computing methods
Recently Published Documents


TOTAL DOCUMENTS

796
(FIVE YEARS 198)

H-INDEX

28
(FIVE YEARS 6)

2022 ◽  
Author(s):  
Tahereh Abbasi-khazaei ◽  
Mohammad Hossein Rezvani

Abstract One of the most important concerns of cloud service providers is balancing renewable and fossil energy consumption. On the other hand, the policy of organizations and governments is to reduce energy consumption and greenhouse gas emissions in cloud data centers. Recently, a lot of research has been conducted to optimize the Virtual Machine (VM) placement on physical machines to minimize energy consumption. Many previous studies have not considered the deadline and scheduling of IoT tasks. Therefore, the previous modelings are mainly not well-suited to the IoT environments where requests are time-constraint. Unfortunately, both the sub-problems of energy consumption minimization and scheduling fall into the category of NP-hard issues. In this study, we propose a multi-objective VM placement to joint minimizing energy costs and scheduling. After presenting a modified memetic algorithm, we compare its performance with baseline methods as well as state-of-the-art ones. The simulation results on the CloudSim platform show that the proposed method can reduce energy costs, carbon footprints, SLA violations, and the total response time of IoT requests.


Author(s):  
S. I. Kseneva ◽  
E. V. Borodulina ◽  
O. Yu. Trifonova ◽  
V. P. Fisenko ◽  
V. V. Udut

2022 ◽  
Vol 2022 ◽  
pp. 1-13
Author(s):  
Muhammad Arif ◽  
F. Ajesh ◽  
Shermin Shamsudheen ◽  
Muhammad Shahzad

The use of application media, gamming, entertainment, and healthcare engineering has expanded as a result of the rapid growth of mobile technologies. This technology overcomes the traditional computing methods in terms of communication delay and energy consumption, thereby providing high reliability and bandwidth for devices. In today’s world, mobile edge computing is improving in various forms so as to provide better output and there is no room for simple computing architecture for MEC. So, this paper proposed a secure and energy-efficient computational offloading scheme using LSTM. The prediction of the computational tasks is done using the LSTM algorithm, the strategy for computation offloading of mobile devices is based on the prediction of tasks, and the migration of tasks for the scheme of edge cloud scheduling helps to optimize the edge computing offloading model. Experiments show that our proposed architecture, which consists of an LSTM-based offloading technique and routing (LSTMOTR) algorithm, can efficiently decrease total task delay with growing data and subtasks, reduce energy consumption, and bring much security to the devices due to the firewall nature of LSTM.


2022 ◽  
Vol 2022 ◽  
pp. 1-7
Author(s):  
J. Divakaran ◽  
Somashekhar Malipatil ◽  
Tareeq Zaid ◽  
M. Pushpalatha ◽  
Vilaskumar Patil ◽  
...  

With increasing advancements in the field of telecommunication, the attainment of a higher data transfer rate is essentially a greater need to meet high-performance communication. The exploitation of the fuzzy system in the wireless telecommunication systems, especially in Fifth Generation Mobile Networks (or) 5G networks is a vital paradigm in telecommunication markets. A comprehensive survey is dealt in the paper, where it initially reviews the basic understanding of fuzzy systems over 5G telecommunication. The literature studies are collected from various repositories that include reference materials, Internet, and other books. The collection of articles is based on empirical or evidence-based from various peer-reviewed journals, conference proceedings, dissertations, and theses. Most of the existing soft computing models are streamlined to certain applications of 5G networking. Firstly, it is hence essential to provide the readers to find research gaps and new innovative models on wide varied applications of 5G. Secondly, it deals with the scenarios in which the fuzzy systems are developed under the 5G platform. Thirdly, it discusses the applicability of fuzzy logic systems on various 5G telecommunication applications. Finally, the paper derives the conclusions associated with various studies on the fuzzy systems that have been utilized for the improvement of 5G telecommunication systems.


2022 ◽  
Vol 12 (1) ◽  
Author(s):  
Andriyan Bayu Suksmono ◽  
Yuichiro Minato

AbstractFinding a Hadamard matrix (H-matrix) among all possible binary matrices of corresponding order is a hard problem that can be solved by a quantum computer. Due to the limitation on the number of qubits and connections in current quantum processors, only low order H-matrix search of orders 2 and 4 were implementable by previous method. In this paper, we show that by adopting classical searching techniques of the H-matrices, we can formulate new quantum computing methods for finding higher order ones. We present some results of finding H-matrices of order up to more than one hundred and a prototypical experiment of the classical-quantum resource balancing method that yields a 92-order H-matrix previously found by Jet Propulsion Laboratory researchers in 1961 using a mainframe computer. Since the exactness of the solutions can be verified by an orthogonality test performed in polynomial time; which is untypical for optimization of hard problems, the proposed method can potentially be used for demonstrating practical quantum supremacy in the near future.


2022 ◽  
Vol 11 (1) ◽  
pp. 0-0

Many computing methods have been studied in intuitionistic fuzzy environment to enhance the resourcefulness of intuitionistic fuzzy sets in modelling real-life problems, among which, correlation coefficient is prominent. This paper proposes a new intuitionistic fuzzy correlation algorithm via intuitionistic fuzzy deviation, variance and covariance by taking into account the complete parameters of intuitionistic fuzzy sets. This new computing technique does not only evaluates the strength of relationship between the intuitionistic fuzzy sets but also indicates whether the intuitionistic fuzzy sets have either positive or negative linear relationship. The proposed technique is substantiated with some theoretical results, and numerically validated to be superior in terms of performance index in contrast to some hitherto methods. Multi-criteria decision-making processes involving pattern recognition and students’ admission process are determined with the aid of the proposed intuitionistic fuzzy correlation algorithm coded with JAVA programming language.


2022 ◽  
Vol 51 ◽  
pp. 101524
Author(s):  
Ming-Fung Francis Siu ◽  
Sik-Wah Patrick Fong ◽  
Hongqin Fan ◽  
JoonOh Seo ◽  
Vineet Kamat

2022 ◽  
pp. 325-347
Author(s):  
Nagi Faroug M. Osman ◽  
Ali Ahmed A. Elamin ◽  
Elmustafa Sayed Ali Ahmed ◽  
Rashid A. Saeed

A smart grid is an advanced utility, stations, meters, and energy systems that comprises a diversity of power processes of smart meters, and various power resources. The cyber-physical systems (CPSs) can play a vital role boosting the realization of the smart power grid. Applied CPS techniques that comprise soft computing methods, communication network, management, and control into a smart physical power grid can greatly boost to realize this industry. The cyber-physical smart power systems (CPSPS) are an effective model system architecture for smart grids. Topics as control policies, resiliency methods for secure utility meters, system stability, and secure end-to-end communications between various sensors/controllers would be quite interested in CPSPS. One of the essential categories in CPSPS applications is the energy management system (EMS). The chapter will spotlight the model and design the relationship between the grid and EMS networks with standardization. The chapter also highlights some necessary standards in the context of CPSPS for the grid infrastructure.


Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 856-874
Author(s):  
S. Anoop ◽  
Dr.J. Amar Pratap Singh

Mobile technologies is evolving so rapidly in every aspect, utilizing every single resource in the form of applications which creates advancement in day to day life. This technological advancements overcomes the traditional computing methods which increases communication delay, energy consumption for mobile devices. In today’s world, Mobile Edge Computing is evolving as a scenario for improving in these limitations so as to provide better output to end users. This paper proposed a secure and energy-efficient computational offloading scheme using LSTM. The prediction of the computational tasks done using the LSTM algorithm. A strategy for computation offloading based on the prediction of tasks, and the migration of tasks for the scheme of edge cloud scheduling based on a reinforcement learning routing algorithm help to optimize the edge computing offloading model. Experimental results show that our proposed algorithm Intelligent Energy Efficient Offloading Algorithm (IEEOA), can efficiently decrease total task delay and energy consumption, and bring much security to the devices due to the firewall nature of LSTM.


Sign in / Sign up

Export Citation Format

Share Document