0% Complete
English
صفحه اصلی
/
سیزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A clonal selection mechanism for load balancing in the cloud computing system
نویسندگان :
Melika Mosayyebi
1
Reza Azmi
2
1- دانشگاه الزهرا
2- دانشگاه الزهرا
کلمات کلیدی :
Cloud Computing،Load Balance،Clonal Selection،Virtual Machines،Cloud Analyst
چکیده :
Clients demand more services and better results as cloud computing expand quickly. As a result, the load balance management component in cloud computing systems should be able to redistribute resources by user needs. The massive increase in users using cloud services increases the load on the cloud, making its management difficult. Load balancing is therefore suggested as a way to handle the excess load on the cloud. Algorithms for load balancing are the basis of load balancing. Effective load balancing and job scheduling techniques have been proposed for this reason. The main requirement of cloud computing is to share and supply computing resources, such as virtual machines, based on user demand. In the cloud, load-balancing algorithms can be used to allocate virtual machines to user requests. Requests are planned as the number of users grows, and as the number of requests grows, some scheduling algorithms in cloud computing struggle to serve users' needs effectively. As a result, effective algorithms are required to reduce processing expenses, calculation time, and energy consumption. To address these objectives, hybrid algorithms were developed. For the clonal selection algorithm, load-balancing techniques are used in this research. This novel strategy is also tested using a cloud Analyst simulator. Finally, the findings are examined and contrasted with prior research.
لیست مقالات
لیست مقالات بایگانی شده
شناسایی جایگاه مالونیلاسیون در پروتئینها با بهرهگیری از استخراج ویژگی و تکنیکهای پردازش زبان طبیعی
حنانه رجبیون - محمد قاسم زاده - وحید رنجبر بافقی
TDO-SA-PINN: A Co-Evolutionary Framework for Physics-Informed Neural Networks
SeyedMohammadReza AhmadEnjavi - Masoud Shafiee
طراحی سیستم پشتیبانی تجاری با استفاده از فناوری هوش مصنوعی
سجاد قطعی - زهره عربی - محمد روحی
Cryptanalysis of two password authenticated key exchange schemes
Mohammad Ali Poorafsahi - Hamid Mala
Violence detection using one-dimensional convolutional networks
Narges Honarjoo - Ali Abdari - Dr Azadeh Mansouri
Intent-Based Classification of Multi-Stage Cyber Attacks Using Attacker TTPs and Machine Learning
Fatemeh Imanimehr - Hamed Ebrahimi
Business Process Improvement Challenges: A Systematic Literature Review
Hanieh Kashfi - Fereidoon Shams Aliee
چارچوب پیشبینی خرابی تطبیقی مبتنی بر شبکه عصبی گراف پویا و GRU در سامانههای صنعتی IIoT
رسول اسماعیلی فرد - لیلا رنجبر
Customer Churn Prediction Using Data Mining Techniques for an Iranian Payment Application
Olya Rezaeian - Dr ُSeyedhamidreza Shahabi Haghighi - Dr Jamal Shahrabi
بهبود دقت و کارایی در شبکههای عصبی کانولوشنی با استفاده از روشهای محاسبات تقریبی
محمدرضا رفیعی نژاد - محمدرضا بینش مروستی - سید امیر اصغری
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2