Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access

    ARTICLE

    Systematic Cloud-Based Optimization: Twin-Fold Moth Flame Algorithm for VM Deployment and Load-Balancing

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 477-510, 2024, DOI:10.32604/iasc.2024.050726 - 11 July 2024

    Abstract Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications. Nevertheless, existing commercial cloud computing models demonstrate an appropriate design by concentrating computational assets, such as preservation and server infrastructure, in a limited number of large-scale worldwide data facilities. Optimizing the deployment of virtual machines (VMs) is crucial in this scenario to ensure system dependability, performance, and minimal latency. A significant barrier in the present scenario is the load distribution, particularly when striving for improved energy consumption in a hypothetical grid computing framework. This design… More >

  • Open Access

    ARTICLE

    Tasks Scheduling in Cloud Environment Using PSO-BATS with MLRHE

    Anwar R Shaheen*, Sundar Santhosh Kumar

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2963-2978, 2023, DOI:10.32604/iasc.2023.025780 - 17 August 2022

    Abstract Cloud computing plays a significant role in Information Technology (IT) industry to deliver scalable resources as a service. One of the most important factor to increase the performance of the cloud server is maximizing the resource utilization in task scheduling. The main advantage of this scheduling is to maximize the performance and minimize the time loss. Various researchers examined numerous scheduling methods to achieve Quality of Service (QoS) and to reduce execution time. However, it had disadvantages in terms of low throughput and high response time. Hence, this study aimed to schedule the task efficiently… More >

  • Open Access

    ARTICLE

    Randomized MILP framework for Securing Virtual Machines from Malware Attacks

    R. Mangalagowri1,*, Revathi Venkataraman2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1565-1580, 2023, DOI:10.32604/iasc.2023.026360 - 19 July 2022

    Abstract Cloud computing involves remote server deployments with public network infrastructures that allow clients to access computational resources. Virtual Machines (VMs) are supplied on requests and launched without interactions from service providers. Intruders can target these servers and establish malicious connections on VMs for carrying out attacks on other clustered VMs. The existing system has issues with execution time and false-positive rates. Hence, the overall system performance is degraded considerably. The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target… More >

  • Open Access

    ARTICLE

    Homogeneous Batch Memory Deduplication Using Clustering of Virtual Machines

    N. Jagadeeswari1,*, V. Mohan Raj2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 929-943, 2023, DOI:10.32604/csse.2023.024945 - 01 June 2022

    Abstract Virtualization is the backbone of cloud computing, which is a developing and widely used paradigm. By finding and merging identical memory pages, memory deduplication improves memory efficiency in virtualized systems. Kernel Same Page Merging (KSM) is a Linux service for memory pages sharing in virtualized environments. Memory deduplication is vulnerable to a memory disclosure attack, which uses covert channel establishment to reveal the contents of other colocated virtual machines. To avoid a memory disclosure attack, sharing of identical pages within a single user’s virtual machine is permitted, but sharing of contents between different users is More >

  • Open Access

    ARTICLE

    Soft Computing Based Metaheuristic Algorithms for Resource Management in Edge Computing Environment

    Nawaf Alhebaishi1, Abdulrhman M. Alshareef1, Tawfiq Hasanin1, Raed Alsini1, Gyanendra Prasad Joshi2, Seongsoo Cho3, Doo Ill Chul4,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5233-5250, 2022, DOI:10.32604/cmc.2022.025596 - 21 April 2022

    Abstract In recent times, internet of things (IoT) applications on the cloud might not be the effective solution for every IoT scenario, particularly for time sensitive applications. A significant alternative to use is edge computing that resolves the problem of requiring high bandwidth by end devices. Edge computing is considered a method of forwarding the processing and communication resources in the cloud towards the edge. One of the considerations of the edge computing environment is resource management that involves resource scheduling, load balancing, task scheduling, and quality of service (QoS) to accomplish improved performance. With this… More >

  • Open Access

    ARTICLE

    Live Migration of Virtual Machines Using a Mamdani Fuzzy Inference System

    Tahir Alyas1, Iqra Javed1, Abdallah Namoun2, Ali Tufail2, Sami Alshmrany2, Nadia Tabassum3,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3019-3033, 2022, DOI:10.32604/cmc.2022.019836 - 07 December 2021

    Abstract Efforts were exerted to enhance the live virtual machines (VMs) migration, including performance improvements of the live migration of services to the cloud. The VMs empower the cloud users to store relevant data and resources. However, the utilization of servers has increased significantly because of the virtualization of computer systems, leading to a rise in power consumption and storage requirements by data centers, and thereby the running costs. Data center migration technologies are used to reduce risk, minimize downtime, and streamline and accelerate the data center move process. Indeed, several parameters, such as non-network overheads… More >

  • Open Access

    ARTICLE

    Optimal Load Balancing in Cloud Environment of Virtual Machines

    Fuad A.M. Al-Yarimi1,*, Sami Althahabi1, Majdy Mohammed Eltayeb2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 919-932, 2022, DOI:10.32604/csse.2022.021272 - 10 November 2021

    Abstract Cloud resource scheduling is gaining prominence with the increasing trends of reliance on cloud infrastructure solutions. Numerous sets of cloud resource scheduling models were evident in the literature. Cloud resource scheduling refers to the distinct set of algorithms or programs the service providers engage to maintain the service level allocation for various resources over a virtual environment. The model proposed in this manuscript schedules resources of virtual machines under potential volatility aspects, which can be applied for any priority metric chosen by the server administrators. Also, the model can be flexible for any time frame-based More >

  • Open Access

    ARTICLE

    Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective

    Mwaffaq Abu-Alhaija1, Nidal M. Turab1,*, AbdelRahman Hamza2

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 225-240, 2022, DOI:10.32604/csse.2022.019547 - 08 October 2021

    Abstract Infrastructure as a Service (IaaS) provides logical separation between data, network, applications and machines from the physical constrains of real machines. IaaS is one of the basis of cloud virtualization. Recently, security issues are also gradually emerging with virtualization of cloud computing. Different security aspects of cloud virtualization will be explored in this research paper, security recognizing potential threats or attacks that exploit these vulnerabilities, and what security measures are used to alleviate such threats. In addition, a discussion of general security requirements and the existing security schemes is also provided. As shown in this… More >

  • Open Access

    ARTICLE

    Allocation and Migration of Virtual Machines Using Machine Learning

    Suruchi Talwani1, Khaled Alhazmi2,*, Jimmy Singla1, Hasan J. Alyamani3, Ali Kashif Bashir4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3349-3364, 2022, DOI:10.32604/cmc.2022.020473 - 27 September 2021

    Abstract Cloud computing promises the advent of a new era of service boosted by means of virtualization technology. The process of virtualization means creation of virtual infrastructure, devices, servers and computing resources needed to deploy an application smoothly. This extensively practiced technology involves selecting an efficient Virtual Machine (VM) to complete the task by transferring applications from Physical Machines (PM) to VM or from VM to VM. The whole process is very challenging not only in terms of computation but also in terms of energy and memory. This research paper presents an energy aware VM allocation… More >

  • Open Access

    ARTICLE

    A Heterogeneous Virtual Machines Resource Allocation Scheme in Slices Architecture of 5G Edge Datacenter

    Changming Zhao1,2,*, Tiejun Wang2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 423-437, 2019, DOI:10.32604/cmc.2019.07501

    Abstract In the paper, we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment. In general, the different slices for different task scenarios exist in the same edge layer synchronously. A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity. In the condition, the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment. Based on the slicing and container concept, we propose the resource allocation… More >

Displaying 1-10 on page 1 of 10. Per Page