Article
Computer Science, Artificial Intelligence
Yogesh Gupta
Summary: Cloud storage, a type of distributed storage based on cloud computing technology, emerged to efficiently manage the rapidly expanding data in cyberspace. It acts as a repository for data storage, management, and user accessibility, aiming to balance server load, reduce response time, and leverage overall system performance.
EXPERT SYSTEMS WITH APPLICATIONS
(2021)
Review
Computer Science, Information Systems
Surabhi Kaul, Yogesh Kumar, Uttam Ghosh, Waleed Alnumay
Summary: Nature inspired algorithms play a vital role in solving diverse optimization problems by improving task efficiency and reducing energy consumption and costs. Various computing techniques benefit from these algorithms and have seen significant improvements in results.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Telecommunications
Fenghui Zhang, Ruilong Deng, Xinsheng Zhao, Michael Mao Wang
Summary: The paper investigates the improvement of service quality in edge computing by introducing artificial intelligence, and proposes a state-based distributed learning algorithm to balance the load of distributed intelligent edge servers. The convergence of the algorithm is proved, demonstrating significant enhancement in load balancing and service performance for the distributed IESs compared to existing works.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2021)
Article
Computer Science, Theory & Methods
Zhang Miao, Peng Yong, Yang Mei, Yin Quanjun, Xie Xu
Summary: This study proposes a new PSO-based static load balancing algorithm named APDPSO, which utilizes external archive solutions to update personal best positions of particles and introduces a probability and similarity-based discretization method for PSO. Experimental results on MATLAB and CloudSim platforms demonstrate that the proposed algorithm significantly improves convergence and diversity of the swarm, as well as efficiently reduces load imbalance compared to existing techniques.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Computer Science, Information Systems
Xinliang Wei, Yu Wang
Summary: Edge computing is a popular computing paradigm for real-time data processing and mobile intelligence. This paper proposes a popularity-based data placement method and load-balancing strategies in edge computing. Simulation results demonstrate the effectiveness of reducing data access latency and relieving storage pressures at overloaded servers.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2023)
Article
Chemistry, Analytical
Saurabh Singhal, Senthil Athithan, Madani Abdu Alomar, Rakesh Kumar, Bhisham Sharma, Gautam Srivastava, Jerry Chun-Wei Lin
Summary: Data centers generate large amounts of data as cloud-based smart grids replace traditional grids. The increase in automated systems has led to the rise of cloud computing, which helps enterprises provide services at low cost and high efficiency. Despite challenges such as resource management, longer response and processing time, and increased energy consumption, cloud computing is being increasingly used. Fog computing, an extension of cloud computing, reduces traffic, improves security, and speeds up processes. Both cloud and fog computing contribute to energy savings in smart grids. The paper proposes a load-balancing approach using Rock Hyrax Optimization (RHO) in Smart Grids to optimize response time and energy consumption. The algorithm assigns tasks to virtual machines and shuts off unused ones, reducing energy consumption. The proposed method shows better and quicker response time, lower energy requirements, and improved performance compared to static and dynamic algorithms. It reduces processing time by 26%, response time by 15%, energy consumption by 29%, cost by 6%, and delay by 14%.
Article
Computer Science, Information Systems
KaiLun Eng, Abdullah Muhammed, Azizol Abdullah, Masnida Hussin, Sazlinah Hasan, Mohamad Afendee Mohamed
Summary: To fully utilize the potential of Grid computing, efficient resource management is crucial. This study proposes a dynamic load balancing algorithm to effectively distribute and balance the load in a heterogeneous Grid computing environment. Extensive simulation experiments using GridSim show that the proposed algorithm outperforms contemporary load balancing approaches, effectively utilizing resources and maintaining a low degree of load imbalance in different levels of heterogeneity.
JOURNAL OF GRID COMPUTING
(2023)
Article
Computer Science, Information Systems
Anam Asghar, Assad Abbas, Hasan Ali Khattak, Samee U. Khan
Summary: With the increase in data and data-generating devices in healthcare settings, health monitoring systems are facing issues such as processing efficiency and latency. Cloud computing architecture is commonly used for health monitoring systems, but fog computing offers lower latency and increased scalability. A fog-based health monitoring system with a Load Balancing Scheme (LBS) is proposed to minimize network usage and latency, outperforming cloud-only implementations and other schemes in terms of latency and network usage.
Article
Computer Science, Information Systems
Avadh Kishor, Rajdeep Niyogi, Bharadwaj Veeravalli
Summary: This article studies the load balancing problem in a distributed system and proposes a distributed load balancing algorithm (DLBA). By considering both the minimization of jobs' response time and the fair utilization of servers, DLBA can effectively solve the load balancing problem. Experimental results validate the effectiveness of DLBA compared to other existing approaches.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2022)
Article
Computer Science, Software Engineering
Seyedeh Leili Mirtaheri, Lucio Grandinetti
Summary: New generation application problems in big data and high-performance computing (HPC) areas pose diverse operational properties that require dynamic system component behavior, emphasizing the critical issue of load balancing. In this research, two distributed and optimized load balancing methods are proposed for HPC in Big Data processing, aiming to minimize task execution time by reducing idle time. Evaluations show that the proposed methods significantly decrease idle time, scale well to network size, and are applicable in heterogeneous networks with dynamic resources and configuration.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2021)
Article
Green & Sustainable Science & Technology
Prabhdeep Singh, Rajbir Kaur, Junaid Rashid, Sapna Juneja, Gaurav Dhiman, Jungeun Kim, Mariya Ouaissa
Summary: The Internet of Things is crucial for the development of smart homes and smart cities. Fog computing, which brings cloud services closer to the edge, addresses issues such as increased latency and inefficient resource use. Load balancing plays a critical role in fog computing to distribute dynamic load evenly and optimize resource utilization. A framework was proposed in this paper to decrease bandwidth costs and provide load balancing, achieving energy savings and improved performance compared to existing algorithms.
Article
Computer Science, Hardware & Architecture
Zhiyuan Yao, Yoann Desmouceaux, Juan-Antonio Cordero-Fuertes, Mark Townsley, Thomas Clausen
Summary: This paper proposes a distributed, application-agnostic Hybrid Load Balancer (HLB) that infers server occupancies and processing speeds to make optimized workload placement decisions. The approach achieves significant performance gains compared to existing load-balancing algorithms in terms of response time and system utilization.
IEEE-ACM TRANSACTIONS ON NETWORKING
(2022)
Article
Computer Science, Information Systems
Wei-Zhe Zhang, Ibrahim A. Elgendy, Mohamed Hammad, Abdullah M. Iliyasu, Xiaojiang Du, Mohsen Guizani, Ahmed A. Abd El-Latif
Summary: Mobile-edge computing (MEC) introduces a new load balancing and computation offloading (CO) technique, along with a new security layer to address potential security issues. Experimental results demonstrate that redistributing MDUs among different sBSs can effectively reduce system consumption, while adopting AES encryption technology can better protect data during transmission.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Theory & Methods
Anthony Boulmier, Nabil Abdennadher, Bastien Chopard
Summary: This paper introduces a novel automatic load balancing criterion based on a mathematical model and proposes an algorithm to find the optimal load balancing iterations in polynomial time. Experimental results demonstrate that the proposed criterion outperforms other automatic criteria in terms of performance.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2022)
Article
Computer Science, Information Systems
Xiaomin Huang, Chenhao Wang
Summary: The study explores balancing indivisible tokens among nodes connected by a complete bipartite graph. Through a series of steps, the tokens between nodes are balanced. It is proven that the process can reach an almost perfect balance within a certain number of steps.
INFORMATION PROCESSING LETTERS
(2022)
Article
Computer Science, Interdisciplinary Applications
Deepak Kumar Patel, Devashree Tripathy, Chitaranjan Tripathy
ENGINEERING WITH COMPUTERS
(2016)
Article
Computer Science, Interdisciplinary Applications
Deepak Kumar Patel, Chitaranjan Tripathy
ENGINEERING WITH COMPUTERS
(2015)
Article
Computer Science, Hardware & Architecture
Devashree Tripathy, Amirali Abdolrashidi, Laxmi Narayan Bhuyan, Liang Zhou, Daniel Wong
Summary: Research shows that considering data access locality in thread scheduling in GPUs is crucial to reduce cache contention problems. A scheduler named PAVER optimizes thread scheduling by using a graph-theoretic approach and data sharing among thread blocks, significantly improving performance.
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION
(2021)
Article
Computer Science, Hardware & Architecture
Behzad Boroujerdian, Ying Jing, Devashree Tripathy, Amit Kumar, Lavanya Subramanian, Luke Yen, Vincent Lee, Vivek Venkatesan, Amit Jindal, Robert Shearer, Vijay Janapa Reddi
Summary: Domain-specific SoCs (DSSoCs) are a solution for domains with strict power, performance, and area requirements. However, they suffer from complex systems and a difficult design space. To address this, a design space exploration framework called FARSI is proposed, which includes a fast simulator, efficient exploration heuristic, and co-design capabilities.
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS
(2023)
Proceedings Paper
Computer Science, Hardware & Architecture
Devashree Tripathy, AmirAli Abdolrashidi, Quan Fan, Daniel Wong, Manoranjan Satpathy
Summary: This paper proposes a thread block-centric locality analysis method to efficiently use data caches and address memory bottleneck issues in GPGPUs. By conducting detailed JIT compilation analysis and deriving mappings between threads and data indices at kernel-launch-time, smarter decisions and data partition management can be achieved.
2021 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS)
(2021)
Proceedings Paper
Computer Science, Hardware & Architecture
Hadi Zamani, Devashree Tripathy, Ali Jahanshahi, Daniel Wong
Summary: This paper explores the reduction of leakage energy and improvement of performance in GPGPU systems by introducing a new multi-modal power gating switch. The redesigned PGS minimizes the inrush current during system activation, optimizing system performance and reliability.
2021 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS)
(2021)
Proceedings Paper
Computer Science, Theory & Methods
Hadi Zamani, Yuanlai Liu, Devashree Tripathy, Laxmi Bhuyan, Zizhong Chen
INTERNATIONAL CONFERENCE ON SUPERCOMPUTING (ICS 2019)
(2019)
Article
Computer Science, Information Systems
Deepak Kumar Patel, Chita Ranjan Tripathy
Proceedings Paper
Computer Science, Artificial Intelligence
Deepak Kumar Patel, Chita Ranjan Tripathy
2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE)
(2017)
Proceedings Paper
Computer Science, Theory & Methods
AmirAli Abdolrashidi, Devashree Tripathy, Mehmet Esat Belviranli, Laxmi Narayan Bhuyan, Daniel Wong
50TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO)
(2017)
Proceedings Paper
Computer Science, Artificial Intelligence
Devashree Tripathy, Jagdish Lal Raheja
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2
(2015)
Article
Computer Science, Hardware & Architecture
Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain
Summary: In this paper, a blockchain architecture based on dynamic state sharding (DSSBD) is proposed to solve the problems caused by cross-shard transactions and reconfiguration. By utilizing deep reinforcement learning, the number of shards, block spacing, and block size can be dynamically adjusted to improve the performance of the blockchain. The experimental results show that the crowdsourcing system with DSSBD has better performance in terms of throughput, latency, balancing, cross-shard transaction proportion, and node reconfiguration proportion, while ensuring security.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Gabriel F. C. de Queiroz, Jose F. de Rezende, Valmir C. Barbosa
Summary: Multi-access Edge Computing (MEC) is a technology that enables faster task processing at the network edge by deploying servers closer to end users. This paper proposes the FlexDO algorithm to solve the DAG application partitioning and offloading problem, and compares it with other solutions to demonstrate its superior performance in various test scenarios.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad
Summary: In the field of Industrial Internet of Things (IIoT), networks are increasingly vulnerable to cyberattacks. This research introduces an optimized Intrusion Detection System based on Deep Transfer Learning (DTL) for heterogeneous IIoT networks, combining Convolutional Neural Networks (CNNs), Genetic Algorithms (GA), and ensemble techniques. Through rigorous evaluation, the framework achieves exceptional performance and accurate detection of various cyberattacks.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao
Summary: This paper proposes a joint control approach called STOP to guarantee user-perceived deadline using curriculum-guided deep reinforcement learning. Experimental results show that the STOP scheme achieves a significantly higher average arrival ratio in NS-3.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Miguel Rodriguez-Perez, Sergio Herreria-Alonso, J. Carlos Lopez-Ardao, Raul F. Rodriguez-Rubio
Summary: This paper presents an implementation of an active queue management (AQM) algorithm for the Named-Data Networking (NDN) architecture and its application in congestion control protocols. By utilizing the congestion mark field in NDN packets, information about each transmission queue is encoded to achieve a scalable AQM solution.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Angel Canete, Mercedes Amor, Lidia Fuentes
Summary: This paper proposes an energy-aware placement of service function chains of Virtual Network Functions (VNFs) and a resource-allocation solution for heterogeneous edge infrastructures. The solution has been integrated with an open source management and orchestration project and has been successfully applied to augmented reality services, achieving significant reduction in power consumption and ensuring quality of service compliance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar
Summary: This paper discusses the problem of estimating the node cardinality of each node type in a heterogeneous wireless network. Two schemes, HSRC-M1 and HSRC-M2, are proposed to rapidly estimate the number of nodes of each type. The accuracy and efficiency of these schemes are proven through mathematical analysis and simulation experiments.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier
Summary: The launch of commercial 5G networks has opened up opportunities for heavy data users and highspeed applications, but traditional monitoring and evaluation techniques have limitations in the 5G networks. This paper presents a cost-effective hybrid analytical approach for detecting and evaluating user experience in real-time 5G networks, using statistical methods to calculate the user quality index.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Ali Nauman, Haya Mesfer Alshahrani, Nadhem Nemri, Kamal M. Othman, Nojood O. Aljehane, Mashael Maashi, Ashit Kumar Dutta, Mohammed Assiri, Wali Ullah Khan
Summary: The integration of terrestrial and satellite wireless communication networks offers a practical solution to enhance network coverage, connectivity, and cost-effectiveness. This study introduces a resource allocation framework that leverages local cache pool deployments and non-orthogonal multiple access (NOMA) to improve energy efficiency. Through the use of a multi-agent enabled deep deterministic policy gradient algorithm (MADDPG), the proposed approach optimizes user association, cache design, and transmission power control, resulting in enhanced energy efficiency and reduced time delays compared to existing methods.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Wu Chen, Jiayi Zhu, Jiajia Liu, Hongzhi Guo
Summary: With advancements in technology, large-scale drone swarms will be widely used in commercial and military fields. Current application methods are mainly divided into autonomous methods and controlled methods. This paper proposes a new framework for global coordination through local interaction.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Peiying Zhang, Zhihu Luo, Neeraj Kumar, Mohsen Guizani, Hongxia Zhang, Jian Wang
Summary: With the development of Industry 5.0, the demand for network access devices is increasing, especially in areas such as financial transactions, drone control, and telemedicine where low latency is crucial. However, traditional network architectures limit the construction of low-latency networks due to the tight coupling of control and data forwarding functions. To overcome this problem, researchers propose a constraint escalation virtual network embedding algorithm assisted by Graph Convolutional Networks (GCN), which automatically extracts network features and accelerates the learning process to improve network performance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Review
Computer Science, Hardware & Architecture
P. Anitha, H. S. Vimala, J. Shreyas
Summary: Congestion control is crucial for maintaining network stability, reliability, and performance in IoT. It ensures that critical applications can operate seamlessly and that IoT devices can communicate efficiently without overwhelming the network. Congestion control algorithms ensure that the network operates within its capacity, preventing network overload and maintaining network performance.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Shunmugapriya Ramanathan, Abhishek Bhattacharyya, Koteswararao Kondepu, Andrea Fumagalli
Summary: This article presents an experiment that achieves live migration of a containerized 5G Central Unit module using modified open-source migration software. By comparing different migration techniques, it is found that the hybrid migration technique can reduce end-user service recovery time by 36% compared to the traditional cold migration technique.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi
Summary: This article introduces the development and current status of authentication protocols in 6LoWPAN, and proposes an innovative perspective to fill the research gap. The article comprehensively surveys and evaluates AKA protocols, analyzing their suitability in wireless sensor networks and the Internet of Things, and proposes future research directions and issues.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)
Article
Computer Science, Hardware & Architecture
Pranjal Kumar Nandi, Md. Rejaul Islam Reaj, Sujan Sarker, Md. Abdur Razzaque, Md. Mamun-or-Rashid, Palash Roy
Summary: This paper proposes a task offloading policy for IoT devices to a mobile edge computing system, aiming to balance device utility and execution cost. A meta heuristic approach is developed to solve the offloading problem, and the results show its potential in terms of task execution latency, energy consumption, utility per unit cost, and task drop rate.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2024)