The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a novel approach based on a rubber band technique to solve the "maximum flow" problem for a single-source, single-sink directed graph implemented on the Microsoft Azure cloud platform. The problem of finding the maximum possible flow for a given graph is a classic network optimization problem that arises in several real life circumstances. Having proposed several...
Virtual machine live migration technology allows a running VM migrates from one physical host to another with no impact on users. As the scale of distributed computing gets larger and larger, hybrid cloud, which is integrated cloud service utilizing both private and public clouds to perform distinct functions within the same organization becomes a hotspot for both academia and industry. Thus, it will...
For achieving various network optimization and management goals in data centers, some VMs need to be migrated from the initial servers to the target ones. Live VM migration is an effective technique to achieve these goals. When multiple VMs need to be migrated at the same time, the migration order and migration bandwidth has a great impact on migration performance. For making an effective VM migration...
Fog computing is a promising paradigm in terms of extending cloud computing to an edge network. In a broad sense, fog computing in Internet-of-Vehicles(IoV) provides low-latency services since fog nodes are closely located with moving cars and are locally distributed. In this paper, we propose a fog computing architecture based on a publish/subscribe model. After that, we describe a traffic congestion...
It is challenging to execute an application in a heterogeneous cloud cluster, which consists of multiple types of virtual machines with different performance capabilities and prices. This paper aims to mitigate this challenge by proposing a scheduling mechanism to optimise the execution of Bag-of-Task jobs on a heterogeneous cloud cluster. The proposed scheduler considers two approaches to select...
With the advent of big data era, the data analytical applications have sprung up which can be modeled using workflow. Such workflow applications are subject to continuously arriving requests and have a rigid requirement on response time. When running the analytical workflow in a cloud platform, one of the critical questions arising here is that how to provision resources in a way that the monetary...
To support the various services quickly and flexibly, intelligence and automation are the key characters for future network resource management. How to build a big data based Telco cloud resource management framework is very important currently, which can leverages the power of Network Function Virtualization (NFV) and enhances telecom operators' availability of service, efficiency of resource, and...
Cloud computing technology is rapidly emerging as quite an efficient execution platform for even highly trusted scientific applications. Efficient resource management plays a pivotal role in the execution along with attaining high performance standards in Distributed environments. Resource provisioning and scheduling has become an important area of research in cloud resource management. Clouds can...
The energy consumption of a data center and hence the carbon footprint from it largely depends on the energy consumption by its active Physical Machines (PMs). Researchers have taken many attempts to minimize the data center energy consumption through the Virtual Machines (VMs) allocation into a minimal number of PMs of homogeneous types. However, the current VM placement strategies do not consider...
The prosperous growth of the Internet-of-Things industry attracts numerous interests in employing edge clouds (a.k.a. cloudlets) to enhance the performance of mobile services and applications. Most existing research has been focused on offloading computational tasks from mobile devices to a single cloudlet or a central location, yet overlooked the issue of jointly coordinating the offloaded tasks...
Network functions virtualization (NFV) opens up a new ability of network enablement through agile network DevOps to design, develop, and test new services and to provide ongoing updates of existing services. This paper proposes a tool and methodology to aid the NFV designer to rapidly design and onboard new services and applications. Although the main focus is on the service design and onboarding,...
Service Function Chaining (SFC) defines the concept of linking ordered Service Functions (SFs) through network technologies to support specific application requirements. SFC exploits Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies to achieve the creation, modification and deletion of SFC in a cost efficient and rapid way. However, during the runtime phase,...
Cloud computing provides an opportunity to users to outsource their data and applications. However, data privacy is one of the key challenges for the users who are outsourcing data on some transparent cloud servers. Data encryption is the best option to protect users' data privacy on the cloud. However, computation overheads of encryption methods could be expensive to some small computing machines,...
Virtualization technology is the foundation of Cloud services. To achieve the maximum hardware utilization, Cloud service providers usually host many guest VMs on one VM host. However, as the number of VM increases, the disk accessing performance drops significantly. Disk performance in multiple VM environment is one of the most significant problems in cloud environment. In this work, we propose a...
The prevalence of wearable devices brought questions about their impact on user habits, use cases and future developments. Will users continue to use smart phones even if they have high capacity wearable devices? If that will be the case, for which reason people will continue to carry smartphones with them? User mobility and soft application usage correlation is an important research area for setting...
Energy consumption of distributed data centers costs huge amounts to the cloud service providers (CSP) each year. In order to make the services affordable for the cloud service consumers (CSC) and increase the profit for the CSP, it is essential to minimize the cooling and operational costs. In this work, we address cost optimization by taking advantage of time and space varying properties of distributed...
The emerging requirements for 5th generation (5G) mobile networks lead to a complete network paradigm refurbishment by leveraging on Network Function Virtualisation (NFV) and Mobile Edge Computing (MEC). While NFV adds flexibility by allowing network functions to be dynamically deployed and inter-connected, MEC brings intelligence at the edge of the mobile network, reduces latency and enhances the...
With the developments of mobile services, mobilecrowdsourcing systems are attracting more and more attention. How to recommend user-preferred and trustful tasks for usersis an important issue to improve efficiency of mobile crowd-sourcing systems. This paper proposes a task recommendationmodel for mobile crowdsourcing systems based on dwell-time. Considering both user similarity and task similarity,...
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
Electrification in remote islands is an urgent project to improve social life in the developing countries. With site survey, the electric power supply improvement in Batanes, Philippines, is selected as an example for optimal sizing practice for renewable power system study. A DC link system configuration is recommended to include diesel generators, photovoltaic panel, wind generator and battery bank...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.