2022
DOI: 10.3390/su14106256
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing

Abstract: Global warming is one of the most compelling environmental threats today, as the rise in energy consumption and CO2 emission caused a dreadful impact on our environment. The data centers, computing devices, network equipment, etc., consume vast amounts of energy that the thermal power plants mainly generate. Primarily fossil fuels like coal and oils are used for energy generation in these power plants that induce various environmental problems such as global warming ozone layer depletion, which can even become… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
3

Relationship

4
5

Authors

Journals

citations
Cited by 72 publications
(15 citation statements)
references
References 106 publications
0
15
0
Order By: Relevance
“…Machine learning classifiers have also been trained using unigrams and weighted unigrams. The results demonstrate that machine learning methods perform well on weighted unigrams, with SVM achieving the highest level of reliability [ 29 , 30 , 31 , 32 , 33 , 34 ]. The formulae used in the calculation of the classification report are given below: where TP = True Positive, TN = True Negative, FP = False Positive, FN = False Negative.…”
Section: Results and Comparative Analysismentioning
confidence: 99%
“…Machine learning classifiers have also been trained using unigrams and weighted unigrams. The results demonstrate that machine learning methods perform well on weighted unigrams, with SVM achieving the highest level of reliability [ 29 , 30 , 31 , 32 , 33 , 34 ]. The formulae used in the calculation of the classification report are given below: where TP = True Positive, TN = True Negative, FP = False Positive, FN = False Negative.…”
Section: Results and Comparative Analysismentioning
confidence: 99%
“…Moreover, one platform could supply some assistance that is not offered by another platform [10,[43][44][45][46][47][48][49]. So, application portability among different clouds or from legacy enterprises to the cloud becomes essential to preclude users from vendor lock-in [50][51][52][53][54][55]. A vast amount of the literature on application portability solutions was reviewed, and a comparative analysis is presented in Table 1.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The middleware code does not need to be changed to facilitate the change in the configuration file. The modified configuration variables are loaded into the middleware directly via dependency injection [52][53][54].…”
mentioning
confidence: 99%
“…It is a keyless hash function. The SHA-256 follows the same model as SHA-1 and begins by defining several constants [25][26][27][28][29]. Several operating systems frequently use hash methods to secure passwords.…”
Section: The Sha-256 Hash Functionmentioning
confidence: 99%