999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Intelligent Model for Predicting the Quality of Services Violation

2022-08-24 03:30:32MuhammadAdnanKhanAsmaKanwalSagheerAbbasFaheemKhanandWhangbo
Computers Materials&Continua 2022年5期

Muhammad Adnan Khan,Asma Kanwal,Sagheer Abbas,F(xiàn)aheem Khan and T.Whangbo,*

1Pattern Recognition and Machine Learning Lab.,Department of Software,Gachon University,Seongnam,Gyeonggido,13120,Korea

2Riphah School of Computing&Innovation,F(xiàn)aculty of Computing,Riphah International University Lahore Campus,Lahore,54000,Pakistan

3School of Computer Science,National College of Business Administration and Economics,Lahore,54000,Pakistan

4Department of Computer Engineering,Gachon University,Seongnam,13557,Korea

Abstract: Cloud computing is providing IT services to its customer based on Service level agreements(SLAs).It is important for cloud service providers to provide reliable Quality of service(QoS)and to maintain SLAs accountability.Cloud service providers need to predict possible service violations before the emergence of an issue to perform remedial actions for it.Cloud users’major concerns;the factors for service reliability are based on response time,accessibility, availability, and speed.In this paper, we, therefore, experiment with the parallel mutant-Particle swarm optimization(PSO)for the detection and predictions of QoS violations in terms of response time, speed, accessibility,and availability.This paper also compares Simple-PSO and Parallel Mutant-PSO.In simulation results,it is observed that the proposed Parallel Mutant-PSO solution for cloud QoS violation prediction achieves 94% accuracy which is many accurate results and is computationally the fastest technique in comparison of conventional PSO technique.

Keywords: Accountability; particle swarm optimization; mutant particle swarm optimization;quality of service;service level agreement

1 Introduction

Cloud computing is a novel domain for the implementation of accessible computing resources by integrating the concept of virtualization,distributed application design,and grid computing.The core purpose of this paradigm is its convenient behavior which is provided through its real-time access to the network and configuration of the computing resources.These resources involve hardware(network,servers, and data storage) and software (as service) resources.Cloud service provider facilitates its users to rapidly provisioned and release these resources[1].In the current era;the demand for cloud systems rapidly increases which is a result that generates a large number of cloud service providers in the market.The interaction between the service provider and the consumer is a transfer of values between the interacting bodies which is called service provisioning [2].The cloud hypervisors are virtual machine monitors to handle resource provisioning, this software is used to map or schedule the instantiated virtual machine that lies on the cloud physical servers[3,4].Through this interaction,a cloud user can deploy their application on the pool of networked resources with practically minimal operating cost in comparison to actual resource purchasing [5].For example, commercial cloud service providers like Amazon web services,Microsoft Azure,Google App Engine are running their services on millions of physical hosts.Each host is hosting many virtual machines which can be invoked and removed dynamically.These technical and economic aids like the on-demand service of cloud computing increasing the trends of migration from traditional enterprise computing to cloud computing[6].

Service provisioning like all subscription-based services relies on Service level agreements(SLAs)which is a signed contract between the cloud service provider and customer [7].These SLAs are designed by considering all functional and non-functional requirements to assure the Quality of service(QoS).SLAs contain all the roles and responsibilities of all the interacting parties involved, scope and quality of service, the performance of services, rates of charges of services, time, etc [8].So,these QoS provide an acceptance ratio of the customer for the cloud services.In case of agreement violation obligations,service charges or penalties will be paid by the service provider.This violation decreases the trust of the customer for migration towards cloud computing services by decreasing the cloud service quality[9].Cloud service quality consists of many related attributes like availability,speed,accessibility,and response time of the service[10].These quality attributes are the key factors for the selection of the best cloud service providers among similar functionality service providers.These quality attributes are the basis for the contract between customer and service provider to assure the customer that their service expectations are fulfilled.These contracts will manage by service management systems to assess and monitor the quality of service that is being executed.Some adequate actions will perform to enforce these contracts,for example,upscaling the relevant resources,substitute the erroneous service.This will also define the overall cost that will be paid by the relevant body on the termination of the contract.

QoS includes very significant attributes response time and speed that are explicitly mentioned in the SLA [10].The nature of service quality is dynamic that changes according to the functionality of the server, so the values of the service quality attribute can be changed without affecting the basic functionalities of the main service [11].For the assurance of QoS; it is necessary to monitor cloud resources,existing provided data,and SLAs for the effective working of the cloud environment[12].The dynamic monitoring of provided quality attributes could provide consistent and real-time information about the running services and resources for all types of cloud services:Platform as a service(PaaS),Infrastructure as a service(IaaS),and Software as a service(SaaS)[13].Any deviation from the agreed quality attribute ranges which are explicitly defined is SLA may become the cause of system failure and dissatisfaction of customers.So,for effective monitoring of cloud services,it is important to detect the SLA violations that occur in the system[13].

The proposed research is focused on cloud QoS violation detection and prediction using the Parallel Mutant-PSO machine learning technique for SaaS’s SLA violation using response time,speed,availability,and accessibility.

2 Related Work

The following section provides the literature review and its related work on cloud quality of service for SaaS and also the detection of QoS violations.

2.1 Service Level Agreement for Cloud Base Services

SLA obliges a contract between service providers and service users to define cloud services.SLA lists down the quality attributes, commitments, and guarantees between both parties.These QoS attributes are Service-level objectives(SLOs)that define the criteria to measure QoS metrics[14].Set of SLOs specify Service level(SL).Cloud service providers define various SLs in a single SLA.These SLA represents a different type of services and also execute at different time durations.If these SLs are violated then downgrading to service may consider.The resultant service provider will execute remedial actions to cover up the existing flaws of the service.So,there is a need to define an effective mechanism to continuously measure cloud service performance and detection of SLA violations.The study shows that several types of research have been conducted in this field.Like, Business process execution language (BPEL) is a framework that manages cloud-based web services [13].The framework was designed to gather cloud information,detect the SLAs violations and also provide corrective measures to remove these violations.This framework performs monitoring at run-time based on the workflow pattern generated by BPEL.

Michlmayr et al.[15]in another research define a framework that monitors client and server QoS.The framework performs event-based processing to detect the ongoing QoS metrics and possible SLAs violations.On the occurrence of SLAs violation,an adaptive approach will be adopted like hosting a new service instance for the avoidance of undesired QoS that trigger at run-time.

2.2 Cloud Resource Monitoring and Service Violation Detection

An effective monitoring mechanism is required to ensure that software or hardware that is remotely deployed by the cloud service provider is meeting all the quality levels defined in SLAs.This approach will gather QoS parameters values and detect QoS violations[13].Typically the cloud resource monitoring system on the abnormal working of any cloud service performs the remedial actions to recover the service.

A variety of IT infrastructure tools are available before the evolution of cloud computing.These tools are specially designed to monitor cluster and grid computing.Many of these existing tools are now used in cloud computing to monitor the cloud resources at an abstract level.These monitoring tools collect metrics from all the components and servers playing their role in providing current cloud services and analyses the collected data.These tools generate SLA reports based on noted data.Some cloud service provider provides their service monitoring facility to their consumers for the better management of applications.For example,Azure fabric controller(AFC)is a monitoring service that monitors Azure-based cloud resources,web services,Windows Azure storage facility[16],hosted websites,etc.Amazon cloud watch(ACW)is a service to monitor Amazon web services(AWS)[17].Some other cloud monitoring services are used to monitors diverse cloud platforms, [18] like Amazon EC2, GoogleApp Engine, Salesforce CRM, S3 Web Services, Rackspace Cloud Microsoft Azure,CloudKick,etc.

2.3 Software as a Service(SaaS’s)QoS

International Standard Organization (ISO) 9126 model defines the distinct software quality attributes relevant to cloud services.These cloud services expose their external attributes to their users during the advertising and utilization phase.External attributes like response time, security,accessibility,availability,speed,performance,reliability,etc.Many internal attributes are hidden for a user like changeability.So, ISO 9126 [19] does not define the SaaS’s service quality sufficiently.Resource monitoring to achieve quality is a significant procedure in SaaS cloud computing.This monitoring defines how much user expectations have been met.The study shows that response time throughput,and availability is quality attributes that estimate the effectiveness of cloud cost and cloud QoS ranking prediction[11–14].Consequently,by monitoring these SLAs’metrics degree of QoS noviolation or violation can be predicted.

Cappiello et al.[20]proposed a QoS-based technique to manage cloud resources effectively and reliably.This approach prevents SLA violation on the sudden failure of service using intelligent optimization for the self-healing process.Availability and performance QoS attributes are considered in this research for the violation evaluation.Penalties are calculated by managing this violation data.

Kritikos et al.[21] define a model for QoS monitoring and adaptation.Through this model service quality categorization is proposed in which service performance is a foremost category that defines how well any service performs.One more category that this research considers is response time.Response time is a composite attribute that can be calculated through network latency and delay.The fundamental parameters for this research were performance, throughput, and response time to evaluate QoS parameters,using these parameters performance of cloud service can be predicted.

Alotaibi et al.[22] highlight the functional and non-functional aspects of QoS.This research defines that semantic web and web services description models help any user to select the best quality services.The authors define that response time and throughput are domain-independent parameters that depict QoS.Whereas,service availability is a dependent parameter that is based on security and reliability of service.This paper proposed a classification mechanism for the management of servicebased applications.

Brandic et al.[23] determine QoS through perspective awareness and user mobility.This is a semantic model consisting of four ontological layers represented as network,applications,hardware resources, and the end-user layer.Quality attributes response time, speed and throughput define the performance of service.This research presents the QoS knowledge representation as a general framework in the form of the ontology layer.So,this research gives another direction in QoS service engineering.

Truong et al.[24]work on grid computing and present an approach to focus on the comprehensive set of QoS to give the high-level workflow of the system.The author proposed the QoS aware grid workflow language (QoWL) that experimentally specifies the performance of SaaS.Müller et al.[25]present the significance of QoS monitoring for the selection of services.QoS Classification Tree is used to evaluate QoS using response time, availability, and throughput.Noor et al.[26] provide a comprehensive conceptual reference model named SALMonADA that is responsible to get the SLA agreed between both parties and define the explanation of SLA violations.SALMonADA continuously monitors the configurations and through constraint satisfaction problem identifies the SLA violations.

Deep & Machine learning arose over the last two decades from the increasing capacity of computers to process large amounts of data empowered with cloud computing [27,28].Computational Intelligence approaches like Swarm Intelligence [29], Evolutionary Computing [30] like Genetic Algorithm [31], Neural Network [32], Deep Extreme Machine learning [33] and Fuzzy system [34–38] are strong candidate solutions in the field of the smart city [39–41], smart health empowered with cloud computing[42,43],and wireless communication[44,45,46],etc.

3 Proposed Methodology

This Section presents an overview of the methodology applied for SLA violation detection using the machine learning mutant-Particle swarm optimization(PSO)technique.

Fig.1 shows the proposed conceptual model for the Detection and Prediction of SLA Violations.

Figure 1:Proposed conceptual model for detection and prediction of SLA violations

The proposed model consists of many modules for the learning state of PSO based on available data in its knowledge base.A part of the dataset is used for the training of PSO.The knowledge base consists of the QoS metrics data.These metrics were transferred to the PSO for training.In the proposed work five Mutant-PSO run parallel for the training of category-based SLA violation.After training the trained PSO will test for the life prediction of SLA violation.The newly predicted rules will send to the knowledge base for the extension of existing knowledge.The response time, speed,availability,and accessibility are the QoS attributes of cloud service that are quantitative value,which does not represent any meaningful terms.The knowledge base for the proposed system is taken from Cloud Armour[27]due to its accommodation of multiple QoS attributes.

3.1 Data Preprocessing

It is a fact that if data is insufficient, the machine learning algorithm may produce inaccurate results or there is the possibility that the machine learning algorithm simply fails to determine anything useful due to this deficiency of data.It is observed that the knowledgebase that is provided having some missing values in its defined attributes so,these missing values estimation is a valuable part to properly process and learn the class of SLA violation from the given knowledgebase.The proposed approach use is the simple method used to find out the missing value that is represented asα,the system searches for a record having similar values of any attributeβin the observed data and extracts that missing value ofα.

A sample consists of a part of the dataset for the training of the Mutant-PSO to learn the algorithm for the five classes defined in Tab.1.

Table 1:QoS attributes classes

3.2 Learning Mechanism for Particle Swarm Optimization

PSO is an optimization algorithm based on the intelligent behavior of the particles to reach an optimized goal [28].The group of particles is initially generated and their corresponding velocities and next positions are defined.Each particle is considered as an eligible candidate solution,therefore,the fitness of each candidate will be calculated.This fitness determines the movement vector of every particle in search space.This movement defines its current best-fit location.The next iteration of the algorithm takes place when all the particles move to their best next location.

The first step to perform the SLA violation prediction using the Mutant-PSO algorithm is to encode the particle among multiple QoS attributes.Where each element of a particle represents a single attribute.The value of every dimension of the particle is randomly defined under the defined upper and lower bound.Where the upper bound for every dimension is 5 and the lower bound is 0.01.

3.3 Initialization of the Particle Groups

An initial population matrix is generated which consists of many particles using random methods.A combination of defined QoS attributes is a single composition particle.

In the current algorithm,we have performed some modifications to calculate the next position of a particle instead of using the traditional velocity calculation technique we are using the average velocity of every particle.The basic formula of PSO is as in Eq.(1).The velocity of the ith particle is denoted asvi=vi1,vi2,.........,vinand position of the ithparticle is represented asxi=xi1,xi2,.........,xinand local best particle of any iteration is presented asLi=Li1,Li2,.........,Linand the global best particle is presented asGi=Gi1,Gi2,.........,Gin.For every particle,its nth dimensional velocity at timet+1 is calculated using the given formula in Eq.(1)using by calculating local and global intelligence.

whereα1,α2the learning rate for is local and global best particles respectively andr1,r2is the random number that generates under the range(0–1).

The average velocity calculated through Eq.(2)

For the learning of the particle,the existing particle is updated through Eq.(3)

Then fitness of every particle is calculated through Root mean square error (RMSE) and if the particle reaches to desired fitness, then the algorithm will stop otherwise the whole procedure will repeat until each particle attains the required fitness or the Number of cycles(NoC)will achieve.

3.4 Fitness Function

The PSO algorithm selects the next generation to evolve based on the fitness function and then it will search for the best solution in the search space.In the proposed methodology,the fitness function is mainly used to calculate the SLA violation that occurs under the given dataset.The fitness of the particle is evaluated by multiplying every particle with the given dataset and find the overall fitness of the particle for the whole dataset.This composite particle has four parameters of response time,availability,accessibility,speed.SLA violation occurs if the values of given attributes are very low or below the average value.The values of every attribute are classified in Tab.1.For fitness RMSE of the learning particle with the given class is calculated and if the error ratio is minimum then the particle is considered as the best-fitted particle.

4 Results and Discussion

The following diagrams Figs.2 and 3 represent the results of simulation in the learning process of parallel mutant-PSO for different classes of QoS attributes in the context of SLA violations.

Figure 2:Simple PSO convergence results for training of all classes

Figure 3:Parallel mutant-PSO convergence results for training of all classes

4.1 PSOs Performance in Training Phase

The proposed solution performance compares with the simple PSO in the training phase.The same dataset provides to both methodologies(Simple PSO and Mutant-PSO)for the training of algorithms.For the proposed solution MATLAB is used for the simulation.The parameters are defined in Section 3.4.3 for the training of both PSOs.The values of each parameter are pre-defined in the given dataset according to Tab.1 defined values.

4.2 Convergence of Simple PSO in Training Phase

Fig.2 shows the simple PSO convergence for all categories.The algorithm converges to its global minima in a minimum of 25–30 iterations.For the Strongly Weak class,the algorithm starts converging to fitness value at the 25th iteration.For the Weak class,it converges at the 27thiteration.The algorithm converges very speedily for Medium class,Strong class at 10thand 15thiteration respectively.The Very Strong class algorithm converges very slowly at the 29thiteration.

4.3 Convergence of Parallel Mutant-PSO in Training Phase

Fig.3 represents the convergence of fitness values for training is calculated by Parallel Mutant-PSO for the iterations of different categories of SLA violation proposed in Fig.1.Initially,the particles are generated randomly,therefore,the initial fitness error for the system is very high.Initial fitness error relates to the 0th iteration.As the algorithm advances,the convergence of particles is extreme and this particle finds its global minima very fast.As for Medium,Strong,and Very Strong classes[3(2–2.99),4(3–3.99), and 5(4–5)], the algorithm converges at its second iteration.For the Strongly Weak class(0–0.99)Mutant-PSO converges at the third iteration and for Weak class(1–1.99)it converges at the fourth iteration.It is also observed that the number of iterations required for the convergence Parallel Mutant-PSO is seen to be 4–7 for our simulation.It is observed that the proposed Parallel Mutant-PSO converges more speedily for all categories comparative to Simple PSO for the same dataset.Simple PSO takes approximately 25–30 iterations and in its comparison,Mutant-PSO takes only 5–7 iterations for the overall convergence of the algorithm for all categories.

4.4 PSOs Performance in Validation Phase

4.4.1 Simple PSO in Validation Phase

In the validation phase,the learning of Simple PSO is tested on the unknown dataset which is not used in the training of PSO to assess the SLA Violation prediction done by PSO.Sample Dataset of 50 particles is chosen for this purpose which consists of 10 particles for each category.In the Strongly Weak,Medium,and Strong category Simple PSO prediction remain good as it predicts accurately 8,7,and 9 particles respectively out of 10 particles.Whereas the Simple PSO performance remains very poor for the Weak and Very Strong category, it performs maximum wrong predictions for them as shown in Tab.2.

Table 2:Simple PSO SLA violation prediction results

4.4.2 Parallel Mutant-PSO in Validation Phase

In a comparison of simple PSO, Parallel Mutant-PSO predictions remain far better.The same dataset of 50 particles is provided to Mutant-PSO for the validation of its learning.Mutant-PSO achieves maximum accurate predictions for all categories only for Weak category its performance remains a little low as out of 10 it predicts 2 particles wrongly.Parallel Mutant-PSO SLA violation prediction results are shown in Tab.3.

Table 3:Parallel mutant-PSO SLA violation prediction results

Table 3:Continued

So,in overall comparison proposed Parallel Mutant-PSO is considered as the best solution so far for the prediction of QoS-based SLA violation as it converges in minimum NoC and shows maximum accuracy in its learning.

5 Conclusion

Cloud computing is an emerging paradigm in the computing field due to its flexible use and tractability in providing hardware or software resources and which in result reduce the cost factors.Monitoring is a way in cloud computing that assures the QoS agreed in SLA will provide the cloud resources.The core concern of cloud users is the performance of service which includes service availability,response time,and desired data size and speed for the transfer of data.This study proposed a Parallel Mutant-PSO for SLA violation detection and prediction by considering the QoS attributes response time,speed,availability,accessibility.Our experimental results based on the proposed model show that the Mutant-PSO reaches its convergence state in 5–7 iterations which is better than the performance of Simple PSO that reaches its convergence state 25–30 iterations.Tabs.2 and 3 define that predictions done by Mutant-PSO are more accurate than the Simple PSO.The Proposed Parallel Mutant-PSO meets a 94%accuracy level.The Mutant PSO is stuck in local minima,which may affect our system performance, to overcome this issue we can use opposite learning-based algorithms like Opposite Mutant-PSO,Opposite PSO,Total Opposite Mutant-PSO,etc.

Acknowledgement:We thank our families and colleagues who provided us with moral support.

Funding Statement:No funding was received for this research.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 亚洲第一区精品日韩在线播放| 久久一本日韩精品中文字幕屁孩| 精品偷拍一区二区| 2020亚洲精品无码| 色综合天天综合中文网| 亚洲欧美人成人让影院| 免费国产好深啊好涨好硬视频| 亚洲性日韩精品一区二区| 成人福利免费在线观看| 无码精品国产dvd在线观看9久| 久久婷婷五月综合97色| 天天综合色天天综合网| 国产日韩AV高潮在线| 日韩最新中文字幕| 丁香婷婷激情综合激情| 亚洲一级毛片免费观看| 亚洲国产理论片在线播放| 伊人久久久久久久| 亚洲色偷偷偷鲁综合| 茄子视频毛片免费观看| 欧美日本在线播放| 99久久免费精品特色大片| 久久99热这里只有精品免费看| 欧美黄网站免费观看| 91精品情国产情侣高潮对白蜜| 98精品全国免费观看视频| 丁香婷婷激情网| 黄色网站不卡无码| 91成人在线观看| 欧美劲爆第一页| 亚洲一区二区三区在线视频| 制服无码网站| 四虎永久在线精品国产免费 | 婷婷亚洲视频| 成年女人a毛片免费视频| 特级毛片8级毛片免费观看| 国产在线视频欧美亚综合| 国产在线一区二区视频| 99这里只有精品免费视频| 欧美亚洲激情| 日韩精品专区免费无码aⅴ| 手机在线免费不卡一区二| 在线欧美日韩国产| 99热国产这里只有精品9九| 国产又爽又黄无遮挡免费观看| 99福利视频导航| 国产国产人成免费视频77777 | 2020国产精品视频| 久久国产精品影院| 国产麻豆aⅴ精品无码| 三上悠亚在线精品二区| 欧美午夜视频| 亚洲精品中文字幕午夜| 国产精品久久自在自线观看| 国产特级毛片aaaaaa| 免费jjzz在在线播放国产| 男女猛烈无遮挡午夜视频| 一级毛片免费观看久| 国产一级在线播放| 91精品最新国内在线播放| 成人av专区精品无码国产| 亚洲精品麻豆| 国产成人资源| 狠狠亚洲婷婷综合色香| 毛片网站在线看| 日本欧美午夜| 成年人国产网站| 免费国产好深啊好涨好硬视频| 国产三区二区| 亚洲综合在线网| 中国黄色一级视频| 久久国产精品夜色| 乱色熟女综合一区二区| 亚洲第七页| 久久情精品国产品免费| 精品自窥自偷在线看| 欧美精品亚洲二区| 真实国产乱子伦高清| 色有码无码视频| 无码专区国产精品第一页| 无码电影在线观看| 欧美成人精品高清在线下载|