Energy-Efficient Virtual Machines Dynamic Integration for Robotics

  • Haoyu WenEmail author
  • Sheng Zhou
  • Zie Wang
  • Ranran Wang
  • Jianmin Lu
Conference paper
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)


The rapid development of cloud computing technology has brought a lot of energy consumption. However, the utilization rate of resources such as data center CPUs is often less than half. Therefore, if the virtual machines in operation are centrally integrated into some servers, and idle servers are switched to low-power modes, the power consumption of data centers can be greatly reduced. The consumption. The traditional research on the integration of virtual machines is mainly based on the current load of the host to set a high-load threshold or periodically perform the migration. At present, research based on time-series prediction faces the problem of low prediction accuracy. In order to solve these problems, this paper synthetically considers the influence of multi-order Markov model and CPU state at different times, and proposes a new K-order mixed Markov model for CPU load prediction of the host for a period of time in the future. By conducting large-scale data experiments on the CloudSim simulation platform, the host load forecasting method proposed in this paper is compared with traditional load detection methods, and the proposed model is greatly reduced in the number of virtual machine migrations and data center energy consumption. And the violation of the SLA is also at an acceptable level.


Cloud computing Virtual machines dynamic integration Mixed Markov model 


  1. 1.
    Zhao, H., & Zhao, J. (2014). Application and analysis of cloud computing technology in digital library. Library and Information Guide, 24(7), 33–34.Google Scholar
  2. 2.
    Barroso, L. A. & Hlzle, U. (2007). The case for energy-proportional computing. Computer, 40(12), 33–37.CrossRefGoogle Scholar
  3. 3.
    Koomey, J. (2011). Growth in data center electricity use 2005 to 2010 (pp. 41–50). Berkeley: Analytics Press.Google Scholar
  4. 4.
    Lu, H., Li, Y., Mu, S., Wang, D., Kim, H., & Serikawa, S. (2017). Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet of Things Journal(99), 1–1.Google Scholar
  5. 5.
    Lu, H., Li, Y., Chen, M., Kim, H., & Serikawa, H. (2018). Brain intelligence: Go beyond artificial intelligence. Mobile Networks and Applications, 23(2), 368–375.CrossRefGoogle Scholar
  6. 6.
    Wang, Q., Xiong, W., Zhang, Y., Pan, N., Yu, Z., Song, E., et al. (2018). Remote analysis of myocardial fiber information in vivo assisted by cloud computing. Future Generation Computer Systems, 85, 146–159.CrossRefGoogle Scholar
  7. 7.
    Zhang, Y., Gravina, R., Lu, H., Villari, M., & Fortino, G. (2018) PEA: Parallel electrocardiogram-based authentication for smart healthcare systems. Journal of Network and Computer Applications, 117, 10–16.CrossRefGoogle Scholar
  8. 8.
    Xiao, S., Yu, H., Wu, Y., Peng, Z., & Zhang, Y. (2017). Self-evolving trading strategy integrating internet of things and big data. IEEE Internet of Things Journal, 5(4), 2518–2525. Scholar
  9. 9.
    Zhang, Y., Yang, F., Wang, Q., He, Q., Li, J., & Yang, Y. (2017). An anti-collision algorithm for RFID-based robots based on dynamic grouping binary trees. Computers & Electrical Engineering, 63, 91–98., Scholar
  10. 10.
    Serikawa, S., & Lu, H. (2014). Underwater image dehazing using joint trilateral filter. Oxford, Pergamon Press, Inc.CrossRefGoogle Scholar
  11. 11.
    Lu, H., Li, Y., Uemura, T., Kim, H., & Serikawa, S. (2018). Low illumination underwater light field images reconstruction using deep convolutional neural networks. Future Generation Computer Systems, 82, 142–148.CrossRefGoogle Scholar
  12. 12.
    Lu, H., Li, B., Zhu, J., Li, Y., Li, Y., Xu, X., et al. (2017). Wound intensity correction and segmentation with convolutional neural networks. Concurrency and Computation Practice and Experience, 29(6), e3927.CrossRefGoogle Scholar
  13. 13.
    Xu, X., He, L., Lu, H., Gao, L., & Ji, Y. (2018). Deep adversarial metric learning for cross-modal retrieval. World Wide Web-internet & Web Information Systems, 1–16.Google Scholar
  14. 14.
    Calheiros, R. N., Ranjan, R., Beloglazov, A., Rose, C. A. F. D., & Buyya, R. (2010). CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, software: Practice and experience. Software Practice and Experience, 41(1), 23–50.CrossRefGoogle Scholar
  15. 15.
    Beloglazov, A., & Buyya, R. (2012). Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurrency and Computation Practice and Experience, 24(13), 1397–1420.CrossRefGoogle Scholar
  16. 16.
    Li, M. F., Bi, J. P., & Li, Z. C. (2014). Resource scheduling waits for cost-aware virtual machine integration. Journal of Software, 21(7), 1388–1402.Google Scholar
  17. 17.
    Hermenier, F., Lorca, X., Menaud, J. M., Muller, G., & Lawall, J. (2009). Entropy: a consolidation manager for clusters. In ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (pp. 41–50). Washington, ACM.Google Scholar
  18. 18.
    Verma, A., Ahuja, P., & Neogi, A. (2008). pMapper: power and migration cost aware application placement in virtualized systems. Berlin, Springer.Google Scholar
  19. 19.
    Nathuji, R., & Schwan, K. (2007). VirtualPower: coordinated power management in virtualized enterprise systems. ACM SIGOPS Operating Systems Review, 41(6), 265–278.CrossRefGoogle Scholar
  20. 20.
    Beloglazov, A., & Buyya, R. (2013). Managing overloaded hosts for dynamic consolidation of virtual machines in cloud data centers under quality of service constraints. IEEE Transactions on Parallel and Distributed Systems, 24(7), 1366–1379.CrossRefGoogle Scholar
  21. 21.
    Wood, T., Shenoy, P., Venkataramani, A., & Yousif, M. (2009). Black-box and gray-box strategies for virtual machine migration. In Proceedings of the 4th USENIX Conference on Networked Systems Design and Implementation (pp. 17–17). Berkeley, CA: USENIX Association.Google Scholar
  22. 22.
    Zhu, X., Young, D., Watson, B.J., Wang, Z., Rolia, J., Singhal, S., et al. (2008). 1000 islands: Integrated capacity and workload management for the next generation data center. In International conference on autonomic computing (pp. 172–181). Piscataway: IEEE.Google Scholar
  23. 23.
    Gmach, D., Rolia, J., Cherkasova, L., Belrose, G., Turicchi, T., & Kemper, A. (2009). An integrated approach to resource pool management: Policies, efficiency and quality metrics. In IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (pp. 326–335). Piscataway: IEEE.Google Scholar
  24. 24.
    Gmach, D., Rolia, J., Cherkasova, L., & Kemper, A. (2009). Resource pool management: Reactive versus proactive or let’s be friends. Computer Networks, 53(17), 2905–2922.CrossRefGoogle Scholar
  25. 25.
    Verma, A., Dasgupta, G., Nayak, T. K., De, P., & Kothari, R. (2009). Server workload analysis for power minimization using consolidation. In Conference on USENIX Technical Conference (pp. 28–28). Berkeley, CA: USENIX Association.Google Scholar
  26. 26.
    Weng, C., Li, M., Wang, Z., & Lu, X. (2009). Automatic performance tuning for the virtualized cluster system. In IEEE International Conference on Distributed Computing Systems (pp. 183–190). Piscataway: IEEE.Google Scholar
  27. 27.
    Bobroff, N., Kochut, A., & Beaty, K. (2007). Dynamic placement of virtual machines for managing SLA violations. In IFIP/IEEE International Symposium on Integrated Network Management (pp. 119–128). Piscataway: IEEE.Google Scholar
  28. 28.
    Huang, Q., Shuang, K., Xu, P., Li, J., Liu, X., & Su, S. (2014). Prediction-based dynamic resource scheduling for virtualized cloud systems. Journal of Networks, 9(2), 375–383.Google Scholar
  29. 29.
    Beloglazov, A. (2013). Energy-efficient management of virtual machines in data centers for cloud computing. Department of Computing & Information Systems. The University of Melbourne.Google Scholar
  30. 30.
    Khalil, F., Li, J., & Wang, H. (2006). A framework of combining Markov model with association rules for predicting web page accesses. In Australasian Conference on Data Mining and Analytics (pp. 177–184). Darlinghurst: Australian Computer Society, Inc.Google Scholar
  31. 31.
    Deshpande, M., & Karypis, G. (2001). Selective Markov models for predicting web page accesses. ACM Transactions on Internet Technology, 4(2), 163–184.CrossRefGoogle Scholar
  32. 32.
    Xia, L. T. (2005). Prediction of plum rain intensity based on index weighted Markov chain. Journal of Hydraulic Engineering, 36(8), 988–993.Google Scholar
  33. 33.
    Peng, Z. (2010). Weighted Markov chains for forecasting and analysis in incidence of infectious diseases in Jiangsu province, China. The Journal of Biomedical Research, 24(3), 207–214.MathSciNetCrossRefGoogle Scholar
  34. 34.
    Park, K. S., & Pai, V. S. (2006). CoMon: a mostly-scalable monitoring system for PlanetLab. ACM SIGOPS Operating Systems Review, 40(1), 65–74.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Haoyu Wen
    • 1
    Email author
  • Sheng Zhou
    • 1
  • Zie Wang
    • 1
  • Ranran Wang
    • 1
  • Jianmin Lu
    • 1
  1. 1.School of Information and Safety EngineeringZhongnan University of Economics and LawWuhanChina

Personalised recommendations