Optimization problems are challenging, but the larger challenge is to deal with the energy issue of the cloud, with continuous dynamic load and fluctuating VM performance. The optimization technique aids in efficient task-resource mapping ensuring optimal resource utilization with minimum active hosts and energy consumption. Existing works focused on time-invariant and bounded VM performance with major concentration on minimizing the execution cost and time. A multi-objective adaptive manta-ray foraging optimization (MAMFO) has been proposed in the paper for efficient scheduling with optimum resource utilization and energy consumption. The paper contributes by considering the time-varying VM performance and performance prediction using a dynamic time-series based ARIMA model, filtering out the VMs with larger fluctuating possibility, and employing only the selected VMs to be scheduled using MAMFO to meet the optimization goal with minimum SLA violations. The experimental analysis improves the work efficiency (e.g., energy consumption attained to be 0.405 kWh, and 5.97% of SLA violations).
{"title":"Multi-Objective Adaptive Manta-Ray Foraging Optimization for Workflow Scheduling with Selected Virtual Machines Using Time-Series-Based Prediction","authors":"Sweta Singh, R. Kumar, U. P. Rao","doi":"10.4018/ijssci.312559","DOIUrl":"https://doi.org/10.4018/ijssci.312559","url":null,"abstract":"Optimization problems are challenging, but the larger challenge is to deal with the energy issue of the cloud, with continuous dynamic load and fluctuating VM performance. The optimization technique aids in efficient task-resource mapping ensuring optimal resource utilization with minimum active hosts and energy consumption. Existing works focused on time-invariant and bounded VM performance with major concentration on minimizing the execution cost and time. A multi-objective adaptive manta-ray foraging optimization (MAMFO) has been proposed in the paper for efficient scheduling with optimum resource utilization and energy consumption. The paper contributes by considering the time-varying VM performance and performance prediction using a dynamic time-series based ARIMA model, filtering out the VMs with larger fluctuating possibility, and employing only the selected VMs to be scheduled using MAMFO to meet the optimization goal with minimum SLA violations. The experimental analysis improves the work efficiency (e.g., energy consumption attained to be 0.405 kWh, and 5.97% of SLA violations).","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khadidja Benmoussa, D. Hamdadou, Zine El Abidine Roukh
The selection of hospital sites is one of the most important choice a decision maker has to take so as to resist the pandemic. The decision may considerably affect the outbreak transmission in terms of efficiency , budget, etc. The main targeted objective of this study is to find the ideal location where to set up a hospital in the willaya of Oran Alg. For this reason, we have used a geographic information system coupled to the multi-criteria analysis method AHP in order to evaluate diverse criteria of physiological positioning , environmental and economical. Another objective of this study is to evaluate the advanced techniques of the automatic learning . the method of the random forest (RF) for the patterning of the hospital site selection in the willaya of Oran. The result of our study may be useful to decision makers to know the suitability of the sites as it provides a high level of confidence and consequently accelerate the power to control the COVID19 pandemic.
{"title":"GIS-Based Multi-Criteria Decision-Support System and Machine Learning for Hospital Site Selection: Case Study Oran, Algeria","authors":"Khadidja Benmoussa, D. Hamdadou, Zine El Abidine Roukh","doi":"10.4018/ijssci.285592","DOIUrl":"https://doi.org/10.4018/ijssci.285592","url":null,"abstract":"The selection of hospital sites is one of the most important choice a decision maker has to take so as to resist the pandemic. The decision may considerably affect the outbreak transmission in terms of efficiency , budget, etc. The main targeted objective of this study is to find the ideal location where to set up a hospital in the willaya of Oran Alg. For this reason, we have used a geographic information system coupled to the multi-criteria analysis method AHP in order to evaluate diverse criteria of physiological positioning , environmental and economical. Another objective of this study is to evaluate the advanced techniques of the automatic learning . the method of the random forest (RF) for the patterning of the hospital site selection in the willaya of Oran. The result of our study may be useful to decision makers to know the suitability of the sites as it provides a high level of confidence and consequently accelerate the power to control the COVID19 pandemic.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"1040 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123140251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. K. Appati, Prince Kofi Nartey, Winfred Yaokumah, J. Abdulai
Biometric authentication is gaining ground in security-related issues in business, corporate management, and other settings. A considerable amount of research has been conducted in this area, yet further research into its betterment is still an emerging trend. This article presents a study of the published empirical research on some fingerprint recognition techniques widely in use. The study is limited to articles that explicitly discuss techniques used in recognizing a person's fingerprint. It employs a systematic mapping design, which proposes a categorical system to classify the research results based on the selected articles' topics. The categories include work distribution by year of publication, datasets used, fingerprint recognition approaches, metrics, and evaluation. This study shows the direction of currently performed empirical research on fingerprint recognition by comparing the selected published work to the classification criteria and evaluating them.
{"title":"A Systematic Review of Fingerprint Recognition System Development","authors":"J. K. Appati, Prince Kofi Nartey, Winfred Yaokumah, J. Abdulai","doi":"10.4018/ijssci.300358","DOIUrl":"https://doi.org/10.4018/ijssci.300358","url":null,"abstract":"Biometric authentication is gaining ground in security-related issues in business, corporate management, and other settings. A considerable amount of research has been conducted in this area, yet further research into its betterment is still an emerging trend. This article presents a study of the published empirical research on some fingerprint recognition techniques widely in use. The study is limited to articles that explicitly discuss techniques used in recognizing a person's fingerprint. It employs a systematic mapping design, which proposes a categorical system to classify the research results based on the selected articles' topics. The categories include work distribution by year of publication, datasets used, fingerprint recognition approaches, metrics, and evaluation. This study shows the direction of currently performed empirical research on fingerprint recognition by comparing the selected published work to the classification criteria and evaluating them.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiangnan Pan, S. Yamaguchi, Takumi Kageyama, Mohd Hafizuddin Bin Kamilin
This article proposes a white-hat worm launcher based on machine learning (ML) adaptable to large-scale IoT network for Botnet Defense System (BDS). BDS is a cyber-security system that uses white-hat worms to exterminate malicious botnets. White-hat worms defend an IoT system against malicious bots, the BDS decides the number of white-hat worms, but there is no discussion on the white-hat worms' deployment in IoT network. Therefore, the authors propose a machine-learning-based launcher to launch the white-hat worms effectively along with a divide and conquer algorithm to deploy the launcher to large-scale IoT networks. Then the authors modeled BDS and the launcher with agent-oriented Petri net and confirmed the effect through the simulation of the PN2 model. The result showed that the proposed launcher can reduce the number of infected devices by about 30-40%.
{"title":"Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System","authors":"Xiangnan Pan, S. Yamaguchi, Takumi Kageyama, Mohd Hafizuddin Bin Kamilin","doi":"10.4018/ijssci.291713","DOIUrl":"https://doi.org/10.4018/ijssci.291713","url":null,"abstract":"This article proposes a white-hat worm launcher based on machine learning (ML) adaptable to large-scale IoT network for Botnet Defense System (BDS). BDS is a cyber-security system that uses white-hat worms to exterminate malicious botnets. White-hat worms defend an IoT system against malicious bots, the BDS decides the number of white-hat worms, but there is no discussion on the white-hat worms' deployment in IoT network. Therefore, the authors propose a machine-learning-based launcher to launch the white-hat worms effectively along with a divide and conquer algorithm to deploy the launcher to large-scale IoT networks. Then the authors modeled BDS and the launcher with agent-oriented Petri net and confirmed the effect through the simulation of the PN2 model. The result showed that the proposed launcher can reduce the number of infected devices by about 30-40%.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Magagi Ali Bachir, Ismail Jellouli, E. Said, Souad Amjad
In a modern information system adaptation, optimization is a crucial aspect. Systems adaptation problematics have been explored in a large set of research, which have not been able to fix every single issue, leaving therefore so many challenges to be explored. It for this reason this paper presents a method, through a UML profile, to ensure the optimization of the performance of a production system. In the first place, a state of the art is presented to clarify the context of the study. This method consists in setting up a UML profile which will allow the real value of the production to be constantly assessed, the reaction take place when production is not satisfactory. The productivity assessment performs through the application of the simple algorithm, the simplex constraints are integrated through the OCL language. A code generator, based on acceleo, has been developed to propose code generation.
{"title":"Model-Based Method for Optimisation of an Adaptive System","authors":"Magagi Ali Bachir, Ismail Jellouli, E. Said, Souad Amjad","doi":"10.4018/ijssci.301269","DOIUrl":"https://doi.org/10.4018/ijssci.301269","url":null,"abstract":"In a modern information system adaptation, optimization is a crucial aspect. Systems adaptation problematics have been explored in a large set of research, which have not been able to fix every single issue, leaving therefore so many challenges to be explored. It for this reason this paper presents a method, through a UML profile, to ensure the optimization of the performance of a production system. In the first place, a state of the art is presented to clarify the context of the study. This method consists in setting up a UML profile which will allow the real value of the production to be constantly assessed, the reaction take place when production is not satisfactory. The productivity assessment performs through the application of the simple algorithm, the simplex constraints are integrated through the OCL language. A code generator, based on acceleo, has been developed to propose code generation.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Operational safety is at the center of all companies' concerns because increasing productivity is the top priority. Moreover, the high cost of breakdowns invests in a maintenance strategy, one of the most critical aspects of a manufacturing system. In the digital age, e-maintenance platforms can interoperate technically but fail to achieve semantic interoperability. The results are ambiguities and misunderstandings that can lead to equipment shutdowns or inefficient use of material resources. However, as formal knowledge specifications, ontologies have successfully integrated heterogeneous systems for some time. Therefore, the authors developed a core industrial maintenance ontology that is both generic and capable of extending and refining to meet semantic information repository requirements. Ontologies can unite and merge different datasets without adapting new ontologies. Only the core ontology needs to be modified according to the new semantics. A detailed description of the development process is provided, beginning with the definition of requirements and ending with the evaluation.
{"title":"A Core Industrial Maintenance Ontology Development Process","authors":"Leila Zemmouchi-Ghomari, Badreddine Midoune, Nadhir Djamiai","doi":"10.4018/ijssci.312555","DOIUrl":"https://doi.org/10.4018/ijssci.312555","url":null,"abstract":"Operational safety is at the center of all companies' concerns because increasing productivity is the top priority. Moreover, the high cost of breakdowns invests in a maintenance strategy, one of the most critical aspects of a manufacturing system. In the digital age, e-maintenance platforms can interoperate technically but fail to achieve semantic interoperability. The results are ambiguities and misunderstandings that can lead to equipment shutdowns or inefficient use of material resources. However, as formal knowledge specifications, ontologies have successfully integrated heterogeneous systems for some time. Therefore, the authors developed a core industrial maintenance ontology that is both generic and capable of extending and refining to meet semantic information repository requirements. Ontologies can unite and merge different datasets without adapting new ontologies. Only the core ontology needs to be modified according to the new semantics. A detailed description of the development process is provided, beginning with the definition of requirements and ending with the evaluation.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128376511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm, security measures must be taken with great care. Researchers can better understand the threats and weaknesses of the IoT if attacks are categorized to facilitate the development of a more robust defense system. This study discusses various attacks and statistical data related to IoT. These attacks are divided into two categories: physical and cyber-attacks. Based on the literature review, the authors found that social engineering and DoS are the most common attacks in the physical and cyber categories. This study demonstrates the security solutions inherent to securing the IoT environment. Cryptography, blockchain, software-defined networks, and machine learning techniques were reviewed. They also discussed steps that should be taken to make a safe IoT environment.
{"title":"Attacks on Resource-Constrained IoT Devices and Security Solutions","authors":"Ravi Sharma, Nonita Sharma","doi":"10.4018/ijssci.310943","DOIUrl":"https://doi.org/10.4018/ijssci.310943","url":null,"abstract":"An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm, security measures must be taken with great care. Researchers can better understand the threats and weaknesses of the IoT if attacks are categorized to facilitate the development of a more robust defense system. This study discusses various attacks and statistical data related to IoT. These attacks are divided into two categories: physical and cyber-attacks. Based on the literature review, the authors found that social engineering and DoS are the most common attacks in the physical and cyber categories. This study demonstrates the security solutions inherent to securing the IoT environment. Cryptography, blockchain, software-defined networks, and machine learning techniques were reviewed. They also discussed steps that should be taken to make a safe IoT environment.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akshat Gaurav, Konstantinos E. Psannis, D. Peraković
In this digital era expectations for medical quality have increased. As the number of patients continues to increase, conventional health care methods are having to deal with new complications. In light of these observations, researchers suggested a hybrid combination of conventional health care methods with IoT technology and develop MIoT. The goal of IoMT is to ensure that patients can respond more effectively and efficiently to their treatment. But preserving user privacy is a critical issue when it comes to collecting and handling highly sensitive personal health data. However, IoMTs have limited processing power; hence, they can only implement minimal security techniques. Consequently, throughout the health data transfer through MIoT, patient’s data is at risk of data leakage. This manuscript per the authors emphasizes the need of implementing suitable security measures to increase the IoMT's resilience to cyberattacks. Additionally, this manuscript per the authors discusses the main security and privacy issues associated with IoMT and provide an overview of existing techniques.
{"title":"Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey","authors":"Akshat Gaurav, Konstantinos E. Psannis, D. Peraković","doi":"10.4018/ijssci.285593","DOIUrl":"https://doi.org/10.4018/ijssci.285593","url":null,"abstract":"In this digital era expectations for medical quality have increased. As the number of patients continues to increase, conventional health care methods are having to deal with new complications. In light of these observations, researchers suggested a hybrid combination of conventional health care methods with IoT technology and develop MIoT. The goal of IoMT is to ensure that patients can respond more effectively and efficiently to their treatment. But preserving user privacy is a critical issue when it comes to collecting and handling highly sensitive personal health data. However, IoMTs have limited processing power; hence, they can only implement minimal security techniques. Consequently, throughout the health data transfer through MIoT, patient’s data is at risk of data leakage. This manuscript per the authors emphasizes the need of implementing suitable security measures to increase the IoMT's resilience to cyberattacks. Additionally, this manuscript per the authors discusses the main security and privacy issues associated with IoMT and provide an overview of existing techniques.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Light Detection and Ranging (LiDAR) sensor is utilized to track each sensed obstructions at their respective locations with their relative distance, speed, and direction; such sensitive information forwards to the cloud server to predict the vehicle-hit, traffic congestion and road damages. Learn the behaviour of the state to produce an appropriate reward as the recommendation to avoid tragedy. Deep Reinforcement Learning and Q-network predict the complexity and uncertainty of the environment to generate optimal reward to states. Consequently, it activates automatic emergency braking and safe parking assistance to the vehicles. In addition, the proposed work provides safer transport for pedestrians and independent vehicles. Compared to the newer methods, the proposed system experimental results achieved 92.15% higher prediction rate accuracy. Finally, the proposed system saves many humans, animal lives from the vehicle hit, suggests drivers for rerouting to avoid unpredictable traffic, saves fuel consumption, and avoids carbon emission.
{"title":"Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception","authors":"P. Vijayakumar, L. Deborah, S. Rajkumar","doi":"10.4018/ijssci.291712","DOIUrl":"https://doi.org/10.4018/ijssci.291712","url":null,"abstract":"The Light Detection and Ranging (LiDAR) sensor is utilized to track each sensed obstructions at their respective locations with their relative distance, speed, and direction; such sensitive information forwards to the cloud server to predict the vehicle-hit, traffic congestion and road damages. Learn the behaviour of the state to produce an appropriate reward as the recommendation to avoid tragedy. Deep Reinforcement Learning and Q-network predict the complexity and uncertainty of the environment to generate optimal reward to states. Consequently, it activates automatic emergency braking and safe parking assistance to the vehicles. In addition, the proposed work provides safer transport for pedestrians and independent vehicles. Compared to the newer methods, the proposed system experimental results achieved 92.15% higher prediction rate accuracy. Finally, the proposed system saves many humans, animal lives from the vehicle hit, suggests drivers for rerouting to avoid unpredictable traffic, saves fuel consumption, and avoids carbon emission.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The popularization of the cloud and its need to solve complex engineering application have alarmed energy and environmental concerns among the researchers. Achieving energy efficiency has become one of the most essential aims of the data center, offering more services with minimal energy consumption (EC). VM consolidation aims at adjusting the VMs to fewer PMs by live migration of VMs and then switching off the inactive servers, achieving energy efficiency. However, uncontrolled consolidation could violate the SLA. The paper contributes by considering the optimization problem targeting the EC and the number of VM migrations. Dynamic double threshold with enhanced search and rescue (DDT-ESAR) optimization has been introduced utilizing two thresholds; the first value defines the upper and lower bound for host classification, whereas the other is used to make migration decision. For migration, ESAR has been adopted for the most appropriate PM- VM mapping. The experimental analysis proves the efficiency where EC is computed to be 0.384kWh, SLA violations to be 6.33% and 64 number of migrations.
{"title":"Multi-Objective Energy-Efficient Virtual Machine Consolidation Using Dynamic Double Threshold-Enhanced Search and Rescue-Based Optimization","authors":"Sweta Singh, R. Kumar, U. P. Rao","doi":"10.4018/ijssci.315006","DOIUrl":"https://doi.org/10.4018/ijssci.315006","url":null,"abstract":"The popularization of the cloud and its need to solve complex engineering application have alarmed energy and environmental concerns among the researchers. Achieving energy efficiency has become one of the most essential aims of the data center, offering more services with minimal energy consumption (EC). VM consolidation aims at adjusting the VMs to fewer PMs by live migration of VMs and then switching off the inactive servers, achieving energy efficiency. However, uncontrolled consolidation could violate the SLA. The paper contributes by considering the optimization problem targeting the EC and the number of VM migrations. Dynamic double threshold with enhanced search and rescue (DDT-ESAR) optimization has been introduced utilizing two thresholds; the first value defines the upper and lower bound for host classification, whereas the other is used to make migration decision. For migration, ESAR has been adopted for the most appropriate PM- VM mapping. The experimental analysis proves the efficiency where EC is computed to be 0.384kWh, SLA violations to be 6.33% and 64 number of migrations.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}