The International Arab Journal of Information Technology最新文献

筛选
英文 中文
Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN 使用 YOLOv-5s-FRN 的基于深度学习的特征可区分性增强型并发金属表面缺陷检测系统
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028//iajit/21/1/9
Reshma P. Vengaloor, Roopa Muralidhar
{"title":"Deep Learning Based Feature Discriminability Boosted Concurrent Metal Surface Defect Detection System Using YOLOv-5s-FRN","authors":"Reshma P. Vengaloor, Roopa Muralidhar","doi":"10.34028//iajit/21/1/9","DOIUrl":"https://doi.org/10.34028//iajit/21/1/9","url":null,"abstract":"Computer vision and deep learning techniques are the most emerging technologies in this era. Both of these can greatly raise the rate at which defects on metal surfaces are identified while performing industrial quality checks. The identification of faults over metal surfaces can be viewed as a significant challenge since they are easily impacted by ambient factors including illumination and light reflections. This paper proposes novel metal surface defect detection network called as YOLOv-5s-FRN in response to the problems of ineffective detection brought by the conventional manual inspection system. The proposed system is developed through the integration of a novel architectural module called as Feature Recalibration Network (FRN) to the You Only Look Once-version-5 small network )YOLOv-5s(. In order to extract the global feature information from the provided image, FRN is able to evaluate the interdependencies between the channels. This improves the feature discrimination capability and prediction accuracy of the defect detection system. The incorporation of FRN structure makes YOLOv-5s architecture to selectively enhance the necessary features and discard the unwanted ones. Therefore, the proposed novel method will efficiently detect and classify the metal surface defects such as crazing, patches, inclusions, scratches, pitted surfaces and rolled in scale. North Eastern University Surface Defect Database (NEU-DET) has been used to train and test the proposed architectural model. The suggested system has been compared with alternative models based on several performance matrices such as precision, recall and Mean Average Precision (mAP). It is observed that the proposed YOLOv-5s-FRN architecture provides significant performance improvement than state-of-the-art methods. The proposed system has been provided satisfactory results by means of improvement in mAP and time consumption. The proposed model has delivered value of mAP_0.5 as 98.05% and that of mAP_0.5:0.95 as 89.03%.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"10 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139129337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ERDAP: A Novel Method of Event Relation Data Augmentation Based on Relation Prediction ERDAP:基于关系预测的事件关系数据扩充新方法
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028/iajit/21/1/6
Ruijuan Hu, Yue Chen, Haiyan Liu
{"title":"ERDAP: A Novel Method of Event Relation Data Augmentation Based on Relation Prediction","authors":"Ruijuan Hu, Yue Chen, Haiyan Liu","doi":"10.34028/iajit/21/1/6","DOIUrl":"https://doi.org/10.34028/iajit/21/1/6","url":null,"abstract":"Event relation extraction is a key aspect in the fields of event evolutionary graph construction, knowledge question and answer, and intelligence analysis, etc. Currently, supervised learning methods that rely on large amounts of labeled data are mostly used; however, the size of existing event relation datasets is small and cannot provide sufficient training data for the models. To alleviate this challenging research question, this study proposes a novel data augmentation model, called Event Relation Data Augmentation based on relationship Prediction (ERDAP), that allows both semantic and structural features to be taken into account without changing the semantic relation label compatibility, uses event relation graph convolutional neural networks to predict event relations, and expands the generated high-quality event relation triples as new training data for the event relation texts. Experimental evaluation using event causality extraction method on Chinese emergent event dataset shows that our model significantly outperforms existing text augmentation methods and achieves desirable performance, which provides a new idea for event relation data augmentation","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"9 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139129675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities 整合业务功能和数据库实体的综合微服务提取方法
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028/iajit/21/1/3
Deepali Bajaj, Anita Goel, Suresh Gupta
{"title":"A Comprehensive Microservice Extraction Approach Integrating Business Functions and Database Entities","authors":"Deepali Bajaj, Anita Goel, Suresh Gupta","doi":"10.34028/iajit/21/1/3","DOIUrl":"https://doi.org/10.34028/iajit/21/1/3","url":null,"abstract":"Cloud application practitioners are building large-scale enterprise applications as microservices, to leverage scalability, performance, and availability. Microservices architecture allows a large monolithic application to be split into small, loosely coupled services. A service communicates with other services using lightweight protocols such as RESTful APIs. Extracting microservices from the monolith is a challenging task and is mostly performed manually by system architects based on their skills. This extraction involves both: 1) Partitioning of business logic, 2) Partitioning of database. For partitioning of business logic, the existing research studies focus on decomposition by considering the dependencies in the application at the class-level. However, with the passage of time, monolith application classes outgrow their size defying the Single Responsibility Principle (SRP). So, there is a need to consider the code within the classes when identifying microservices. Current studies also lack the partitioning of database and ignore the mapping of Database Entities (DE) to the microservices. In this paper, we present a Comprehensive Microservice Extraction Approach (CMEA) that considers: 1) Both classes and their methods to define and refine microservices, 2) Associate the DE to microservices using newly devised eight guiding rules handling ownership conflicts. This approach has been applied to three benchmark web applications implemented in Java and one in-house application implemented in both Java and Python. Our results demonstrate better or similar software quality attributes in comparison to the existing related studies. CMEA improves software quality attributes by 22%. System architects can easily identify microservices along with their DE using our approach. The CMEA is generic and language-independent so it can be used for any application","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"75 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139128150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Breast Cancer using Ensemble Filter Feature Selection with Triplet Attention Based Efficient Net Classifier 使用基于三重注意的高效网络分类器的集合过滤器特征选择进行乳腺癌分类
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028/iajit/21/1/2
Madhukar Bangalore Nagaraj, Bharathi Shivanandamurthy Hiremath, Ashwin Matta Polnaya
{"title":"Classification of Breast Cancer using Ensemble Filter Feature Selection with Triplet Attention Based Efficient Net Classifier","authors":"Madhukar Bangalore Nagaraj, Bharathi Shivanandamurthy Hiremath, Ashwin Matta Polnaya","doi":"10.34028/iajit/21/1/2","DOIUrl":"https://doi.org/10.34028/iajit/21/1/2","url":null,"abstract":"In medical imaging, the effective detection and classification of Breast Cancer (BC) is a current research important task because of the still existing difficulty to distinguish abnormalities from normal breast tissues due to their subtle appearance and ambiguous margins and distinguish abnormalities from the normal breast. Moreover, BC detection based on an automated detection model is needed, because manual diagnosis faces problems due to cost and shortage of skilled manpower, and also takes a very long time. Using deep learning and ensemble feature selection techniques, in this paper, a novel framework is introduced for classifying BC from histopathology images. The five primary steps of the suggested framework are as follows: 1) to make the largest original dataset and then deep learning model with data augmentation to improve the learning. 2) The best features are selected by an Ensemble Filter Feature selection Method (EFFM) which combines the best feature subsets to produce the final feature subsets. 3) Then the pruned Convolution Neural Network (CNN) model is utilized to extract the optimal features. 4) Finally, the classification is done through the Triplet Attention based Efficient Network (TAENet) classifier. The suggested model produces a 98% accuracy rate after being trained and tested on two different histopathology imaging datasets including images from four different data cohorts. Subsequently, the suggested strategy outperforms the conventional ones since the ensemble filter habitually acquires the best features, and experimental results demonstrate the importance of the proposed approach","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"46 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering XAI-PDF:利用基于 SHAP 的特征工程进行恶意 PDF 检测的稳健框架
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028/iajit/21/1/12
Mustafa Al-Fayoumi, Q. Abu Al-haija, Rakan Armoush, Christine Amareen
{"title":"XAI-PDF: A Robust Framework for Malicious PDF Detection Leveraging SHAP-Based Feature Engineering","authors":"Mustafa Al-Fayoumi, Q. Abu Al-haija, Rakan Armoush, Christine Amareen","doi":"10.34028/iajit/21/1/12","DOIUrl":"https://doi.org/10.34028/iajit/21/1/12","url":null,"abstract":"With the increasing number of malicious PDF files used for cyberattacks, it is essential to develop efficient and accurate classifiers to detect and prevent these threats. Machine Learning (ML) models have successfully detected malicious PDF files. This paper presents XAI-PDF, an efficient system for malicious PDF detection designed to enhance accuracy and minimize decision-making time on a modern dataset, the Evasive-PDFMal2022 dataset. The proposed method optimizes malicious PDF classifier performance by employing feature engineering guided by Shapley Additive Explanations (SHAP). Particularly, the model development approach comprises four phases: data preparation, model building, explainability of the models, and derived features. Utilizing the interpretability of SHAP values, crucial features are identified, and new ones are generated, resulting in an improved classification model that showcases the effectiveness of interpretable AI techniques in enhancing model performance. Various interpretable ML models were implemented, with the Lightweight Gradient Boosting Machine (LGBM) outperforming other classifiers. The Explainable Artificial Intelligence (XAI) global surrogate model generated explanations for LGBM predictions. Experimental comparisons of XAI-PDF with baseline methods revealed its superiority in achieving higher accuracy, precision, and F1-scores with minimal False Positive (FP) and False Negative (FN) rates (99.9%, 100%, 99.89%,0.000, and 0.002, respectively). Additionally, XAI-PDF requires only 1.36 milliseconds per record for predictions, demonstrating increased resilience in detecting evasive malicious PDF files compared to state-of-the-art methods","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"43 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images 图像加密中的乘法群耦合与混沌理论
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028/iajit/21/1/1
F. ElAzzaby, N. Elakkad, Khalid Sabour
{"title":"The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images","authors":"F. ElAzzaby, N. Elakkad, Khalid Sabour","doi":"10.34028/iajit/21/1/1","DOIUrl":"https://doi.org/10.34028/iajit/21/1/1","url":null,"abstract":"This study is centered on a significant scientific contribution within the realm of image cryptography. The chosen approach involves employing the bidimensional Arnold Cat Map transformation to reposition and modify pixel locations, guided by parameters derived from the original image. The construction of the multiplicative group Z/nZ, comprising equivalence classes modulo n, relies on a hyper-chaotic sequence derived from the 2D sinusoidal logistic modulation map. The correlation between this sequence and the preceding step yields an unpredictable blurring pattern, effectively altering the statistical properties of resulting matrices and distributing the influence of individual bits across the entire encrypted image. For each pixel, the encryption process entails an XOR operation with the Z/nZ group, followed by a right shift based on the three Least Significant Bits (LSB) of the preceding pixel. This meticulous procedure is iterated for every pixel, leaving no trace of similarity or association with the original plaintext image, effectively rendering it blurred and indecipherable. To gauge the efficacy of our algorithm, we subjected it to thorough evaluation utilizing diverse criteria, including histogram analysis, which unveiled a nearly uniform pattern in the encrypted images. Entropy values were found to be close to 8, while the correlation analysis exhibited a pronounced proximity to 0. Moreover, we subjected our approach to differential attacks, and the calculated values of the Number of Changing Pixel Rate (NPCR > 99.6) and the Unified Averaged Changed Intensity (UACI > 33.2) corroborated the strength and resilience of our methodology. In addition, to establish its comparative standing, we undertook a comprehensive assessment, meticulously comparing our method to various existing approaches from the literature, including those proposed by Hua, Es-sabry, and Faragallah. This systematic process accentuated the high level of responsiveness and sensitivity inherent in our approach, thus underscoring its innovative and promising nature","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"44 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139127951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples* 利用极少量标记样本进行半监督聚类的内聚性对维约束深度嵌入技术*
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028/iajit/21/1/7
Zhang Jing, Guiyan Wei, Yonggong Ren
{"title":"Cohesive Pair-Wises Constrained Deep Embedding for Semi-Supervised Clustering with Very Few Labeled Samples*","authors":"Zhang Jing, Guiyan Wei, Yonggong Ren","doi":"10.34028/iajit/21/1/7","DOIUrl":"https://doi.org/10.34028/iajit/21/1/7","url":null,"abstract":"Semi-supervised learning is a powerful paradigm for excavating latent structures of between labeled and unlabeled samples under the view of models constructing. Currently, graph-based models solve the approximate matrix that directly represent distributions of samples by the spatial metric. The crux lies in optimizing connections of samples, which is achieved by subjecting to must-links or cannot-links. Unfortunately, to find links are rather difficult for semi-supervised clustering with very few labeled samples, therefore, significantly impairs the robustness and accuracy in such scenario. To address this problem, we propose the Cohesive Pair-wises Constrained deep Embedding model (CPCE) to obtain an optimal embedding for representing the category distribution of samples and avoid the failed graph-structure of the global samples. CPCE designs the deep network framework based on CNN-Autoencoder by minimizing reconstruct errors of samples, and build up constrains both of the sample distribution for within-class and the category distribution for intra-class to optimal the latent embedding. Then, leverage the strong supervised information obtained from cohesive pair-wises to pull samples into within-class, which avoid the similarity of high-dimension features located in different categories to achieve more the compact solution. We demonstrate the proposed method in popular datasets and compare the superiority with popular methods","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"85 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139125135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration 利用基于 Caffe 的 PCA 过滤技术识别修复图像的 Scrupulous SCGAN 框架
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028//iajit/21/1/10
Khushboo Agarwal, Manish Dixit
{"title":"Scrupulous SCGAN Framework for Recognition of Restored Images with Caffe based PCA Filtration","authors":"Khushboo Agarwal, Manish Dixit","doi":"10.34028//iajit/21/1/10","DOIUrl":"https://doi.org/10.34028//iajit/21/1/10","url":null,"abstract":"Computer vision enables to detect many objects in any scenario which helps in various real time application but still face recognition and detection remains a tedious process due to the low resolution, blurriness, noise, diverse pose and expression and occlusions. This proposal develops a novel scrupulous Standardized Convolute Generative Adversarial Network (SCGAN) framework for performing accurate face recognition automatically by restoring the occluded region including blind face restoration. Initially, a scrupulous image refining technique is utilised to offer the appropriate input to the network in the subsequent process. Following the pre-processing stage, a Caffe based Principle Component Analysis (PCA) filtration is conducted which uses convolutional architecture for fast feature embedding that collects spatial information and significant differentiating characteristics to counteract the loss of information existing in pooling operations. Then a filtration method identifies the specific match of the face based on the extracted features, creating uncorrelated variables that optimise variance across time while minimising information loss. To handle all the diversification occurring in the image and accurately recognise the face with occlusion in any part of the face, a novel Standardized Convolute GAN network is used to restore the image and recognise the face using novel Generative Adversarial Network (GAN) networks are modelled. This GAN ensures the normal distribution along with parametric optimization contributing to the high performance with accuracy of 96.05% and Peak Signal to Noise Ratio (PSNR) of 18 and Structural Similarity Index Metric (SSIM) of 98% for restored face recognition. Thus, the performance of the framework based on properly recognizing the face from the generated images is evaluated and discussed.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"39 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139125635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm 使用轻量级对称密钥算法确保云存储中的医疗保健数据安全
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028/iajit/21/1/5
Vimala Devi Parthasarathy, Kalaichelvi Viswalingam
{"title":"Healthcare Data Security in Cloud Storage Using Light Weight Symmetric Key Algorithm","authors":"Vimala Devi Parthasarathy, Kalaichelvi Viswalingam","doi":"10.34028/iajit/21/1/5","DOIUrl":"https://doi.org/10.34028/iajit/21/1/5","url":null,"abstract":"Now-a-days, healthcare monitoring system is very much important system in the medical field to know the patient‘s health status immediately. In the proposed system, the sensors are fixed over the patient’s body or placed at some distances around the body to collect patient’s significant parameters like blood pressure, temperature, heart beat rate, etc. These parameters are collected by the healthcare professionals through some connectivity mechanisms like Bluetooth, ZigBee, etc. These significant data will be outsourced to the cloud storage in a secure way to avoid attack from the attackers. So, we need some protection mechanism to safeguard this information. This article proposes a light weight cryptographic algorithm (symmetric key) via random number key generation using Diffie-Hellman key exchange based on Elliptic Curve (ECDH) cryptography. As a result of substituting bytes (S-box) and folding (horizontal and vertical) operations, the proposed symmetric key algorithm achieves the foremost properties of cryptography such as confusion and diffusion quite well. Experimental results showed that the overall execution time of the proposed algorithm is superior to the standard Advanced Encryption Standard (AES) algorithm. The throughput rate of the proposed algorithm is 20.525095 KB/seconds whereas for the standard AES algorithm throughput rate is 18.727215 KB/seconds. So, the proposed algorithm is faster than the existing AES algorithm. Moreover, the construction of S-box, IS-box and the key generation procedures are entirely different in the proposed algorithm so, it increases the complexity for the attacker and it will create confusion to the attacker","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"60 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Dual-Objective Approach for Allocation of Virtual Machine with improved Job Scheduling in Cloud Computing 在云计算中分配虚拟机并改进作业调度的双目标方法
The International Arab Journal of Information Technology Pub Date : 2024-01-01 DOI: 10.34028/iajit/21/1/4
Sandeep Sutar, Manjunathswamy Byranahallieraiah, Kumarswamy Shivashankaraiah
{"title":"A Dual-Objective Approach for Allocation of Virtual Machine with improved Job Scheduling in Cloud Computing","authors":"Sandeep Sutar, Manjunathswamy Byranahallieraiah, Kumarswamy Shivashankaraiah","doi":"10.34028/iajit/21/1/4","DOIUrl":"https://doi.org/10.34028/iajit/21/1/4","url":null,"abstract":"In Cloud Computing (CC) environment, requests of user are maintained via workloads that are allocated to Virtual Machines (VMs) using scheduling techniques which primarily focus on reducing the time for processing by generating efficient schedules of smaller lengths. The efficient processing of requests also needs larger usage of resources that incurs higher overhead in the form of utilization of energy and optimization of cost utilized by Physical Machines (PMs). Assignment of VMs optimally in the environment of CC for jobs submitted by users is a challenge. In order to obtain better solution involving scheduling of jobs to VMs, considering two parameters utilization of energy and cost, we present a dual-objective approach for VM allocation with improved scheduling of jobs in CC environment. The proposed work aimed to build a dual-objective scheduling model for improved job scheduling, focusing on minimization of cost and utilization of energy at a time. For evaluating performance of dual-objective approach, we utilized two types of benchmark datasets and compared with existing approaches such as Whale, Artificial Bee Colony (ABC), Particle Swarm Optimization (PSO) and Metaheuristic Dynamic VM Allocation (MDVMA) techniques. The results obtained from simulation demonstrated that dual-objective approach performs better in the form of minimization of utilization of energy and cost","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"22 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139127187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信