2017
DOI: 10.1186/s13677-017-0083-2
|View full text |Cite
|
Sign up to set email alerts
|

Towards energy aware cloud computing application construction

Abstract: The energy consumption of cloud computing continues to be an area of significant concern as data center growth continues to increase. This paper reports on an energy efficient interoperable cloud architecture realised as a cloud toolbox that focuses on reducing the energy consumption of cloud applications holistically across all deployment models. The architecture supports energy efficiency at service construction, deployment and operation. We discuss our practical experience during implementation of an archit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…On the basis of bio-inspired and swarm insight methodologies, a methodical investigation of task scheduling in cloud and network modelling has been familiarized. Tis study should give per-users the ability to select a rational methodology for presenting improved strategies when organizing client's applications by providing them with more options [10].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…On the basis of bio-inspired and swarm insight methodologies, a methodical investigation of task scheduling in cloud and network modelling has been familiarized. Tis study should give per-users the ability to select a rational methodology for presenting improved strategies when organizing client's applications by providing them with more options [10].…”
Section: Related Workmentioning
confidence: 99%
“…Obviously, the states' S with action A is focused to obtain reward R. Te Qtables retain the latest updates and actions [26]. Te total reward is computed using the following equation: For {Get the t hours load predictions of the starting VM} (10) VMPreload < -Get-L p LoadPrediction (VMid) (11) {Get load prediction of each VM on host} (12) HRes < -Get_ResFromLoad (VMs, PreLoads, eachhost) (13) endFor (14) For: each server PM in datacenter (15) PM.Tcpu > β (16) workloadBalance in Data center() (17) End Function ALGORITHM 1: Dynamic programming algorithm to load utilization corresponding to bandwidth and network availability.…”
Section: Reinforcement Learning Techniques In Machine Learningmentioning
confidence: 99%
“…According to the policies, the method enforces access control in BYOD environment. In [7], the author performs evaluation on various algorithms on their security performance. In [8], the author present a taxonomy based approach for the access restriction in cloud environment.…”
Section: Related Workmentioning
confidence: 99%
“…Zuccaro et al and Zou et al found that using a shared Internet connection or shared databases may also add to the success of information sharing [8,9]. As a result of the exponential growth of technology, information technology (IT) products and services are accessible worldwide every day [10,11]. Bosch-Sijtsema et al and CAPM and Eng stated that this phenomenon pressures building managers to develop, implement, and integrate new technical techniques to accommodate these changes [12,13].…”
Section: Introductionmentioning
confidence: 99%