Evaluation and Analysis of Bio-Inspired Optimization Techniques for Bill Estimation in Fog Computing
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 7
Abstract
In light of constant developments in the realm of Information Communication and Technologies, large-scale busi-nesses and Internet service providers have realized the limitation of data storage capacity available to them. This led organizations to cloud computing, a concept of sharing of resources among different service providers by renting these resources through service level agreements. Fog computing is an extension to cloud computing architecture in which resources are brought closer to the consumers. Fog computing, being a distinct from cloud computing as it provides storage services along with computing resources. To use these services, the organizations have to pay according to their usage. In this paper, two nature-inspired algorithms, i.e. Pigeon Inspired Optimization (PIO) and Binary Bat Algorithm (BBA) are compared to regulate the effective management of resources so that the cost of resources can be curtailed and billing can be achieved by calculating utilized resources under the service level agreement. PIO and BBA are used to evaluate energy utilization by cloudlets or edge nodes that can be used subsequently for approximating the utilization and bill through a Time of Use pricing scheme. We appraise above-mentioned techniques to evaluate their performance concerning the bill estimation based on the usage of fog servers. With respect to the utilization of resources and reduction in the bill, simulation results have revealed that the BBA gives pointedly better results than PIO.
Authors and Affiliations
Hafsa Arshad, Hasan Ali Khattak, Munam Ali Shah, Assad Abbas, Zoobia Ameer
TinyCO – A Middleware Model for Heterogeneous Nodes in Wireless Sensor Networks
Wireless sensor networks (WSNs) contain multiple nodes of the same configuration and type. The biggest challenge nowadays is to communicate with heterogeneous nodes of different WSNs. To communicate with distinct network...
Implementing and Comparison between Two Algorithms to Make a Decision in a Wireless Sensors Network
The clinical presentation of acute CO poisoning and hydrocarbon gas (Butane CAS 106-97-8) varies depending on terrain, humidity, temperature, duration of exposure and the concentration of gas toxic: From then consciousne...
Handsets Malware Threats and Facing Techniques
- Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security...
The Impact of Motivator and Demotivator Factors on Agile Software Development
Since the last decade, Agile software development has emerged as a widely utilized software development method keeping in view the developing countries of South Asia. The literature reports significant challenges and bar...
Computerised Speech Processing in Hearing Aids using FPGA Architecture
The development of computerized speech processing system is to mimic the natural functionality of human hearing, because of advent of technology that used Very Large Scale Integration (VLSI) devices such as Field Progra...