Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    Tasks Scheduling in Cloud Environment Using PSO-BATS with MLRHE

    Anwar R Shaheen*, Sundar Santhosh Kumar

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2963-2978, 2023, DOI:10.32604/iasc.2023.025780 - 17 August 2022

    Abstract Cloud computing plays a significant role in Information Technology (IT) industry to deliver scalable resources as a service. One of the most important factor to increase the performance of the cloud server is maximizing the resource utilization in task scheduling. The main advantage of this scheduling is to maximize the performance and minimize the time loss. Various researchers examined numerous scheduling methods to achieve Quality of Service (QoS) and to reduce execution time. However, it had disadvantages in terms of low throughput and high response time. Hence, this study aimed to schedule the task efficiently… More >

  • Open Access

    ARTICLE

    Randomized MILP framework for Securing Virtual Machines from Malware Attacks

    R. Mangalagowri1,*, Revathi Venkataraman2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1565-1580, 2023, DOI:10.32604/iasc.2023.026360 - 19 July 2022

    Abstract Cloud computing involves remote server deployments with public network infrastructures that allow clients to access computational resources. Virtual Machines (VMs) are supplied on requests and launched without interactions from service providers. Intruders can target these servers and establish malicious connections on VMs for carrying out attacks on other clustered VMs. The existing system has issues with execution time and false-positive rates. Hence, the overall system performance is degraded considerably. The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target… More >

  • Open Access

    ARTICLE

    Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems

    P. Ramadevi1,*, T. Jayasankar1, V. Dinesh2, M. Dhamodaran3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1373-1385, 2023, DOI:10.32604/csse.2023.026603 - 15 June 2022

    Abstract Recently, with the growth of cyber physical systems (CPS), several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively. Besides, the cloud computing (CC) enabled CPS offers huge processing and storage resources for CPS that finds helpful for a range of application areas. At the same time, with the massive development of applications that exist in the CPS environment, the energy utilization of the cloud enabled CPS has gained significant interest. For improving the energy effectiveness of the CC platform, virtualization technologies have been employed for… More >

  • Open Access

    ARTICLE

    Homogeneous Batch Memory Deduplication Using Clustering of Virtual Machines

    N. Jagadeeswari1,*, V. Mohan Raj2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 929-943, 2023, DOI:10.32604/csse.2023.024945 - 01 June 2022

    Abstract Virtualization is the backbone of cloud computing, which is a developing and widely used paradigm. By finding and merging identical memory pages, memory deduplication improves memory efficiency in virtualized systems. Kernel Same Page Merging (KSM) is a Linux service for memory pages sharing in virtualized environments. Memory deduplication is vulnerable to a memory disclosure attack, which uses covert channel establishment to reveal the contents of other colocated virtual machines. To avoid a memory disclosure attack, sharing of identical pages within a single user’s virtual machine is permitted, but sharing of contents between different users is More >

  • Open Access

    ARTICLE

    Aging Analysis Framework of Windows-Based Systems through Differential-Analysis of System Snapshots

    Eun-Tae Jang1, Sung Hoon Baek2, Ki-Woong Park1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5091-5102, 2022, DOI:10.32604/cmc.2022.026663 - 28 July 2022

    Abstract When a Windows-based system is used for an exceedingly long time, its performance degrades, and the error occurrence rate tends to increase. This is generally called system aging. To investigate the reasons for system aging, various studies have been conducted within the range of the operating system kernel to the user application. However, finding an accurate reason for system performance degradation remains challenging research topic. In this study, system monitoring was conducted by dividing a system into ‘before software installation,’ ‘after software installation,’ and ‘after software removal.’ We confirmed that when a software installed in… More >

  • Open Access

    ARTICLE

    An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks

    Farag Azzedin*, Husam Suwad, Md Mahfuzur Rahman

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3003-3020, 2022, DOI:10.32604/cmc.2022.028646 - 16 June 2022

    Abstract This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’ behavior. Current security solutions rely on information coming from attackers. Examples are current monitoring and detection security solutions such as intrusion prevention/detection systems and firewalls. This article envisions creating an imbalance between attackers and defenders in favor of defenders. As such, we are proposing to flip the security game such that it will be led by defenders and not attackers. We are proposing a security system that does not observe the… More >

  • Open Access

    ARTICLE

    Evolutionary Algorithm Based Adaptive Load Balancing (EA-ALB) in Cloud Computing Framework

    J. Noorul Ameen1,*, S. Jabeen Begum2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1281-1294, 2022, DOI:10.32604/iasc.2022.025137 - 03 May 2022

    Abstract In the present decade, the development of cloud computing framework is witnessed for providing computational resources by dynamic service providing methods. There are many problems in load balancing in cloud, when there is a huge demand for resources. The objective of load balancing is to equilibrate the cloud server computations for avoiding overloading problems. On addressing the issue, this paper develops a new model called Evolutionary Algorithm based Adaptive Load Balancing (EA-ALB) for enhancing the efficacy and user satisfaction of cloud services. Efficient Scheduling Scheme for the virtual machines using machine learning algorithm is proposed More >

  • Open Access

    ARTICLE

    Soft Computing Based Metaheuristic Algorithms for Resource Management in Edge Computing Environment

    Nawaf Alhebaishi1, Abdulrhman M. Alshareef1, Tawfiq Hasanin1, Raed Alsini1, Gyanendra Prasad Joshi2, Seongsoo Cho3, Doo Ill Chul4,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5233-5250, 2022, DOI:10.32604/cmc.2022.025596 - 21 April 2022

    Abstract In recent times, internet of things (IoT) applications on the cloud might not be the effective solution for every IoT scenario, particularly for time sensitive applications. A significant alternative to use is edge computing that resolves the problem of requiring high bandwidth by end devices. Edge computing is considered a method of forwarding the processing and communication resources in the cloud towards the edge. One of the considerations of the edge computing environment is resource management that involves resource scheduling, load balancing, task scheduling, and quality of service (QoS) to accomplish improved performance. With this… More >

  • Open Access

    ARTICLE

    Multi-Objective Optimization of Energy Aware Virtual Machine Placement in Cloud Data Center

    B. Gomathi1, B. Saravana Balaji2, V. Krishna Kumar3, Mohamed Abouhawwash4,5,*, Sultan Aljahdali6, Mehedi Masud6, Nina Kuchuk7

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1771-1785, 2022, DOI:10.32604/iasc.2022.024052 - 24 March 2022

    Abstract Cloud computing enables cloud providers to outsource their Information Technology (IT) services from data centers in a pay-as-you-go model. However, Cloud infrastructure comprises virtualized physical resources that consume huge amount of energy and emits carbon footprints to environment. Hence, there should be focus on optimal assignment of Virtual Machines (VM) to Physical Machines (PM) to ensure the energy efficiency and service level performance. In this paper, The Pareto based Multi-Objective Particle Swarm Optimization with Composite Mutation (PSOCM) technique has been proposed to improve the energy efficiency and minimize the Service Level Agreement (SLA) violation in… More >

  • Open Access

    ARTICLE

    Bayes Theorem Based Virtual Machine Scheduling for Optimal Energy Consumption

    R. Swathy*, B. Vinayagasundaram

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 159-174, 2022, DOI:10.32604/csse.2022.023706 - 23 March 2022

    Abstract This paper proposes an algorithm for scheduling Virtual Machines (VM) with energy saving strategies in the physical servers of cloud data centers. Energy saving strategy along with a solution for productive resource utilization for VM deployment in cloud data centers is modeled by a combination of “Virtual Machine Scheduling using Bayes Theorem” algorithm (VMSBT) and Virtual Machine Migration (VMMIG) algorithm. It is shown that the overall data center’s consumption of energy is minimized with a combination of VMSBT algorithm and Virtual Machine Migration (VMMIG) algorithm. Virtual machine migration between the active physical servers in the… More >

Displaying 11-20 on page 2 of 38. Per Page