scholarly journals Efficient Resources Allocation and Energy Reduction with Virtual Machines for Cloud Computing

Author(s):  
Anand Mehta ◽  

Cloud computing is an internet provisioned method for sharing the resources on demand by network management, storage, services, applications and the serves that necessitate management optimal effort. VMM (virtual machine migration) plays a major role in enhancing the resource utilization, application isolation, processing nodes, fault tolerance in VMs for enhancing nodes portability and for maximizing the efficiency of physical server. For balancing the clouds with resources for the enhanced performance, varied users are served with application deployment in the cloud environment is considered as the major task. The user can rent or request the resources when it becomes significant. The emphasis of this paper is on different energy VM energy efficient module as per machine learning methods. While allocating the VMs to the host machines, MBFD (Modified Best Fit Decreasing) is considered and the classification of host machine capability such as overloaded, normal loaded and underloaded is executed according to SVM (Support vector machine). SVM is utilized as a classifier for analyzing the MBFD algorithm and for the classification of the host as per the job properties. In this procedure, the numbers of jobs that are not allocated are examined via simulation which is computed by means of time consumption, energy consumption and a total number of migrations.

2019 ◽  
Author(s):  
Girish L

Cloud computing is a technology which relies onsharing various computing resources instead of having localservers to handle applications. Cloud computing is driven byvirtualization technology. Virtual machines need migration fromone host to anther due to the presence of error or over loading orslowness in the current running host machine. Live Virtualmachine migration is the transfer of running virtual machinefrom one host to another without stopping the current runningtask. During this live virtual machine migration Downtime is oneof the key factors that have to be considered and assessed.Here we present detailed survey on what are the importance oflive virtual machine migration in cloud computing technologyand various techniques to reduce the downtime during livevirtual machine migration. The flow chart showing the steps usedin Pre copy approach for VM migration. And also we presentthe result of the comparison between the two virtual machinemigration environments, VMWare and Xen Server.


Proceedings ◽  
2020 ◽  
Vol 78 (1) ◽  
pp. 5
Author(s):  
Raquel de Melo Barbosa ◽  
Fabio Fonseca de Oliveira ◽  
Gabriel Bezerra Motta Câmara ◽  
Tulio Flavio Accioly de Lima e Moura ◽  
Fernanda Nervo Raffin ◽  
...  

Nano-hybrid formulations combine organic and inorganic materials in self-assembled platforms for drug delivery. Laponite is a synthetic clay, biocompatible, and a guest of compounds. Poloxamines are amphiphilic four-armed compounds and have pH-sensitive and thermosensitive properties. The association of Laponite and Poloxamine can be used to improve attachment to drugs and to increase the solubility of β-Lapachone (β-Lap). β-Lap has antiviral, antiparasitic, antitumor, and anti-inflammatory properties. However, the low water solubility of β-Lap limits its clinical and medical applications. All samples were prepared by mixing Tetronic 1304 and LAP in a range of 1–20% (w/w) and 0–3% (w/w), respectively. The β-Lap solubility was analyzed by UV-vis spectrophotometry, and physical behavior was evaluated across a range of temperatures. The analysis of data consisted of response surface methodology (RMS), and two kinds of machine learning (ML): multilayer perceptron (MLP) and support vector machine (SVM). The ML techniques, generated from a training process based on experimental data, obtained the best correlation coefficient adjustment for drug solubility and adequate physical classifications of the systems. The SVM method presented the best fit results of β-Lap solubilization. In silico tools promoted fine-tuning, and near-experimental data show β-Lap solubility and classification of physical behavior to be an excellent strategy for use in developing new nano-hybrid platforms.


2016 ◽  
Vol 14 (06) ◽  
pp. 1650033 ◽  
Author(s):  
Li Gu ◽  
Lichun Xue ◽  
Qi Song ◽  
Fengji Wang ◽  
Huaqin He ◽  
...  

During commercial transactions, the quality of flue-cured tobacco leaves must be characterized efficiently, and the evaluation system should be easily transferable across different traders. However, there are over 3000 chemical compounds in flue-cured tobacco leaves; thus, it is impossible to evaluate the quality of flue-cured tobacco leaves using all the chemical compounds. In this paper, we used Support Vector Machine (SVM) algorithm together with 22 chemical compounds selected by ReliefF-Particle Swarm Optimization (R-PSO) to classify the fragrant style of flue-cured tobacco leaves, where the Accuracy (ACC) and Matthews Correlation Coefficient (MCC) were 90.95% and 0.80, respectively. SVM algorithm combined with 19 chemical compounds selected by R-PSO achieved the best assessment performance of the aromatic quality of tobacco leaves, where the PCC and MSE were 0.594 and 0.263, respectively. Finally, we constructed two online tools to classify the fragrant style and evaluate the aromatic quality of flue-cured tobacco leaf samples. These tools can be accessed at http://bioinformatics.fafu.edu.cn/tobacco .


2021 ◽  
Author(s):  
Hanna Klimczak ◽  
Wojciech Kotłowski ◽  
Dagmara Oszkiewicz ◽  
Francesca DeMeo ◽  
Agnieszka Kryszczyńska ◽  
...  

<p>The aim of the project is the classification of asteroids according to the most commonly used asteroid taxonomy (Bus-Demeo et al. 2009) with the use of various machine learning methods like Logistic Regression, Naive Bayes, Support Vector Machines, Gradient Boosting and Multilayer Perceptrons. Different parameter sets are used for classification in order to compare the quality of prediction with limited amount of data, namely the difference in performance between using the 0.45mu to 2.45mu spectral range and multiple spectral features, as well as performing the Prinicpal Component Analysis to reduce the dimensions of the spectral data.</p> <p> </p> <p>This work has been supported by grant No. 2017/25/B/ST9/00740 from the National Science Centre, Poland.</p>


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Minal Patel ◽  
Sanjay Chaudhary ◽  
Sanjay Garg

Service can be delivered anywhere and anytime in cloud computing using virtualization. The main issue to handle virtualized resources is to balance ongoing workloads. The migration of virtual machines has two major techniques: (i) reducing dirty pages using CPU scheduling and (ii) compressing memory pages. The available techniques for live migration are not able to predict dirty pages in advance. In the proposed framework, time series based prediction techniques are developed using historical analysis of past data. The time series is generated with transferring of memory pages iteratively. Here, two different regression based models of time series are proposed. The first model is developed using statistical probability based regression model and it is based on ARIMA (autoregressive integrated moving average) model. The second one is developed using statistical learning based regression model and it uses SVR (support vector regression) model. These models are tested on real data set of Xen to compute downtime, total number of pages transferred, and total migration time. The ARIMA model is able to predict dirty pages with 91.74% accuracy and the SVR model is able to predict dirty pages with 94.61% accuracy that is higher than ARIMA.


Author(s):  
Dina Mohsen Zoughbi ◽  
Nitul Dutta

Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.


2021 ◽  
Vol 5 (3) ◽  
pp. 905
Author(s):  
Muhammad Afrizal Amrustian ◽  
Vika Febri Muliati ◽  
Elsa Elvira Awal

Japanese is one of the most difficult languages to understand and read. Japanese writing that does not use the alphabet is the reason for the difficulty of the Japanese language to read. There are three types of Japanese, namely kanji, katakana, and hiragana. Hiragana letters are the most commonly used type of writing. In addition, hiragana has a cursive nature, so each person's writing will be different. Machine learning methods can be used to read Japanese letters by recognizing the image of the letters. The Japanese letters that are used in this study are hiragana vowels. This study focuses on conducting a comparative study of machine learning methods for the image classification of Japanese letters. The machine learning methods that were successfully compared are Naïve Bayes, Support Vector Machine, Decision Tree, Random Forest, and K-Nearest Neighbor. The results of the comparative study show that the K-Nearest Neighbor method is the best method for image classification of hiragana vowels. K-Nearest Neighbor gets an accuracy of 89.4% with a low error rate.


2013 ◽  
Vol 2013 ◽  
pp. 1-10 ◽  
Author(s):  
Xiaoying Wang ◽  
Xiaojing Liu ◽  
Lihua Fan ◽  
Xuhan Jia

As cloud computing offers services to lots of users worldwide, pervasive applications from customers are hosted by large-scale data centers. Upon such platforms, virtualization technology is employed to multiplex the underlying physical resources. Since the incoming loads of different application vary significantly, it is important and critical to manage the placement and resource allocation schemes of the virtual machines (VMs) in order to guarantee the quality of services. In this paper, we propose a decentralized virtual machine migration approach inside the data centers for cloud computing environments. The system models and power models are defined and described first. Then, we present the key steps of the decentralized mechanism, including the establishment of load vectors, load information collection, VM selection, and destination determination. A two-threshold decentralized migration algorithm is implemented to further save the energy consumption as well as keeping the quality of services. By examining the effect of our approach by performance evaluation experiments, the thresholds and other factors are analyzed and discussed. The results illustrate that the proposed approach can efficiently balance the loads across different physical nodes and also can lead to less power consumption of the entire system holistically.


2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
Yanbing Liu ◽  
Bo Gong ◽  
Congcong Xing ◽  
Yi Jian

Aimed at resolving the issues of the imbalance of resources and workloads at data centers and the overhead together with the high cost of virtual machine (VM) migrations, this paper proposes a new VM migration strategy which is based on the cloud model time series workload prediction algorithm. By setting the upper and lower workload bounds for host machines, forecasting the tendency of their subsequent workloads by creating a workload time series using the cloud model, and stipulating a general VM migration criterion workload-aware migration (WAM), the proposed strategy selects a source host machine, a destination host machine, and a VM on the source host machine carrying out the task of the VM migration. Experimental results and analyses show, through comparison with other peer research works, that the proposed method can effectively avoid VM migrations caused by momentary peak workload values, significantly lower the number of VM migrations, and dynamically reach and maintain a resource and workload balance for virtual machines promoting an improved utilization of resources in the entire data center.


2020 ◽  
pp. 1-4
Author(s):  
Haresh Damjibhai Khachariya ◽  
Jayesh N. Zalavadia

Cloud computing provides various services over the internet and its increasing day by day.Given the growing demands of cloud services, it requires a lot of computing resources to meet customer needs. So, the addition of energy consumption through cloud computing resources will increase day by day and become a key obstacle in the cloud environment.In cloud computing,data centers consume more energy and additionally release carbon dioxide into the atmosphere. To reduce energy consumption through the cloud datacenter, energy-efficient resource management is required. In this paper a specific technique for performing virtual machines through datacenter is given. Our goal is to reduce power consumption on the datacenter by reducing the host running in the cloud datacenter. To reduce power consumption, schedule the incoming task such a way that all the resources like ram,cpu(mips) and bandwidth utilize in equal weightage.Then after if any host is over utilized then migrate one or more vm from that host to another host as well as if any host is underutilize then migrate running vm of that host and switch off the under loaded host to save energy.


Sign in / Sign up

Export Citation Format

Share Document