A Survey of Energy Aware Cloud’s Resource Allocation Techniques for Virtual Machine Consolidation
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 6
Abstract
As the demand for cloud computing environment is increasing, new techniques for making cloud computing more environment-friendly are being proposed with an aim to convert traditional cloud computing into green cloud computing. A standout amongst the most imperative complications in cloud computing is streamlining of energy utilization because its importance is increasing rapidly. There are numerous strategies and algorithms used to limit the energy utilization in the cloud. Methods incorporate DVFS, UP-VMC, Utility based MFF, HCT, AVVMC, ACO, and ESWCT. In this survey, a review of energy-aware techniques is presented for making virtual machines more energy efficient in a cloud computing. Working on each technique is briefly explained. A comparative analysis is also given for comparing multiple efficient techniques with respect to performance metrics.
Authors and Affiliations
Asif Farooq, Tahir Iqbal, Muhammad Usman Ali, Zunnurain Hussain
Wavelet Based Change Detection for Four Dimensional Assimilation Data in Space and Time Domains
Method for time change detection of four dimensional assimilation data by means of wavelet analysis is proposed together with spatial change detection with satellite imagery data. The method is validated with assimilatio...
Vision Based Geo Navigation Information Retrieval
In order to derive the three-dimensional camera position from the monocular camera vision, a geo-reference database is needed. Floor plan is a ubiquitous geo-reference database that every building refers to it during con...
Study on Method of Feature Selection in Speech Content Classification
Information communication is developing rapidly now, Voice communication from a distance is more and more popular. In order to evaluate and classify the content correctly, the acoustic features is used to analyze first i...
Security Provisions in Stream Ciphers Through Self Shrinking and Alternating Step Generator
in cryptography stream ciphers used to encrypt plain text data bits one by one. The security of stream ciphers depend upon randomness of key stream, good linear span and low probability of finding the initial states of p...
WHITE - DONKEY: Unmanned Aerial Vehicle for searching missing people
Searching for a missing person is not an easy task to accomplish,so over the years search methods have been developed, the problem is that the methods currently available have certain limitations and these limitations ar...