You are on page 1of 4

2020 International Conference on Computing and Information Technology, University of Tabuk, Kingdom of Saudi Arabia.

Volume: 01, Issue: ICCIT- 1441, Page No.: 152 – 155, 9th & 10th Sep. 2020.

Improved Conservation of Energy in Fog IOT


Services Using Machine Learning Model
M. Viju Prakash V.Porkodi S.Rajanarayanan
Assistant Professor Assistant Professor Professor
Department of Computer Science Department of Information Technology Department of Business Administration
and Information System
College of Science Knowledge University Lebanese French University Arba Minch University, Sawla Campus,
Erbil, Kurdistan Region, Iraq Erbil, Kurdistan Region, Iraq Ethiopia
viju.prakash@knu.edu.iq porkodi.sivaram@lfu.edu.krd srnarayanan.slm@gmail.com

Mujeebudheen Khan Banar Fareed Ibrahim M.Sivaram


Lecturer Assistant Professor Assistant Professor
Department of Electrical and Electronics Computer Engineering Department Department of Computer Networking
Ibra College of Technology Cyprus International University Lebanese French University
Oman Cyprus Erbil, Kurdistan Region, Iraq
mujeeb@ict.edu.om 21712329@student.ciu.edu.tr sivaram.murugan@lfu.edu.krd
phdsiva@gmail.com

Abstract—This Fog Computing is an extension of Cloud Computing “Network Edge,” however, involves a series of features which
technology to the network edge, which enables a newer breed of make the Fog a non-trivial cloud extension.
services and applications. Resource sharing and resource discovery
is considered to be critical for the performance of fog computing
applications. In general, the methods to reduce are consumption of
energy in heterogonous network is very minimal. Considering the
higher consumption of energy in heterogeneous networks as a
problem statement, this work proposes a machine learning model
to reduce the consumption of energy demand in fog computing
Internet of Things (IoT) services. Considering the problem, the
machine learning model adopts network density, latency and
mobility as its energy constraints and designs an objective function
to support the lower energy consumption in the network. The
simulation of the proposed method is carried out between the
proposed and existing methods in terms of various performance
metrics. The result shows that the proposed machine learning
method in Fog IoT environment is efficient in conserving the energy
Fig.1. Fog Computing acts as a intermediate between cloud and edge computing
than the other methods.
[10]
Keywords—IoT, Fog Computing, Energy Consumption, Network
Density, Latency, Mobility Fog computing is provided as a more effective solution to tackle
these constraints and seamlessly integrates network edge
I. INTRODUCTION equipment and cloud center. Fog computing is an geographically
The cloud computing’ paid-as-go’ model provides an effective distributed computing architecture with a combined elastic
solution for clients facing Web applications and batch processing computing, communicating and storage facilities for several
to own or manage private data centers (CDs). Cloud computing heterogeneous systems on the edge of the network[3]. Fog
releases the company and the end user from the information. This computing’s most prominent feature is extending the cloud
happiness becomes a issue for latency sensitive apps that need to service to the network’s edge. It closely matches end-users by
satisfy their delay demands for nodes in the area. In relation to pooling local resources in computing, communication, control
location consciousness and low latency, an evolving wave of and stock. Geographically distributed edge devices are used for
Internet deployments, especially the Internet of Things (IoTs), data consumption. Consequently, transmission time and network
needs assistance for mobility and geo-deployment. In order to transmission are decreased significantly [2,10]. The fog
satisfy these demands, we claim that the fresh platform is paradigm can fulfill the requirements of apps which are reliable
required; a platform we call Fog Computing [1,14] or Fog, just or sensitive to latency in real time and particularly eases network
because the fog is a cloud next door. The Fog Computing allows bandwidth gaps.
a fresh array of apps and services, and a successful interplay of Fog nodes are distributed geographically in the fog computing
data management and analysis between the Cloud and Fog. architecture. So because of the concentration, it won’t produce a
Fog Computing (Fig.1) is a highly-violent platform which offers lot of heat and no extra refresher is necessary. In addition, mobile
computing, storing and networking services, typically, but not node energy management policies obviously decrease
solely at the bottom of a network, between end systems and communicative energy consumption [4] in a short-term
traditional cloud computing centres. The Cloud and Fog building communication mode and some optimal energy management.
blocks are computing, storing and networking resources. This reduces energy consumption, saves energy and reduces

Volume: 01, Issue: ICCIT- 1441, Page No.: 152 – 155, 9th & 10th Sep. 2020.
M. Viju Prakash, et al.: Improved Conservation of Energy…

costs. A greener computing paradigm is provided by Fog The most notable advantage of machine learning is that pre-
computing. trained models can predict results with elevated precision almost
instantly. The simulation in autonomy that lasts for a few days is
There are many distributed nodes for the Fog computing devices, now decreased considerably to a few minutes.
and energy consumption is therefore anticipated to be greater
than its cloud counterparts. Many work therefore needs to be Our machine learning and forecasting routine includes
carried out to develop and optimize fresh and effective protocols preparation, training, validation, prediction and, as needed,
and architectures for energy saving within the fog paradigm such outline detection. It should be observed, even if the primary
as efficient communication protocols, computation, and routine is linear before presenting each step in detail, that it is
optimization of network resources. understood as an iterative method. Any step before producing
trained patterns can be recalled by the need to improve forecast
II. PREDICTIONS IN FOG COMPUTING precision. For example, a different machine learning algorithm
The next move is to perform digital analysis and prognostics for could be chosen for validation on a test set that means an
manufacturing machines and processes utilizing cloud-based unsuitable model. If a training set is deemed inadequate,
machine learning after gathering large volumes of crude additional information should be obtained. We define our
information via IoT infrastructures and interaction processes. teaching process and our routine forecast step by step below.
The strategies of machine learning usually fall into three broad
categories, including supervised learning, unsupervised In consideration of the heterogeneity computing setting, the
learning, and collaborative filtering that use both supervised and suggested strategy examined the source of energy consumption.
unsupervised learning. In addition, the strategy suggested used a methodology based on
the fractal strategy for machine-learning model to support the
As an input to a training algorithm based on datasets and labelled algorithm for allocating resources.
information, a variety of features or attributes will be obtained.
Data sets for the training of a learning algorithm are also used. Four modules present the suggested strategy to scheduling as
To evaluate the learning algorithm, testing data sets are used. shown in Figure 2. First, the surveillance model gathers resource
Upon an evaluation of a machine learning model, the potential workloads for all physical devices in all clusters such as disk
result of an event can be predicted. Machine learning can be used usage, memory usage and CPU use. In order to evaluate resource
in manufacturing to anticipate the wear of equipment and to use, the surveillance model will transmit these information into
determine if maintenance is needed. the forecast model. The model forecast analyzes usage
documents and sends the outcomes to the model scheduler. On
Since machine learning on big training data may take the base of the forecast model outcomes, the scheduler model is
considerable memory and CPU cores, it helps to accelerate accountable for allocating resources to specific hosts. Finally, the
predictive modeling to implement cloud machine learning assignment model assigns host resources. An appropriate virtual
algorithms. Several commercial solutions for decentralized machine is used for incoming demands of cloud users. The
cloud training have been created. Amazon's Elastic Compute primary role of the assignment model. Many current algorithms
Cloud (EC2), for instance, offers high-performance computing have discovered that the resource load of the CPU has an
services to users to create predictive cloud models [12,13]. effective effect and powerful study correlation.

Big data poses other obstacles to cloud research. The main The suggested technique for forecasting CPU use based on the
factors that make cloud computing valuable for data processing iterative fractal approach was motivated by this stage. The time
are performance, manageability and low cost. Security and has been taken as a sequence of interval times and the use of
privacy are nevertheless primary issues for sensitive data CPUs in the cluster has been predicted. From the outcomes, the
storage. We need secure processing especially for health geo- prediction values of the proposed method have the same number
informatics applications with sensitive data. To mitigate data of values after two prediction steps. Equation 1 reflects the
protection and security threats, the software should be used for coefficient of Pearson correlation to find the resemblance
limited data access within the system, in compliance with the between the load value forecast and actual CPU load. This
application scope. The information should be moved for the calculates the correspondence between the two values.
 XY −  N
completion of the data analysis to the next stage after storage. X Y
Data protection and security will benefit through this. r=
 ( X )  ( Y ) 
2 2

 X 2 −   Y 2 − 
III. USE MACHINE LEARNING ENERGY CONSUMPTION  N  N 
   (1)
MODEL
When extended to fresh information assuming that the same
mechanism generates general regularities, we can predict The monitoring model collects data at interpolation points from
outgoings with regard to an endless mixture of input and values the virtual machine pool. Iterative fractal forecasts are used for
which vary constantly. Exactly as machine learning functions. the calculation of CPU use of virtual machines every 5 minutes
Supervised machine-learning algorithms are training on a well- [9]. The reinforcement learning technique produces a comparison
developed dataset to explore and encode understanding in a of present value and expected value with the same workload
model that is concealed from the information. Therefore, feeding points. The outcome of the correlation factor is larger if the
fresh inputs to pretrained models produces expected outputs. workload value is comparable to that of the prior work load value.
While the training routine takes time, especially for big training The scheduler model programming resources to a specific cloud
sets, it requires considerably less time than autonomy simulation.

Vol. 01, No. ICCIT – 1441, pp. 152 – 155, 9th & 10th Sep. 2020.
M. Viju Prakash, et al.: Improved Conservation of Energy…

user using the Allocation model, based on the correlation factor network density, latency and mobility as its energy constraints
[4]. and designs an objective function to support the lower energy
consumption in the network [15-20]. The simulation of the
proposed method is carried out between the proposed and
existing methods in terms of various performance metrics.
Simulation result shows that the proposed method in terms of
energy utilization than other methods. The RL technique offers
increased performance by lowering CPU resources with reduced
energy usage.

REFERENCES
[1] F. Bonomi, “Connected vehicles, the internet of things, and fog
computing”, In The eighth ACM international workshop on vehicular
inter-networking (VANET), pp. 13-15, 2011.

Fig. 2. Architecture of Proposed Model [2] S.K Datta, C. Bonnet, and J. Haerri, “Fog computing architecture to enable
consumer centric internet of things services”, In 2015 International
Reinforcement Learning (RL) is a machine learning sub-area Symposium on Consumer Electronics (ISCE), pp. 1-2, 2015.
which is linked to maximizing certain long term benefits
[3] S. Manimurugan, and S. Al- Mutari, “A Novel Secret Image Hiding
according to the measures made by a particular agent. The agent Technique for Secure Transmission”, J. Theo. Appl. Inf. Tech, Vol.95.
examines its environment in particular by choosing a particular No.1, pp. 166-176, 2017.
action at each stage and getting a corresponding environmental
[4] S. Yi, Z. Hao, Z. Qin, and Q. Li, “Fog computing: Platform and
reward. Since the best action is never previously knew, the officer applications”, In 2015 Third IEEE Workshop on Hot Topics in Web
must learn from his experience by performing a series of various Systems and Technologies (HotWeb), pp. 73-78, 2015.
activities in order to determine the best behavior from the benefits
[5] Y. Zhang, D. Niyato, P. Wang, and D.I. Kim, “Optimal energy
acquired. management policy of mobile energy gateway”, IEEE T Veh. Technol,
Vol.65, No.5, pp.3685-3699, 2015.
IV. RESULTS AND DISCUSSIONS [6] B. Saravana Balaji, A. Salih Mohammed, C. Al-Atroshi, “Adaptability of
The RL algorithm for scheduling is applied and assessed in a SOA in IoT Services–An Empirical Survey”, Int. J. Comput. Appl,
simulation setting. The proposed model implemented in Vol.182, No.31, pp.25-28, 2018.
cloudsim tool with existing algorithm like ECORA [5], LOCUS [7] S. Almutairi, S. Manimurugan, and M. Aborokbah, “A new secure
[6], JUFO [7] and SWIPT [8] in the simulation setting in the transmission scheme between senders and receivers using HVCHC without
cloud simulation setting. The data center consists of 100 VMs in any loss”, EURASIP J. Wirel. Comm. Net, No.88, pp.1-15, 2019.
this experiment. [8] Q. Li, J. Zhao, Y. Gong, and Q. Zhang, “Energy-efficient computation
offloading and resource allocation in fog computing for Internet of
Everything”, China Communications, Vol.16, No.3, pp.32-41, 2019.
[9] M.R. Nakhkash, T.N. Gia, I. Azimi, A. Anzanpour, A.M. Rahmani, and P.
Liljeberg, “Analysis of Performance and Energy Consumption of
Wearable Devices and Mobile Gateways in IoT Applications”, COINS '19:
Proceedings of the International Conference on Omni-Layer Intelligent
Systems, pp.68-73, 2019.
[10] J. Kim, T. Ha, W. Yoo, and J.M. Chung, “Task Popularity based Energy
Minimized Computation Offloading for Fog Computing Wireless
Networks”, IEEE Wirel. Commun. Le, Vol.8, No.4, pp.1200-1203, 2019.
[11] S. Manimurugan, K. Porkumaran, C. Narmatha, “The New Block Pixel
Sort Algorithm for TVC Encrypted Medical Image”, Img. Sci. J, Vol.62,
No.8, pp. 403-414, 2014.
[12] J. Liu, K. Xiong, P. Fan, Z. Zhong, and K.B. Letaief, “Optimal Design of
SWIPT-Aware Fog Computing Networks”, arXiv preprint
arXiv:1901.08997, pp.1-8, 2019.
Fig. 3. Average CPU utilization
[13] K. Batri, and S. Anbu karuppusamy, “Improving TCP Performance in Ad-
Hoc Networks”, Euro. J. Scient. Res, Vol.65, No.2, pp.237-245, 2019.
Figure 3 reflects the use of the CPU utilization between proposed
[14] R.K. Barik, R. Priyadarshini, H. Dubey, V. Kumar, and K. Mankodiya,
and existing techniques. The RL technique uses more CPU than “FogLearn: leveraging fog-based machine learning for smart system big
other algorithms and has shown outcomes. The RL technique data analytics”, In Geospatial Intelligence: Concepts, Methodologies,
offers increased performance by lowering CPU resources with Tools, and Applications, IGI Global, pp. 1225-1241, 2019.
reduced energy usage. [15] Shanmuganathan, M., Almutairi, S., Aborokbah, M. M., Ganesan, S., and
Ramachandran, V., “Review of advanced computational approaches on
V. CONCLUSION multiple sclerosis segmentation and classification”, IET Signal Processing,
In this paper, we reduce consumption of energy in heterogonous Vol. 14, Issue 6, pp. 333-341, August 2020,
network using RL model to reduce the consumption of energy [16] S. Manimurugan, S. Al-Mutairi, M. M. Aborokbah, N. Chilamkurti, S.
demand in fog computing Internet of Things (IoT) services. Ganesan and R. Patan, "Effective Attack Detection in Internet of Medical
Things Smart Environment Using a Deep Belief Neural Network," in IEEE
Considering the problem, the machine learning model adopts

Vol. 01, No. ICCIT – 1441, pp. 152 – 155, 9th & 10th Sep. 2020.
M. Viju Prakash, et al.: Improved Conservation of Energy…

Access, vol. 8, pp. 77396-77404, 2020. doi:


10.1109/ACCESS.2020.2986013.
[17] Narmatha C, Sarah Mustafa Eljack, Afaf Abdul Rahman Mohammed
Tuka, Manimurugan S and Mohammed Mustafa, "A Hybrid Fuzzy Brain-
Storm Optimization Algorithm for the Classification of Brain Tumor MRI
Images", Journal of Ambient Intelligence and Humanized Computing
,2020. https://doi.org/10.1007/s12652-020-02470-5.
[18] C.Narmatha, P.Manimegalai and S.Manimurugan.,"A Lossless
Compression Scheme for Grayscale Medical Images Using a P2-Bit Short
Technique", Journal of Medical Imaging and Health Informatics Vol. 7,
No. 6, Page 1196-1204, October 2017.
[19] S.Manimurugan and C.Narmatha.,"Secure and Efficient Medical Image
Transmission by New Tailored Visual Cryptography Scheme with LS
Compressions", International Journal of Digital Crime and Forensics , Vol.
7, Issue 1, Pp 26-50, 2015.
[20] S.Manimurugan and C.Narmatha., "A New Approach for IRIS Image
identification using modified contour segmentation", IEEE international
conference on green computing , communication and electrical
engineering, Vol-1, Pp 206, 6-8 March, Coimbatore, India, 2014. DOI:
10.1109/ICGCCEE.2014.6921399

Vol. 01, No. ICCIT – 1441, pp. 152 – 155, 9th & 10th Sep. 2020.

You might also like