
cpu
: the cpu capacity of pj
Pj
mem
: the memory capacity of pj
Pj
wcpu
: the total CPU workload on pj
Pj
wmem
: the total memory workload on pj
Vpj: the set of virtual machines assigned to physical machine pj
Vpj={pj1, pj2,…, pjm}
The utilization rate of the CPU in physical server pj is :
𝜇𝑗 = 𝑃 /𝑃
The energy consumption of physical server pj when its CPU usage 𝜇𝑗 is:
𝐸 𝑝 = 𝑘 . 𝑒 + 1 − 𝑘 . 𝑒 . 𝜇
When kj is the fraction of energy consumed when pj is idle; ej
max
is the energy consumption of physical server
pj when it is fully utilized; and 𝜇 is the CPU utilization of pj. The purpose of this study allocating physical
hosts to each virtual machine according to above Equations, so that the energy consumption is reduced.
4. PROPOSED METHOD
In this section the proposed method is described so that at the first the preliminary description of
lottery algorithm is given, then the method for virtual machines to physical hosts with proposed method is
proposed.
4.1. Introduction to lottery algorithm
In computing, scheduling is the method by which work specified by some means is assigned to
resources that complete the work. The work may be virtual computation elements such as threads, processes
or data flows, which are in turn scheduled onto hardware resources such as processors, network links or
expansion cards. A scheduler is what carries out the scheduling activity. Schedulers are often implemented so
they keep all computer resources busy (as in load balancing), allow multiple users to share system resources
effectively, or to achieve a target quality of service. Scheduling is fundamental to computation itself, and an
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 546 - 553
550
intrinsic part of the execution model of a computer system; the concept of scheduling makes it possible to
have computer multitasking with a single central processing unit (CPU).
A scheduler may aim at one of many goals, for example, maximizing throughput (the total amount
of work completed per time unit), minimizing response time (time from work becoming enabled until the
first point it begins execution on resources), or minimizing latency (the time between work becoming enabled
and its subsequent completion) maximizing fairness (equal CPU time to each process, or more generally
appropriate times according to the priority and workload of each process). In practice, these goals often
conflict (e.g. throughput versus latency), thus a scheduler will implement a suitable compromise. Preference
is given to any one of the concerns mentioned above, depending upon the user's needs and objectives. In real-
time environments, such as embedded systems for automatic control in industry (for example robotics), the
scheduler also must ensure that processes can meet deadlines; this is crucial for keeping the system stable.
Scheduled tasks can also be distributed to remote devices across a network and managed through an
administrative back end.
4.2. The proposed method for virtual machine allocation with lottery algorithm
In the proposed method a new method based on lottery algorithm has been proposed for virtual
machine allocation to physical hosts. The advantage of proposed algorithm in comparison to previous
algorithm is more agility and high speed. In this research a new method based on lottery algorithm and with
evolutionary vision has been proposed.
The proposed method steps:
a. First step: producing N different solutions. The functions of producing initialize solutions have proposed
in the following.
b. Second step: The fitness function is calculated for every single solutions.
c. Third step: for every solution a ticket is assigned based on the fitness function.
d. Forth step: one parameter for win rate is used in this algorithm, determines what percentages of solutions
moved to the next step. The lottery operation is done in this step and solutions with more tickets has more
chance to go to the next step. In this step with notice to win rate, the lottery algorithm repeats and some
solutions has been selected for next step. For example if the win rate equals to 70 percent, 70 percent of
current solutions are selected to move to the next step and 30 percent of initialize solutions new solutions
are created.
e. Fifth step: The end condition or the number of iterations of algorithm is checked. If the condition is
fulfilled the best solution will be chosen otherwise go to the second step.
The problem formulation and production of initialize solutions
As described in the previous sections, the virtual machine allocation is an optimization solution for
decreasing energy consumption. The set of virtual machine is as follows:
V={v1,v2,…,vm}
[m presents the total number of virtual machines]
The set of physical hosts is as follows:
H={H1,H2,..Hn}
[n presents the total number of physical hosts]
Some of the restrictions are as follows:
1 A virtual machine can only assigned to one physical host.
2 For solving the virtual machine allocation to physical hosts, each answer is assumed as a participation in
lottery algorithm. As shown in Figure 1, the array index represents of virtual machine’s number, and the
input number represents the physical host’s number which the mentioned virtual machine to be placed
on this physical host. In other word if the input number if index i equals to j, means virtual machine[i] is
placed on physical host[j]. Sample of solution for proposed algorithm as shown in Table 1.
Table 1. Sample of Solution for Proposed Algorithm
VMn......VM3VM2VM1
Hostn…...Host3Host2Host1
6. Int J Elec & Comp Eng ISSN: 2088-8708
Energy efficiency in virtual machines allocation for cloud data centers with lottery… (Mehran Tarahomi)
551
Figure 1. The proposed algorithm’s flowchart
5. SIMULATION
The Cloudsim is used to evaluate and analyzing the proposed algorithm’s performance.
This simulator is a toolkit in java language which is used to simulate cloud environment. The toolbox
contains set of several classes, designed by A. Belogazov et al in 2013 [5]. The following scenarios are used
for simulating the proposed algorithm.
The simulated data center comprised 800 heterogeneous physical nodes, half of which were HP
ProLiant ML110 G4 servers, and the other half consisted of HP ProLiant ML110 G5 servers. The
characteristics of the servers and data on their power consumption are given in Section 4.2.2. The frequencies
of the servers’ CPUs were mapped onto MIPS ratings: 1860 MIPS each core of the HP ProLiant ML110 G5
server, and 2660 MIPS each core of the HP ProLiant ML110 G5 server. Each server had 1 GB/s network
bandwidth. In this paper, the proposed method is studied in terms of energy efficiency and the
violation of SLA
6. PERFORMANCE EVALUATION
In this study a method for virtual machine allocation to physical hosts has been proposed.
As mentioned in the previous sections, there are three sub-issues in a cloud data center, also affect to each
other. Four common methods MAD, IQR, LR, LRR on the question of "When a migration should be done?”
and three most widely used method MMT, RS, MC for the sub-issue on “which virtual machine should be
select for migration" are simulated). The proposed algorithm as a solution for third sub-issue on “where
virtual machine should be migrate?" has been proposed. Reducing energy consumption requires to best
solutions for each sub-issues. Actually the solution for every sub-issues effects on the final solutions, and it is
important that the proposed algorithms is with following of which algorithms. This study analyses the
performance of the proposed algorithm with over-load detection algorithms and the virtual machine selecting
algorithm. In order to obtain the best solution for optimization of energy consumption the combination of
algorithms [the best algorithms for each sub-issues] is important factor.
The Figure 2 shows energy consumption in different combination of algorithms. The vertical axis of
diagram shows the energy consumption in w/h and the horizontal axis shows different combinations of
methods for each sub-issue. As shows in Figure 1, the minimum amount of energy consumption is for
Proposed/LR/MC with 11 w/h. The behavior of three algorithm in combination of VM selection/Host
overload detection/Host under-load detection algorithms are a little similar, for example the maximum
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 1, February 2019 : 546 - 553
552
amount of energy consumption is related to LRR/RS. In the 12 different combinations, the proposed
algorithm performs better than GA and PABFD algorithm. The Figure 2 shows the four points of the most
minimum of energy consumptions in Figure 2.
The Figure 3 shows that the proposed algorithm has the minimum amount of energy consumption
and the policy of using MC algorithm in virtual machine selection makes the results better. In addition the
MC policy has better performance in reducing energy consumption in comparison to RS or MMT policy.
Figure 4 shows the performance of proposed algorithm. GA, PABFD during 10 rounds, in term of
the violation of the SLA. The vertical axis shows the violation of SLA in percentage and the horizontal axis
shows the algorithms of each sub-issues. As shown in Figure 2 the minimum number of violation of SLA is
for LRR/MC for proposed, GA and PABFD algorithms. The proposed algorithm with 0.37 number is in the
third place. Among 12 different states, the proposed algorithm performed best in 5 states in comparison on
the other algorithms.
Figure 5 shows the violation of SLA for the most minimum numbers of energy consumption
methods. As shown in Figure 4 and Figure 5, the violation of SLA decrease by MC policy. As a result of the
comparison of Figures 2 and Figure 3, the energy consumption and the violation of SLA are related
inversely. The violation of SLA for proposed algorithm is more than the other algorithms but the difference is
0.09 percentage and is very little and can be ignored.
Figure 2. The energy consumption Figure 3. The four minimum points of energy
consumption
Figure 4 Overall SLA violation Figure 5. The violation of SLA for the most
minimum energy consumption for Scenario C
7. CONCLUSION
As shown in Figures 1-4 the proposed algorithm has the minimum amount of energy consumption in
collaborative with LR algorithm for over-load detection algorithm and MC algorithm for selecting the virtual
machine, but the minimum amount for the violation of SLA is with collaborative with LRR algorithm for
over-load detection algorithm and MC algorithm for selecting the virtual machines. As is clear, the best
policies are LR/MC. The proposed algorithm has improved the energy consumption about 31.25 percent.
8. Int J Elec & Comp Eng ISSN: 2088-8708
Energy efficiency in virtual machines allocation for cloud data centers with lottery… (Mehran Tarahomi)
553
REFERENCES
[1] Buyya, Rajkumar, Chee Shin Yeo, and Srikumar Venugopal, "Market-Oriented Cloud Computing: Vision, Hype,
and Reality for Delivering It Services As Computing Utilities," High Performance Computing and
Communications, 2008. HPCC'08. 10th IEEE International Conference on. IEEE, 2008.
[2] Buyya, Rajkumar, Anton Beloglazov, and Jemal Abawajy. "Energy-efficient Management of Data Center
Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges." arXiv preprint
arXiv:1006.0308, 2010.
[3] Wu, Yongqiang. "Energy Efficient Virtual Machine Placement In Data Centers", 2013.
[4] Energy-aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud computing
Anton Beloglazov, Jemal Abawajy, Rajkumar Buyya.
[5] Beloglazov, A., “Energy-efficient Management Of Virtual Machines In Data Centers for Cloud Computing,”
Submitted in Total Fulfilment of the Requirements of the Degree of Doctor of Philosophy, Department of
Computing and Information Systems The University Of Melbourne, 2013.
[6] Guenter, B., Jain, N., & Williams, C., “Managing Cost, Performance, and Reliability Tradeoffs for Energy-aware
Server Provisioning,” In INFOCOM, 2011 Proceedings IEEE, pp. 1332-1340, IEEE, April, 2011.
[7] Beloglazov, A., & Buyya, R., “Optimal Online Deterministic Algorithms and Adaptive Heuristics for Energy and
Performance Efficient Dynamic Consolidation of Virtual Machines in Cloud Data Centers,” Concurrency and
Computation: Practice and Experience, 24(13), 1397-1420, 2012.
[8] Beloglazov, Anton, and Rajkumar Buyya. "Managing Overloaded Hosts for Dynamic Consolidation of Virtual
Machines in Cloud Data Centers under Quality of Service Constraints." IEEE Transactions on Parallel and
Distributed System, vol. 24, no. 7, 1366-1379, 2013.
[9] Beloglazov, Anton, and Rajkumar Buyya. "Optimal Online Deterministic Algorithms and Adaptive Heuristics for
Energy and Performance Efficient Dynamic Consolidation of Virtual Machines in Cloud Data Centers."
Concurrency and Computation: Practice and Experience, vol. 24, no. 13 pp. 1397-1420, 2012.
[10] Beloglazov, Anton, and Rajkumar Buyya, "Adaptive Threshold-Based Approach for Energy-Efficient
Consolidation of Virtual Machines in Cloud Data Centers," Proceedings of the 8th International Workshop on
Middleware for Grids, Clouds and e-Science. Vol. 4, ACM, 2010.
[11] Wu, Yongqiang, Maolin Tang, and Warren Fraser. "A Simulated Annealing Algorithm for Energy Efficient Virtual
Machine Placement." 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), IEEE, 2012.
[12] Jeyarani, Rajarathinam, N. Nagaveni, and R. Vasanth Ram. "Design and Implementation of Adaptive Power-Aware
Virtual Machine Provisioner (APA-VMP) Using Swarm Intelligence." Future Generation Computer Systems,
vol. 28, no. 5, 811-821, 2012.