A Heuristic Algorithm for Multi-layer Network Optimization in Cloud Computing

A. Hadian; M. Bagherian; B. Fathi Vajargah

Volume 9, Issue 3 , July 2021, , Pages 361-367

http://dx.doi.org/10.22044/jadm.2021.9955.2133

Abstract
  Background: One of the most important concepts in cloud computing is modeling the problem as a multi-layer optimization problem which leads to cost savings in designing and operating the networks. Previous researchers have modeled the two-layer network operating problem as an Integer Linear Programming ...  Read More

An Energy-aware Real-time Task Scheduling Approach in a Cloud Computing Environment

H. Momeni; N. Mabhoot

Volume 9, Issue 2 , April 2021, , Pages 213-226

http://dx.doi.org/10.22044/jadm.2021.10344.2171

Abstract
  Interest in cloud computing has grown considerably over recent years, primarily due to scalable virtualized resources. So, cloud computing has contributed to the advancement of real-time applications such as signal processing, environment surveillance and weather forecast where time and energy considerations ...  Read More

C.5. Operating Systems
Analytical evaluation of an innovative decision-making algorithm for VM live migration

M. Tajamolian; M. Ghasemzadeh

Volume 7, Issue 4 , November 2019, , Pages 589-596

http://dx.doi.org/10.22044/jadm.2018.7178.1847

Abstract
  In order to achieve the virtual machines live migration, the two "pre-copy" and "post-copy" strategies are presented. Each of these strategies, depending on the operating conditions of the machine, may perform better than the other. In this article, a new algorithm is presented that automatically decides ...  Read More

G.3.5. Systems
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

M. Rezvani

Volume 6, Issue 2 , July 2018, , Pages 387-397

http://dx.doi.org/10.22044/jadm.2017.5581.1668

Abstract
  Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional ...  Read More