• Home
  • Cloud Computing
    • List of Articles Cloud Computing

      • Open Access Article

        1 - Identifying and ranking of key variables on the use of cloud computing in the technology business
        Ahmad mehrabian
        Achieving the goals of the country's development prospects, the goals of the Sixth Development Plan, and other goals of developing business technologies in the light of these needs require the development of the appropriate infrastructure and platform for the realizatio More
        Achieving the goals of the country's development prospects, the goals of the Sixth Development Plan, and other goals of developing business technologies in the light of these needs require the development of the appropriate infrastructure and platform for the realization of technological business in the true sense. Cloud computing has a significant impact on the improvement. The provision of technology business services, and in addition to reducing the current problems of business technology, also reduces the costs associated with information technology. Small and medium enterprises face many challenges and challenges in using cloud computing to develop their technological business. The main purpose of this research is to identify and rank the key variables on the use of cloud computing in technology businesses by hierarchical analysis method. The research method is descriptive-survey. The target community and the decision team are 18 people who are in the field of information technology, who completed the questionnaire of identification and paired comparison questionnaire in two periods of time. At first, identifying key variables on the use of cloud computing in technological businesses (18 criteria) were listed from papers, theses, books, and interviews with specialists, and these variables were assigned to the decision team, so that variables that are of high importance are identified. Which, from the team's point of view, was found to be a criterion of the severity of their impact. In the second turn, the identified variables were ranked by the Standard Paired Questionnaire and Expert Choice software. The factors are ranked by this; Self-efficacy is of the highest importance. Coaches, former entrepreneurial knowledge, information flows, systematic search of opportunity, strong social ties, and poor social links are in the foreground. Manuscript profile
      • Open Access Article

        2 - A Centralized core Banking model in cloud environment
        Meysam Bayeriyar
        The network structure of banking systems each bank separately from a central management system and a channel management system. Branches users and customers through different systems to the channel and their request by the central system handled and processing by the ce More
        The network structure of banking systems each bank separately from a central management system and a channel management system. Branches users and customers through different systems to the channel and their request by the central system handled and processing by the central system. But some banks don't has a central management system and have to use different systems, along with several service-providers to do things. this multiplicity of the system of service and , serving is real issue of this thesis, in which lead to various problems, over time, Including decentralization logical storage resources and application of the maximum processing capacity of the banking network. In this thesis is to increase efficiency and maximum use of processing capability and centralized storage systems in Cloud environments ,Different models were examined, and finally one of the proposed models is selected as the basic model and the necessary changes were done, the model is improved. In this study, the technical structure of the Bank has been studied. The Implementation of the proposed model, lead to increase efficiency, availability, and fault tolerance and reliability of the bank. With increasing flexibility, the bank is able to offer a more diverse service. Manuscript profile
      • Open Access Article

        3 - modified division and replication of data in cloud for optimal performace and security (MDROPS)
        hossein hassanpour
        The tendency of organizations to use cloud services is increasing every day, due to the economic benefits that can be contained, the adoption of every service of information security topic is the most critical basic needs. Hence the need to Outsourcing data as well as t More
        The tendency of organizations to use cloud services is increasing every day, due to the economic benefits that can be contained, the adoption of every service of information security topic is the most critical basic needs. Hence the need to Outsourcing data as well as the significant growth of the hacker's knowledge may be considered as a major obstacle in the path of securing the cloud services. One of the proposed techniques to secure cloud computing using network platform, is divide and replicate data [5]. That this method suffers from problems like disclosure of Information through telephone (internet) tapping, incompleteness of encryption of location's data storage algorithm. Therefore, in this article we have tried to present a way to optimize the performance and increase the level of security, by dividing and replicating data using a methodology with the encryption of location's respondents and Finally, we want to indicate the increase of efficiency and security with the implementation of the algorithm in the context of data center networks that simulated with Cloudsim software, and also to compare the algorithm using the same proposed approaches. Manuscript profile
      • Open Access Article

        4 - Identifying Technological Business Criteria Based On Cloud Computing Using Fuzzy Delphi Method
        Ahmad fendereski
        This study aimed to identify technological business criteria based on cloud computing that technology can greatly help to technological business in Iran small and medium-sized trade, and it can also have a significant impact on improving the delivery of services, decrea More
        This study aimed to identify technological business criteria based on cloud computing that technology can greatly help to technological business in Iran small and medium-sized trade, and it can also have a significant impact on improving the delivery of services, decreasing current problems and decreasing costs. The current research has been done during one year and it is developmental research and it is analytical- exploratory based on nature. The current study has been done based on mixed research (quality-quantity) and gathering data conducted via literature review and viewpoint of experts and the method of gathering data was questionnaire and interview and fuzzy Delphi. Criteria and sub criteria were identified by interview and literature review and the comments of experts were given by Delphi questionnaire. In this method, fuzzy theory has been used for modeling variables in experts’ comments and group decision making. This research has been done during one year and the most important results were selected for reviewing criteria including space accessibility, information retrievability, appropriateness, technical factors and economic factors which had maximum limits in technological business. Manuscript profile
      • Open Access Article

        5 - Scheduling tasks in cloud environments using mapping framework - reduction and genetic algorithm
        nima khezr nima jafari novimipour
        Task scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of More
        Task scheduling is a vital component of any distributed system such as grids, clouds, and peer-to-peer networks that refer tasks to appropriate resources for execution. Common scheduling methods have disadvantages such as high time complexity, inconsistent execution of input tasks, and increased program execution time. Exploration-based scheduling algorithms to prioritize tasks from Manuscript profile
      • Open Access Article

        6 - Using a multi-objective optimization algorithm for tasks allocate in the cloud-based systems to reduce energy consumption
        sara tabaghchimilan nima jafari novimipour
        Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amount More
        Nowadays, new technologies have increased the demand for business in the web environment.Increasing demand will increase the variety and number of services. As a result, the creation of large-scale computing data centers has high operating costs and consumes huge amounts of electrical power. On the other hand, inadequate and inadequate cooling systems not only cause excessive heating of resources and shorten the life of the machines. It also produces carbon that plays an important role in the weather. Therefore, they should reduce the total energy consumption of these systems with proper methods. In this research, an efficient energy management approach is provided in virtual cloud data centers, which reduces energy consumption and operational costs, and brings about an increase in the quality of services. It aims to provide a resource allocation strategy for cloud systems with the goal of reducing energy, cost of implementation and examining its use in cloud computing. The results of the simulation show that the proposed method in comaprision to NPA, DVFS, ST and MM methods can reduce the average energy consumption up to 0.626 kWh, also the need to immigration and SLA violation declined up to 186 and 30.91% respectively. Manuscript profile
      • Open Access Article

        7 - Internet Banking, Cloud Computing: Opportunities, Threats
        Monireh Hosseini Elias Fathi Kiadehi
        With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been offered as a revolution in Internet application as a More
        With the extension of Internet and its applications, internet banking is introduced as an efficient and cost effective way to provide services to customers. Towards the end of previous decade, cloud computing has been offered as a revolution in Internet application as a service which effect on the way that service is provided. Regarding the service improvement based on customer’s needs, cloud computing is a quick move in informational services. This study tried to consider each aspect of internet banking and cloud computing strengths, weaknesses, opportunities and threats and provide SWOT analysis for Internet banking using cloud computing. In the following, the study tried to provide a practical solution for financial agencies and banks to provide better Internet banking services using cloud computing technology. Finally a SWOT analysis of internet banking using cloud computing technology is discussed and approved with expert opinions using fuzzy Delphi method. Manuscript profile
      • Open Access Article

        8 - Hybrid Task Scheduling Method for Cloud Computing by Genetic and PSO Algorithms
        Amin Kamalinia Ali Ghaffari
        Cloud computing makes it possible for users to use different applications through the internet without having to install them. Cloud computing is considered to be a novel technology which is aimed at handling and providing online services. For enhancing efficiency in cl More
        Cloud computing makes it possible for users to use different applications through the internet without having to install them. Cloud computing is considered to be a novel technology which is aimed at handling and providing online services. For enhancing efficiency in cloud computing, appropriate task scheduling techniques are needed. Due to the limitations and heterogeneity of resources, the issue of scheduling is highly complicated. Hence, it is believed that an appropriate scheduling method can have a significant impact on reducing makespans and enhancing resource efficiency. Inasmuch as task scheduling in cloud computing is regarded as an NP complete problem; traditional heuristic algorithms used in task scheduling do not have the required efficiency in this context. With regard to the shortcomings of the traditional heuristic algorithms used in job scheduling, recently, the majority of researchers have focused on hybrid meta-heuristic methods for task scheduling. With regard to this cutting edge research domain, we used HEFT (Heterogeneous Earliest Finish Time) algorithm to propose a hybrid meta-heuristic method in this paper where genetic algorithm (GA) and particle swarm optimization (PSO) algorithms were combined with each other. The results of simulation and statistical analysis of proposed scheme indicate that the proposed algorithm, when compared with three other heuristic and a memetic algorithms, has optimized the makespan required for executing tasks. Manuscript profile
      • Open Access Article

        9 - Toward an Enhanced Dynamic VM Consolidation Approach for Cloud Datacenters Using Continuous Time Markov Chain
        Monireh Hosseini Sayadnavard Abolfazl Toroghi Haghighat
        Dynamic Virtual Machine (VM) consolidation is an effective manner to reduce energy consumption and balance the resource load of physical machines (PMs) in cloud data centers that guarantees efficient power consumption while maintaining the quality of service requirement More
        Dynamic Virtual Machine (VM) consolidation is an effective manner to reduce energy consumption and balance the resource load of physical machines (PMs) in cloud data centers that guarantees efficient power consumption while maintaining the quality of service requirements. Reducing the number of active PMs using VM live migration leads to prevent inefficient usage of resources. However, high frequency of VM consolidation has a negative effect on the system reliability and we need to deal with the trade-off between energy consumption and system reliability. In recent years many research work has been done to optimize energy management using power management techniques. Although these methods are very efficient from the point of view of energy management, but they ignore the negative impact on the system reliability. In this paper, a novel approach is proposed to achieve a reliable VM consolidation method. In this way, a Markov chain model is designed to determine the reliability of PMs and then it has been prioritized PMs based on their CPU utilization level and reliability status. Two algorithms are presented to determining source and destination servers. The efficiency of our proposed approach is validated by conducting extensive simulations. The results of the evaluation clearly show that the proposed approach significantly improve energy consumption while avoiding the inefficient VM migrations. Manuscript profile
      • Open Access Article

        10 - Reliable resource allocation and fault tolerance in mobile cloud computing
        Zahra Najafabadi Samani Mohammad Reza  Khayyam Bashi
        By switching the computational load from mobile devices to the cloud, Mobile Cloud Computing (MCC) allows mobile devices to offer a wider range of functionalities. There are several issues in using mobile devices as resource providers, including unstable wireless connec More
        By switching the computational load from mobile devices to the cloud, Mobile Cloud Computing (MCC) allows mobile devices to offer a wider range of functionalities. There are several issues in using mobile devices as resource providers, including unstable wireless connections, limited energy capacity, and frequent location changes. Fault tolerance and reliable resource allocation are among the challenges encountered by mobile service providers in MCC. In this paper, a new reliable resource allocation and fault tolerance mechanism is proposed in order to apply a fully distributed resource allocation algorithm without exploiting any central component. The objective is to improve the reliability of mobile resources. The proposed approach involves two steps: (1) Predicting device status by gathering contextual information and applying TOPSIS to prevent faults caused by volatility of mobile devices, and (2) Adapting replication and checkpointing methods to fault tolerance. A context-aware reliable offloading middleware is developed to collect contextual information and manage the offloading process. To evaluate the proposed method, several experiments are run in a real environment. The results indicate improvements in success rates, completion time, and energy consumption for tasks with high computational load Manuscript profile
      • Open Access Article

        11 - BSFS: A Bidirectional Search Algorithm for Flow Scheduling in Cloud Data Centers
        Hasibeh Naseri Sadoon Azizi Alireza Abdollahpouri
        To support high bisection bandwidth for communication intensive applications in the cloud computing environment, data center networks usually offer a wide variety of paths. However, optimal utilization of this facility has always been a critical challenge in a data cent More
        To support high bisection bandwidth for communication intensive applications in the cloud computing environment, data center networks usually offer a wide variety of paths. However, optimal utilization of this facility has always been a critical challenge in a data center design. Flow-based mechanisms usually suffer from collision between elephant flows; while, packet-based mechanisms encounter packet re-ordering phenomenon. Both of these challenges lead to severe performance degradation in a data center network. To address these problems, in this paper, we propose an efficient mechanism for the flow scheduling problem in cloud data center networks. The proposed mechanism, on one hand, makes decisions per flow, thus preventing the necessity for rearrangement of packets. On the other hand, thanks do SDN technology and utilizing bidirectional search algorithm, our proposed method is able to distribute elephant flows across the entire network smoothly and with a high speed. Simulation results confirm the outperformance of our proposed method with the comparison of state-of-the-art algorithms under different traffic patterns. In particular, compared to the second-best result, the proposed mechanism provides about 20% higher throughput for random traffic pattern. In addition, with regard to flow completion time, the percentage of improvement is 12% for random traffic pattern Manuscript profile
      • Open Access Article

        12 - Embedding Virtual Machines in Cloud Computing Based on Big Bang–Big Crunch Algorithm
        Ali Ghaffari Afshin Mahdavi
        Cloud computing is becoming an important and adoptable technology for many of the organization which requires a large amount of physical tools. In this technology, services are provided and presented according to users’ requests. Due to the presence of a large number of More
        Cloud computing is becoming an important and adoptable technology for many of the organization which requires a large amount of physical tools. In this technology, services are provided and presented according to users’ requests. Due to the presence of a large number of data centers in cloud computing, power consumption has recently become an important issue. However, data centers hosting Cloud applications consume huge amounts of electrical energy and contributing to high operational costs to the environment. Therefore, we need Green Cloud computing solutions that can not only minimize operational costs but also reduce the environmental impact. Live migration of virtual machines and their scheduling and embedding lead to enhanced efficiency of dynamic resources. The guarantee of service quality and service reliability is an indispensable and irrevocable requirement with respect to service level agreement. Hence, providing a method for reducing costs of power consumption, data transmission, bandwidth and, also, for enhancing quality of service (QoS) in cloud computing is critical. In this paper, a Big Bang–Big Crunch (BB-BC) based algorithm for embedding virtual machines in cloud computing was proposed. We have validated our approach by conducting a performance evaluation study using the CloudSim toolkit. Simulation results indicate that the proposed method not only enhances service quality, thanks to the reduction of agreement violation, but also reduces power consumption. Manuscript profile
      • Open Access Article

        13 - Reallocation of Virtual Machines to Cloud Data Centers to Reduce Service Level Agreement Violation and Energy Consumption Using the FMT Method
        Hojjat Farrahi Farimani Davoud  Bahrepour Seyed Reza Kamel Tabbakh reza Ghaemi
        Due to the increased use of cloud computing services, cloud data centers are in search of solutions in order to better provide the services demanded by their users. Virtual machine consolidation is an appropriate solution to the trade-off between power consumption and s More
        Due to the increased use of cloud computing services, cloud data centers are in search of solutions in order to better provide the services demanded by their users. Virtual machine consolidation is an appropriate solution to the trade-off between power consumption and service level agreement violation. The present study aimed to identify low, medium, and high load identification techniques, as well as the energy consumption and SLAv to minimize. In addition to the reduced costs of cloud providers, these techniques enhance the quality of the services demanded by the users. To this end, reallocation of resources to physical hosts was performed at the medium load level using a centralized method to classify the physical hosts. In addition, quartile was applied in each medium to reduce the energy consumption parameters and violation level. The three introduced SMT - NMT and FMT methods for reallocation of resources were tested and the best results were compared with previous methods.The proposed method was evaluated using the Cloudsim software with real Planet Lab data and five times run, the simulation results confirmed the efficiency of the proposed algorithm, which tradeoff between decreased the energy consumption and service level of agreement violation (SLAv) properly. Manuscript profile
      • Open Access Article

        14 - Providing a New Smart Camera Architecture for Intrusion Detection in Wireless Visual Sensor Network
        Meisam Sharifi Sani Amid Khatibi
        The wireless Visual sensor network is a highly functional domain of high-potential network generations in unpredictable and dynamic environments that have been deployed from a large number of uniform or non-uniform groups within the desired area, cause the realization o More
        The wireless Visual sensor network is a highly functional domain of high-potential network generations in unpredictable and dynamic environments that have been deployed from a large number of uniform or non-uniform groups within the desired area, cause the realization of large regulatory applications from the military and industrial domain to hospital and environment. Therefore, security is one of the most important challenges in these networks. In this research, a new method of routing smart cameras with the help of cloud computing technology has been provided. The framework in the cloud computing management layer increases security, routing, inter interaction, and other features required by wireless sensor networks. Systematic attacks are simulated by a series of standard data collected at the CTU University related to the Czech Republic with RapidMiner software. Finally, the accuracy of detection of attacks and error rates with the suggested NN-SVM algorithm, which is a combination of vector machines and neural networks, is provided in the smart cameras based on the visual wireless sensor networks in MATLAB software. The results show that different components of the proposed architecture meet the quality characteristics of visual wireless sensor networks. Detection of attacks in this method is in the range of 99.24% and 99.35% in the worst and best conditions, respectively. Manuscript profile
      • Open Access Article

        15 - Cloud Computing- The Business Perspective: Appropriate Strategies to Eliminate or Decrease of Weaknesses and Threats
        Maryam Ashoori Farid Khosh Alhan najme jooriyan
        Todays, Internet have been engulfed all aspects of our life. Cloud computing is the newest presenting of internet on the ubiquitous web. Cloud computing considered as a provider of host benefits and has addictive natural in information technology and Business world. Org More
        Todays, Internet have been engulfed all aspects of our life. Cloud computing is the newest presenting of internet on the ubiquitous web. Cloud computing considered as a provider of host benefits and has addictive natural in information technology and Business world. Organizations need to search extra addiction and considering real value of compounding cloud in business. Establishing business on cloud needed deployment models and cloud services. Also we can receive greater services by spending lower costs. This research has studied cloud system and its components, the business perspective, which is starting organization's business on cloud needed. In addition, concepts of core technology and SWOT analysis of small and medium organizations and available challenges have been explained in the world of cloud. Then, this paper has presented suggestive strategies for converting weaknesses to strengths and threats to opportunity. The proposed strategies help decreasing-cost and increasing productivity in organizations and normal users. They cause to improve profitability in business that they related to cloud computing. Manuscript profile
      • Open Access Article

        16 - Presenting a Model for Technology Transfer Governance of Cloud Computing
        mozhgan marashi neda abdolvand
        In recent years, developing countries have followed the use of technological advances and technology transfer of cloud computing is one of these innovations. Using innovations in the domain of information technology enables organizations to improve their economic status More
        In recent years, developing countries have followed the use of technological advances and technology transfer of cloud computing is one of these innovations. Using innovations in the domain of information technology enables organizations to improve their economic status. As a result, it is necessary for organizations to learn how to manage their process of technology transfer. Technology transfer governance is a new concept that can help organizations in this area. Implementation of technology transfer governance can reduce costs and increase productivity For Organizations and facilitate the progress of organizations towards a competitive advantage. In the scope of new technologies such as cloud computing that success and acceptance needs to overcome the challenges and risks that it is facing, Governance transfer processes of this technology can reduce these challenges. As a result, the use of cloud computing can be extended in organizations and organization will benefit from this extention. Current research objective is fundamental and the methodology used is qualitative–descriptive in which the Library Studies are conducted to collect information. Results of research is presentation of two models of governance.in presentation of these models the COBIT framework is used as an efficient and strong governance framework in the field of information technology. The first proposed model is for technology transfer governance and the second model for technology transfer governance of cloud computing Manuscript profile
      • Open Access Article

        17 - A New Architecture for Future: Innovative Business Model Based on Integrity of Cloud Computing and IOT
        sadaf zarrin mehrdad alimuhammadi seyyed hossein siadat
        The Internet of Things is a new innovation in the technology world and, although so far, has gained much progress with the support of many companies, but this is just the beginning of its growth. This paper considers the Internet of Things from business perspective and More
        The Internet of Things is a new innovation in the technology world and, although so far, has gained much progress with the support of many companies, but this is just the beginning of its growth. This paper considers the Internet of Things from business perspective and integration of it with cloud computing with focus on theoretical and practical aspects. By entering the Internet of things into different areas of knowledge and because of breadth of its data and information, and the increasing need for analysis and management of them, cloud computing as the only solution to provide software and hardware requirements will be introduced and evaluated in this paper. This integration, while having many benefits and improving many applications, faces challenges that will be discussed in this paper. This article is written through literature review among activists in this field and scientific resources. First, the ecosystem of Internet of things businesses is introduced with the aim of identifying the roles of this ecosystem, then the impact of the IOT on the components of the business model of the companies will be examined and, finally, a variety of business models of the Internet of things will be examined. In the following, the main architectures and platforms of this area are described. Finally, with respect to the article's approach, a business framework is introduced that can be used by developers as the starting point for creating applications from the Internet of things based on cloud computing. Manuscript profile
      • Open Access Article

        18 - Cloud Computing Technology in the Management of Human Resources for Small and Medium Enterprises - Applications, Advantages and Challenges
        Mona Kardani malekinezhad Mohammad Mahdi  Farahi
        In recent years, the advent of cloud computing has brought significant advances in the IT industry, and business management. One of the most important advantages of this technology is its reduced cost and the ability to seamlessly manage resources without the need for c More
        In recent years, the advent of cloud computing has brought significant advances in the IT industry, and business management. One of the most important advantages of this technology is its reduced cost and the ability to seamlessly manage resources without the need for costly deployment of multiple infrastructures and software, and is thus widely used in the deployment of management systems and systems in organizations. Cloud computing technology has also been widely used in human resource management systems. In many cases the implementation and deployment of multiple HRM systems and software, especially for small and medium-sized organizations, entails numerous costs. Cloud computing technology is a tool that allows organizations to form and manage management systems, including their own human resource management systems, in a seamless, low-cost cloud environment. The purpose of this study is to explore the applications, advantages and challenges of cloud computing technology in human resource management, and its implementation requirements especially in small and medium enterprises. The study was carried out through library method and literature review. And it has attempted to review how literature and the requirements of cloud computing are applied in human resource management by reviewing literature and research in this area. Based on the findings of this study, the applications of cloud computing in human resource management systems in SMEs are widespread. This technology can be used in talent recruitment, training and development of human resources, compensation management systems, and human resource management and evaluation. Also, the advantages and challenges of this technology in human resource management of small and medium-sized enterprises can be categorized into two general categories, including internal and external factors. Internal advantages and challenges include technical, security, human, and financial factors, and external factors include environmental and legal factors. The applications and advantages and challenges of this technology are described in detail in the HRM systems of SMEs. The findings of this study can serve as a basis for companies and organizations to manage small organizations using and utilizing cloud computing technology in human resource management systems. Manuscript profile
      • Open Access Article

        19 - Investigating the Effect of Cloud Computing on the e-Health System
        Mohsen Gharakhani Seyedeh OmSalameh  pourhashemi
        Cloud computing was proposed as a new paradigm to host and provide services via Internet. Cloud computing can have various advantages for organizations including reduction in costs and increased flexibility. Nonetheless, transition from the current system on the cloud c More
        Cloud computing was proposed as a new paradigm to host and provide services via Internet. Cloud computing can have various advantages for organizations including reduction in costs and increased flexibility. Nonetheless, transition from the current system on the cloud computing is not a simple task because it depends on various of factors. In this applied research, the main purpose is to investigate the influential factors in admission of e-health system based on cloud computing in a number of public hospitals in Tehran. In the present study, path analysis was done using the Analytic Hierarchy Process (AHP) and Partial Least Squares (PLS) to perceive the factors influencing the admission of cloud computing in e-health system from IT employees' viewpoint. Reviewing the related literature on Technology-Organization-Environment (TOE) Model and the theory of Diffusion of Innovations (DOI), four main factors and 17 sub criteria were identified. These factors and sub-criteria were determined according to comments of specialists, university professors and IT and health experts based on the Analytic Hierarchy Process and Partial Least Squares. Results show that environmental factors such as regulations, competitive pressure, commercial pressure and organizational structure, and technological factors such as accessibility, reliability, security, privacy and trust should be considered as organizational objectives when adopting the e-health system based on cloud computing. Results of the present study can play an important role in organizations such as the ministry of health and medical education that are concern about this issue. Manuscript profile
      • Open Access Article

        20 - Presenthing Metasynthesis and Interpretive Structural Modelling Approaches in Modeling the Cloud Business Intelligence in SMEs
        Fatemeh Hamidinava َAbdolhamid Ebrahimy ROOHALLAH SAMIEE HOSSEIN Dide Khani
        Tourism small and medium enterprises (TSMEs( are more responsive to market demand when compared with larger companies. And if they use business intelligence system, they can enjoy high competition. The cloud platform for implementing business intelligence reduces mainte More
        Tourism small and medium enterprises (TSMEs( are more responsive to market demand when compared with larger companies. And if they use business intelligence system, they can enjoy high competition. The cloud platform for implementing business intelligence reduces maintenance and implementation costs for these businesses.The globalization of the markets requires the adaptation of the firm for business sustainability . Cloud deployments of BI and analytics platforms have the potential to reduce cost of ownership and speed time to deployment. In order to subsist, TSMEs have to take advantage of the new technology and new concepts for survival .The statistical population in the qualitative phase included 19 academics and experienced experts in the area of business intelligence .chosen by the purposive sampling approach. Further, in the quantitative phase, 393 people among the mangers of small and medium-sized enterprises in the Mazandaran Province, Iran, were participated. In the current study, the Meta-synthesis method has been utilized to identify the fundamental categories of business intelligence (BI). Fuzzy Delphi method (FDM) has been applied for parameter validation purposes, and eventually, the Cloud business intelligence model has been presented through exploiting the interpretive structural modeling. Final indices, 6 main factors, 27 sub-factors and 34 identifiers were obtained. In this regard, the data analysis process has been performed by MATLAB and MicMac software. Our research has shown that the two main themes of business stimuli and characteristics have the highest influence on other variables.. Manuscript profile
      • Open Access Article

        21 - A Proposed Method of Decentralized Load Balancing Algorithm in Heterogeneous Cloud Environments
        S. Hourali S. Jamali F. Hourali
        One of the key strategies to improve the efficiency is load balancing. Choosing the appropriate VM to do any task, is function of various parameters such as the amount of required resources like CPU, memory, the size of VM resource, cost and maturity of VMs. In this pap More
        One of the key strategies to improve the efficiency is load balancing. Choosing the appropriate VM to do any task, is function of various parameters such as the amount of required resources like CPU, memory, the size of VM resource, cost and maturity of VMs. In this paper, by considering each of these criteria and design objectives such as load balancing, reducing the rate of create new VM, and VM migration, we modeling the problem in terms of effective parameters in performance. Then, we solving this model by using the PROMETHEE method, which is one of the most widely used method for MADM problems. In this method, selecting the best VM occurs based on the value assigned to each of criteria which is calculated based on fuzzy logic. To evaluate the performance of this approach, the necessary simulations have been carried out on CloudSim simulator and shown that the proposed method has better performance compared to FIFO, DLB and WRR methods on average in terms of response time, rate of success tasks, load variation and rate of VM migration. Manuscript profile
      • Open Access Article

        22 - Mobility-Aware and Fault-Tolerant Computation Offloading for Mobile Cloud Computing
        R. Roostaei Z. Movahedi
        Nowadays, Internet of Things (IoT) has emerged as an important field in information and communication technologies. Despite the progress of networks and communication technologies, the development of IoT has encountered some challenges mainly with regard to computation More
        Nowadays, Internet of Things (IoT) has emerged as an important field in information and communication technologies. Despite the progress of networks and communication technologies, the development of IoT has encountered some challenges mainly with regard to computation power, battery lifetime and memory of mobile devices. In order to overcome these challenges, mobile cloud computing has been raised which uses the cloud storage space and computation power to extend the capabilities of mobile devices. In this regard, some of application’s components are selected to be offloaded to the cloud in order to optimize the execution time and energy consumption of application. Since the mobility has an important effect on the acquired condition of the access network and the quality of the connection, the mobility should be considered while selecting components for offloading. Although a number of mobility-aware offloading approaches has been already proposed, these works suffer from the lack of an appropriate mobility-model, ignorance of the fault-tolerance capability and use of only coarse-grain offloading. In order to address these issues, we propose a mobility-aware offloading scheme which uses the user mobility Markov chain and the fault tolerance capability in order to optimize the offloading decision. Evaluation results show that our proposed method significantly outperforms the existing alternatives, reaching respectively up to 75 and 65 percent enhancement in terms of the execution time and the energy consumption. Manuscript profile
      • Open Access Article

        23 - Quality of Service Aware Service Composition Method Using Biogeography-Based Optimization (BBO) Algorithm
        S. Saligheh B. Arasteh
        Fast development in the utilization of cloud computing leads to publishing more cloud services on the cloud environment. The single and simple services cannot satisfy the users’ real-world complex requirements. To create a complex service, it is necessary to select and More
        Fast development in the utilization of cloud computing leads to publishing more cloud services on the cloud environment. The single and simple services cannot satisfy the users’ real-world complex requirements. To create a complex service, it is necessary to select and compose a set of simple services. Therefore, it is essential to embed a service composition system in cloud computing environment. Service composition is one of the important NP-hard problems in the service-oriented computings. In this paper, a biogeography-based optimization algorithm is used to create the optimal composite-services. The proposed method was simulated and executed on five different scenarios with different number of tasks and candidate services. The throughput of the proposed method, genetic algorithm and particle swarm optimization algorithm are respectively 0.9997, 0.9975 and 0.9994; furthermore, the reliability of these methods are respectively 0.9993, 0.9980 and 0.9982. The results of simulations indicate that the proposed method outperforms the previous methods in the same conditions in terms of throughput, successability, reliability, response time, and stability. Manuscript profile
      • Open Access Article

        24 - Green Cloud Computing with Reduced Energy Consumption in Live Migration Prioritizing Services
        Mohammad Rostami Salman Goli
        Today, the rapid growth in cloud computing resources usage has increased energy consumption in data centers. Green cloud computing goal is to decrease the energy consumption of data centers. In the meantime, service aggregation is a good method to reduce energy consumpt More
        Today, the rapid growth in cloud computing resources usage has increased energy consumption in data centers. Green cloud computing goal is to decrease the energy consumption of data centers. In the meantime, service aggregation is a good method to reduce energy consumption in these systems. Existing aggregation methods with unnecessary migration, the unbalanced workload of hosts, and ignoring the relationship between services may reduce the quality of service and increase energy consumption. Therefore, in this study, by migrating the necessary services based on priority (including the number of children, the level and communication cost of each service), from hosts with the unbalanced workload to hosts that contain partner services, the productivity of available resources is improved and the energy consumption is decreased. Live services migration based on prioritizing and minimizing the number of migrations can also lead to response time decrease and system efficiency increase. The proposed method can lead to an 11.79% decrease in energy consumption, a 12.15% reduction in the number of service migrations, and a 1.55% increase in the number of hosts that have been shut down. Manuscript profile
      • Open Access Article

        25 - Reliable and Energy Efficient Deployment Optimization of Internet of Things Applications in Cloud and Fog Infrastructure by Using Cuckoo Search Algorithm
        Yaser Ramzanpoor میرسعید حسینی شیروانی
        Deployment applications of internet of things (IoT) in fog infrastructure as cloud complementary leads effectively computing resource saving in cloud infrastructure. Recent research efforts are investigating on how to better exploit fog capabilities for execution and su More
        Deployment applications of internet of things (IoT) in fog infrastructure as cloud complementary leads effectively computing resource saving in cloud infrastructure. Recent research efforts are investigating on how to better exploit fog capabilities for execution and supporting IoT applications. Also, the distribution of an application’s components on the possible minimum number of fog nodes for the sake of reduction in power consumption leads degradation of the service reliability level. In this paper, a hybrid meta-heuristic algorithm based on cuckoo search algorithm is presented for static deployment the components of IoT applications on fog infrastructure in the aim of trade-off between efficient power usage, reduction in the effect of one point of failure and boosting the application reliability against failure. The results of simulations show that the proposed approach in this paper reduces the power consumption of fog network and meets the quality of service requirement of IoT application with the high reliability level. Manuscript profile
      • Open Access Article

        26 - Multi-Objective Optimization Solution for Virtual Machine Placement Problem in Cloud Datacenters with Minimization of Power Consumption and Resource Dissipation Perspectives by Simulated Annealing Algorithm
        Mirsaeid Hosseini Shirvani
        Nowadays, cloud computing industry has been transformed to a new supply chain between cloud service providers and service requesters. To this end, cloud service provisioning in datacenters is procured via virtualization platforms in which it can potentially increase the More
        Nowadays, cloud computing industry has been transformed to a new supply chain between cloud service providers and service requesters. To this end, cloud service provisioning in datacenters is procured via virtualization platforms in which it can potentially increase the utilization of computing resources at infrastructure level. Inefficient virtual machine placement (VMP) schemes lead lower system utilization, increase of resource dissipation, and high rate of power consumption. Therefore, this paper formulates VMP problem on physical machines of cloud datacenters to a multi-objective optimization problem with minimization of both power consumption and resource dissipation perspectives which is computationally NP-Hard. Since the most meta-heuristic algorithms are designed for continuous optimization problems and are also susceptible to get stuck in local optimum, to figure out this combinatorial problem an optimization algorithm based on simulated annealing algorithm commensurate with discrete search space of stated problem is extended, so that the possibility of getting stuck in local optimum is reduced. To validate the proposed approach, several scenarios are introduced and conducted. Reported results from simulation of different scenarios show that the proposed approach outperforms against other existing approaches in terms of reduction in power consumption, resource dissipation, and the number of active server in use. Manuscript profile
      • Open Access Article

        27 - Provide an Energy-aware Markov Based Model for Dynamic Placement of Virtual Machines in Cloud Data Centers
        mehdi rajabzadeh Abolfazl Toroghi Haghighat Amir Masoud Rahmani
        The use of energy-conscious solutions is one of the important research topics in the field of cloud computing. By effectively using virtual machine placement and aggregation algorithms, cloud suppliers will be able to reduce energy consumption. In this paper, a new mode More
        The use of energy-conscious solutions is one of the important research topics in the field of cloud computing. By effectively using virtual machine placement and aggregation algorithms, cloud suppliers will be able to reduce energy consumption. In this paper, a new model is presented that seeks to achieve the desired results by improving the algorithms and providing appropriate methods. Periodic monitoring of resource status, proper analysis of the data obtained, and prediction of the critical state of the servers using the proposed Markov model have reduced the number of unnecessary migrations as much as possible. The combination of genetic algorithm and simulated annealing in the replacement section along with the definition of the adsorbent Markov chain has resulted in better and faster performance of the proposed algorithm. Simulations performed in different scenarios in CloudSim show that compared to the best algorithm compared, at low, medium and high load, energy consumption has decreased significantly. Violations of service level agreements also fell by an average of 17 percent. Manuscript profile
      • Open Access Article

        28 - BOM Model; Designing and Presenting Learning Services based on Cloud Computing by Learning Service Providers
        Dr Firouz Nouri Kalkhoran Kurosh Fathi Vajargah Abasalt Khorasani Amir reza Asnafi
        Cloud computing and cloud services, as a technological solution to the development of educational services, can be very useful in accelerating and expanding services for this type of activities. This study aims to provide a coherent model for the design and delivery of More
        Cloud computing and cloud services, as a technological solution to the development of educational services, can be very useful in accelerating and expanding services for this type of activities. This study aims to provide a coherent model for the design and delivery of services provided by Learning Service Providers (LSPs) based on the capabilities of cloud computing for human resources training and learning. To achieve this, a mixed approach and the theoretical research method were adopted. To identify the elements of the model for designing and delivering cloud-based learning services, we organized semi-structured interviews with specialists in organizational learning and business education. The participants in the interview process were selected using the theoretical sampling method. The interviews were organized using the open coding method. The test-retest reliability method was used in this study to measure the reliability of the coding process used in the specialized interviews. The consistency level (PAQ) was equal to 0.83, indicating a high level of internal consistency. In the second phase, the structure and method of Interactive Management (IM) and the Interpretive Structural Modeling (ISM) software were used for integrating the data and determining the relationship between the elements of the model. In the third section, related to the quantitative part of the research, the Analytic Hierarchy Process (AHP) and Expert Choice software were used to weigh the model design and cloud computing-based learning service delivery elements. Then, a comprehensive model called BOM was presented for the delivery of cloud computing-based learning services. The main elements of the model in the order of weight and level of importance in the model include the tools and mechanisms of technological learning (0.215), establishment of a curriculum planning system (0.208), design of learning services (0.151), learning support services (0.105), learning system performance evaluation (0.074), incentive mechanisms and tools for the use of cloud space for learning (0.068), legal dimensions of the use of cloud space (0.046), learning services business management (0.040), curriculum assessment (0.038), and marketing , advertising and sales of learning services (0.033). Manuscript profile
      • Open Access Article

        29 - Improve security in cloud computing infrastructure using block chain protocol
        Mohsen Gerami Vahid Yazdanian Siavash Naebasl
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloadi More
        Security in cloud computing is very important, cloud computing security is a set of computer security and network security in general is information security and when a processing task by using the virtual machine scheduling algorithm in the cloud for processing Unloading will be This virtual machine will not be able to distinguish the normal mobile user from attackers, thus violating the privacy and security of the transmitted data, so after determining the unloading strategy, the China block can be used in information security. And the information of each server is encapsulated and unloaded in the form of a block. In this research, a proposed solution is presented, which is the combination of China blockchain and cloud computing to increase security and efficiency. The proposed solution is implemented and evaluated in order to evaluate its efficiency increase compared to other existing solutions. Manuscript profile
      • Open Access Article

        30 - Modeling Cloud Accounting Risk Reduction Strategies with a Structural-Interpretive Approach
        sakineh tajari Ali Khozein majid ashrafi Jamadverdi   Gorganli Davaji
        Cloud accounting not only introduces specific risks to the accounting process, but also some of the known risks associated with other cloud-based applications. Considering the great importance of risk reduction strategies in accepting cloud accounting, the aim of this s More
        Cloud accounting not only introduces specific risks to the accounting process, but also some of the known risks associated with other cloud-based applications. Considering the great importance of risk reduction strategies in accepting cloud accounting, the aim of this study is to investigate the strategies for reducing cloud accounting risks in Iran using structural-interpretive modeling. the research methodology is a combination of qualitative and quantitative methods that are used to collect the components of strategies for reducing cloud accounting risks from a qualitative method by examining theoretical foundations and performing fuzzy Delphi analysis with the participation of 16 accounting faculty members as experts. In a small part, through the formation of its own structural interaction matrix, it seeks structural-interpretive modeling, which has been done in this part with the participation of 12 faculty members in the field of accounting. the results show that the most basic strategies to reduce cloud accounting risks are based on the prioritization of the acceptance plan. Also at the highest level and least effective strategies to reduce the risks of cloud accounting is to provide timely and adequate training for employees. the most important strategy is to reduce the risks of cloud accounting and should be considered more than other strategies. research findings can fill the research gap in the field of cloud accounting and be useful for managers in decision making. Manuscript profile
      • Open Access Article

        31 - TPALA: Two Phase Adaptive Algorithm based on Learning Automata for job scheduling in cloud Environment
        Abolfazl Esfandi Javad Akbari Torkestani Abbas Karimi Faraneh Zarafshan
        Due to the completely random and dynamic nature of the cloud environment, as well as the high volume of jobs, one of the significant challenges in this environment is proper online job scheduling. Most of the algorithms are presented based on heuristic and meta-heuristi More
        Due to the completely random and dynamic nature of the cloud environment, as well as the high volume of jobs, one of the significant challenges in this environment is proper online job scheduling. Most of the algorithms are presented based on heuristic and meta-heuristic approaches, which result in their inability to adapt to the dynamic nature of resources and cloud conditions. In this paper, we present a distributed online algorithm with the use of two different learning automata for each scheduler to schedule the jobs optimally. In this algorithm, the placed workload on every virtual machine is proportional to its computational capacity and changes with time based on the cloud and submitted job conditions. In proposed algorithm, two separate phases and two different LA are used to schedule jobs and allocate each job to the appropriate VM, so that a two phase adaptive algorithm based on LA is presented called TPALA. To demonstrate the effectiveness of our method, several scenarios have been simulated by CloudSim, in which several main metrics such as makespan, success rate, average waiting time, and degree of imbalance will be checked plus their comparison with other existing algorithms. The results show that TPALA performs at least 4.5% better than the closest measured algorithm. Manuscript profile
      • Open Access Article

        32 - A Multi-Objective Differential Evolutionary Algorithm-based Approach for Resource Allocation in Cloud Computing Environment
        Saeed Bakhtiari Mahan Khosroshahi
        In recent years, the cloud computing model has received a lot of attention due to its high scalability, reliability, information sharing and low cost compared to separate machines. In the cloud environment, scheduling and optimal allocation of tasks affects the effectiv More
        In recent years, the cloud computing model has received a lot of attention due to its high scalability, reliability, information sharing and low cost compared to separate machines. In the cloud environment, scheduling and optimal allocation of tasks affects the effective use of system resources. Currently, common methods for scheduling in the cloud computing environment are performed using traditional methods such as Min-Min and meta-heuristic methods such as ant colony optimization algorithm (ACO). The above methods focused on optimizing one goal and do not estimate multiple goals at the same time. The main purpose of this research is to consider several objectives (total execution time, service level agreement and energy consumption) in cloud data centers with scheduling and optimal allocation of tasks. In this research, multi-objective differential evolution algorithm (DEA) is used due to its simple structure features and less adjustable parameters. In the proposed method, a new approach based on DEA to solve the problem of allocation in cloud space is presented which we try to be effective in improving resource efficiency and considering goals such as time, migration and energy by defining a multi-objective function and considering mutation and crossover vectors. The proposed method has been evaluated through a CloudSim simulator by testing the workload of more than a thousand virtual machines on Planet Lab. The results of simulation show that the proposed method in comparison with IqrMc, LrMmt and FA algorithms, in energy consumption by an average of 23%, number of migrations by an average of 29%, total execution time by an average of 29% and service level agreement violation (SLAV) by an average of 1% has been improved. In this case, use of the proposed approach in cloud centers will lead to better and appropriate services to customers of these centers in various fields such as education, engineering, manufacturing, services, etc. Manuscript profile
      • Open Access Article

        33 - An Intelligent Pricing System for Cloud Services aims at Increasing Implementation Simplicity and Flexibility
        Mahboubeh Zandieh Sepideh Adabi Samaneh Yazdani
        Most of the previous pricing models for cloud resources which are defined based on auction suffer from high implementation complexity in real cloud environments. Therefore, the main challenge for researchers is to design dynamic pricing models that can achieve three goa More
        Most of the previous pricing models for cloud resources which are defined based on auction suffer from high implementation complexity in real cloud environments. Therefore, the main challenge for researchers is to design dynamic pricing models that can achieve three goals: 1) low computation complexity, 2) high accuracy, and 3) high implementation simplicity in real cloud environments. CMM (Cloud Market Maker) is one of the most popular dynamic pricing models that has two advantages of computation accuracy and the possibility to implement in the real cloud environments. This model calculates the bid price based on a linear function. In designing this linear function, the parameters: buyer’s urgency, number of competitors and number of opponents are considered. Despite the advantages of this pricing function, the importance ratio of the constructor parameters of it is considered the same in various market conditions. Ignoring this issue reduces both system flexibility and computation accuracy in tangible changes in the cloud market. Therefore, the authors of this paper focus on designing a new cloud market-aware intelligent pricing system (which developed in customer side of the market) to tackle the mentioned problem. At the same time, high implementation simplicity of the proposed system should be guaranteed. For this purpose, an agent-based intelligent pricing system by combining support vector machine (SVM) and hierarchical analysis process (AHP) techniques is proposed. Simulation results show the better performance of the proposed solution which is named as DPMA in comparison to CMM. Manuscript profile
      • Open Access Article

        34 - A review of the application of meta-heuristic algorithms in load balancing in cloud computing
        Mehdi Morsali Abolfazl Toroghi Haghighat Sasan Hosseinali-Zade
        By widespread use of cloud computing, the need to improve performance and reduce latency in the cloud increases. One of the problems of distributed environments, especially clouds, is unbalanced load which results in reducing speed and efficiency and increasing delay in More
        By widespread use of cloud computing, the need to improve performance and reduce latency in the cloud increases. One of the problems of distributed environments, especially clouds, is unbalanced load which results in reducing speed and efficiency and increasing delay in data storage and retrieval time. Various methods for load balancing in the cloud environment have been proposed, each of which has addressed the issue from its own perspective and has its advantages and disadvantages. In this research, we first provide some criteria for measuring load balance in the cloud and then examine the use of Metaheuristic methods in load balancing in the cloud environment. After introducing Metaheuristic load balancing methods, we have compared them based on the aforementioned criteria and discussed the advantages and disadvantages of each. Ant Colony Algorithms, Artificial Ant Colony, Bee Colony, Artificial Bee Colony, Bee Foraging Algorithm, Particle Swarm, Cat Swarm, Simulated Annealing, Genetic Algorithm, Tabu Search, Fish Swarm and Hybrid Algorithms and etc. examined in this research. Manuscript profile
      • Open Access Article

        35 - An approach to prioritize quality dimensions of based on cloud computing using Multiple Criteria Decision Making method
        Zahra Abbasi Somayeh Fatahi Mohammad Javad  Ershadi
        Today, quality is one of the most important factors in attracting customer satisfaction and loyalty to service organizations. Therefore, one of the main concerns of managers is to improve the quality of services. With the development of the Internet and the world of com More
        Today, quality is one of the most important factors in attracting customer satisfaction and loyalty to service organizations. Therefore, one of the main concerns of managers is to improve the quality of services. With the development of the Internet and the world of communications, a concept called cloud computing has expanded in the world of communications, which provides a new model for the supply, consumption and delivery of computing services. The purpose of this study is to make the optimal decision in choosing the appropriate cloud service according to the conditions of users so that they achieve the highest satisfaction. Fuzzy Delphi method, fuzzy hierarchical analysis method, fuzzy TOPSIS method and finally multi-criteria decision making method are the methods used in this research. The results of the fuzzy Delphi method show that the indicators of transparency, accessibility and reliability should be eliminated. The results of fuzzy hierarchical analysis identified the cost index as the most important index and the support index during demand as the least important index. According to the results of fuzzy TOPSIS based on the weights obtained from fuzzy hierarchical analysis, SAAS, IAAS and PAAS cloud services were ranked first to third, respectively. Using the SAAS service provides numerous benefits to employees and companies, such as reducing time and money spent on time-consuming tasks such as installing, managing, and upgrading software. Manuscript profile
      • Open Access Article

        36 - Fuzzy Multicore Clustering of Big Data in the Hadoop Map Reduce Framework
        Seyed Omid Azarkasb Seyed Hossein Khasteh Mostafa  Amiri
        A logical solution to consider the overlap of clusters is assigning a set of membership degrees to each data point. Fuzzy clustering, due to its reduced partitions and decreased search space, generally incurs lower computational overhead and easily handles ambiguous, no More
        A logical solution to consider the overlap of clusters is assigning a set of membership degrees to each data point. Fuzzy clustering, due to its reduced partitions and decreased search space, generally incurs lower computational overhead and easily handles ambiguous, noisy, and outlier data. Thus, fuzzy clustering is considered an advanced clustering method. However, fuzzy clustering methods often struggle with non-linear data relationships. This paper proposes a method based on feasible ideas that utilizes multicore learning within the Hadoop map reduce framework to identify inseparable linear clusters in complex big data structures. The multicore learning model is capable of capturing complex relationships among data, while Hadoop enables us to interact with a logical cluster of processing and data storage nodes instead of interacting with individual operating systems and processors. In summary, the paper presents the modeling of non-linear data relationships using multicore learning, determination of appropriate values for fuzzy parameterization and feasibility, and the provision of an algorithm within the Hadoop map reduce model. The experiments were conducted on one of the commonly used datasets from the UCI Machine Learning Repository, as well as on the implemented CloudSim dataset simulator, and satisfactory results were obtained.According to published studies, the UCI Machine Learning Repository is suitable for regression and clustering purposes in analyzing large-scale datasets, while the CloudSim dataset is specifically designed for simulating cloud computing scenarios, calculating time delays, and task scheduling. Manuscript profile
      • Open Access Article

        37 - WSTMOS: A Method For Optimizing Throughput, Energy, And Latency In Cloud Workflow Scheduling
        Arash Ghorbannia Delavar Reza Akraminejad sahar mozafari
        Application of cloud computing in different datacenters around the world has led to generation of more co2 gas. In addition, energy and throughput are the two most important issues in this field. This paper has presented an energy and throughput-aware algorithm for sche More
        Application of cloud computing in different datacenters around the world has led to generation of more co2 gas. In addition, energy and throughput are the two most important issues in this field. This paper has presented an energy and throughput-aware algorithm for scheduling of compressed-instance workflows in things-internet by cluster processing in cloud. A method is presented for scheduling cloud workflows with aim of optimizing energy, throughput, and latency. In the proposed method, time and energy consumption has been improved in comparison to previous methods by creating distance parameters, clustering inputs, and considering real execution time. In WSTMOS method by considering special parameters and real execution time, we managed to reach the optimized objective function. Moreover, in the proposed method parameter of time distance of tasks to virtual machines for reduction of number of migration in virtual machines was applied. In WSTMOS method by organizing the workflow inputs to low, medium and heavy groups and also by distributing appropriate load on more suitable servers for processors threshold, we accomplished to optimize energy and cost. Energy consumption was reduced by 4.8 percent while the cost was cut down by 4.4 percent using this method in comparison to studied method. Finally, average delay time, power and workload are optimized in comparison to previous methods. Manuscript profile
      • Open Access Article

        38 - Improving the load balancing in Cloud computing using a rapid SFL algorithm (R-SFLA)
        Kiomars Salimi Mahdi Mollamotalebi
        Nowadays, Cloud computing has many applications due to various services. On the other hand, due to rapid growth, resource constraints and final costs, Cloud computing faces with several challenges such as load balancing. The purpose of load balancing is management of th More
        Nowadays, Cloud computing has many applications due to various services. On the other hand, due to rapid growth, resource constraints and final costs, Cloud computing faces with several challenges such as load balancing. The purpose of load balancing is management of the load distribution among the processing nodes in order to have the best usage of resources while having minimum response time for the users’ requests. Several methods for load balancing in Cloud computing have been proposed in the literature. The shuffled frog leaping algorithm for load balancing is a dynamic, evolutionary, and inspired by nature. This paper proposed a modified rapid shuffled frog leaping algorithm (R-SFLA) that converge the defective evolution of frogs rapidly. In order to evaluate the performance of R-SFLA, it is compared to Shuffled Frog Leaping Algorithm (SFLA) and Augmented Shuffled Frog Leaping Algorithm (ASFLA) by the overall execution cost, Makespan, response time, and degree of imbalance. The simulation is performed in CloudSim, and the results obtained from the experiments indicated that the proposed algorithm acts more efficient compared to other methods based on the above mentioned factors. Manuscript profile