2019
DOI: 10.1007/s42235-019-0030-7
|View full text |Cite
|
Sign up to set email alerts
|

Energy-efficient Virtual Machine Allocation Technique Using Flower Pollination Algorithm in Cloud Datacenter: A Panacea to Green Computing

Abstract: The University of Gloucestershire accepts no liability for any infringement of intellectual property rights in any material deposited but will remove such material from public view pending investigation in the event of an allegation of any such infringement.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(17 citation statements)
references
References 33 publications
0
17
0
Order By: Relevance
“…Most of the papers prioritize the following elements in their experiments: task scheduling [96], [123], [124], biometric identification [112], [125], network optimization [60], [126]- [129], and network stability [123], [130], [131]. ACO may be very promising when implemented to single-goal optimization, even though more common GA have somewhat overtaken.…”
Section: Discussion and Potential Remarksmentioning
confidence: 99%
See 3 more Smart Citations
“…Most of the papers prioritize the following elements in their experiments: task scheduling [96], [123], [124], biometric identification [112], [125], network optimization [60], [126]- [129], and network stability [123], [130], [131]. ACO may be very promising when implemented to single-goal optimization, even though more common GA have somewhat overtaken.…”
Section: Discussion and Potential Remarksmentioning
confidence: 99%
“…Finally, we would like to suggest some of the possible scopes, shortly for researcher and practitioner as a brainstorming concept: reducing the reaction time and maximizing VM's resource allocation considering the QoS factor; improving the load stability in WSN using RCNN learning; SVM-PSO based community Forensics and RNN techniques for Intrusion Detection. Feature selection from natural algorithm Koroniotis et al [133] Quality of service NF PSO and DL Enhance NF Al hawaitat et al [134] WS PNS PSO Jamming attack Shi et al [135] Anomaly detection P ADAID 1 Presented unsupervised clustering Usman et al [96] VM allocation VR EFPA 2 Energy-oriented allocation Singh et al [103] VM migration VR HBGA 3 Energy reduction Naik et al [130] VM allocation VR Fruit fly Reduce host migration Meng & Pan [136] Optimization VR FFOA solve MKP 4 Mosa & Paton [126] VM placement VR GA Reduce response time & maximize resources utilization Duan et al [137] Information leakage P DL Protect server Festag & Spreckelsen [138] Data leakage P DL Detection of protected health information Chari et al [125] Quality of service IA DL Generate password via cognitive information Li et al [139] Signal processing IA GA Feature extraction via EEG signal Saini & Kansal [127] WSN ACS SI Reduce energy consumption and increase network life time Chen et al [140] Biometric identification IA CNN Proposed GSLT-CNN using human brain EEG Cao & Fang [141] Multilayer defense scenario ACS SI Found proficient IPSO elucidating extensive WTA problem Aliyu et al [124] Resource allocation ACS Ant colony Illustrated faster convergence optimize makespan time Poonia [142] VAN ACS SI Found significant difference in VANET routing protocol and Swarm based protocol Verma et al [ [129] Feature extraction ID GA Reduce features to classify network packet Tan et al [148] Real time network attack intrusion ID NN Able to detect in network precisely…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In the FC network, the fog nodes are servers, which are placed at the edge of the Internet [6,7]. In general, terms, fog nodes are the subset of public cloud, and fog nodes have limited capacity as compared to the public cloud [8,9]. As a reason, computation offloading is a method used to transfer resources intensive computation tasks of an application to the external server for processing [10,11].…”
Section: Introductionmentioning
confidence: 99%