Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Application Centric Virtual Machine Placements to Minimize Bandwidth Utilization in Datacenters

    Muhammad Abdullah1,*, Saad Ahmad Khan1, Mamdouh Alenez2, Khaled Almustafa3, Waheed Iqbal1

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 13-25, 2020, DOI:10.31209/2018.100000047

    Abstract An efficient placement of virtual machines (VMs) in a cloud datacenter is important to maximize the utilization of infrastructure. Most of the existing work maximises the number of VMs to place on a minimum number of physical machines (PMs) to reduce energy consumption. Recently, big data applications become popular which are mostly hosted on cloud datacenters. Big data applications are deployed on multiple VMs and considered data and communication intensive applications. These applications can consume most of the datacenter bandwidth if VMs do not place close to each other. In this paper, we investigate the use of different VM placement… More >

  • Open Access

    ARTICLE

    Virtual Machine Based on Genetic Algorithm Used in Time and Power Oriented Cloud Computing Task Scheduling

    Tongmao Ma1,2, Shanchen Pang1, Weiguang Zhang1, Shaohua Hao1

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 605-613, 2019, DOI:10.31209/2019.100000115

    Abstract In cloud computing, task scheduling is a challenging problem in cloud data center, and there are many different kinds of task scheduling strategies. A good scheduling strategy can bring good effectiveness, where plenty of parameters should be regulated to achieve acceptable performance of cloud computing platform. In this work, combined elitist strategy, three parameters values oriented genetic algorithms are proposed. Specifically, a model built by Generalized Stochastic Petri Nets (GSPN) is introduced to describe the process of scheduling in cloud datacenter, and then the workflow of the algorithms is showed. After that, the effectiveness of the algorithms is found to… More >

  • Open Access

    ARTICLE

    Network Security Situation Awareness Framework based on Threat Intelligence

    Hongbin Zhang1, 2, Yuzi Yi1, *, Junshe Wang1, Ning Cao3, *, Qiang Duan4

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 381-399, 2018, DOI: 10.3970/cmc.2018.03787

    Abstract Network security situation awareness is an important foundation for network security management, which presents the target system security status by analyzing existing or potential cyber threats in the target system. In network offense and defense, the network security state of the target system will be affected by both offensive and defensive strategies. According to this feature, this paper proposes a network security situation awareness method using stochastic game in cloud computing environment, uses the utility of both sides of the game to quantify the network security situation value. This method analyzes the nodes based on the network security state of… More >

  • Open Access

    ARTICLE

    A Heterogeneous Virtual Machines Resource Allocation Scheme in Slices Architecture of 5G Edge Datacenter

    Changming Zhao1,2,*, Tiejun Wang2, Alan Yang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 423-437, 2019, DOI:10.32604/cmc.2019.07501

    Abstract In the paper, we investigate the heterogeneous resource allocation scheme for virtual machines with slicing technology in the 5G/B5G edge computing environment. In general, the different slices for different task scenarios exist in the same edge layer synchronously. A lot of researches reveal that the virtual machines of different slices indicate strong heterogeneity with different reserved resource granularity. In the condition, the allocation process is a NP hard problem and difficult for the actual demand of the tasks in the strongly heterogeneous environment. Based on the slicing and container concept, we propose the resource allocation scheme named Two-Dimension allocation and… More >

Displaying 31-40 on page 4 of 34. Per Page