• Home
  • رایانش ابری
    • List of Articles رایانش ابری

      • Open Access Article

        1 - Identifying Technological Business Criteria Based On Cloud Computing Using Fuzzy Delphi Method
        Ahmad fendereski
        This study aimed to identify technological business criteria based on cloud computing that technology can greatly help to technological business in Iran small and medium-sized trade, and it can also have a significant impact on improving the delivery of services, decrea More
        This study aimed to identify technological business criteria based on cloud computing that technology can greatly help to technological business in Iran small and medium-sized trade, and it can also have a significant impact on improving the delivery of services, decreasing current problems and decreasing costs. The current research has been done during one year and it is developmental research and it is analytical- exploratory based on nature. The current study has been done based on mixed research (quality-quantity) and gathering data conducted via literature review and viewpoint of experts and the method of gathering data was questionnaire and interview and fuzzy Delphi. Criteria and sub criteria were identified by interview and literature review and the comments of experts were given by Delphi questionnaire. In this method, fuzzy theory has been used for modeling variables in experts’ comments and group decision making. This research has been done during one year and the most important results were selected for reviewing criteria including space accessibility, information retrievability, appropriateness, technical factors and economic factors which had maximum limits in technological business. Manuscript profile
      • Open Access Article

        2 - Performance Improvement of Polynomial Neural Network Classifier using Whale Optimization Algorithm
        Mahsa Memari A. Harifi a. Khalili
        Polynomial neural network (PNN) is a supervised learning algorithm which is one of the most popular models used in real applications. The architectural complexity of polynomial neural network in terms of both number of partial descriptions (PDs) and number of layers, le More
        Polynomial neural network (PNN) is a supervised learning algorithm which is one of the most popular models used in real applications. The architectural complexity of polynomial neural network in terms of both number of partial descriptions (PDs) and number of layers, leads to more computation time and more storage space requirement. In general, it can be said that the architecture of the polynomial neural networks is very complex and it requires large memory and computation time. In this research, a novel approach has been proposed to improve the classification performance of a polynomial neural network using the Whale Optimization Algorithm (PNN-WOA). In this approach, the PDs are generated at the first layer based on the combination of two features. The second layer nodes consists of PDs generated in the first layer, input variables and bias. Finally, the polynomial neural network output is obtained by sum of weighted values of the second layer outputs. Using the Whale Optimization Algorithm (WOA), the best vector of weighting coefficients will be obtained in such a way that the PNN network reach to the highest classification accuracy. Eleven different dataset from UCI database has been used as input data of proposed PNN-WOA and the results has been presented. The proposed method outperforms state-of-the-art approaches such as PNN-RCGA, PNN-MOPPSO, RCPNN-PSO and S-TWSVM in most cases. For datasets, an improvement of accuracy between 0.18% and 10.33% can be seen. Also, the results of the Friedman test indicate the statistical superiority of the proposed PNN-WOA model compared to other methods with p value of 0.039. Manuscript profile
      • Open Access Article

        3 - Provide an Energy-aware Markov Based Model for Dynamic Placement of Virtual Machines in Cloud Data Centers
        mehdi rajabzadeh Abolfazl Toroghi Haghighat Amir Masoud Rahmani
        The use of energy-conscious solutions is one of the important research topics in the field of cloud computing. By effectively using virtual machine placement and aggregation algorithms, cloud suppliers will be able to reduce energy consumption. In this paper, a new mode More
        The use of energy-conscious solutions is one of the important research topics in the field of cloud computing. By effectively using virtual machine placement and aggregation algorithms, cloud suppliers will be able to reduce energy consumption. In this paper, a new model is presented that seeks to achieve the desired results by improving the algorithms and providing appropriate methods. Periodic monitoring of resource status, proper analysis of the data obtained, and prediction of the critical state of the servers using the proposed Markov model have reduced the number of unnecessary migrations as much as possible. The combination of genetic algorithm and simulated annealing in the replacement section along with the definition of the adsorbent Markov chain has resulted in better and faster performance of the proposed algorithm. Simulations performed in different scenarios in CloudSim show that compared to the best algorithm compared, at low, medium and high load, energy consumption has decreased significantly. Violations of service level agreements also fell by an average of 17 percent. Manuscript profile
      • Open Access Article

        4 - Improve security in cloud computing infrastructure using block chain protocol
        Mohsen Gerami Vahid Yazdanian Siavash Naebasl
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloadi More
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloading will be This virtual machine will not be able to distinguish the normal mobile user from attackers, thus violating the privacy and security of the transmitted data, so after determining the unloading strategy, the China block can be used in information security. And the information of each server is encapsulated and unloaded in the form of a block. In this research, a proposed solution is presented, which is the combination of China blockchain and cloud computing to increase security and efficiency. The proposed solution is implemented and evaluated in order to evaluate its efficiency increase compared to other existing solutions. Manuscript profile