0% Complete
فارسی
Home
/
دوازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Novel Service Deployment Policy in Fog Computing Considering The Degree of Availability and Fog Landscape Utilization Using Multiobjective Evolutionary Algorithms
Authors :
Maryam Eslami
1
Mehdi Sakhaei-nia
2
1- دانشگاه بوعلی سینا
2- دانشگاه بوعلی سینا
Keywords :
Internet of Things, Fog Computing, Service Deployment, Multiobjective Evolutionary Algorithms, Service Availability
Abstract :
Fog computing is a promising paradigm for real-time and mission-critical Internet of Things (IoT) applications. Regarding the high distribution, heterogeneity, and limitation of fog resources, applications should be placed in a distributed manner to fully utilize these resources. In this paper, we propose a linear formulation for assuring the different availability requirements of application services while maximizing the utilization of fog resources. We also compare three multiobjective evolutionary algorithms, namely MOPSO, NSGA-II, and MOEA/D for a trade-off between the mentioned optimization goals. The evaluation results in the iFogSim simulator demonstrate the efficiency of all three algorithms and a generally better behavior of MOPSO algorithm in terms of obtained objective values, application deadline satisfaction, and execution time.
Papers List
List of archived papers
Leveraging Retrieval-Augmented Generation for Persian University Knowledge Retrieval
Arshia Hemmat - Mohammad Hassan Heydari - Kianoosh Vadaei - Afsaneh Fatemi
A Blockchain-Based Smart Contract Framework for Peer-to-Peer Energy Trading in Smart Grids
Hossein Shahinzadeh - Farshad Ebrahimi - S. Mohammadali Zanjani - Amirafshin Zamani - Saiedeh Mehrabani-Najafabadi - Gevork B. Gharehpetian
SBST challenges from the perspective of the test techniques
Sepideh Kashefi Gargari - Dr Mohammad Reza Keyvanpour
طراحی و پیاده سازی بستر اجرای بازی جنگ سایبری
مریم نصراصفهانی - بهروز ترک لادانی - بهروز شاهقلی قهفرخی - حسین قجاوند بلتیجه - نوید شیرمحمدی - مهدی شمس - محمدامین آقاکبیری
A Novel Decentralized Privacy Preserving Federated Learning Model for Healthcare Applications
Saba Ameri - Reza Ebrahimi Atani
Kalman Filter–Based Anomaly Detection for User Authentication Failures in Enterprise Logs
Somayeh Soltani - Hossein Nikdel
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Arman Sepehr - Mohammadzaman Zamani - Hamid Beigy - Shabnam Behzad
Information Technology Risk Management Model for Remote Control Vehicles
Hamid Reza Naji - Aref Ayati
Application of Artificial Intelligence and Remote Sensing for Oil Spill Detection
َAmir Reza Ziaee - Masomeh Azimzadeh - Parvin Ahmadi
Sustainability analysis and improvement of model driven engineering and model transformation languages
Kevin Lano - Shekoufeh Kolahdouz Rahimi
more
Samin Hamayesh - Version 42.5.2