Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 15 , Issue 2 , PP: 27-34, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

Smart Energy Management in Green Cloud Computing using Machine Learning Algorithms

Assel Hashim Salman 1 , Abdullahi Abdu Ibrahim 2 *

  • 1 Middle Technical University, Baghdad, Iraq - (alttei4@gmail.com)
  • 2 Altinbas University, Turkish, Turkey - (Abdullahi.ibrahim@altinbas.edu.tr)
  • Doi: https://doi.org/10.54216/JCIM.150203

    Received: April 24, 2024 Revised: June 21, 2024 Accepted: October 07, 2024
    Abstract

    Cloud computing has many advantages as well as some disadvantages. An internet connection is required to use Cloud Computing. In other words, it is not possible to access the data in cases without internet. Cloud Computing can provide infrastructure services, platform services and software services to individuals with any device connected to the internet. If the connection speed is low when there is internet, the data transmission is also slower. In this context, it may not be practical for individuals or institutions to benefit from Cloud Computing in places where internet connection is low, limited, or absent. A new technology was obtained in this study; this method depends on deep learning and machine learning techniques applied to detect the attacks in the cloud computing-based systems. The suggested method compared with many traditional machine learning techniques.

    Keywords :

    Cloud computing , CNN , Energy management , Security , SVM , PCA , KNN , AdaBoost

    References

    [1] Rui Ye, Qun Dai, implementing transfer learning across different datasets for time series forecasting, Pattern Recognition, Volume 109, 2021.

    [2] Ahmed, O. (2024). Enhancing Intrusion Detection in Wireless Sensor Networks through Machine Learning Techniques and Context Awareness Integration. International Journal of Mathematics, Statistics, and Computer Science, 2, 244–258. https://doi.org/10.59543/ijmscs.v2i.10377

    [3] Pak U.S.;Kim Y.N.;Kim J.Y.;Ri J.S.” A controller design and analysis using asymmetry triangular cloud models”, Iranian Journal of Fuzzy Systems, Volume 20, Issue 2, Pages 33 – 55,2023.

    [4] Ruchika Malhotra, Shine Kamal, An empirical study to investigate oversampling methods for improving software defect prediction using imbalanced data, Neurocomputing, Volume 343, Pages 120-140, 2019.

    [5] J. H. Lee, J. Shin, and M. J. Realff, “Machine learning: Overview of the recent progresses and implications for the process systems engineering field,” Comput. Chem. Eng., 2017.

    [6] C. Khammassi and S. Krichen, “A GA-LR wrapper approach for feature selection in network intrusion detection,” Comput. Secur., vol. 70, pp. 255–277, 2017.

    [7] Dixit, Sarvottam ;Hussain, Gousiya,” An Effective Intrusion Detection System in Cloud Computing Environment”, Lecture Notes in Networks and Systems, Volume 588, Pages 671 – 680,2023.

    [8] El Khammar, Imane; El Ghmary, Mohamed; Idrissi, Abdellah,” An Improvement to the Cloud Service Research and Selection System's Usage of the Skyline Algorithm”, Lecture Notes in Networks and Systems, Volume 635 LNNS, Pages 199 – 205,2023.

    [9] Tzu-Tsung Wong, Performance evaluation of classification algorithms by k-fold and leave-one-out cross validation, Pattern Recognition, Volume 48, Issue 9, Pages 2839-2846, 2015.

    [10] N. Patani and R. Patel, “A Mechanism for Prevention of Flooding based DDoS Attack,” vol. 13, no. 1, pp. 101–111, 2017.

    [11] A. Kaushik, H. Gupta, and D. S. Latwal, “Impact of Feature Selection and Engineering in the Classification of Handwritten Text,” 2016 Int. Conf. Computer. Sustain. Glob. Dev., pp. 2598–2601, 2016.

    [12] Zhang, Guangfu ; Cai, Jiajing ; Zheng, Xiuyan.” Data Cloud Platform of Industrial Internet of Things based on TSN Scheduling Algorithm”,IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2023.

    [13] A. Shenfield, D. Day, and A. Ayesh, “Intelligent intrusion detection systems using artificial neural networks,” ICT Express, vol. 4, no. 2, pp. 95–99, 2018.

    [14] Piyush Kant, Shahedul Haque Laskar, Jupitara Hazarika, Rupesh Mahamune, CWT Based Transfer Learning for Motor Imagery Classification for Brain Computer Interfaces, Journal of Neuroscience Methods, Volume 345, 2020.

    [15] Arnulf Jentzen, Philippe von Wurstemberger, Lower error bounds for the stochastic gradient descent optimization algorithm: Sharp convergence rates for slowly and fast decaying learning rates, Journal of Complexity, Volume 57, 101438, 2020.

    [16] A. Shenfield, D. Day, and A. Ayesh, “Intelligent intrusion detection systems using artificial neural networks,” ICT Express, vol. 4, no. 2, pp. 95–99, 2018.

    [17] Oanta, Emil M. ; Menabil, Birol, “Data Management in Original Software Development for Hybrid Models” Proceedings of SPIE - The International Society for Optical Engineering, Volume 12493, Article number.2023.

    [18] Bojan Kolosnjaji, Apostolis Zarras, George Webster, and Claudia Eckert. Deep learn- ing for classification of malware system call sequences. In Australasian Joint Confer- ENCE on Artificial Intelligence, pages 137–149. Springer, 2016.

    [19]Ankita Atrey, Nikita Jain and Iyengar N.Ch.S.N, “A Study on Green Cloud Computing”, international Journal of Grid and Distributed Computing, Vol.6, No.6 (2013), pp.93-102.

    [20] Neethu Jayaram, “Green Cloud Computing”, International Journal Of Engineering And Computer Science, Volume 11 Issue5, 2022, Page No.25532-25534

    [21]Nagrath, Preeti ;Alzubi, Jafar A.; Singla, Bhawna; Rodrigues, Joel J. P. C.;Verma A.K.” Smart Distributed Embedded Systems for Healthcare Applications”, Smart Distributed Embedded Systems for Healthcare Applications Pages 1 – 1841, 2023.

    [22] Kanwal, Asia ; Amjad, Tehmina ;Ashraf, Humaira,” Correction to: Framework for Agent-Based Multistage Application Partitioning Algorithm in Mobile Cloud Computing”, SN Computer Science, Volume 5, Issue 5, Article number 521,2024.

    [23] L. Wang, C. Wang, W. Du et al., “Parameter optimization of a four-legged robot to improve motion trajectory accuracy using signal-to-noise ratio theory,” Robotics and Computer-Integrated Manufacturing, vol. 51, pp. 85–96, 2018.

    [24] Ferreira, Ricardo ; Canesche, Michael ;Jamieson, Peter; Neto, Omar P. Vilela; Nacif, Jose A. M.” Examples and tutorials on using Google Colab and Gradio to create online interactive student-learning modules”, Computer Applications in Engineering Education, Volume 32, Issue 4, Article number e22729, 2024.

    [25] Agudo, Ujué ;Liberal, Karlos G.; Arrese, Miren; Matute, Helena, “The impact of AI errors in a human-in-the-loop process”, Cognitive Research: Principles and Implications, Volume 9, Issue 1, Article number 1.2024

    [26] L. Deng and D. Yu, “Deep Learning: Methods and Applications,” Found. Trends Signal Process., vol. 7, no. 3–4, pp. 197–387, 2014.

    [27] C. Sobie, C. Freitas, and M. Nicolai, “Simulation-driven machine learning: Bearing fault classification,” Mech. Syst. Signal Process., vol. 99, pp. 403–419, 2018.

    [28] Ebas, Nur Ain; Jacob, Kavikumar; Rusiman, Mohd Saifullah; Shafi, Muhammad Amma ; “Deivanayagampillai, Nagarajan, General Fuzzy Switchboard Transformation Semigroup”, Journal of Advanced Research in Applied Sciences and Engineering Technology, Volume 42, Issue 2, Pages 1 – 12,2024.

    [29] A. Gupta, A. T. Müller, B. J. H. Huisman, J. A. Fuchs, P. Schneider, and G. Schneider, “Generative Recurrent Networks for De Novo Drug Design,” Mol. Inform., vol. 37, no. 1, 2018.

    [30] V. Sze, Y.-H. Chen, T.-J. Yang, and J. Emer, “Efficient Processing of Deep Neural Networks: A Tutorial and Survey,” vol. 105, no. 12, pp. 2295–2329, 2017.

    [31] S. M. Hosseini Bamakan, H. Wang, and Y. Shi, “Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem,” Knowledge-Based Syst., vol. 126, pp. 113–126, 2017.

    Cite This Article As :
    Hashim, Assel. , Abdu, Abdullahi. Smart Energy Management in Green Cloud Computing using Machine Learning Algorithms. Journal of Cybersecurity and Information Management, vol. , no. , 2025, pp. 27-34. DOI: https://doi.org/10.54216/JCIM.150203
    Hashim, A. Abdu, A. (2025). Smart Energy Management in Green Cloud Computing using Machine Learning Algorithms. Journal of Cybersecurity and Information Management, (), 27-34. DOI: https://doi.org/10.54216/JCIM.150203
    Hashim, Assel. Abdu, Abdullahi. Smart Energy Management in Green Cloud Computing using Machine Learning Algorithms. Journal of Cybersecurity and Information Management , no. (2025): 27-34. DOI: https://doi.org/10.54216/JCIM.150203
    Hashim, A. , Abdu, A. (2025) . Smart Energy Management in Green Cloud Computing using Machine Learning Algorithms. Journal of Cybersecurity and Information Management , () , 27-34 . DOI: https://doi.org/10.54216/JCIM.150203
    Hashim A. , Abdu A. [2025]. Smart Energy Management in Green Cloud Computing using Machine Learning Algorithms. Journal of Cybersecurity and Information Management. (): 27-34. DOI: https://doi.org/10.54216/JCIM.150203
    Hashim, A. Abdu, A. "Smart Energy Management in Green Cloud Computing using Machine Learning Algorithms," Journal of Cybersecurity and Information Management, vol. , no. , pp. 27-34, 2025. DOI: https://doi.org/10.54216/JCIM.150203