1,648 research outputs found

    Cloud computing resource scheduling and a survey of its evolutionary approaches

    Get PDF
    A disruptive technology fundamentally transforming the way that computing services are delivered, cloud computing offers information and communication technology users a new dimension of convenience of resources, as services via the Internet. Because cloud provides a finite pool of virtualized on-demand resources, optimally scheduling them has become an essential and rewarding topic, where a trend of using Evolutionary Computation (EC) algorithms is emerging rapidly. Through analyzing the cloud computing architecture, this survey first presents taxonomy at two levels of scheduling cloud resources. It then paints a landscape of the scheduling problem and solutions. According to the taxonomy, a comprehensive survey of state-of-the-art approaches is presented systematically. Looking forward, challenges and potential future research directions are investigated and invited, including real-time scheduling, adaptive dynamic scheduling, large-scale scheduling, multiobjective scheduling, and distributed and parallel scheduling. At the dawn of Industry 4.0, cloud computing scheduling for cyber-physical integration with the presence of big data is also discussed. Research in this area is only in its infancy, but with the rapid fusion of information and data technology, more exciting and agenda-setting topics are likely to emerge on the horizon

    Intelligent intrusion detection in low power IoTs

    Get PDF
    Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they cannot secure such systems effectively, having limited resources. Programming languages permitting immediate memory accesses through pointers often result in applications having memory-related errors, which may lead to unpredictable failures and security vulnerabilities. Furthermore, energy efficient IoT devices running on batteries cannot afford the implementation of cryptography algorithms as such techniques have significant impact on the system power consumption. Therefore, in order to operate IoT in a secure manner, the system must be able to detect and prevent any kind of intrusions before the network (i.e., sensor nodes and base station) is destabilised by the attackers. In this article, we have presented an intrusion detection and prevention mechanism by implementing an intelligent security architecture using random neural networks (RNNs). The application’s source code is also instrumented at compile time in order to detect out-of-bound memory accesses. It is based on creating tags, to be coupled with each memory allocation and then placing additional tag checking instructions for each access made to the memory. To validate the feasibility of the proposed security solution, it is implemented for an existing IoT system and its functionality is practically demonstrated by successfully detecting the presence of any suspicious sensor node within the system operating range and anomalous activity in the base station with an accuracy of 97.23%. Overall, the proposed security solution has presented a minimal performance overhead.</jats:p

    A Review on Energy Consumption Optimization Techniques in IoT Based Smart Building Environments

    Get PDF
    In recent years, due to the unnecessary wastage of electrical energy in residential buildings, the requirement of energy optimization and user comfort has gained vital importance. In the literature, various techniques have been proposed addressing the energy optimization problem. The goal of each technique was to maintain a balance between user comfort and energy requirements such that the user can achieve the desired comfort level with the minimum amount of energy consumption. Researchers have addressed the issue with the help of different optimization algorithms and variations in the parameters to reduce energy consumption. To the best of our knowledge, this problem is not solved yet due to its challenging nature. The gap in the literature is due to the advancements in the technology and drawbacks of the optimization algorithms and the introduction of different new optimization algorithms. Further, many newly proposed optimization algorithms which have produced better accuracy on the benchmark instances but have not been applied yet for the optimization of energy consumption in smart homes. In this paper, we have carried out a detailed literature review of the techniques used for the optimization of energy consumption and scheduling in smart homes. The detailed discussion has been carried out on different factors contributing towards thermal comfort, visual comfort, and air quality comfort. We have also reviewed the fog and edge computing techniques used in smart homes

    Improved quality of service-based cloud service ranking and recommendation model

    Get PDF
    One of the ongoing technologies which are used by large number of companies and users is cloud computing environment. This computing technology has proved that it provides certainly a different level of efficiency, security, privacy, flexibility and availability to its users. Cloud computing delivers on demand services to the users by using various service-based models. All these models work on utility-based computing such that users pay for their used services. Along with the various advantages of the cloud computing environment, it has its own limitations and problems such as efficient resource identification or discovery, security, task scheduling, compliance and sustainability. Among these resource identification and scheduling plays an important role because users always submits their jobs and expects responses in least possible time. Research is happening all around the world to optimize the response time, make span so as to reduce the burden on the cloud resources. In this paper, QoS based service ranking model is proposed for cloud computing environment to find the essential top ranked services. Proposed model is implemented in two phases. In the first phase, similarity computation between the users and their services is considered. In the second phase, computing the missing values based on the computed similarity measures is calculated. The efficiency of the proposed ranking is measured and the average precision correlation of the proposed ranking measure is showing better results than the existing measures

    Revisión de la optimización de Bess en sistemas de potencia

    Get PDF
    The increasing penetration of Distributed Energy Resources has imposed several challenges in the analysis and operation of power systems, mainly due to the uncertainties in primary resource. In the last decade, implementation of Battery Energy Storage Systems in electric networks has caught the interest in research since the results have shown multiple positive effects when deployed optimally. In this paper, a review in the optimization of battery storage systems in power systems is presented. Firstly, an overview of the context in which battery storage systems are implemented, their operation framework, chemistries and a first glance of optimization is shown. Then, formulations and optimization frameworks are detailed for optimization problems found in recent literature. Next, A review of the optimization techniques implemented or proposed, and a basic explanation of the more recurrent ones is presented. Finally, the results of the review are discussed. It is concluded that optimization problems involving battery storage systems are a trending topic for research, in which a vast quantity of more complex formulations have been proposed for Steady State and Transient Analysis, due to the inclusion of stochasticity, multi-periodicity and multi-objective frameworks. It was found that the use of Metaheuristics is dominant in the analysis of complex, multivariate and multi-objective problems while relaxations, simplifications, linearization, and single objective adaptations have enabled the use of traditional, more efficient, and exact techniques. Hybridization in metaheuristics has been important topic of research that has shown better results in terms of efficiency and solution quality.La creciente penetración de recursos distribuidos ha impuesto desafíos en el análisis y operación de sistemas de potencia, principalmente debido a incertidumbres en los recursos primarios. En la última década, la implementación de sistemas de almacenamiento por baterías en redes eléctricas ha captado el interés en la investigación, ya que los resultados han demostrado efectos positivos cuando se despliegan óptimamente. En este trabajo se presenta una revisión de la optimización de sistemas de almacenamiento por baterías en sistemas de potencia. Pare ello se procedió, primero, a mostrar el contexto en el cual se implementan los sistemas de baterías, su marco de operación, las tecnologías y las bases de optimización. Luego, fueron detallados la formulación y el marco de optimización de algunos de los problemas de optimización encontrados en literatura reciente. Posteriormente se presentó una revisión de las técnicas de optimización implementadas o propuestas recientemente y una explicación básica de las técnicas más recurrentes. Finalmente, se discutieron los resultados de la revisión. Se obtuvo como resultados que los problemas de optimización con sistemas de almacenamiento por baterías son un tema de tendencia para la investigación, en el que se han propuesto diversas formulaciones para el análisis en estado estacionario y transitorio, en problemas multiperiodo que incluyen la estocasticidad y formulaciones multiobjetivo. Adicionalmente, se encontró que el uso de técnicas metaheurísticas es dominante en el análisis de problemas complejos, multivariados y multiobjetivo, mientras que la implementación de relajaciones, simplificaciones, linealizaciones y la adaptación mono-objetivo ha permitido el uso de técnicas más eficientes y exactas. La hibridación de técnicas metaheurísticas ha sido un tema relevante para la investigación que ha mostrado mejorías en los resultados en términos de eficiencia y calidad de las soluciones

    Resource allocation in mobile edge cloud computing for data-intensive applications

    Get PDF
    Rapid advancement in the mobile telecommunications industry has motivated the development of mobile applications in a wide range of social and scientific domains. However, mobile computing (MC) platforms still have several constraints, such as limited computation resources, short battery life and high sensitivity to network capabilities. In order to overcome the limitations of mobile computing and benefit from the huge advancement in mobile telecommunications and the rapid revolution of distributed resources, mobile-aware computing models, such as mobile cloud computing (MCC) and mobile edge computing (MEC) have been proposed. The main problem is to decide on an application execution plan while satisfying quality of service (QoS) requirements and the current status of system networking and device energy. However, the role of application data in offloading optimisation has not been studied thoroughly, particularly with respect to how data size and distribution impact application offloading. This problem can be referred to as data-intensive mobile application offloading optimisation. To address this problem, this thesis presents novel optimisation frameworks, techniques and algorithms for mobile application resource allocation in mobile-aware computing environments. These frameworks and techniques are proposed to provide optimised solutions to schedule data intensive mobile applications. Experimental results show the ability of the proposed tools in optimising the scheduling and the execution of data intensive applications on various computing environments to meet application QoS requirements. Furthermore, the results clearly stated the significant contribution of the data size parameter on scheduling the execution of mobile applications. In addition, the thesis provides an analytical investigation of mobile-aware computing environments for a certain mobile application type. The investigation provides performance analysis to help users decide on target computation resources based on application structure, input data, and mobile network status
    corecore