Abstract:Energy management of the cloud datacentre is a challenging task, especially when the cloud server receives a number of the user’s request simultaneously. This requires an efficient method to optimally allocate the resources to the users. Resource allocation in cloud data centers need to be done in optimized manner for conserving energy keeping in view of Service Level Agreement (SLA). We propose, Eagle Strategy (ES) based Modified Particle Swarm Optimization (ES-MPSO) to minimize the energy consumption and SLA… Show more
“…CM is a continuous probability distribution having two parameters, where p 0 indicates the location parameter and γ is the scale parameter used to determine the shape of the Cauchy distribution [29][30][31]. CM aims to solve the premature convergence problem and local stagnation problem of any optimization algorithm by taking controlled small steps.…”
With the growth of the discipline of digital communication, the topic has acquired more attention in the cybersecurity medium. The Intrusion Detection (ID) system monitors network traffic to detect malicious activities. The paper introduces a novel Feature Selection (FS) approach for ID. Reptile Search Algorithm (RSA)-is a new optimization algorithm; in this method, each agent searches a new region according to the position of the host, which makes the algorithm suffers from getting stuck in local optima and a slow convergence rate. To overcome these problems, this study introduces an improved RSA approach by integrating Cauchy Mutation (CM) into the RSA's structure. Thus, the CM can effectively expand search space and enhance the performance of the RSA. The developed RSA-CM is assessed on five publicly available ID datasets: KDD-CUP99, NSL-KDD, UNSW-NB15, CIC-IDS2017, and CIC-IDS2018 and two engineering problems. The RSA-CM is compared with the original RSA, and three other state-of-theart FS methods, namely particle swarm optimization, grey wolf optimization, and multi-verse optimizer, and quantitatively is evaluated using fitness value, the number of selected optimum features, accuracy, precision, recall, and F1score evaluation measures. The results reveal that the developed RSA-CM got better results than the other competitive methods applied for FS on the ID datasets and the examined engineering problems. Moreover, the Friedman test results confirm that RSA-CM has a significant superiority compared to other methods as an FS method for ID.
“…CM is a continuous probability distribution having two parameters, where p 0 indicates the location parameter and γ is the scale parameter used to determine the shape of the Cauchy distribution [29][30][31]. CM aims to solve the premature convergence problem and local stagnation problem of any optimization algorithm by taking controlled small steps.…”
With the growth of the discipline of digital communication, the topic has acquired more attention in the cybersecurity medium. The Intrusion Detection (ID) system monitors network traffic to detect malicious activities. The paper introduces a novel Feature Selection (FS) approach for ID. Reptile Search Algorithm (RSA)-is a new optimization algorithm; in this method, each agent searches a new region according to the position of the host, which makes the algorithm suffers from getting stuck in local optima and a slow convergence rate. To overcome these problems, this study introduces an improved RSA approach by integrating Cauchy Mutation (CM) into the RSA's structure. Thus, the CM can effectively expand search space and enhance the performance of the RSA. The developed RSA-CM is assessed on five publicly available ID datasets: KDD-CUP99, NSL-KDD, UNSW-NB15, CIC-IDS2017, and CIC-IDS2018 and two engineering problems. The RSA-CM is compared with the original RSA, and three other state-of-theart FS methods, namely particle swarm optimization, grey wolf optimization, and multi-verse optimizer, and quantitatively is evaluated using fitness value, the number of selected optimum features, accuracy, precision, recall, and F1score evaluation measures. The results reveal that the developed RSA-CM got better results than the other competitive methods applied for FS on the ID datasets and the examined engineering problems. Moreover, the Friedman test results confirm that RSA-CM has a significant superiority compared to other methods as an FS method for ID.
“…The result analysis highlighted that the proposed method performs efficiently than MGA, MOACO, and MPSO for various QoS parameters. A task mapping approach using the PSO and Eagle Strategy was designed in [4]. The simulation results indicate that the proposed procedure is improved than the original PSO and other existing methods like RALBA, NMT-FOLS, etc.…”
Section: Related Workmentioning
confidence: 99%
“…To fulfill these services, cloud service providers provide virtual machines to the users in order to execute their tasks. It is necessary to map all the tasks on each virtual machine carefully to optimize the performance of the cloud [4] [5]. A service level agreement needs to be signed by the user and the service provider.…”
Cloud computing is a vital paradigm of emerging technologies. It provides hardware, software, and development platforms to end-users as per their demand. Task scheduling is an exciting job in the cloud computing environment. Tasks can be divided into two categories dependent and independent. Independent tasks are not connected to any type of parent-child concept. Various meta-heuristic algorithms have come into force to schedule the independent tasks. In this, paper a hybrid HC-CSO algorithm has been simulated using independent tasks. This hybrid algorithm has been designed by using the HEFT algorithm, Self-Motivated Inertia Weight factor, and standard Cat Swarm Optimization algorithm. The Crow Search algorithm has been applied to overcome the problem of premature convergence and to avoid the H-CSO algorithm getting stuck in the local fragment. The simulation was carried out using 500-1300 random lengths independent tasks and it was found that the H-CSO algorithm has beaten PSO, ACO, and CSO algorithms whereas the hybrid algorithm HC-CSO is working fine despite Cat Swarm Optimization, Particle Swarm Optimization, and H-CSO algorithm in the name of processing cost and makespan. For all scenarios, the HC-CSO algorithm is found overall 4.15% and 7.18% efficient than the H-CSO and standard CSO respectively in comparison to the makespan and in case of computation cost minimization, 9.60% and 14.59% than the H-CSO and the CSO, respectively.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.