SlideShare a Scribd company logo
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
1
TOWARDS A MACHINE LEARNING
BASED ARTIFICIALLY INTELLIGENT
SYSTEM FOR ENERGY EFFICIENCY IN
A CLOUD COMPUTING ENVIRONMENT
Yao Francois Michael Kra, 1840192845@qq.com, School of Computer Science and Engineering, Southeast University, Nanjing, China
Noah Kwaku Baah, baah.noah@gmail.com, School of Computer Science and Engineering, Southeast University, Nanjing, China.
Imran Memon, imranmemon52@zju.edu.cn, College of Computer Science, Zhejiang University, Hangzhou 310027, China
William Gyasi-Mensah, kyfm349349@gmail.com, School of Finance and Economics Jiangsu University
ABSTRACT
Cloud computing has become the mainstream of
the emerging technologies for information interchange and
accessibility. With such systems, the information accessed
from any geographic location on this planet with some
decent kind of internet connection. Applying machine
learning together with artificial intelligence in dealing with
the problem of energy reduction in cloud data center is an
innovative idea. A large combination of Artificial
intelligence is playing a significant role in cloud
environment. For that matter, the Big organization
providers like Amazon have taken steps to ensure that they
can continue to expand their fast-growing cloud services to
commensurate with the fast growth of population. These
companies have built large data centers in remote parts of
the world to overcome a shortage of information. These
centers consume significant amounts of electrical energy.
There is often a lot of energy wastage. According to IDC
white paper, data centers have tremendously wasted
billions of energy regarding billing and cash. Additionally,
researchers have argued that by the year 2020 the energy
consumption rate would have doubled. Research in this
area is still a hot topic. This paper seeks to address the
energy efficiency issue at a Cloud Data Center using
machine learning methodologies, principles, and practices.
This article also aims to bring out possible future
implementation methods for artificially intelligent agents
that would help reduce energy wastage at a Cloud data
center and thus help ameliorate the great big energy
problem at hand.
Keywords: Cloud Computing; PUE; Energy
Efficiency, Machine Learning, Artificial Intelligence,
Cloud Service Provider (CSP) Virtualization
I. INTRODUCTION
Recent years, cloud computing has demonstrated,
established and founded itself as one of the brains and
drivers in modern technology. As a process paradigm
faculty economy of scale, when organized and used
effectively, the cloud computing presents significant
advantages relating to computation power whereas
reducing expenditures and saving energy. Massive data
centers are in places wherever the concept of cloud
computing involves life. Through virtualization technology,
data center resources and services became substantially
potential for several users to share, and to avoid having to
line up their infrastructure to try and do things that have
been completed within the cloud.
Efficient use of energy in cloud computing has been
receiving attention by researchers over the past decade.
Some studies have suggested various optimization
approaches to the challenge of minimizing the expenditure
of energy within cloud computing setting
[36],[37],[25],[20],[22]. Several scenarios also exist for
using machine instruction strategies to material supplies
and management within the cloud, with several goals.
(The study will provide a survey towards a machine
learning based artificially intelligent system for the
efficient use of energy in a cloud computing setting). (The
aim of this study area is to analyze and delve into energy
efficiency, and carry up to the machine learning research,
as well as support their invention in innovative ways
capable of producing preferred outcomes. As computing
has become very vast and sophisticated engine worldwide,
cloud computing as a traditional model delivers, computing
resources on cloud computing uses pay as you use method.
The public IT corporations like Microsoft, Google,
Amazon, and IBM have a unit of measurement running
expansive data knowledge Centres worldwide to handle
their always-rising requests. Notably, the rising demands
for cloud computing facilities have considerably multiplied
the power usage of knowledge centers, thereby making it
an important issue). The third drop in energy charge for an
outsized associate company like Google will reach over
1,000,000 dollars in value savings [35]. High power
consumption does not only interpret to the great value but
to boot leads to high carbon emissions that do not appear to
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
2
be environmentally sustainable. Power costs hugely rising,
information center instrumentality is overstretching power
and cooling infrastructures, and so the primary point has
not been about the current amount of data center emissions,
instead, the point that these emissions are rising faster than
the various carbon emission [35]. Among the compelling
primary rationales for energy underperformance in data
centers is that unused energy is wasted once the server
operates at a low load. Even at down usage, like 100
percent central processor Usage, the flexibility consumed is
over five hundredth of the peak power [36]. Dynamic
consolidation has tested to be a good economic technique
for energy cut down in data information centers by
switching off unused or less-utilized servers [36],[37].
However, reaching the aimed extent of Quality of Service
(QoS) between the user and a data center is vital. Hence,
Quality of Service, the periodic upgrade will save energy
whereas keeping an appropriate Quality of Service. The
standard of Service necessity formalized through Service
Level Agreement (SLA) that explains these features as
lower turnout, largest possible amount or latency produced
by the installed system. Moreover, virtualization is the most
present power controlling and resource distribution
technique used by data Knowledge Center. It permits a
physical server (host) to be shared among multiple Virtual
Machines (VMs) whereby each VM can run numerous
application tasks. The central processing unit and memory
resources are dynamically provided for a Virtual Machine,
per current resource requirements. It enables virtualization
for the requirements of energy efficiency in every data
center [35].
Our Contributions to article extended by:
1. Illustrating some problems towards machine learning
based mostly artificial agent to lop out the energy usage
within the large-scale data center.
2. Reviewing and analyzing various types agent entities
which may be applying exploiting machine learning
3. Identify problems within the existing systems to give
insight to new researchers in innovative ways to implement
energy huddles to handle the substance of massive energy
wastage within green data centers.
4. Additionally show that when exploiting AI will facilitate
data Centre’s manager to understand the prediction,
management and stop the worst-case situation from
occurring in reducing usage capability.
The research paper is organized as follow, section I
introduction, section I the background of the article,
Section III, the stated problem of the article, section IV
mathematical models for PUE state of the art. Part V and
VI respectively discussed privacy control and literature
review; section VII end up of the conclusion and the
possible future development.
II. BACKGROUND
People around the world these days are enjoying computers,
PC networks and applications to undertake and do most of
their business processes [25], communication, and social
networking [25]. As a result, the popularity of web-
primarily based applications is on the increase. Most of the
companies rendering these internet based applications use
cloud computing services to host their applications. One
can only imagine what amount methodology in power is
needed to tackle this common workload dilemma. However,
these works are mostly distributed across data centers
within a cloud computing setting.
The goal of cloud computing is to provide computing
resources as utilities, rather like today electricity, clean
water and telephoning services rendered as utilities. The
services provided by cloud computing is based on software
as a service (SaaS), infrastructure as a service (IaaS) and
platform as a service. A new aspect of cloud computing is
its acquisition model that depends on going to services and
its business model supported by purchase use. It has an
excellent access model that handles over the net to any
device and its particular model that is cycling the climbable,
elastic, dynamic, multi-tenant, and shareable. There are
differing types of cloud computing environments of which
Public cloud services offered by a 3rd party service
provider. Private cloud is extraordinarily like a public
cloud, the only real distinction between the private cloud is
based on the services managed within one organization.
Community cloud that controlled by a bunch of agencies
that have a regular goal or concern, like security. Hybrid
cloud, is therefore a mix of any of the various cloud
environments.
A) Machine Learning
Machine learning (ML) methods considered for materials
and power control within the wide-reaching data center
corresponding procedure in grid energy and cloud
technology. Considering the task consolidation policies,
which have been described in [35], it operates every job
with a small amount of data resources and takes into
account the programming aspect in cutting down energy
utilization [35]. The study adopted machine-learning
strategy as a method to explore the existing data of the
system, like Energy usage level, hundreds of processors
and task completion time; and contributes to the standard of
scheduling selections. The primary goal of the policy in [38]
was to maximize user contentment while keeping energy
usage down. In [38] an internet learning algorithmic
regulation was scheduled to vigorously choose diverse
consultants for forming energy controlling choices at
execution time, wherever every knowledgeable may be a
redesigned power management policy. Various experts
outperform one another beneath entirely different
workloads and hardware characteristics.
B) Learning Reinforcement
In [35] Reinforcement Learning (RL), the intelligent agent
gets the maximum resolution through trial and error
interaction with a current set with no prior information
regarding the surroundings. A framework of learning
reinforcement comprises of [1][35]:
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
3
▪ State area S: a group of states that intelligent
agent can provide representation for at any
surrounding area.
▪ Action area A: a group of measures that
intelligent agent can perform.
▪ A Learning reinforcement agent sends signal r: a
symbol that intelligent agent can receive from
different types of environment.
Actually, the indicator imitates the success or failure status
of the system when associated with an action which it has
taken place. Considering the fact of the signal, in [1] the
signal serves as punishment for the intelligent agent who
has accomplished an action based on pay before usage. Q-
learning [1] could pass as one of the first probable Learning
reinforcement agents which can be employed in numerous
areas of analysis [1]. At the iteration level of the Q-learning
algorithm, the intelligent agent firstly detects the system
state ‘s’ and selects the action in ‘a.' When describing the
work, the system run up to the following state ‘s,' and
obtains the supported signal in r. When updating Q value,
the equation calculates the start of next iteration level.
(1)[1]
Where Q(s, a) [1] signifies that the value of an intelligent
agent can take action within state s. Training percentage
determined which the recent one can overwrite proportion
of the new information. The agent learning level can
assume a price between zero and one; the worth of zero
implies that no training takes place by the algorithm; on the
other hand, the value of 1 shows that solely the first current
data is used. The reduction issue could be worth between
zero and one that gives additional weight to the sanctions
within the near future than the far future. Consequently,
once associate degree agent moves to state s once more, it
chooses the activity with the least Q-value. The approach
for selecting the simplest measures in state s is:
(2) [1]
Accordingly, the training agent’s objective is to seek out
Learning Reinforcement (RL)[1],[39] could be machine
learning Prototype has applied for power management in
wide-reaching data center systems. In Reinforcement
Learning, a decision-maker or agent observes the
environment and chooses an activity at every state[1]. After
every action has been undertaken, the agent gets a response
showing the value of the executed activity. The ultimate
objective of the agent is to study a policy for choosing the
most effective measures for all possible steps. Also,
researchers have shown the viability of RL methods in
resource distribution [41][42], energy control [36][42] and
self-optimizing memory controller [1] [43]. In [42] share
servers on the internets. Applications dynamically exploit
online, hybrid Reinforcement Learning to increase the
anticipated total of SLA payments in every application.
This hybrid method permits the RL regulator to bootstrap
from existing management policies, considerably cutting
down learning and expensiveness. The efficiency of the
process verified in the situation of an available information
data center image. Moreover, in [43], the power
management system level’s policy supported by
Reinforcement Learning provided a real gold reduction in
the energy usage. It studies the most favorable policy in the
absence any previous data of work. The researchers set the
delay in manufacturing activity as a performance challenge
whereas reducing energy usage. Looking at the prevalence
of Machine Learning based on power management methods,
the RL based learning mostly will investigate the trade-off
within the electrical performance design house and join to a
far efficient energy management policy.
The application of machine learning algorithms to existing
observance data provides a chance to improve Data Center
in operation effectiveness significantly. A typical large
scale Data Center generates several data points across
thousands of sensors each day. Nevertheless, this
information is never used for applications aside from
observation purposes. Advances in process power and
respect capabilities produce an outsized chance for machine
learning to guide best apply and improve Data Center
efficiency.
C) Artificial Intelligent
Intelligence commonly thought about because of the
capacity to gather expertise and logic concerning insight to
resolve compounded issues. Within the close to Future
Intelligent Machines, they can replace human abilities in
several ways. AI is the study and creation of intelligent
machines and software system capable of reasoning,
learning, gathering data, communicating, manipulating and
understanding the objects. John McCarthy coined the term
in 1956 as an aspect of technology involved with creating
computers that act similar to humans. Economical energy
use, generally merely referred to as energy efficiency, is the
objective to scale back the quantity of power needed to
produce product and services. For instance, Installing
fluorescent lights, semiconductor diode lights or natural
skylights minimizes the amount of energy necessary to
reach an equivalent degree of lighting compared with using
an old incandescent lightweight bulbs. Compact fluorescent
lights need a mere fraction of the power of incandescent
lights and will last from half dozen to ten times longer.
These are the bound advantages of energy efficiency:-
Energy observation Agent: This half is responsible for
inspection the usage of electricity. Energy view agent
compares current energy usage with historical data, records
the results associated reports an emergency when abnormal
information is revealed.
Energy effectiveness Analysis Agent: This agent is
accountable for information analyzing. Energy potency
analysis agent can classify the characteristics of different
users, and eventually verify the principle of energy
utilization, which used to make effective selections.
Decision-making Agent: This agent considers the results
of energy potency analysis agent and the gifting strategy
thoroughly, and makes correct picks once needed. At an
equivalent time, it will take the CMB output as an essential
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
4
reference. Finally, the agent generates new and reasonable
electricity theme to guide users.
Energy diagnosing Agent: Analyzes energy-using
instrumentation from the system aspect, estimates current
power consumption and offers additional references to
decision-making agent, thus serving to enhance energy
potency.
User Feedback Agent: Uses the service condition to
estimate the effectiveness of the system, measure the
strength of the model from the user aspect, and output
auxiliary suggestions to form period changes, improving
decision-making set up endlessly.
Information Intelligence Maintenance Agent: This agent
is responsible for all the system information’s maintenance
and classification in a very regular time, including user
profile, energy-using instrumentality information, energy
utilization information and information from measurement
points.
The constituent below shows the effectiveness of energy
savings:
Renewable Energy: The Renewable Energy has a possible
impact on health because it produces energy with a
significant reason and it has no pollution effect as coal and
nuclear power.
Intelligent Distribution: It has an artificial agent to which
every knowledge performed as human. Its experience
enables to predict and prevent some unusual distribution
system (e.g. street lights, doors, elevators, wireless and
many more)
Operation Centre: performs as a data center whereby
devices can be check and resolve specific problem within
the area employment
Smart home: it has an ability to control and check all
connected gadgets within office building and houses
Smart Connected Cities: It performs as public clouds to
which connect the cities with internet bandwidth related to
the aim of accessing information anywhere within the city.
PEVs: the PEVs are very efficient electric cars chargers
with a sort of less duration charging time
D. Deep Learning
Deep learning strategies illustrated with learning strategies
with multiple levels of representation, obtained by
composing straightforward; however nonlinear modules
that convert every illustration at one level start with a raw
data into the slightly new abstract level. With the
composition of enough such transformations, highly
complex functions often learned.
Deep learning is creating significant advances in resolution
issues that have resisted the most effective makes an
attempt of the synthetic intelligence agency for several
years [54]. It has clad to be superb at unearthing involving
systems in high-dimensional information and is thus
relevant to several domains of science, business and
government.
Since 2006, intensive, structured training, or additional
unremarkably referred to as deep learning or hierarchical
learning[60], has been known as a replacement space of
machine learning analysis [56],[61]. Throughout the
previous years, many methods have been created from deep
learning analysis and have already been affecting a good
vary of signal and data process. Working on the normal and
also innovate a widened scopes together with fundamental
aspects of machine learning and artificial intelligence in
[55],[56],[57],[58], [59].
E. Cloud Computing Load Prediction
One of the first important analytics applications for the SG.
Moreover, the handiness of the time interval information
has made it attainable to predict within the short term and
with greater correctness.
Fig: 1. Intelligent, smart grid architecture images
Source: A smart grid [44].Smart Buildings of the Future
Cyber aware, Deep Learning Powered, and Human
Interacting.
The figure 1 above described the need of intelligence
system which helps reduce energy wastage and at the same
becomes some sources of energy inefficiency.
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
5
Correct predictions are necessary for determining a short
term time operations as well as mid-term planning.
However, additionally, manufacturers have to have
an understanding concerning the purchases they need to
provide for extended scheming [45]. Several applications of
load prediction have been represented in literature
wherever many apply function statically, and machine
learning technologies used. For shorthand medium-term
prediction, time-series analysis and neural networks are
used [45], [47], [48]. A haul with short term time predicting
models has been the deficit in understanding concerning the
larger image as a result of not handling data concerning the
various classes of customers. In [49], a PCA-based
approach accustomed establishes the kind of demand
visage by such client categories. In [50], [45] a hybrid
system of SOMs and SVM was applied to predict mid-term
electricity load. The SOM was used to divide power usage
information into two teams that are then input into an SVM
in an exceedingly monitored way for load forecasting. In
[46], Espinoza et al. described on short-term time
prediction with hourly load data from a Belgian grid station
highlight that prediction and client identification are
reticulated and suggested a merged structure which
includes each. The first modeling relies on seasonal time-
series analysis, using the periodic auto-regression (PAR)
model [51], the periodic autoregression utilized in the
modeling of electricity costs [52]. The stationary attributes
obtained from these models are run through a k-means
clustering method to include various client descriptions.
III. PROBLEMS
The problem occurs in the fact that in a cloud computing
environment server consumes far more energy than they
need. Hence, lots of energy wasted due to intuitive to
energy efficiency. Computer servers in data centers account
for concerning a pair of worldwide energy demand,
growing concerning twelve-tone music a year, in line with
the cluster. The servers, Greenpeace aforementioned, will
suck up the maximum amount power as 50,000 average
U.S. homes. However, most of what supplies energy to the
cloud comes from coal energy instead of renewable sources
like wind and star, consistent with Greenpeace. Clusters of
information centers square measure rising in places just like
the geographical region, where coal-powered electricity is
reasonable and plentiful in the same cluster. In its report,
the organization narrowed in on ten major technical school
corporations, together with Apple, Twitter, and Amazon.
Recently, the cluster has waged a feisty fight against
Facebook, that depends on coal for 53.2% of its electricity,
consistent with Greenpeace. Several corporations, the
organization aforementioned, tightly guard data concerning
the environmental effect and power usage of their IT
operations. They additionally focus a lot on victimization
energy expeditiously than on sourcing it cleanly, previously
mentioned Greenpeace. Yahoo landed bonus points for
setting facilities near clean energy hot spots and efficient
coal-based power for direct 18.3% of its portfolio. Google
received commendation for its intensive support of the
wind and solar initiatives and for making a subsidiary,
Google Energy, that may get electricity straight from
separated clean energy producers. In 2005, the U.S. owned
10.3 million data centers gobbling up sufficient power to
supply all of the England for two months, consistent with
the web selling company WordStream. Every month,
electricity accustomed power inquiries on Google bring out
260,000 kilograms of greenhouse gas, and it is s to
sufficient supply a deep freezer for 5,400 years, consistent
with WordStream.
IV. Power Usage Effectiveness (PUE) V Data center
Infrastructure Efficiency (DCiE)
Benchmarking information data hub’s power capability
might be a vital commencement for minimizing energy
usage and connected power expenditure. Effectiveness
Benchmarking permits us to grasp this level of
effectiveness with every data center, and has to institute
further effective optimum procedures; it aids in measuring
the efficiency of those efficiency methods. Power Usage
Effectiveness (PUE) and its shared data Centre
infrastructure Efficiency (DCiE) are usually preferred
criterion planned by the new Grid to aid IT Professionals to
ensure but energy economical info centers areas, and to
observe the impact of their efficiency efforts. The amount
instituted collectively incorporates a general benchmark
that it recommends, named Company Average info Centre
Efficiency (CADE). At their February 2009 Technical
Forum, the new Grid introduced new parameters named
Information Center Productivity (DCP) knowledge and
Data Centre energy Productivity (DCeP) that probed into
the relevant work created by your information center. All
benchmarks have their worth, and once used correctly, they
are going to be a helpful and essential tool for center
energy efficiency.
Data centers all around the world have a responsibility to
become green and eco-friendly. It starts with cutting their
energy costs and consumption. Traditional methods of
managing the energy efficiency of data centers are
evidently inefficient and obsolete. The PUE ratio of total
amount of energy used the in substitute variations inside
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
6
the landscape of
Fig: 2. Sketch of How the PUE and the DCE are calculated
Computing, some legal problems increase with cloud
computing, together with trademark infringement, security
considerations and sharing of proprietary information
resources.
With a computer data center facility [29], the lower an
organization is PUE the greener they are. An ideal PUE is
about 1.0. PUE developed by a group called The Green
Grid. It is a computation of how efficiently a computer data
center applies energy.
It is necessary to know the elements for the hundreds of the
standards of measurement, which may represent as follows:
1. IT equipment Power. It comprises the load related to all
of the IT instrumentation, such as figure, storage, and
network equipment, in conjunction with complementing
gadgets such as KVM switches, monitors, and
workstations/laptops accustomed monitor or otherwise
control the information center.
2. Total Facility Power. It involves all that supports the IT
equipment load such as:
❖ Power delivery elements run through as
Generators, UPS, PDUs, switchgear, heavy
batteries, and distribution losses outside to the IT
equipment.
❖ Cooling system elements like chillers, PC room
air conditioning units (CRACs), direct
enlargement air handler (DX) units, pumps, and
cooling towers.
❖ Computer network and storage nodes.
❖ Different miscellaneous element hundreds like
data center lighting.
The PUE and DCiE provide the simplest approach to
show:
❖ Opportunities to boost a data center's operational
efficiency. However center compares with
competitive data centers. If the PUE Data center
operators are rising, then the designs and
processes will get over time.
❖ Opportunities to repurpose energy for added IT
equipment.
While each of those metrics is an equivalent, they will be
accustomed to express the power sharing within the
knowledge center otherwise. As an example, if a PUE is
decided to be 3.0, this means that the information center's
demand is thrice bigger than the power required to supply
energy to the IT instrumentation. Additionally, the
magnitude relation uses as a multiplier factor for conniving
the $64000 effect of the system’s power demands. For
instance, if a server requests five hundred watts and the
PUE for the data center is 3.0, then the ability from the
utility Grid required to deliver five hundred watts to the
server is 1500 watts. DCiE
In A Data center, PUE is calculated by:
(3)
Moreover, its similarities with DCIE described as:
; (4)
It must be well noted here at this point that the valuation for
Total Facility Energy and IT Equipment Energy will vary
and are likely to change based on a data center's layout.
(5)
Companies like Google have pioneered many attempts to
cut energy costs at their data centers. One of such attempt
is an artificially intelligent system developed by its
subsidiary Deep Mind that led to a 15 percent
improvement in power efficiency. The following diagram
illustrates the layout of the Google data center and how the
PUE resolved in:
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
7
Data Source: ensuring measurement on Google data
center, Google comprises servers, storage, and networking
equipment as IT equipment power. We recognize
everything else overhead power [33].
Fig: 4. Flowchart of already done data center
Total Facility Power calculated at or close to the ability
utility’s meter(s) to correctly mirror the facility coming into
the data center. It could amount to the whole energy used
within the data center. Center-only parts of a building
utility meter ought to set the calculation of energy that is
not supposed to be used within the data center would lead
to faulty PUE and DCiE metrics. For instance, if a
knowledge center works in an office block, gross energy
supplied from the utility is the addition of the whole
Facility Power for the data center, and therefore, the total
power used by the non-data center offices. In this case, the
data center administrator would need to live or predict the
number of the energy utilized by the non-data center offices
(an estimate can include some mistakes into the
computations). IT instruments power would measure on
balance power conversion, switching, and acquisition
finalized and before the IT instrumentation itself. A
possible measure purpose would be to the outcome of the
PC space power distribution units (PDUs). This
mensuration ought to represent the whole energy supplied
to the figure instrumentation racks within the information
center.
Fig: 3. Structure green data center architecture
The PUE will vary from 1.0 to time. Acceptably, a
PUE worth approaching from zero to one would show
100% efficiency (i.e. all power utilized by IT equipment
only). Presently, there are no exhaustive information data
sets that show truth expansion of the PUE for information
centers.
Some preliminary work indicates that a lot of data centers
might have a PUE from zero to three or greater; however,
with the right style, a PUE worth from zero to six ought to
be achievable. Shows that the twenty-two information data
centers measured had PUE values within the 1.3 to 3.0
ranges. Some researchers have indicates that PUE values of
2.0 are doable with correct design6. However, there is
presently no comprehensive business data information set
that shows how the Green Grid feels, which is vital to start
measuring information of data centers' effectiveness,
though the present approach needs information
manipulation.
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
8
Additionally, the Green Grid conjointly urges information
data center providers to share DCiE outcomes, which can
facilitate every information data center owner higher
analysis of their mensuration methodology similarly as
perceived in their performance, however, compared with
the remainder of the trade.
Fig: 5. Observation of where energy utilized
Correct PUE statistics for information data centers. Once
more, there is no universal consensus on what makes up an
economic or inefficient data center. Within the future, the
Green Grid can provide values that profile target PUE and
DCiE metrics for a range of typical data center
configurations. In the short term, the Green Grid suggests
that information center infrastructure begins utilization
either with the PUE or DCiE metrics. Whereas the
measuring points might not be outlined, the Green Grid
feels which is vital to start measurement information of
data center efficiency, even if the method presently needs
information manipulation.
VI. REVIEWED LITERATURE
A. Cloud Computing Authorization
U.S. Federal Agencies “are engaged in a geographical point
of Management and Budget to use a system discussed to as
Fed-RAMP (Federal Risk and Authorization Management
Program) to assess and authorize cloud product and
services. As it has shown, the Federal Congress of
commerce Organised by Steven VanRoekel noted the fact
to federal agency Chief Information Officers on 8th
of
December, 2011, about shaping but the federal agencies
needed to use Fed-RAMP [63][64]. Fed-RAMP comprises
of a group of agency Exceptional Publication 800-53
security panels specifically elect to issues protection in
cloud environments. A group has been recognized publicly
for the FIPS 199 at the lower categorization and thus the
FIPS 199 moderate categorization [64]. The Fed-RAMP
program has also set up Joint Certification Board (JAB)
comprising of Chief Information Officers from Defense,
DHS, and GSA [63][64]. The JAB is responsible for
developing certification benchmark for third party
organization Worldwide and also assesses the World
Health Organization performance assessments on cloud
solutions level. The JAB also evaluates license packages
that can grant temporary permission, allowing the operation.
The government agencies overseeing the services have the
final duty for final authority.
B. Legal Over Cloud Computing
The additional dissimilarities classified the environment of
computing; some legal issues increase with cloud
computing, in conjunction with trademark infringement,
security concerns and sharing of proprietary data resources.
The Electronic Frontier Foundation discussed a conflicted
issues about the United States government; concerning the
Mega transfer confiscation methodology, considering
people losing their property privileges by storing
information on a cloud computing service[68]. One to three
significant but hardly mentioned disadvantage with cloud
computing is that the problem of World Health
Organization is in "possession" of the knowledge[69][64].
If the cloud company is the "custodian" of the data, then a
particular set of rights would apply. However, it is bringing
certain disadvantages inside the legalities of cloud
computing, that is, the problem of legal possession of the
data. Many terms are of Service Level Agreements area
unit that is silent on the question of ownership. The legal
issues are not limited to the first amendment during which
the cloud-based application is actively getting used
[64][70]. That should straighten things that could happen
when the clients finish up the relationship with others. With
important issues, things might be an event going to happen
before leveraging the deployment of the application in the
cloud environment [64]. Though, within the occurrence of
provider failures or liquidation, the state property
information might become distorted.
C. Cloud computing Vendor lock-in Right
Cloud computing remains comparatively new, standard
developed. Several cloud platforms and services are
proprietary, which means that has engineered on the precise
criteria, tools, and protocols developed by the explicit
merchant for its particular cloud giving. It may build
migration off a proprietary cloud platform prohibitively
sophisticated and highly-priced.
Three forms of merchant lock-in will occur with cloud
computing[64][72]:
Clouds Platform lock-in: Cloud services tend to be
engineered on one amongst many possible virtualization
platforms, for instance, VMWare or Xen. Migrating from a
cloud supplier utilization of one platform to a cloud
provider employing an entirely different platform can be
terribly sophisticated[64][72].
Clouds Data lock-in: Since the computing cloud remains
novel, the standards of possession. The World Health
Organization owns the data once it appears on a cloud
platform, that is not, however, developed, that might build
it sophisticated if cloud computing users ever conceived as
moving knowledge Off a cloud vendor's platform[64][72].
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
9
Clouds Tool's lock-in: The tools engineered to manage a
clouded atmosphere which is not compatible with various
types of each virtual and physical infrastructure, those tools
can solely be ready to be administered by knowledge or
apps that board the vendor's explicit cloud
atmosphere[64][72].
When the heterogeneous cloud computing is delineated as a
kind of cloud environment that forestalls merchant lock-in,
it aligns with enterprise information data centers that are
operating hybrid cloud models[64][73]. The absence of
merchant lock-in lets cloud director choose his or her
selection of supervisors for specific tasks to deploy
virtualized infrastructures to alternative enterprises while
not the necessity to think about the flavor of a supervisor
within the alternative company[64][73].
A different cloud has taken into account one that has on-
premises non-public clouds, public clouds, and software-as-
a-service clouds. Heterogeneous clouds will work with
environments that are not virtualized, like old knowledge
centers. Different clouds additionally yield the utilization of
piece components, like hypervisors, servers, and storage,
from multiple vendors.
Cloud piece components, like cloud storage systems,
provide arthropod genus, however it usually incompatible
with one another. The result is sophisticated migration
between backends and makes it tough to integrate
knowledge unfold across various location. It has been
delineating as a tangle of merchant lock-in[64][74]. The
answer to the current is for clouds to adopt common
standards[64].
Heterogeneous cloud computing differs from homogenized
clouds, which delineated as those efficient, logical building
blocks provided by one merchant[64][73][75]. Intel chief of
high-density computing, Jason Waxman, “ estimated as an
expression that a homogenized system of fifteen thousand
servers would value about six million US dollars for an
additional cost and “ megawatts” power utilsation[64][75].
C. Cloud Computing Open standards
Cloud infrastructure providers naturally expose traditional
APIs services but additionally distinctive to their
implementation and so not practical [64][76]. Some
vendors have approved and adopted others APIs[76], and
there are some open standards ongoing development,
delivering ability, and movability. in the year 2012, the
Open Standard was broadened with business support by
OpenStack[77]. In 2010, National Aeronautic Space
Administration and Rackspace presented a probable rule to
the OpenStack Foundation[64][78][79]. OpenStack
followers epitomize and endorse those group which keeps
the clouds technologies such as AMD, Intel, Dell, HP,
IBM, Yahoo, Huawei and currently VMware for
empowerment[64][79].
V. Cloud Computing Privacy Control
D. Cloud Computing Privacy solution
Solutions to privacy in cloud computing embrace policy
and
Legislation likewise as end users' decisions for a way data
is held on[64][80][81].The cloud service infrastructure
desires to establish clear and relevant policies that describe,
how the data of every cloud user will be accessed and used
[64][81]. Cloud service users will cipher data that process
or hold on at intervals the cloud can forestall[64]. The
unauthorized access and Science cryptography mechanisms
are the simplest choices. Additionally, authentication and
integrity protection mechanisms make sure that data solely
goes where the client needs it to travel, and it has not
changed in transit [82].
Strong authentication may be an obligatory demand for any
cloud reading[81][82]. User authentication is that the
primary basis for access management, and especially
within the cloud setting, authentication, and access
management are additional vital than ever since the cloud,
and every one of its data is in public access. Cloud ID
[64][80] provides a privacy-preserving cloud-based and
cross-enterprise identity verification solutions for this
downside[81]. It links the counsel of the users to their life
science associated stores it in an encrypted fashion[64][82].
The creative use of a searchable cryptography technique,
identity verification is performed within the encrypted
domain to form positive that the cloud supplier or potential
attackers do not gain access to any sensitive data or maybe
the contents of the individual queries[64][80].
E Cloud Computing Agreement
To become rules organized by FISMA, HIPAA, and SOX
within the United state of America, the information
Protection Directive within the EU and also the MasterCard
industry's PCI DSS, users might get to adopt community
and hybrid deployment models that are dearer and should
provide restricted edges”[30]. However, Google is
organized to "manage and meet additional government
policy necessities on the far side FISMA, " and Rackspace
Cloud or QubeSpace can claim PCI compliance.
Many suppliers conjointly acquire associate degree SAS
seventy sort II audits. However, this has been criticized as a
result of the selected set of goals and standards determined
by the auditor and also the auditee are typically not
disclosed and may vary widely. Suppliers create this data
obtainable for the asking, beneath a non-disclosure
agreement.
Customers within the EU getting with cloud suppliers
outside the EU/EEA got to adhere to the EU rules on
export of private information.
A multitude of laws and regulations have forced specific
compliance necessities onto several corporations that
collect, generate or store information. These policies might
dictate a vast array of knowledge storage systems.
However significant data should maintain, the method used
for deleting information, and even certain recovery plans.
The U. S insurance movability and answerability Act
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
10
(HIPAA) need a contingency set up that has information
backups, data recovery, and information access throughout
emergencies.
The privacy laws of Svizzera demand that non-public
information, together with emails, physically keep in
Svizzera.
In the UK, the Civil Contingencies Act of 2004 sets forth
steerage for a business contingency set up that has policies
for information storage. In a virtualized cloud computing
atmosphere, customers might grasp precisely wherever
their data is being stored. In fact, information could also
maintain across multiple data centers to enhance
responsibility, increased performance, and supply
redundancies. This geographic dispersion might create it
more durable to establish legal jurisdiction if disputes arise.
VII.CONCLUSION AND FUTURE WORK
In this paper, we sought to implement artificially intelligent
agents that would help reduce energy wastage at Cloud
data centers and thus contribute to improving the great big
energy problem that all big data centers face in today’s
world. We have a look at the different ways in which
machine learning and artificial intelligence mechanisms
and methodologies can be used towards energy efficiency
in a cloud data center. In future work, we hope to consider
deep learning methods in reducing power consumption in
Data Centre much further.
REFERENCES
[1] Farahnakian, F., Liljeberg, P., & Plosila, J. (2014,
February). Energy-efficient virtual machines
consolidation in cloud data centers using
reinforcement learning. In Parallel, Distributed
and Network-Based Processing (PDP), 2014
22nd Euromicro International Conference on
(pp. 500-507). IEEE.
[2] H. Allcott and M. Greenstone, “Is There an
Energy Efficiency Gap?,” in Energy Efficiency,
2013, pp. 133–161.
[3] S. Backlund, P. Thollander, J. Palm, and M.
Ottosson, “Extending the energy efficiency gap,”
Energy Policy, vol. 51, pp. 392–396, 2012.
[4] M. G. Patterson, “What is energy efficiency?
Concepts, indicators, and methodological issues,”
Energy Policy, vol. 24, no. 5, pp. 377–390, 1996.
[5] P. Linares and X. Labandeira, “Energy
efficiency: Economics and policy,” J. Econ.
Surv., vol. 24, no. 3, pp. 573–592, 2010.
[6] Iea, Worldwide Trends in Energy Use and
Efficiency. 2008.
[7] Dec, “The Energy Efficiency Strategy: The
Energy
[8] Efficiency Opportunity in the UK,” Dep. Energy
Clim.
[9] Chang., no. November, p. 30 pp., 2012.
[10] A. A. B. Lovins, “Energy efficiency, taxonomic
overview,” Encycl. Energy, vol. 401, no.
September, pp. 383–401, 2004.
[11] L. Pérez-Lombard, J. Ortiz, and D. Velázquez,
“Revisiting energy efficiency fundamentals,”
Energy Efficiency, vol. 6, no. 2. pp. 239–254,
2013.
[12] V. Oikonomou, F. Becchis, L. Steg, and D.
Russolillo, “Energy saving and energy efficiency
concepts for policy making,” Energy Policy, vol.
37, no. 11, pp. 4787–4796, 2009.
[13] CIBSE GUIDE F, “CIBSE Guide F: Energy
efficiency in buildings,” Energy Effic. Build.
Chart. Inst. Build. Serv. Eng. London, 2nd Ed., p.
204, 2004.
[14] A. B. Jaffe and R. N. Stavins, “The energy-
efficiency gap What does it mean?,” Energy
Policy, vol. 22, no. 10, pp. 804–810, 1994.
[15] L. Pérez-Lombard, J. Ortiz, I. R. Maestre, and J.
F. Coronel, “Constructing HVAC energy
efficiency indicators,” Energy Build., vol. 47, pp.
619–629, 2012.
[16] M. Croucher, “Potential problems and limitations
of energy conservation and energy efficiency,”
Energy Policy, vol. 39, no. 10, pp. 5795–5799,
2011.
[17] M. Ryghaug and K. H. Sørensen, “How energy
efficiency fails in the building industry,” Energy
Policy, vol. 37, no. 3, pp. 984–991, 2009.
[18] A. B. Lovins, “Energy End-Use Efficiency,”
Most, no. September, pp. 1–25, 2005.
[19] H. Herring, “Energy efficiency - A critical view,”
Energy, vol. 31, no. 1 SPEC. ISS. pp. 10–20,
2006.
[20] J. M. Cullen and J. M. Allwood, “Theoretical
efficiency limits for energy conversion devices,”
Energy, vol. 35, no. 5, pp. 2059–2069, 2010.
[21] K. Gillingham, R. Newell, and K. Palmer,
“Energy Efficiency Policies: A Retrospective
Examination,” Annu. Rev. Environ. Resources.,
vol. 31, no. 1, pp. 161–192, 2006.
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
11
[22] A. B. Jaffe, R. G. Newell, and R. N. Stavins,
“Economics of energy efficiency,” Encycl.
Energy, vol. 2, pp. 79–90, 2004.
[23] M. G. Patterson, “What is energy efficiency?,”
Energy Policy, vol. 24, no. 5, pp. 377–390, 1996.
[24] B. W. Ang, “Monitoring changes in economy-
wide energy efficiency: From energy-GDP ratio
to composite efficiency index,” Energy Policy,
vol. 34, no. 5, pp. 574–582, 2006.
[25] H. C. Granade, J. Creyts, A. Derkach, P. Farese,
S. Nyquist, and K. Ostrowski, “Unlocking
Energy Efficiency in the U.S. Economy,”
McKinsey Glob. Energy Mater., pp. 1–165, 2009.
[26] I. G. Hamilton, P. J. Steadman, H. Bruhns, A. J.
Summerfield, and R. Lowe, “Energy efficiency in
the British housing stock: Energy demand and the
Homes Energy Efficiency Database,” Energy
Policy, vol. 60, pp. 462–480, 2013.
[27] J. Palm and P. Thollander, “An interdisciplinary
perspective on industrial energy efficiency,”
Appl. Energy, vol. 87, no. 10, pp. 3255–3261,
2010.
[28] Energy Efficiency Models Implemented in a
Cloud Computing http://worldcomp-
proceedings.com/proc/p2013/GCA3885.pdf
(accessed March 27, 2017).
[29] Google Warns That NSA Is Breaking Internet -
Hit & Run ..,
http://reason.com/blog/2014/10/10/google-warns-
that-nsa-is-breaking-intern (accessed March 27,
2017).
[30] Energy Efficiency Models Implemented in a
Cloud Computing .., http://worldcomp-
proceedings.com/proc/p2013/GCA3885.pdf
(accessed March 27, 2017).
[31] ADVANCED M/E PUE & DCIE Assessments,
http://www.amepservices.com/downloads/AMEP
PUE-DCIEAssessmentServices.pdf (accessed
March 27, 2017).
[32] Cloud computing issues - Wikipedia,
https://en.wikipedia.org/wiki/Cloud_computing_i
ssues (accessed March 27, 2017).
[33] https://www.coursehero.com/file/p55ajq1/98-
Intel-General-Manager-of-high-density (accessed
March 27, 2017).
[34] 98 Intel General Manager of high-density
computing Jason ..,
https://www.coursehero.com/file/p55ajq1/98-
Intel-General-Manager-of-high-density (accessed
March 27, 2017).
[35] Google Data Centers ."Efficiency: How we do it"
retrieved
fromhttps://www.google.com/about/datacenters/e
fficiency/internal/#content , on 2017/03/09
[36] Computing's Energy Problem:
www.futurearchs.org/sites/default/files/horowitz-
ComputingEnergyISSCC.pdfCRAY-1. Page 6.
Supporting Evidence. 6
http://cpudb.stanford.edu/. Page 7. Houston, We
Have A Problem. Seven
http://cpudb.stanford.edu/.
[37] G. A. Qureshi, R. Weber, H. Balakrishnan, J.
Guttag, and B. Maggs,“ Cutting the electric bill
for Internet-scale systems,” Proceedings of the
ACM SIGCOMM 2009 conference on Data
communication, pp.123-134, 2009.
[38] J. Ll. Berral, I. Goiri1, R. Nou, F. Julia, J.
Guitart, R. Gavaldà and J.Torres; “Towards
energy-aware scheduling in data centers using
machine learning”, Proceedings of the 1st
International Conference on Energy-Efficient
Computing and Networking, pp. 215-224, 2010.
[39] A. Beloglazov, J.Abawajy, R.Buyya,” Energy-
aware resource allocation heuristics for efficient
management of data centers for cloud
computing,” Journal of Future Generation
Computer Systems, vol.28, pp.755-768, 2012.
[40] G. Dhiman and T. S. Rosing, “ System-level
power management using online learning”,
Proceedings of the Computer-Aided Design of
Integrated Circuits and Systems (CADICS), pp.
676–689, 2009.
[41] R.S.Sutton, A.G.Barto, “Reinforcement
Learning: AnIntroduction”,MIT Press,1998.
[42] J. Rao, X. Bu, C.-Z. Xu, L. Wang, and G. Yin. “
Vconf: a reinforcement learning approach to
virtual machine auto configuration,” Proceedings
of the 6th International Conference on
Autonomic Computing ( ICAC), pp. 137-146,
2009.
[43] G. Tesauro, N. K. Jong, R. Das, and M. N.
Bennani, “ A hybrid reinforcement learning
approach to autonomic resource allocation,”
Proceedings of the IEEE International
Conference on Autonomic Computing ( ICAC),
pp. 65–73, 2006.
[44] Y. Tan, W. Liu, and Q. Qiu, “Adaptive power
management using reinforcement learning,”
Proceedings of the International Conference on
Computer-Aided Design (ICCAD ’09), pp 461–
467, 2009.
[45] E. Ipek, O. Mutlu, J. F. Martinez, and R.
Caruana. “Self-optimizing memory controllers: A
reinforcement learning approach,” Proceedings of
the 35th Annual International Symposium on
Computer Architecture ( ISCA), pp.39-50, 2008.
[46] Manic, Milos, Kasun Amarasinghe, Juan J.
Rodriguez-Andina, and Craig Rieger. "Intelligent
Buildings of the Future: Cyberwar, Deep
Learning Powered, and Human Interacting."
IEEE Industrial Electronics Magazine 10, no. 4
(2016): 32-49.
[47] Alahakoon, D., & Yu, X. (2016). Smart
electricity meter data intelligence for future
energy systems: A survey. IEEE Transactions on
Industrial Informatics, 12(1), 425-436.
[48] M. Espinoza, C. Joye, R. Belmans, and B.
DeMoor,“Short-term load forecasting, profile
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
12
identification, and customer segmentation: A
methodology based on periodic time series,”
IEEE Trans. Power Syst., vol. 20, no. 3, pp.
1622–1630, Aug. 2005.
[49] K.-H. Kim, H.-S. Youn, and Y.-C. Kang, “Short-
term load forecasting for special days in
anomalous load conditions using neural networks
and fuzzy inference method,” IEEE Trans. Power
Syst., vol. 15, no. 2, pp. 559–565, May 2000.
[50] H. Pao, “Forecasting electricity market pricing
using artificial neural networks,” Energy
Convers. Manage., vol. 48, no. 3, pp. 907–912,
2007
[51] H. Liao and D. Niebur, “Load profile estimation
in electric transmission networks using
independent component analysis,” IEEE Trans.
Power Syst., vol. 18, no. 2, pp. 707–715, May
2003
[52] J. Nagi, K. S. Yap, S. K. Tiong, and S. K.
Ahmed, “Electrical power load forecasting using
hybrid self-organizing maps and support vector
machines,” in Proc. 2nd Int. Power Eng. Optim.
Conf. (PEOCO’08), Jun. 2008, pp. 51–56.
[53] D. Osborn and J. Smith, (1989) “The
performance of periodic autoregressive models in
forecasting seasonal U.K. consumption,” J. Bus.
Econ. Statist., vol. 7, pp. 117–127. [52] G.
Guthrie and S. Videbeck, “High-frequency
electricity spot price dynamics: An intra-day
markets approach,” New Zealand Inst. Study of
Competition Regul., Tech. Rep. 367760, 2002
[Online]. Available:
http://ssrn.com/abstract=367760 accessed on
June. 29, 2017.
[54] Jaiswal, S., Gupta, A., & Kanojiya, S. K. (2016).
Optimization of Energy Consumption via
Artificial Intelligence: A Study. SAMRIDDHI: A
Journal of Physical Sciences, Engineering, and
Technology, 8(1).
[55] LeCun, Y., Bengio, Y., & Hinton, G. (2015).
Deep learning. Nature, 521(7553), 436-444.
[56] I. Arel, C. Rose, and T. Karnowski. , (2010)
“Deep machine learning a new frontier in
artificial intelligence.” IEEE Computational
Intelligence Magazine, 5:13–18
[57] Y. Bengio.( 2009) Learning deep architectures
for AI. in Foundations and trends in Machine
Learning, 2(1):1–127.
[58] Y. Bengio, A. Courville, and P. Vincent. (2013)
Representation learning: A review and new
perspectives. IEEE Transactions on Pattern
Analysis and Machine Intelligence (PAMI),
38:1798–1828.
[59] L. Deng. (2011) An overview of deep-structured
learning for information processing. In
Proceedings of Asian-Pacific Signal &
Information Processing Annual Summit and
Conference (APSIPA-ASC).
[60] L. Deng, J. Li, K. Huang, Yao, D. Yu, F. Seide,
M. Seltzer, G. Zweig, X. He, J. Williams, Y.
Gong, and A. Acero.(2013a) Recent advances in
deep learning for speech research at Microsoft. In
Proceedings of International Conference on
Acoustics Speech and Signal Processing (ICASS).
[61] Deng, L., & Yu, D. (2014). Deep learning:
methods and applications. Foundations and
Trends® in Signal Processing, 7(3–4), 197-387.
[62] G. Hinton, S. Osindero, and Y. Teh. (2006) A
fast learning algorithm for deep belief nets.
Neural Computation, 18:1527–1554.
[63] "FedRAMP". U.S. General Services
Administration. 2012-06-13. Retrieved 2017-07-
03
[64] Cloud computing issues by Wikipedia, the free
encyclopedia,https://en.wikipedia.org/wiki?curid
=43204134#cite_note-25 retrieved from 2017-
07-03
[65] "FISMA compliance for federal cloud computing
on the horizon in 2010". SearchCompliance.com.
Retrieved 2010-08-22.
[66] "Google Apps and Government". Official Google
Enterprise Blog. 2009-09-15. Retrieved 2010-08-
22.
[67] "Cloud Hosting is Secure for Take-off: Mosso
Enables The Spreadsheet Store, an Online
Merchant, to become PCI Compliant". Rackspace.
2009-03-14. Retrieved 2017-07-04.
[68] Cohn, Cindy; Samuels, Julie (31 October 2012).
"Megaupload and the Government's Attack on
Cloud Computing". Electronic Frontier
Foundation. Retrieved 2017-07-04.
[69] Maltais, Michelle (26 April 2012). "Who owns
your stuff in the cloud". Los Angeles Times.
Retrieved 2017-07-04.
[70] Chambers, Don (July 2010). "Windows Azure:
Using Windows Azure’s Service Bus to Solve
Durreesamin Journal (ISSN: 2204-9827)
July Vol 4 Issue 2, Year 2018
13
Data Security Issues" (PDF). Rebus Technologies.
Retrieved 2017-07-04.
[71] McKendrick, Joe. (2011-11-20) "Cloud
Computing's Vendor Lock-In Problem: Why the
Industry is Taking a Step Backward," Forbes.com
[72] Hinkle, Mark. (2010-6-9) "Three cloud lock-in
considerations," Zenoss Blog
[73] Staten, James (2012-07-23). "Gelsinger brings
the 'H' word to VMware." ZDNet.
[74] vada, Eirik T. (2012-06-11) "Creating Flexible
Heterogeneous Cloud Environments," page 5,
Network and System Administration, Oslo
University College.
[75] Gannes, Liz. GigaOm, "Structure 2010: Intel vs.
the Homogeneous Cloud," June 24, 2010
[76] VMware Launches Open Source PaaS Cloud
Foundry". 2011-04-21. Retrieved 2017-07-04.
[77] Jon Brodkin (July 28, 2008). "Open source fuels
growth of cloud computing, software-as-a-
service". Network World. Retrieved 2017-07-04.
[78] AGPL: Open Source Licensing in a Networked
Age". Redmonk.com. 2009-04-15. Retrieved
2017-07-04.
[79] "Did OpenStack Let VMware Into The
Henhouse?". InformationWeek. 2012-10-19.
Retrieved 2017-07-04.
[80] Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M.
(2015). CloudID: Trustworthy Cloud-based and
Cross-Enterprise Biometric Identification. Expert
Systems with Applications, 42(21), 7905–7916.
[81] Ryan, Mark (January 2011). "Cloud Computing
Privacy Concerns on Our Doorstep.". ACM.
[82] Sen, Saydip (2013). "Security and Privacy Issues
in Cloud Computing." In Ruiz-Martinez,
Pereniguez-Garcia, and Marin-Lopez.
Architectures and Protocols for Secure
Information Technology. USA: IGI-Global. ar
xiv:1303.4814 
.

More Related Content

What's hot

The Environmental Impact of Cloud Computing
The Environmental Impact of Cloud ComputingThe Environmental Impact of Cloud Computing
The Environmental Impact of Cloud Computing
Suyati Technologies
 
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET-  	  Cost Effective Workflow Scheduling in BigdataIRJET-  	  Cost Effective Workflow Scheduling in Bigdata
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET Journal
 
Cloud Data Centers and the Challenge of Sustainable Energy
Cloud Data Centers and the Challenge of Sustainable EnergyCloud Data Centers and the Challenge of Sustainable Energy
Cloud Data Centers and the Challenge of Sustainable Energy
Dr Sukhpal Singh Gill
 
green cloud computing
green cloud computinggreen cloud computing
green cloud computing
Divaynshu Totla
 
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Editor IJCATR
 
Collaboration and fairness-aware big data management in distributed clouds
Collaboration  and fairness-aware big data management in distributed cloudsCollaboration  and fairness-aware big data management in distributed clouds
Collaboration and fairness-aware big data management in distributed clouds
Nexgen Technology
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
IJCSEA Journal
 
A Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud ComputingA Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud Computing
IJTET Journal
 
Cost Benefits of Cloud vs. In-house IT for Higher Education
Cost Benefits of Cloud vs. In-house IT for Higher EducationCost Benefits of Cloud vs. In-house IT for Higher Education
Cost Benefits of Cloud vs. In-house IT for Higher Education
CSCJournals
 
Enterprise-level Green ICT Using virtualization to balance energy economics
Enterprise-level Green ICT Using virtualization to balance energy economicsEnterprise-level Green ICT Using virtualization to balance energy economics
Enterprise-level Green ICT Using virtualization to balance energy economics
IJARIDEA Journal
 
Cloud middleware and services-a systematic mapping review
Cloud middleware and services-a systematic mapping reviewCloud middleware and services-a systematic mapping review
Cloud middleware and services-a systematic mapping review
journalBEEI
 
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO'sCloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO's
The Kalgidar Society - Baru Sahib
 
AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING
AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTINGAN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING
AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING
IJNSA Journal
 
B1803031217
B1803031217B1803031217
B1803031217
IOSR Journals
 
Clound computing
Clound computingClound computing
Clound computing
WGroup
 
An Efficient and Fault Tolerant Data Replica Placement Technique for Cloud ba...
An Efficient and Fault Tolerant Data Replica Placement Technique for Cloud ba...An Efficient and Fault Tolerant Data Replica Placement Technique for Cloud ba...
An Efficient and Fault Tolerant Data Replica Placement Technique for Cloud ba...
IJCSIS Research Publications
 
Resource Consideration in Internet of Things A Perspective View
Resource Consideration in Internet of Things A Perspective ViewResource Consideration in Internet of Things A Perspective View
Resource Consideration in Internet of Things A Perspective View
ijtsrd
 
Energy Saving by Migrating Virtual Machine to Green Cloud Computing
Energy Saving by Migrating Virtual Machine to Green Cloud ComputingEnergy Saving by Migrating Virtual Machine to Green Cloud Computing
Energy Saving by Migrating Virtual Machine to Green Cloud Computing
ijtsrd
 

What's hot (19)

The Environmental Impact of Cloud Computing
The Environmental Impact of Cloud ComputingThe Environmental Impact of Cloud Computing
The Environmental Impact of Cloud Computing
 
IRJET- Cost Effective Workflow Scheduling in Bigdata
IRJET-  	  Cost Effective Workflow Scheduling in BigdataIRJET-  	  Cost Effective Workflow Scheduling in Bigdata
IRJET- Cost Effective Workflow Scheduling in Bigdata
 
Cloud Data Centers and the Challenge of Sustainable Energy
Cloud Data Centers and the Challenge of Sustainable EnergyCloud Data Centers and the Challenge of Sustainable Energy
Cloud Data Centers and the Challenge of Sustainable Energy
 
green cloud computing
green cloud computinggreen cloud computing
green cloud computing
 
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
 
Collaboration and fairness-aware big data management in distributed clouds
Collaboration  and fairness-aware big data management in distributed cloudsCollaboration  and fairness-aware big data management in distributed clouds
Collaboration and fairness-aware big data management in distributed clouds
 
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHCLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESH
 
A Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud ComputingA Survey on Virtualization Data Centers For Green Cloud Computing
A Survey on Virtualization Data Centers For Green Cloud Computing
 
Cost Benefits of Cloud vs. In-house IT for Higher Education
Cost Benefits of Cloud vs. In-house IT for Higher EducationCost Benefits of Cloud vs. In-house IT for Higher Education
Cost Benefits of Cloud vs. In-house IT for Higher Education
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Enterprise-level Green ICT Using virtualization to balance energy economics
Enterprise-level Green ICT Using virtualization to balance energy economicsEnterprise-level Green ICT Using virtualization to balance energy economics
Enterprise-level Green ICT Using virtualization to balance energy economics
 
Cloud middleware and services-a systematic mapping review
Cloud middleware and services-a systematic mapping reviewCloud middleware and services-a systematic mapping review
Cloud middleware and services-a systematic mapping review
 
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO'sCloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO's
 
AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING
AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTINGAN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING
AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTING
 
B1803031217
B1803031217B1803031217
B1803031217
 
Clound computing
Clound computingClound computing
Clound computing
 
An Efficient and Fault Tolerant Data Replica Placement Technique for Cloud ba...
An Efficient and Fault Tolerant Data Replica Placement Technique for Cloud ba...An Efficient and Fault Tolerant Data Replica Placement Technique for Cloud ba...
An Efficient and Fault Tolerant Data Replica Placement Technique for Cloud ba...
 
Resource Consideration in Internet of Things A Perspective View
Resource Consideration in Internet of Things A Perspective ViewResource Consideration in Internet of Things A Perspective View
Resource Consideration in Internet of Things A Perspective View
 
Energy Saving by Migrating Virtual Machine to Green Cloud Computing
Energy Saving by Migrating Virtual Machine to Green Cloud ComputingEnergy Saving by Migrating Virtual Machine to Green Cloud Computing
Energy Saving by Migrating Virtual Machine to Green Cloud Computing
 

Similar to TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY EFFICIENCY IN A CLOUD COMPUTING ENVIRONMENT

An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
IJECEIAES
 
A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...
eSAT Publishing House
 
A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...
eSAT Journals
 
Survey: An Optimized Energy Consumption of Resources in Cloud Data Centers
Survey: An Optimized Energy Consumption of Resources in Cloud Data CentersSurvey: An Optimized Energy Consumption of Resources in Cloud Data Centers
Survey: An Optimized Energy Consumption of Resources in Cloud Data Centers
IJCSIS Research Publications
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
ijccsa
 
A Review of Energy-aware Cloud Computing Surveys
A Review of Energy-aware Cloud Computing SurveysA Review of Energy-aware Cloud Computing Surveys
A Review of Energy-aware Cloud Computing Surveys
TELKOMNIKA JOURNAL
 
An energy optimization with improved QOS approach for adaptive cloud resources
An energy optimization with improved QOS approach for adaptive cloud resources An energy optimization with improved QOS approach for adaptive cloud resources
An energy optimization with improved QOS approach for adaptive cloud resources
IJECEIAES
 
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
IJCNCJournal
 
A Study on Energy Efficient Server Consolidation Heuristics for Virtualized C...
A Study on Energy Efficient Server Consolidation Heuristics for Virtualized C...A Study on Energy Efficient Server Consolidation Heuristics for Virtualized C...
A Study on Energy Efficient Server Consolidation Heuristics for Virtualized C...Susheel Thakur
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
Souvik Pal
 
A Study on:Green Cloud Computing
A Study on:Green Cloud ComputingA Study on:Green Cloud Computing
A Study on:Green Cloud Computing
Vineet Garg
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
Dr. Amarjeet Singh
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
Dr. Amarjeet Singh
 
Above the clouds
Above the cloudsAbove the clouds
Above the cloudsrussel_uk
 
Cloud Computing Berkley
Cloud Computing BerkleyCloud Computing Berkley
Cloud Computing Berkleykrmartin_dal
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
IJECEIAES
 

Similar to TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY EFFICIENCY IN A CLOUD COMPUTING ENVIRONMENT (20)

An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
 
A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...
 
A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...A survey on energy efficient with task consolidation in the virtualized cloud...
A survey on energy efficient with task consolidation in the virtualized cloud...
 
Survey: An Optimized Energy Consumption of Resources in Cloud Data Centers
Survey: An Optimized Energy Consumption of Resources in Cloud Data CentersSurvey: An Optimized Energy Consumption of Resources in Cloud Data Centers
Survey: An Optimized Energy Consumption of Resources in Cloud Data Centers
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
 
A Review of Energy-aware Cloud Computing Surveys
A Review of Energy-aware Cloud Computing SurveysA Review of Energy-aware Cloud Computing Surveys
A Review of Energy-aware Cloud Computing Surveys
 
An energy optimization with improved QOS approach for adaptive cloud resources
An energy optimization with improved QOS approach for adaptive cloud resources An energy optimization with improved QOS approach for adaptive cloud resources
An energy optimization with improved QOS approach for adaptive cloud resources
 
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
 
A Study on Energy Efficient Server Consolidation Heuristics for Virtualized C...
A Study on Energy Efficient Server Consolidation Heuristics for Virtualized C...A Study on Energy Efficient Server Consolidation Heuristics for Virtualized C...
A Study on Energy Efficient Server Consolidation Heuristics for Virtualized C...
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
40 41
40 4140 41
40 41
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
A Study on:Green Cloud Computing
A Study on:Green Cloud ComputingA Study on:Green Cloud Computing
A Study on:Green Cloud Computing
 
An Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image CodingAn Efficient MDC based Set Partitioned Embedded Block Image Coding
An Efficient MDC based Set Partitioned Embedded Block Image Coding
 
Cloud Computing in Resource Management
Cloud Computing in Resource ManagementCloud Computing in Resource Management
Cloud Computing in Resource Management
 
Above the clouds
Above the cloudsAbove the clouds
Above the clouds
 
Cloud Computing Berkley
Cloud Computing BerkleyCloud Computing Berkley
Cloud Computing Berkley
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
 

More from Durreesamin Journal Australia (ISSN: 2204-9827)

Hci practices-in-agile-software-development
Hci practices-in-agile-software-developmentHci practices-in-agile-software-development
Hci practices-in-agile-software-development
Durreesamin Journal Australia (ISSN: 2204-9827)
 
Do Mobile Technology in the Classroom Really Improve Learning Outcomes?
Do Mobile Technology in the Classroom Really Improve Learning Outcomes?Do Mobile Technology in the Classroom Really Improve Learning Outcomes?
Do Mobile Technology in the Classroom Really Improve Learning Outcomes?
Durreesamin Journal Australia (ISSN: 2204-9827)
 
FUTURE OF MODIFICATIONS ON THE HUMAN BODY ACCORDING TO SCIENCE FICTION: WETWA...
FUTURE OF MODIFICATIONS ON THE HUMAN BODY ACCORDING TO SCIENCE FICTION: WETWA...FUTURE OF MODIFICATIONS ON THE HUMAN BODY ACCORDING TO SCIENCE FICTION: WETWA...
FUTURE OF MODIFICATIONS ON THE HUMAN BODY ACCORDING TO SCIENCE FICTION: WETWA...
Durreesamin Journal Australia (ISSN: 2204-9827)
 
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
Durreesamin Journal Australia (ISSN: 2204-9827)
 
KNOWLEDGE OF MALARIA AMONG ALBANIAN TRAVELLERS
KNOWLEDGE OF MALARIA AMONG ALBANIAN TRAVELLERS KNOWLEDGE OF MALARIA AMONG ALBANIAN TRAVELLERS
KNOWLEDGE OF MALARIA AMONG ALBANIAN TRAVELLERS
Durreesamin Journal Australia (ISSN: 2204-9827)
 
Measuring of Values in Philosophy: Formal Axiology of Russian Youth
Measuring of Values in Philosophy: Formal Axiology of Russian Youth Measuring of Values in Philosophy: Formal Axiology of Russian Youth
Measuring of Values in Philosophy: Formal Axiology of Russian Youth
Durreesamin Journal Australia (ISSN: 2204-9827)
 
Vol 1 issue 2 june 2015
Vol 1 issue 2 june 2015Vol 1 issue 2 june 2015
Durreesamin Journal Vol1 Issue1 March 2015
Durreesamin Journal  Vol1 Issue1 March 2015Durreesamin Journal  Vol1 Issue1 March 2015
Durreesamin Journal Vol1 Issue1 March 2015
Durreesamin Journal Australia (ISSN: 2204-9827)
 

More from Durreesamin Journal Australia (ISSN: 2204-9827) (8)

Hci practices-in-agile-software-development
Hci practices-in-agile-software-developmentHci practices-in-agile-software-development
Hci practices-in-agile-software-development
 
Do Mobile Technology in the Classroom Really Improve Learning Outcomes?
Do Mobile Technology in the Classroom Really Improve Learning Outcomes?Do Mobile Technology in the Classroom Really Improve Learning Outcomes?
Do Mobile Technology in the Classroom Really Improve Learning Outcomes?
 
FUTURE OF MODIFICATIONS ON THE HUMAN BODY ACCORDING TO SCIENCE FICTION: WETWA...
FUTURE OF MODIFICATIONS ON THE HUMAN BODY ACCORDING TO SCIENCE FICTION: WETWA...FUTURE OF MODIFICATIONS ON THE HUMAN BODY ACCORDING TO SCIENCE FICTION: WETWA...
FUTURE OF MODIFICATIONS ON THE HUMAN BODY ACCORDING TO SCIENCE FICTION: WETWA...
 
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY E...
 
KNOWLEDGE OF MALARIA AMONG ALBANIAN TRAVELLERS
KNOWLEDGE OF MALARIA AMONG ALBANIAN TRAVELLERS KNOWLEDGE OF MALARIA AMONG ALBANIAN TRAVELLERS
KNOWLEDGE OF MALARIA AMONG ALBANIAN TRAVELLERS
 
Measuring of Values in Philosophy: Formal Axiology of Russian Youth
Measuring of Values in Philosophy: Formal Axiology of Russian Youth Measuring of Values in Philosophy: Formal Axiology of Russian Youth
Measuring of Values in Philosophy: Formal Axiology of Russian Youth
 
Vol 1 issue 2 june 2015
Vol 1 issue 2 june 2015Vol 1 issue 2 june 2015
Vol 1 issue 2 june 2015
 
Durreesamin Journal Vol1 Issue1 March 2015
Durreesamin Journal  Vol1 Issue1 March 2015Durreesamin Journal  Vol1 Issue1 March 2015
Durreesamin Journal Vol1 Issue1 March 2015
 

Recently uploaded

How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 

Recently uploaded (20)

How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 

TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY EFFICIENCY IN A CLOUD COMPUTING ENVIRONMENT

  • 1. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 1 TOWARDS A MACHINE LEARNING BASED ARTIFICIALLY INTELLIGENT SYSTEM FOR ENERGY EFFICIENCY IN A CLOUD COMPUTING ENVIRONMENT Yao Francois Michael Kra, 1840192845@qq.com, School of Computer Science and Engineering, Southeast University, Nanjing, China Noah Kwaku Baah, baah.noah@gmail.com, School of Computer Science and Engineering, Southeast University, Nanjing, China. Imran Memon, imranmemon52@zju.edu.cn, College of Computer Science, Zhejiang University, Hangzhou 310027, China William Gyasi-Mensah, kyfm349349@gmail.com, School of Finance and Economics Jiangsu University ABSTRACT Cloud computing has become the mainstream of the emerging technologies for information interchange and accessibility. With such systems, the information accessed from any geographic location on this planet with some decent kind of internet connection. Applying machine learning together with artificial intelligence in dealing with the problem of energy reduction in cloud data center is an innovative idea. A large combination of Artificial intelligence is playing a significant role in cloud environment. For that matter, the Big organization providers like Amazon have taken steps to ensure that they can continue to expand their fast-growing cloud services to commensurate with the fast growth of population. These companies have built large data centers in remote parts of the world to overcome a shortage of information. These centers consume significant amounts of electrical energy. There is often a lot of energy wastage. According to IDC white paper, data centers have tremendously wasted billions of energy regarding billing and cash. Additionally, researchers have argued that by the year 2020 the energy consumption rate would have doubled. Research in this area is still a hot topic. This paper seeks to address the energy efficiency issue at a Cloud Data Center using machine learning methodologies, principles, and practices. This article also aims to bring out possible future implementation methods for artificially intelligent agents that would help reduce energy wastage at a Cloud data center and thus help ameliorate the great big energy problem at hand. Keywords: Cloud Computing; PUE; Energy Efficiency, Machine Learning, Artificial Intelligence, Cloud Service Provider (CSP) Virtualization I. INTRODUCTION Recent years, cloud computing has demonstrated, established and founded itself as one of the brains and drivers in modern technology. As a process paradigm faculty economy of scale, when organized and used effectively, the cloud computing presents significant advantages relating to computation power whereas reducing expenditures and saving energy. Massive data centers are in places wherever the concept of cloud computing involves life. Through virtualization technology, data center resources and services became substantially potential for several users to share, and to avoid having to line up their infrastructure to try and do things that have been completed within the cloud. Efficient use of energy in cloud computing has been receiving attention by researchers over the past decade. Some studies have suggested various optimization approaches to the challenge of minimizing the expenditure of energy within cloud computing setting [36],[37],[25],[20],[22]. Several scenarios also exist for using machine instruction strategies to material supplies and management within the cloud, with several goals. (The study will provide a survey towards a machine learning based artificially intelligent system for the efficient use of energy in a cloud computing setting). (The aim of this study area is to analyze and delve into energy efficiency, and carry up to the machine learning research, as well as support their invention in innovative ways capable of producing preferred outcomes. As computing has become very vast and sophisticated engine worldwide, cloud computing as a traditional model delivers, computing resources on cloud computing uses pay as you use method. The public IT corporations like Microsoft, Google, Amazon, and IBM have a unit of measurement running expansive data knowledge Centres worldwide to handle their always-rising requests. Notably, the rising demands for cloud computing facilities have considerably multiplied the power usage of knowledge centers, thereby making it an important issue). The third drop in energy charge for an outsized associate company like Google will reach over 1,000,000 dollars in value savings [35]. High power consumption does not only interpret to the great value but to boot leads to high carbon emissions that do not appear to
  • 2. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 2 be environmentally sustainable. Power costs hugely rising, information center instrumentality is overstretching power and cooling infrastructures, and so the primary point has not been about the current amount of data center emissions, instead, the point that these emissions are rising faster than the various carbon emission [35]. Among the compelling primary rationales for energy underperformance in data centers is that unused energy is wasted once the server operates at a low load. Even at down usage, like 100 percent central processor Usage, the flexibility consumed is over five hundredth of the peak power [36]. Dynamic consolidation has tested to be a good economic technique for energy cut down in data information centers by switching off unused or less-utilized servers [36],[37]. However, reaching the aimed extent of Quality of Service (QoS) between the user and a data center is vital. Hence, Quality of Service, the periodic upgrade will save energy whereas keeping an appropriate Quality of Service. The standard of Service necessity formalized through Service Level Agreement (SLA) that explains these features as lower turnout, largest possible amount or latency produced by the installed system. Moreover, virtualization is the most present power controlling and resource distribution technique used by data Knowledge Center. It permits a physical server (host) to be shared among multiple Virtual Machines (VMs) whereby each VM can run numerous application tasks. The central processing unit and memory resources are dynamically provided for a Virtual Machine, per current resource requirements. It enables virtualization for the requirements of energy efficiency in every data center [35]. Our Contributions to article extended by: 1. Illustrating some problems towards machine learning based mostly artificial agent to lop out the energy usage within the large-scale data center. 2. Reviewing and analyzing various types agent entities which may be applying exploiting machine learning 3. Identify problems within the existing systems to give insight to new researchers in innovative ways to implement energy huddles to handle the substance of massive energy wastage within green data centers. 4. Additionally show that when exploiting AI will facilitate data Centre’s manager to understand the prediction, management and stop the worst-case situation from occurring in reducing usage capability. The research paper is organized as follow, section I introduction, section I the background of the article, Section III, the stated problem of the article, section IV mathematical models for PUE state of the art. Part V and VI respectively discussed privacy control and literature review; section VII end up of the conclusion and the possible future development. II. BACKGROUND People around the world these days are enjoying computers, PC networks and applications to undertake and do most of their business processes [25], communication, and social networking [25]. As a result, the popularity of web- primarily based applications is on the increase. Most of the companies rendering these internet based applications use cloud computing services to host their applications. One can only imagine what amount methodology in power is needed to tackle this common workload dilemma. However, these works are mostly distributed across data centers within a cloud computing setting. The goal of cloud computing is to provide computing resources as utilities, rather like today electricity, clean water and telephoning services rendered as utilities. The services provided by cloud computing is based on software as a service (SaaS), infrastructure as a service (IaaS) and platform as a service. A new aspect of cloud computing is its acquisition model that depends on going to services and its business model supported by purchase use. It has an excellent access model that handles over the net to any device and its particular model that is cycling the climbable, elastic, dynamic, multi-tenant, and shareable. There are differing types of cloud computing environments of which Public cloud services offered by a 3rd party service provider. Private cloud is extraordinarily like a public cloud, the only real distinction between the private cloud is based on the services managed within one organization. Community cloud that controlled by a bunch of agencies that have a regular goal or concern, like security. Hybrid cloud, is therefore a mix of any of the various cloud environments. A) Machine Learning Machine learning (ML) methods considered for materials and power control within the wide-reaching data center corresponding procedure in grid energy and cloud technology. Considering the task consolidation policies, which have been described in [35], it operates every job with a small amount of data resources and takes into account the programming aspect in cutting down energy utilization [35]. The study adopted machine-learning strategy as a method to explore the existing data of the system, like Energy usage level, hundreds of processors and task completion time; and contributes to the standard of scheduling selections. The primary goal of the policy in [38] was to maximize user contentment while keeping energy usage down. In [38] an internet learning algorithmic regulation was scheduled to vigorously choose diverse consultants for forming energy controlling choices at execution time, wherever every knowledgeable may be a redesigned power management policy. Various experts outperform one another beneath entirely different workloads and hardware characteristics. B) Learning Reinforcement In [35] Reinforcement Learning (RL), the intelligent agent gets the maximum resolution through trial and error interaction with a current set with no prior information regarding the surroundings. A framework of learning reinforcement comprises of [1][35]:
  • 3. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 3 ▪ State area S: a group of states that intelligent agent can provide representation for at any surrounding area. ▪ Action area A: a group of measures that intelligent agent can perform. ▪ A Learning reinforcement agent sends signal r: a symbol that intelligent agent can receive from different types of environment. Actually, the indicator imitates the success or failure status of the system when associated with an action which it has taken place. Considering the fact of the signal, in [1] the signal serves as punishment for the intelligent agent who has accomplished an action based on pay before usage. Q- learning [1] could pass as one of the first probable Learning reinforcement agents which can be employed in numerous areas of analysis [1]. At the iteration level of the Q-learning algorithm, the intelligent agent firstly detects the system state ‘s’ and selects the action in ‘a.' When describing the work, the system run up to the following state ‘s,' and obtains the supported signal in r. When updating Q value, the equation calculates the start of next iteration level. (1)[1] Where Q(s, a) [1] signifies that the value of an intelligent agent can take action within state s. Training percentage determined which the recent one can overwrite proportion of the new information. The agent learning level can assume a price between zero and one; the worth of zero implies that no training takes place by the algorithm; on the other hand, the value of 1 shows that solely the first current data is used. The reduction issue could be worth between zero and one that gives additional weight to the sanctions within the near future than the far future. Consequently, once associate degree agent moves to state s once more, it chooses the activity with the least Q-value. The approach for selecting the simplest measures in state s is: (2) [1] Accordingly, the training agent’s objective is to seek out Learning Reinforcement (RL)[1],[39] could be machine learning Prototype has applied for power management in wide-reaching data center systems. In Reinforcement Learning, a decision-maker or agent observes the environment and chooses an activity at every state[1]. After every action has been undertaken, the agent gets a response showing the value of the executed activity. The ultimate objective of the agent is to study a policy for choosing the most effective measures for all possible steps. Also, researchers have shown the viability of RL methods in resource distribution [41][42], energy control [36][42] and self-optimizing memory controller [1] [43]. In [42] share servers on the internets. Applications dynamically exploit online, hybrid Reinforcement Learning to increase the anticipated total of SLA payments in every application. This hybrid method permits the RL regulator to bootstrap from existing management policies, considerably cutting down learning and expensiveness. The efficiency of the process verified in the situation of an available information data center image. Moreover, in [43], the power management system level’s policy supported by Reinforcement Learning provided a real gold reduction in the energy usage. It studies the most favorable policy in the absence any previous data of work. The researchers set the delay in manufacturing activity as a performance challenge whereas reducing energy usage. Looking at the prevalence of Machine Learning based on power management methods, the RL based learning mostly will investigate the trade-off within the electrical performance design house and join to a far efficient energy management policy. The application of machine learning algorithms to existing observance data provides a chance to improve Data Center in operation effectiveness significantly. A typical large scale Data Center generates several data points across thousands of sensors each day. Nevertheless, this information is never used for applications aside from observation purposes. Advances in process power and respect capabilities produce an outsized chance for machine learning to guide best apply and improve Data Center efficiency. C) Artificial Intelligent Intelligence commonly thought about because of the capacity to gather expertise and logic concerning insight to resolve compounded issues. Within the close to Future Intelligent Machines, they can replace human abilities in several ways. AI is the study and creation of intelligent machines and software system capable of reasoning, learning, gathering data, communicating, manipulating and understanding the objects. John McCarthy coined the term in 1956 as an aspect of technology involved with creating computers that act similar to humans. Economical energy use, generally merely referred to as energy efficiency, is the objective to scale back the quantity of power needed to produce product and services. For instance, Installing fluorescent lights, semiconductor diode lights or natural skylights minimizes the amount of energy necessary to reach an equivalent degree of lighting compared with using an old incandescent lightweight bulbs. Compact fluorescent lights need a mere fraction of the power of incandescent lights and will last from half dozen to ten times longer. These are the bound advantages of energy efficiency:- Energy observation Agent: This half is responsible for inspection the usage of electricity. Energy view agent compares current energy usage with historical data, records the results associated reports an emergency when abnormal information is revealed. Energy effectiveness Analysis Agent: This agent is accountable for information analyzing. Energy potency analysis agent can classify the characteristics of different users, and eventually verify the principle of energy utilization, which used to make effective selections. Decision-making Agent: This agent considers the results of energy potency analysis agent and the gifting strategy thoroughly, and makes correct picks once needed. At an equivalent time, it will take the CMB output as an essential
  • 4. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 4 reference. Finally, the agent generates new and reasonable electricity theme to guide users. Energy diagnosing Agent: Analyzes energy-using instrumentation from the system aspect, estimates current power consumption and offers additional references to decision-making agent, thus serving to enhance energy potency. User Feedback Agent: Uses the service condition to estimate the effectiveness of the system, measure the strength of the model from the user aspect, and output auxiliary suggestions to form period changes, improving decision-making set up endlessly. Information Intelligence Maintenance Agent: This agent is responsible for all the system information’s maintenance and classification in a very regular time, including user profile, energy-using instrumentality information, energy utilization information and information from measurement points. The constituent below shows the effectiveness of energy savings: Renewable Energy: The Renewable Energy has a possible impact on health because it produces energy with a significant reason and it has no pollution effect as coal and nuclear power. Intelligent Distribution: It has an artificial agent to which every knowledge performed as human. Its experience enables to predict and prevent some unusual distribution system (e.g. street lights, doors, elevators, wireless and many more) Operation Centre: performs as a data center whereby devices can be check and resolve specific problem within the area employment Smart home: it has an ability to control and check all connected gadgets within office building and houses Smart Connected Cities: It performs as public clouds to which connect the cities with internet bandwidth related to the aim of accessing information anywhere within the city. PEVs: the PEVs are very efficient electric cars chargers with a sort of less duration charging time D. Deep Learning Deep learning strategies illustrated with learning strategies with multiple levels of representation, obtained by composing straightforward; however nonlinear modules that convert every illustration at one level start with a raw data into the slightly new abstract level. With the composition of enough such transformations, highly complex functions often learned. Deep learning is creating significant advances in resolution issues that have resisted the most effective makes an attempt of the synthetic intelligence agency for several years [54]. It has clad to be superb at unearthing involving systems in high-dimensional information and is thus relevant to several domains of science, business and government. Since 2006, intensive, structured training, or additional unremarkably referred to as deep learning or hierarchical learning[60], has been known as a replacement space of machine learning analysis [56],[61]. Throughout the previous years, many methods have been created from deep learning analysis and have already been affecting a good vary of signal and data process. Working on the normal and also innovate a widened scopes together with fundamental aspects of machine learning and artificial intelligence in [55],[56],[57],[58], [59]. E. Cloud Computing Load Prediction One of the first important analytics applications for the SG. Moreover, the handiness of the time interval information has made it attainable to predict within the short term and with greater correctness. Fig: 1. Intelligent, smart grid architecture images Source: A smart grid [44].Smart Buildings of the Future Cyber aware, Deep Learning Powered, and Human Interacting. The figure 1 above described the need of intelligence system which helps reduce energy wastage and at the same becomes some sources of energy inefficiency.
  • 5. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 5 Correct predictions are necessary for determining a short term time operations as well as mid-term planning. However, additionally, manufacturers have to have an understanding concerning the purchases they need to provide for extended scheming [45]. Several applications of load prediction have been represented in literature wherever many apply function statically, and machine learning technologies used. For shorthand medium-term prediction, time-series analysis and neural networks are used [45], [47], [48]. A haul with short term time predicting models has been the deficit in understanding concerning the larger image as a result of not handling data concerning the various classes of customers. In [49], a PCA-based approach accustomed establishes the kind of demand visage by such client categories. In [50], [45] a hybrid system of SOMs and SVM was applied to predict mid-term electricity load. The SOM was used to divide power usage information into two teams that are then input into an SVM in an exceedingly monitored way for load forecasting. In [46], Espinoza et al. described on short-term time prediction with hourly load data from a Belgian grid station highlight that prediction and client identification are reticulated and suggested a merged structure which includes each. The first modeling relies on seasonal time- series analysis, using the periodic auto-regression (PAR) model [51], the periodic autoregression utilized in the modeling of electricity costs [52]. The stationary attributes obtained from these models are run through a k-means clustering method to include various client descriptions. III. PROBLEMS The problem occurs in the fact that in a cloud computing environment server consumes far more energy than they need. Hence, lots of energy wasted due to intuitive to energy efficiency. Computer servers in data centers account for concerning a pair of worldwide energy demand, growing concerning twelve-tone music a year, in line with the cluster. The servers, Greenpeace aforementioned, will suck up the maximum amount power as 50,000 average U.S. homes. However, most of what supplies energy to the cloud comes from coal energy instead of renewable sources like wind and star, consistent with Greenpeace. Clusters of information centers square measure rising in places just like the geographical region, where coal-powered electricity is reasonable and plentiful in the same cluster. In its report, the organization narrowed in on ten major technical school corporations, together with Apple, Twitter, and Amazon. Recently, the cluster has waged a feisty fight against Facebook, that depends on coal for 53.2% of its electricity, consistent with Greenpeace. Several corporations, the organization aforementioned, tightly guard data concerning the environmental effect and power usage of their IT operations. They additionally focus a lot on victimization energy expeditiously than on sourcing it cleanly, previously mentioned Greenpeace. Yahoo landed bonus points for setting facilities near clean energy hot spots and efficient coal-based power for direct 18.3% of its portfolio. Google received commendation for its intensive support of the wind and solar initiatives and for making a subsidiary, Google Energy, that may get electricity straight from separated clean energy producers. In 2005, the U.S. owned 10.3 million data centers gobbling up sufficient power to supply all of the England for two months, consistent with the web selling company WordStream. Every month, electricity accustomed power inquiries on Google bring out 260,000 kilograms of greenhouse gas, and it is s to sufficient supply a deep freezer for 5,400 years, consistent with WordStream. IV. Power Usage Effectiveness (PUE) V Data center Infrastructure Efficiency (DCiE) Benchmarking information data hub’s power capability might be a vital commencement for minimizing energy usage and connected power expenditure. Effectiveness Benchmarking permits us to grasp this level of effectiveness with every data center, and has to institute further effective optimum procedures; it aids in measuring the efficiency of those efficiency methods. Power Usage Effectiveness (PUE) and its shared data Centre infrastructure Efficiency (DCiE) are usually preferred criterion planned by the new Grid to aid IT Professionals to ensure but energy economical info centers areas, and to observe the impact of their efficiency efforts. The amount instituted collectively incorporates a general benchmark that it recommends, named Company Average info Centre Efficiency (CADE). At their February 2009 Technical Forum, the new Grid introduced new parameters named Information Center Productivity (DCP) knowledge and Data Centre energy Productivity (DCeP) that probed into the relevant work created by your information center. All benchmarks have their worth, and once used correctly, they are going to be a helpful and essential tool for center energy efficiency. Data centers all around the world have a responsibility to become green and eco-friendly. It starts with cutting their energy costs and consumption. Traditional methods of managing the energy efficiency of data centers are evidently inefficient and obsolete. The PUE ratio of total amount of energy used the in substitute variations inside
  • 6. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 6 the landscape of Fig: 2. Sketch of How the PUE and the DCE are calculated Computing, some legal problems increase with cloud computing, together with trademark infringement, security considerations and sharing of proprietary information resources. With a computer data center facility [29], the lower an organization is PUE the greener they are. An ideal PUE is about 1.0. PUE developed by a group called The Green Grid. It is a computation of how efficiently a computer data center applies energy. It is necessary to know the elements for the hundreds of the standards of measurement, which may represent as follows: 1. IT equipment Power. It comprises the load related to all of the IT instrumentation, such as figure, storage, and network equipment, in conjunction with complementing gadgets such as KVM switches, monitors, and workstations/laptops accustomed monitor or otherwise control the information center. 2. Total Facility Power. It involves all that supports the IT equipment load such as: ❖ Power delivery elements run through as Generators, UPS, PDUs, switchgear, heavy batteries, and distribution losses outside to the IT equipment. ❖ Cooling system elements like chillers, PC room air conditioning units (CRACs), direct enlargement air handler (DX) units, pumps, and cooling towers. ❖ Computer network and storage nodes. ❖ Different miscellaneous element hundreds like data center lighting. The PUE and DCiE provide the simplest approach to show: ❖ Opportunities to boost a data center's operational efficiency. However center compares with competitive data centers. If the PUE Data center operators are rising, then the designs and processes will get over time. ❖ Opportunities to repurpose energy for added IT equipment. While each of those metrics is an equivalent, they will be accustomed to express the power sharing within the knowledge center otherwise. As an example, if a PUE is decided to be 3.0, this means that the information center's demand is thrice bigger than the power required to supply energy to the IT instrumentation. Additionally, the magnitude relation uses as a multiplier factor for conniving the $64000 effect of the system’s power demands. For instance, if a server requests five hundred watts and the PUE for the data center is 3.0, then the ability from the utility Grid required to deliver five hundred watts to the server is 1500 watts. DCiE In A Data center, PUE is calculated by: (3) Moreover, its similarities with DCIE described as: ; (4) It must be well noted here at this point that the valuation for Total Facility Energy and IT Equipment Energy will vary and are likely to change based on a data center's layout. (5) Companies like Google have pioneered many attempts to cut energy costs at their data centers. One of such attempt is an artificially intelligent system developed by its subsidiary Deep Mind that led to a 15 percent improvement in power efficiency. The following diagram illustrates the layout of the Google data center and how the PUE resolved in:
  • 7. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 7 Data Source: ensuring measurement on Google data center, Google comprises servers, storage, and networking equipment as IT equipment power. We recognize everything else overhead power [33]. Fig: 4. Flowchart of already done data center Total Facility Power calculated at or close to the ability utility’s meter(s) to correctly mirror the facility coming into the data center. It could amount to the whole energy used within the data center. Center-only parts of a building utility meter ought to set the calculation of energy that is not supposed to be used within the data center would lead to faulty PUE and DCiE metrics. For instance, if a knowledge center works in an office block, gross energy supplied from the utility is the addition of the whole Facility Power for the data center, and therefore, the total power used by the non-data center offices. In this case, the data center administrator would need to live or predict the number of the energy utilized by the non-data center offices (an estimate can include some mistakes into the computations). IT instruments power would measure on balance power conversion, switching, and acquisition finalized and before the IT instrumentation itself. A possible measure purpose would be to the outcome of the PC space power distribution units (PDUs). This mensuration ought to represent the whole energy supplied to the figure instrumentation racks within the information center. Fig: 3. Structure green data center architecture The PUE will vary from 1.0 to time. Acceptably, a PUE worth approaching from zero to one would show 100% efficiency (i.e. all power utilized by IT equipment only). Presently, there are no exhaustive information data sets that show truth expansion of the PUE for information centers. Some preliminary work indicates that a lot of data centers might have a PUE from zero to three or greater; however, with the right style, a PUE worth from zero to six ought to be achievable. Shows that the twenty-two information data centers measured had PUE values within the 1.3 to 3.0 ranges. Some researchers have indicates that PUE values of 2.0 are doable with correct design6. However, there is presently no comprehensive business data information set that shows how the Green Grid feels, which is vital to start measuring information of data centers' effectiveness, though the present approach needs information manipulation.
  • 8. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 8 Additionally, the Green Grid conjointly urges information data center providers to share DCiE outcomes, which can facilitate every information data center owner higher analysis of their mensuration methodology similarly as perceived in their performance, however, compared with the remainder of the trade. Fig: 5. Observation of where energy utilized Correct PUE statistics for information data centers. Once more, there is no universal consensus on what makes up an economic or inefficient data center. Within the future, the Green Grid can provide values that profile target PUE and DCiE metrics for a range of typical data center configurations. In the short term, the Green Grid suggests that information center infrastructure begins utilization either with the PUE or DCiE metrics. Whereas the measuring points might not be outlined, the Green Grid feels which is vital to start measurement information of data center efficiency, even if the method presently needs information manipulation. VI. REVIEWED LITERATURE A. Cloud Computing Authorization U.S. Federal Agencies “are engaged in a geographical point of Management and Budget to use a system discussed to as Fed-RAMP (Federal Risk and Authorization Management Program) to assess and authorize cloud product and services. As it has shown, the Federal Congress of commerce Organised by Steven VanRoekel noted the fact to federal agency Chief Information Officers on 8th of December, 2011, about shaping but the federal agencies needed to use Fed-RAMP [63][64]. Fed-RAMP comprises of a group of agency Exceptional Publication 800-53 security panels specifically elect to issues protection in cloud environments. A group has been recognized publicly for the FIPS 199 at the lower categorization and thus the FIPS 199 moderate categorization [64]. The Fed-RAMP program has also set up Joint Certification Board (JAB) comprising of Chief Information Officers from Defense, DHS, and GSA [63][64]. The JAB is responsible for developing certification benchmark for third party organization Worldwide and also assesses the World Health Organization performance assessments on cloud solutions level. The JAB also evaluates license packages that can grant temporary permission, allowing the operation. The government agencies overseeing the services have the final duty for final authority. B. Legal Over Cloud Computing The additional dissimilarities classified the environment of computing; some legal issues increase with cloud computing, in conjunction with trademark infringement, security concerns and sharing of proprietary data resources. The Electronic Frontier Foundation discussed a conflicted issues about the United States government; concerning the Mega transfer confiscation methodology, considering people losing their property privileges by storing information on a cloud computing service[68]. One to three significant but hardly mentioned disadvantage with cloud computing is that the problem of World Health Organization is in "possession" of the knowledge[69][64]. If the cloud company is the "custodian" of the data, then a particular set of rights would apply. However, it is bringing certain disadvantages inside the legalities of cloud computing, that is, the problem of legal possession of the data. Many terms are of Service Level Agreements area unit that is silent on the question of ownership. The legal issues are not limited to the first amendment during which the cloud-based application is actively getting used [64][70]. That should straighten things that could happen when the clients finish up the relationship with others. With important issues, things might be an event going to happen before leveraging the deployment of the application in the cloud environment [64]. Though, within the occurrence of provider failures or liquidation, the state property information might become distorted. C. Cloud computing Vendor lock-in Right Cloud computing remains comparatively new, standard developed. Several cloud platforms and services are proprietary, which means that has engineered on the precise criteria, tools, and protocols developed by the explicit merchant for its particular cloud giving. It may build migration off a proprietary cloud platform prohibitively sophisticated and highly-priced. Three forms of merchant lock-in will occur with cloud computing[64][72]: Clouds Platform lock-in: Cloud services tend to be engineered on one amongst many possible virtualization platforms, for instance, VMWare or Xen. Migrating from a cloud supplier utilization of one platform to a cloud provider employing an entirely different platform can be terribly sophisticated[64][72]. Clouds Data lock-in: Since the computing cloud remains novel, the standards of possession. The World Health Organization owns the data once it appears on a cloud platform, that is not, however, developed, that might build it sophisticated if cloud computing users ever conceived as moving knowledge Off a cloud vendor's platform[64][72].
  • 9. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 9 Clouds Tool's lock-in: The tools engineered to manage a clouded atmosphere which is not compatible with various types of each virtual and physical infrastructure, those tools can solely be ready to be administered by knowledge or apps that board the vendor's explicit cloud atmosphere[64][72]. When the heterogeneous cloud computing is delineated as a kind of cloud environment that forestalls merchant lock-in, it aligns with enterprise information data centers that are operating hybrid cloud models[64][73]. The absence of merchant lock-in lets cloud director choose his or her selection of supervisors for specific tasks to deploy virtualized infrastructures to alternative enterprises while not the necessity to think about the flavor of a supervisor within the alternative company[64][73]. A different cloud has taken into account one that has on- premises non-public clouds, public clouds, and software-as- a-service clouds. Heterogeneous clouds will work with environments that are not virtualized, like old knowledge centers. Different clouds additionally yield the utilization of piece components, like hypervisors, servers, and storage, from multiple vendors. Cloud piece components, like cloud storage systems, provide arthropod genus, however it usually incompatible with one another. The result is sophisticated migration between backends and makes it tough to integrate knowledge unfold across various location. It has been delineating as a tangle of merchant lock-in[64][74]. The answer to the current is for clouds to adopt common standards[64]. Heterogeneous cloud computing differs from homogenized clouds, which delineated as those efficient, logical building blocks provided by one merchant[64][73][75]. Intel chief of high-density computing, Jason Waxman, “ estimated as an expression that a homogenized system of fifteen thousand servers would value about six million US dollars for an additional cost and “ megawatts” power utilsation[64][75]. C. Cloud Computing Open standards Cloud infrastructure providers naturally expose traditional APIs services but additionally distinctive to their implementation and so not practical [64][76]. Some vendors have approved and adopted others APIs[76], and there are some open standards ongoing development, delivering ability, and movability. in the year 2012, the Open Standard was broadened with business support by OpenStack[77]. In 2010, National Aeronautic Space Administration and Rackspace presented a probable rule to the OpenStack Foundation[64][78][79]. OpenStack followers epitomize and endorse those group which keeps the clouds technologies such as AMD, Intel, Dell, HP, IBM, Yahoo, Huawei and currently VMware for empowerment[64][79]. V. Cloud Computing Privacy Control D. Cloud Computing Privacy solution Solutions to privacy in cloud computing embrace policy and Legislation likewise as end users' decisions for a way data is held on[64][80][81].The cloud service infrastructure desires to establish clear and relevant policies that describe, how the data of every cloud user will be accessed and used [64][81]. Cloud service users will cipher data that process or hold on at intervals the cloud can forestall[64]. The unauthorized access and Science cryptography mechanisms are the simplest choices. Additionally, authentication and integrity protection mechanisms make sure that data solely goes where the client needs it to travel, and it has not changed in transit [82]. Strong authentication may be an obligatory demand for any cloud reading[81][82]. User authentication is that the primary basis for access management, and especially within the cloud setting, authentication, and access management are additional vital than ever since the cloud, and every one of its data is in public access. Cloud ID [64][80] provides a privacy-preserving cloud-based and cross-enterprise identity verification solutions for this downside[81]. It links the counsel of the users to their life science associated stores it in an encrypted fashion[64][82]. The creative use of a searchable cryptography technique, identity verification is performed within the encrypted domain to form positive that the cloud supplier or potential attackers do not gain access to any sensitive data or maybe the contents of the individual queries[64][80]. E Cloud Computing Agreement To become rules organized by FISMA, HIPAA, and SOX within the United state of America, the information Protection Directive within the EU and also the MasterCard industry's PCI DSS, users might get to adopt community and hybrid deployment models that are dearer and should provide restricted edges”[30]. However, Google is organized to "manage and meet additional government policy necessities on the far side FISMA, " and Rackspace Cloud or QubeSpace can claim PCI compliance. Many suppliers conjointly acquire associate degree SAS seventy sort II audits. However, this has been criticized as a result of the selected set of goals and standards determined by the auditor and also the auditee are typically not disclosed and may vary widely. Suppliers create this data obtainable for the asking, beneath a non-disclosure agreement. Customers within the EU getting with cloud suppliers outside the EU/EEA got to adhere to the EU rules on export of private information. A multitude of laws and regulations have forced specific compliance necessities onto several corporations that collect, generate or store information. These policies might dictate a vast array of knowledge storage systems. However significant data should maintain, the method used for deleting information, and even certain recovery plans. The U. S insurance movability and answerability Act
  • 10. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 10 (HIPAA) need a contingency set up that has information backups, data recovery, and information access throughout emergencies. The privacy laws of Svizzera demand that non-public information, together with emails, physically keep in Svizzera. In the UK, the Civil Contingencies Act of 2004 sets forth steerage for a business contingency set up that has policies for information storage. In a virtualized cloud computing atmosphere, customers might grasp precisely wherever their data is being stored. In fact, information could also maintain across multiple data centers to enhance responsibility, increased performance, and supply redundancies. This geographic dispersion might create it more durable to establish legal jurisdiction if disputes arise. VII.CONCLUSION AND FUTURE WORK In this paper, we sought to implement artificially intelligent agents that would help reduce energy wastage at Cloud data centers and thus contribute to improving the great big energy problem that all big data centers face in today’s world. We have a look at the different ways in which machine learning and artificial intelligence mechanisms and methodologies can be used towards energy efficiency in a cloud data center. In future work, we hope to consider deep learning methods in reducing power consumption in Data Centre much further. REFERENCES [1] Farahnakian, F., Liljeberg, P., & Plosila, J. (2014, February). Energy-efficient virtual machines consolidation in cloud data centers using reinforcement learning. In Parallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on (pp. 500-507). IEEE. [2] H. Allcott and M. Greenstone, “Is There an Energy Efficiency Gap?,” in Energy Efficiency, 2013, pp. 133–161. [3] S. Backlund, P. Thollander, J. Palm, and M. Ottosson, “Extending the energy efficiency gap,” Energy Policy, vol. 51, pp. 392–396, 2012. [4] M. G. Patterson, “What is energy efficiency? Concepts, indicators, and methodological issues,” Energy Policy, vol. 24, no. 5, pp. 377–390, 1996. [5] P. Linares and X. Labandeira, “Energy efficiency: Economics and policy,” J. Econ. Surv., vol. 24, no. 3, pp. 573–592, 2010. [6] Iea, Worldwide Trends in Energy Use and Efficiency. 2008. [7] Dec, “The Energy Efficiency Strategy: The Energy [8] Efficiency Opportunity in the UK,” Dep. Energy Clim. [9] Chang., no. November, p. 30 pp., 2012. [10] A. A. B. Lovins, “Energy efficiency, taxonomic overview,” Encycl. Energy, vol. 401, no. September, pp. 383–401, 2004. [11] L. Pérez-Lombard, J. Ortiz, and D. Velázquez, “Revisiting energy efficiency fundamentals,” Energy Efficiency, vol. 6, no. 2. pp. 239–254, 2013. [12] V. Oikonomou, F. Becchis, L. Steg, and D. Russolillo, “Energy saving and energy efficiency concepts for policy making,” Energy Policy, vol. 37, no. 11, pp. 4787–4796, 2009. [13] CIBSE GUIDE F, “CIBSE Guide F: Energy efficiency in buildings,” Energy Effic. Build. Chart. Inst. Build. Serv. Eng. London, 2nd Ed., p. 204, 2004. [14] A. B. Jaffe and R. N. Stavins, “The energy- efficiency gap What does it mean?,” Energy Policy, vol. 22, no. 10, pp. 804–810, 1994. [15] L. Pérez-Lombard, J. Ortiz, I. R. Maestre, and J. F. Coronel, “Constructing HVAC energy efficiency indicators,” Energy Build., vol. 47, pp. 619–629, 2012. [16] M. Croucher, “Potential problems and limitations of energy conservation and energy efficiency,” Energy Policy, vol. 39, no. 10, pp. 5795–5799, 2011. [17] M. Ryghaug and K. H. Sørensen, “How energy efficiency fails in the building industry,” Energy Policy, vol. 37, no. 3, pp. 984–991, 2009. [18] A. B. Lovins, “Energy End-Use Efficiency,” Most, no. September, pp. 1–25, 2005. [19] H. Herring, “Energy efficiency - A critical view,” Energy, vol. 31, no. 1 SPEC. ISS. pp. 10–20, 2006. [20] J. M. Cullen and J. M. Allwood, “Theoretical efficiency limits for energy conversion devices,” Energy, vol. 35, no. 5, pp. 2059–2069, 2010. [21] K. Gillingham, R. Newell, and K. Palmer, “Energy Efficiency Policies: A Retrospective Examination,” Annu. Rev. Environ. Resources., vol. 31, no. 1, pp. 161–192, 2006.
  • 11. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 11 [22] A. B. Jaffe, R. G. Newell, and R. N. Stavins, “Economics of energy efficiency,” Encycl. Energy, vol. 2, pp. 79–90, 2004. [23] M. G. Patterson, “What is energy efficiency?,” Energy Policy, vol. 24, no. 5, pp. 377–390, 1996. [24] B. W. Ang, “Monitoring changes in economy- wide energy efficiency: From energy-GDP ratio to composite efficiency index,” Energy Policy, vol. 34, no. 5, pp. 574–582, 2006. [25] H. C. Granade, J. Creyts, A. Derkach, P. Farese, S. Nyquist, and K. Ostrowski, “Unlocking Energy Efficiency in the U.S. Economy,” McKinsey Glob. Energy Mater., pp. 1–165, 2009. [26] I. G. Hamilton, P. J. Steadman, H. Bruhns, A. J. Summerfield, and R. Lowe, “Energy efficiency in the British housing stock: Energy demand and the Homes Energy Efficiency Database,” Energy Policy, vol. 60, pp. 462–480, 2013. [27] J. Palm and P. Thollander, “An interdisciplinary perspective on industrial energy efficiency,” Appl. Energy, vol. 87, no. 10, pp. 3255–3261, 2010. [28] Energy Efficiency Models Implemented in a Cloud Computing http://worldcomp- proceedings.com/proc/p2013/GCA3885.pdf (accessed March 27, 2017). [29] Google Warns That NSA Is Breaking Internet - Hit & Run .., http://reason.com/blog/2014/10/10/google-warns- that-nsa-is-breaking-intern (accessed March 27, 2017). [30] Energy Efficiency Models Implemented in a Cloud Computing .., http://worldcomp- proceedings.com/proc/p2013/GCA3885.pdf (accessed March 27, 2017). [31] ADVANCED M/E PUE & DCIE Assessments, http://www.amepservices.com/downloads/AMEP PUE-DCIEAssessmentServices.pdf (accessed March 27, 2017). [32] Cloud computing issues - Wikipedia, https://en.wikipedia.org/wiki/Cloud_computing_i ssues (accessed March 27, 2017). [33] https://www.coursehero.com/file/p55ajq1/98- Intel-General-Manager-of-high-density (accessed March 27, 2017). [34] 98 Intel General Manager of high-density computing Jason .., https://www.coursehero.com/file/p55ajq1/98- Intel-General-Manager-of-high-density (accessed March 27, 2017). [35] Google Data Centers ."Efficiency: How we do it" retrieved fromhttps://www.google.com/about/datacenters/e fficiency/internal/#content , on 2017/03/09 [36] Computing's Energy Problem: www.futurearchs.org/sites/default/files/horowitz- ComputingEnergyISSCC.pdfCRAY-1. Page 6. Supporting Evidence. 6 http://cpudb.stanford.edu/. Page 7. Houston, We Have A Problem. Seven http://cpudb.stanford.edu/. [37] G. A. Qureshi, R. Weber, H. Balakrishnan, J. Guttag, and B. Maggs,“ Cutting the electric bill for Internet-scale systems,” Proceedings of the ACM SIGCOMM 2009 conference on Data communication, pp.123-134, 2009. [38] J. Ll. Berral, I. Goiri1, R. Nou, F. Julia, J. Guitart, R. Gavaldà and J.Torres; “Towards energy-aware scheduling in data centers using machine learning”, Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, pp. 215-224, 2010. [39] A. Beloglazov, J.Abawajy, R.Buyya,” Energy- aware resource allocation heuristics for efficient management of data centers for cloud computing,” Journal of Future Generation Computer Systems, vol.28, pp.755-768, 2012. [40] G. Dhiman and T. S. Rosing, “ System-level power management using online learning”, Proceedings of the Computer-Aided Design of Integrated Circuits and Systems (CADICS), pp. 676–689, 2009. [41] R.S.Sutton, A.G.Barto, “Reinforcement Learning: AnIntroduction”,MIT Press,1998. [42] J. Rao, X. Bu, C.-Z. Xu, L. Wang, and G. Yin. “ Vconf: a reinforcement learning approach to virtual machine auto configuration,” Proceedings of the 6th International Conference on Autonomic Computing ( ICAC), pp. 137-146, 2009. [43] G. Tesauro, N. K. Jong, R. Das, and M. N. Bennani, “ A hybrid reinforcement learning approach to autonomic resource allocation,” Proceedings of the IEEE International Conference on Autonomic Computing ( ICAC), pp. 65–73, 2006. [44] Y. Tan, W. Liu, and Q. Qiu, “Adaptive power management using reinforcement learning,” Proceedings of the International Conference on Computer-Aided Design (ICCAD ’09), pp 461– 467, 2009. [45] E. Ipek, O. Mutlu, J. F. Martinez, and R. Caruana. “Self-optimizing memory controllers: A reinforcement learning approach,” Proceedings of the 35th Annual International Symposium on Computer Architecture ( ISCA), pp.39-50, 2008. [46] Manic, Milos, Kasun Amarasinghe, Juan J. Rodriguez-Andina, and Craig Rieger. "Intelligent Buildings of the Future: Cyberwar, Deep Learning Powered, and Human Interacting." IEEE Industrial Electronics Magazine 10, no. 4 (2016): 32-49. [47] Alahakoon, D., & Yu, X. (2016). Smart electricity meter data intelligence for future energy systems: A survey. IEEE Transactions on Industrial Informatics, 12(1), 425-436. [48] M. Espinoza, C. Joye, R. Belmans, and B. DeMoor,“Short-term load forecasting, profile
  • 12. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 12 identification, and customer segmentation: A methodology based on periodic time series,” IEEE Trans. Power Syst., vol. 20, no. 3, pp. 1622–1630, Aug. 2005. [49] K.-H. Kim, H.-S. Youn, and Y.-C. Kang, “Short- term load forecasting for special days in anomalous load conditions using neural networks and fuzzy inference method,” IEEE Trans. Power Syst., vol. 15, no. 2, pp. 559–565, May 2000. [50] H. Pao, “Forecasting electricity market pricing using artificial neural networks,” Energy Convers. Manage., vol. 48, no. 3, pp. 907–912, 2007 [51] H. Liao and D. Niebur, “Load profile estimation in electric transmission networks using independent component analysis,” IEEE Trans. Power Syst., vol. 18, no. 2, pp. 707–715, May 2003 [52] J. Nagi, K. S. Yap, S. K. Tiong, and S. K. Ahmed, “Electrical power load forecasting using hybrid self-organizing maps and support vector machines,” in Proc. 2nd Int. Power Eng. Optim. Conf. (PEOCO’08), Jun. 2008, pp. 51–56. [53] D. Osborn and J. Smith, (1989) “The performance of periodic autoregressive models in forecasting seasonal U.K. consumption,” J. Bus. Econ. Statist., vol. 7, pp. 117–127. [52] G. Guthrie and S. Videbeck, “High-frequency electricity spot price dynamics: An intra-day markets approach,” New Zealand Inst. Study of Competition Regul., Tech. Rep. 367760, 2002 [Online]. Available: http://ssrn.com/abstract=367760 accessed on June. 29, 2017. [54] Jaiswal, S., Gupta, A., & Kanojiya, S. K. (2016). Optimization of Energy Consumption via Artificial Intelligence: A Study. SAMRIDDHI: A Journal of Physical Sciences, Engineering, and Technology, 8(1). [55] LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444. [56] I. Arel, C. Rose, and T. Karnowski. , (2010) “Deep machine learning a new frontier in artificial intelligence.” IEEE Computational Intelligence Magazine, 5:13–18 [57] Y. Bengio.( 2009) Learning deep architectures for AI. in Foundations and trends in Machine Learning, 2(1):1–127. [58] Y. Bengio, A. Courville, and P. Vincent. (2013) Representation learning: A review and new perspectives. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 38:1798–1828. [59] L. Deng. (2011) An overview of deep-structured learning for information processing. In Proceedings of Asian-Pacific Signal & Information Processing Annual Summit and Conference (APSIPA-ASC). [60] L. Deng, J. Li, K. Huang, Yao, D. Yu, F. Seide, M. Seltzer, G. Zweig, X. He, J. Williams, Y. Gong, and A. Acero.(2013a) Recent advances in deep learning for speech research at Microsoft. In Proceedings of International Conference on Acoustics Speech and Signal Processing (ICASS). [61] Deng, L., & Yu, D. (2014). Deep learning: methods and applications. Foundations and Trends® in Signal Processing, 7(3–4), 197-387. [62] G. Hinton, S. Osindero, and Y. Teh. (2006) A fast learning algorithm for deep belief nets. Neural Computation, 18:1527–1554. [63] "FedRAMP". U.S. General Services Administration. 2012-06-13. Retrieved 2017-07- 03 [64] Cloud computing issues by Wikipedia, the free encyclopedia,https://en.wikipedia.org/wiki?curid =43204134#cite_note-25 retrieved from 2017- 07-03 [65] "FISMA compliance for federal cloud computing on the horizon in 2010". SearchCompliance.com. Retrieved 2010-08-22. [66] "Google Apps and Government". Official Google Enterprise Blog. 2009-09-15. Retrieved 2010-08- 22. [67] "Cloud Hosting is Secure for Take-off: Mosso Enables The Spreadsheet Store, an Online Merchant, to become PCI Compliant". Rackspace. 2009-03-14. Retrieved 2017-07-04. [68] Cohn, Cindy; Samuels, Julie (31 October 2012). "Megaupload and the Government's Attack on Cloud Computing". Electronic Frontier Foundation. Retrieved 2017-07-04. [69] Maltais, Michelle (26 April 2012). "Who owns your stuff in the cloud". Los Angeles Times. Retrieved 2017-07-04. [70] Chambers, Don (July 2010). "Windows Azure: Using Windows Azure’s Service Bus to Solve
  • 13. Durreesamin Journal (ISSN: 2204-9827) July Vol 4 Issue 2, Year 2018 13 Data Security Issues" (PDF). Rebus Technologies. Retrieved 2017-07-04. [71] McKendrick, Joe. (2011-11-20) "Cloud Computing's Vendor Lock-In Problem: Why the Industry is Taking a Step Backward," Forbes.com [72] Hinkle, Mark. (2010-6-9) "Three cloud lock-in considerations," Zenoss Blog [73] Staten, James (2012-07-23). "Gelsinger brings the 'H' word to VMware." ZDNet. [74] vada, Eirik T. (2012-06-11) "Creating Flexible Heterogeneous Cloud Environments," page 5, Network and System Administration, Oslo University College. [75] Gannes, Liz. GigaOm, "Structure 2010: Intel vs. the Homogeneous Cloud," June 24, 2010 [76] VMware Launches Open Source PaaS Cloud Foundry". 2011-04-21. Retrieved 2017-07-04. [77] Jon Brodkin (July 28, 2008). "Open source fuels growth of cloud computing, software-as-a- service". Network World. Retrieved 2017-07-04. [78] AGPL: Open Source Licensing in a Networked Age". Redmonk.com. 2009-04-15. Retrieved 2017-07-04. [79] "Did OpenStack Let VMware Into The Henhouse?". InformationWeek. 2012-10-19. Retrieved 2017-07-04. [80] Haghighat, M., Zonouz, S., & Abdel-Mottaleb, M. (2015). CloudID: Trustworthy Cloud-based and Cross-Enterprise Biometric Identification. Expert Systems with Applications, 42(21), 7905–7916. [81] Ryan, Mark (January 2011). "Cloud Computing Privacy Concerns on Our Doorstep.". ACM. [82] Sen, Saydip (2013). "Security and Privacy Issues in Cloud Computing." In Ruiz-Martinez, Pereniguez-Garcia, and Marin-Lopez. Architectures and Protocols for Secure Information Technology. USA: IGI-Global. ar xiv:1303.4814  .