The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1109/access.2021.3105539
|View full text |Cite
|
Sign up to set email alerts
|

The 3-Axis Scalable Service-Cloud Resource Modeling for Burst Prediction Under Smart Campus Scenario

Abstract: Internet of Things (IoT) enables smart campuses more convenient for cloud services. The availability of cloud resources to its users appears as a fundamental challenge. The existing research presents several auto-scaling techniques to scale the resources with the increase in users' demands. However, still, the cloud users of auto-scaled servers experience service disruption, delayed responses, and the occurrence of service bursts. The prevailing burst management framework exhibits limitations in the context of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 35 publications
(27 reference statements)
0
5
0
Order By: Relevance
“…After adjusting the sample weight, the sampling training process using the improved LM algorithm is shown in Figure 3. From Figure 4, when the unimproved neural network is trained 100 times, there is still a big gap from the error of 10 -2 , and the neural network combined by the SOM method and the LM method, convergence is reached after 20 trainings [52][53][54][55][56][57][58] . Using the above combination of SOM method and LM method, the training process is shown in Figures…”
Section: Resultsmentioning
confidence: 99%
“…After adjusting the sample weight, the sampling training process using the improved LM algorithm is shown in Figure 3. From Figure 4, when the unimproved neural network is trained 100 times, there is still a big gap from the error of 10 -2 , and the neural network combined by the SOM method and the LM method, convergence is reached after 20 trainings [52][53][54][55][56][57][58] . Using the above combination of SOM method and LM method, the training process is shown in Figures…”
Section: Resultsmentioning
confidence: 99%
“…The above control policy architecture diagram shows that the security access control policy designed in this paper consists of three layers, namely, application layer, platform layer, and sensing layer [13] . Among them, the application layer is mainly responsible for sensing the security posture of the heterogeneous cloud platform and unified operation management for accessing users according to the current sensing results.…”
Section: Heterogeneous Cloud Resource Illegal Access Behavior Securit...mentioning
confidence: 99%
“…In the event that the vertical threshold is exceeded by new requests, cost estimation server builds log of the current load estimations of horizontal and vertical scales and servers demands from new users. Study simulates 1000 smart campus user requests, adopts a cutting-edge ensemble with bagging approach, and effectively manages a class imbalance scenario [44].…”
Section: Cloud Computingmentioning
confidence: 99%
“…After being designed with operational economies in mind, the ESS model is incorporated into mixed integer linear programming (MILP). The method is tested in a campus MG and put into use with ESSs and PV arrays [44].…”
Section: Big Datamentioning
confidence: 99%