Hyper-Angle Exploitative Searching for Enabling Multi-Objective Optimization of Fog Computing.

Sensors (Basel)

Centre for Cyber Security, Faculty of Information Science and Technology (FTSM), Universiti Kebangsaan Malaysia, UKM, Bangi 43600, Malaysia.

Published: January 2021

Fog computing is an emerging technology. It has the potential of enabling various wireless networks to offer computational services based on certain requirements given by the user. Typically, the users give their computing tasks to the network manager that has the responsibility of allocating needed fog nodes optimally for conducting the computation effectively. The optimal allocation of nodes with respect to various metrics is essential for fast execution and stable, energy-efficient, balanced, and cost-effective allocation. This article aims to optimize multiple objectives using fog computing by developing multi-objective optimization with high exploitive searching. The developed algorithm is an evolutionary genetic type designated as Hyper Angle Exploitative Searching (HAES). It uses hyper angle along with crowding distance for prioritizing solutions within the same rank and selecting the highest priority solutions. The approach was evaluated on multi-objective mathematical problems and its superiority was revealed by comparing its performance with benchmark approaches. A framework of multi-criteria optimization for fog computing was proposed, the Fog Computing Closed Loop Model (FCCL). Results have shown that HAES outperforms other relevant benchmarks in terms of non-domination and optimality metrics with over 70% confidence of the t-test for rejecting the null-hypothesis of non-superiority in terms of the domination metric set coverage.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7829810PMC
http://dx.doi.org/10.3390/s21020558DOI Listing

Publication Analysis

Top Keywords

fog computing
20
exploitative searching
8
multi-objective optimization
8
optimization fog
8
hyper angle
8
fog
6
computing
6
hyper-angle exploitative
4
searching enabling
4
enabling multi-objective
4

Similar Publications

Solu: a cloud platform for real-time genomic pathogen surveillance.

BMC Bioinformatics

January 2025

Solu Healthcare Oy, Kalevankatu 31 A 13, 00100, Helsinki, Finland.

Background: Genomic surveillance is extensively used for tracking public health outbreaks and healthcare-associated pathogens. Despite advancements in bioinformatics pipelines, there are still significant challenges in terms of infrastructure, expertise, and security when it comes to continuous surveillance. The existing pipelines often require the user to set up and manage their own infrastructure and are not designed for continuous surveillance that demands integration of new and regularly generated sequencing data with previous analyses.

View Article and Find Full Text PDF

In response to the demand for advanced tools in environmental monitoring and policy formulation, this work leverages modern software and big data technologies to enhance novel road transport emissions research. This is achieved by making data and analysis tools more widely available and customisable so users can tailor outputs to their requirements. Through the novel combination of vehicle emissions remote sensing and cloud computing methodologies, these developments aim to reduce the barriers to understanding real-driving emissions (RDE) across urban environments.

View Article and Find Full Text PDF

Ensuring Reliable Network Communication and Data Processing in Internet of Things Systems with Prediction-Based Resource Allocation.

Sensors (Basel)

January 2025

Department of Computer Science and Systems Engineering, Faculty of Information and Communication Technology, Wrocław University of Science and Technology, 50-370 Wrocław, Poland.

The distributed nature of IoT systems and new trends focusing on fog computing enforce the need for reliable communication that ensures the required quality of service for various scenarios. Due to the direct interaction with the real world, failure to deliver the required QoS level can introduce system failures and lead to further negative consequences for users. This paper introduces a prediction-based resource allocation method for Multi-Access Edge Computing-capable networks, aimed at assurance of the required QoS and optimization of resource utilization for various types of IoT use cases featuring adaptability to changes in users' requests.

View Article and Find Full Text PDF

Most current research in cloud forensics is focused on tackling the challenges encountered by forensic investigators in identifying and recovering artifacts from cloud devices. These challenges arise from the diverse array of cloud service providers as each has its distinct rules, guidelines, and requirements. This research proposes an investigation technique for identifying and locating data remnants in two main stages: artefact collection and evidence identification.

View Article and Find Full Text PDF

Securing Cloud-Based Internet of Things: Challenges and Mitigations.

Sensors (Basel)

December 2024

Department of Computer Science & Engineering, Sungkyunkwan University, Suwon 16419, Republic of Korea.

The Internet of Things (IoT) has seen remarkable advancements in recent years, leading to a paradigm shift in the digital landscape. However, these technological strides have introduced new challenges, particularly in cybersecurity. IoT devices, inherently connected to the internet, are susceptible to various forms of attacks.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!