2022
DOI: 10.1155/2022/8734198
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Virtualization-Based Dynamic Bin-Packing Optimized Energy Management Solution for Heterogeneous Clouds

Abstract: Cloud computing provides unprecedented advantages of using computing resources with very less efforts and cost. The energy utilization in cloud data centers has forced the cloud service providers to raise the expense of using its services and has increased the carbon footprints in the environment. Many static bin-packing algorithms exist which can reduce energy by some percentage, but with new era of digitization, advanced and dynamic techniques are required which can serve heterogeneous users and random users… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…erefore, the independent cascade model will serve as the basis for the information propagation model proposed in this paper. Researchers are also providing the security protocols [4][5][6] to maintain the integrity and confidentiality of the health care-related information over the wireless communication network.…”
Section: Information Dissemination Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…erefore, the independent cascade model will serve as the basis for the information propagation model proposed in this paper. Researchers are also providing the security protocols [4][5][6] to maintain the integrity and confidentiality of the health care-related information over the wireless communication network.…”
Section: Information Dissemination Modelmentioning
confidence: 99%
“…e current research on social networks mainly focuses on influence maximization and privacy protection. However, the existing studies related to influence dissemination do not consider the privacy protection needs of users, and the research related to privacy protection does not pay attention to the influence of users [3,4]. Moreover, some information propagation models are difficult to effectively model the propagation process of privacy leakage in social networks.…”
Section: Introductionmentioning
confidence: 99%
“…When the malicious node is at a high level of trust, it will rejoin the routing path to launch an attack. Researchers are also proposing various protocols (Puri et al , 2022; Viriyasitavat et al , 2022; Gupta et al , 2022; Dinesh Kumar et al , 2022) for proving confidentiality and integrity for the information shared among users and servers in wireless network using Internet of Things (IoT) device.…”
Section: Introductionmentioning
confidence: 99%
“…The data are captured by the control unit, which saves this data to the SD card, as well as transferred to the cloud server by the control unit. The cloud server processes the real-time data with a data processing unit and a machine learning algorithm for fault prediction and classification [59]. The machine learning algorithm has been trained over huge amounts of datasets.…”
Section: System Designmentioning
confidence: 99%