99 results on '"Mohammad Masdari"'
Search Results
2. Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives
- Author
-
Danial Javaheri, Saeid Gorgin, Jeong-A Lee, and Mohammad Masdari
- Subjects
Information Systems and Management ,Artificial Intelligence ,Control and Systems Engineering ,Software ,Computer Science Applications ,Theoretical Computer Science - Published
- 2023
- Full Text
- View/download PDF
3. MOAEOSCA: an enhanced multi-objective hybrid artificial ecosystem-based optimization with sine cosine algorithm for feature selection in botnet detection in IoT
- Author
-
Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, and Mohammad Masdari
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Media Technology ,Software - Published
- 2022
- Full Text
- View/download PDF
4. A Hybrid Marine Predator Algorithm for Thermal-aware Routing Scheme in Wireless Body Area Networks
- Author
-
Tao Hai, Jincheng Zhou, Mohammad Masdari, and Haydar Abdulameer Marhoon
- Subjects
Biophysics ,Bioengineering ,Biotechnology - Published
- 2022
- Full Text
- View/download PDF
5. BFRA: A New Binary Hyper-Heuristics Feature Ranks Algorithm for Feature Selection in High-Dimensional Classification Data
- Author
-
Aitak Shaddeli, Farhad Soleimanian Gharehchopogh, Mohammad Masdari, and Vahid Solouk
- Subjects
Computer Science (miscellaneous) - Abstract
Feature selection is one of the main issues in machine learning algorithms. In this paper, a new binary hyper-heuristics feature ranks algorithm is designed to solve the feature selection problem in high-dimensional classification data called the BFRA algorithm. The initial strong population generation is done by ranking the features based on the initial Laplacian Score (ILR) method. A new operator called AHWF removes the zero-importance or redundant features from the population-based solutions. Another new operator, AHBF, selects the key features in population-based solutions. These two operators are designed to increase the exploitation of the BFRA algorithm. To ensure exploration, we introduced a new operator called BOM, a binary counter-mutation that increases the exploration and escape from the BFRA algorithm’s local trap. Finally, the BFRA algorithm was evaluated on 26 high-dimensional data with different statistical criteria. The BFRA algorithm has been tested with various meta-heuristic algorithms. The experiments’ different dimensions show that the BFRA algorithm works like a robust meta-heuristic algorithm in low dimensions. Nevertheless, by increasing the dataset dimensions, the BFRA performs better than other algorithms in terms of the best fitness function value, accuracy of the classifiers, and the number of selected features compared to different algorithms. However, a case study of sentiment analysis of movie viewers using BFRA proves that BFRA algorithms demonstrate affordable performance.
- Published
- 2022
- Full Text
- View/download PDF
6. An improved moth flame optimization algorithm based on modified dynamic opposite learning strategy
- Author
-
Saroj Kumar Sahoo, Apu Kumar Saha, Sukanta Nama, and Mohammad Masdari
- Subjects
Linguistics and Language ,Artificial Intelligence ,Language and Linguistics - Published
- 2022
- Full Text
- View/download PDF
7. A Botnet Detection in IoT Using a Hybrid Multi-objective Optimization Algorithm
- Author
-
Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, and Mohammad Masdari
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Software ,Theoretical Computer Science - Published
- 2022
- Full Text
- View/download PDF
8. Cluster-Based Routing Schema Using Harris Hawks Optimization in the Vehicular Ad Hoc Networks
- Author
-
Behbod Kheradmand, Ali Ghaffari, Farhad Soleimanian Gharehchopogh, and Mohammad Masdari
- Subjects
Article Subject ,Computer Networks and Communications ,Electrical and Electronic Engineering ,Information Systems - Abstract
Today, intelligent transportation systems (ITS) have received a lot of attention due to their significant impact on increasing the safety, efficiency, and convenience of transportation. One of the main applications of ITS is vehicular ad hoc networks (VANETs). In particular, a more flexible, reliable, real-time, and scalable routing scheme across the large urban areas is one of the most critical issues for VANETs. Past VANET routing methods have various technical issues with VANET evolutions. On the other hand, clustering improves the reliability and scalability of routing schemes in VANETs. In this paper, a cluster-based, Traffic-aware and Low-Latency Routing Schema (TaLAR) is proposed for VANETs. In the proposed scheme, the Harris hawks optimization (HHO) algorithm is used to select cluster head (CH) nodes by considering appropriate parameters such as intracluster distance, link reliability, and relative speed of vehicles. The path between source and destination CH nodes is identified by using the HHO algorithm; it chooses the appropriate route based on link reliability and intercluster distance. Also, in the interconnection area, a traffic-aware and reliable route is identified by using a digital map of the streets and the Dijkstra algorithm. The performance evaluation of the proposed scheme is analyzed in terms of packet delivery rate (PDR), average end-to-end delay, and throughput. The output of the proposed scheme is compared with the Clustering Routing Based on PSO (Particle Swarm Optimization) (CRBP) and Grey Wolf Optimization Based Clustering in Vehicular Ad Hoc Network (GWOCENT) methods. Simulation results show that the proposed scheme improves PDR (22 and 19%), throughput (25 and 21%), and average end-to-end delay (23 and 18%).
- Published
- 2022
- Full Text
- View/download PDF
9. QFS-RPL: RPL Based Energy and Mobility Aware Multi Path Routing Protocol for the Internet of Mobile Things Data Transfer Infrastructures
- Author
-
Mahmoud Alilou, Amin Babazadeh Sangar, Kambiz Majidzadeh, and Mohammad Masdari
- Abstract
The Internet of Things (IoT) is a network of various interconnected objects capable of collecting and exchanging data without human interaction. These objects have limited processing power, storage space, memory, bandwidth and energy. Therefore, due to these limitations, data transmission and routing are challenging issues where data collection and analysis methods are essential. The Routing Protocol for Low-power and Lossy Networks (RPL) is one of the best alternatives to ensure routing in LoWPAN6 networks. However, RPL lacks scalability and basically designed for non-dynamic devices. Another drawback of the RPL protocol is the lack of load balancing support, leading to unfair distribution of traffic in the network that may decrease network efficiency. This study proposes a novel RPL-based routing protocol, QFS-RPL, using Q-learning algorithm policy and ideation from the Fisheye State Routing (FSR) protocol. The proposed QFS-RPL is as lightweight and agile as the standardized RPL and partially outperforms the mRPL protocol on mobile networks. This method supports multi-path routing, and at any given time in the network lifetime, all possible paths for sending data from any node to the sink are available. Therefore, QFS-RPL provides high resilience against errors, failures, and sudden network changes. To evaluate the performance of the proposed method, the Contiki operating system and Cooja simulator have been used in scenarios with mobile and stationary nodes and random network topologies. The results have been compared with RPL and mRPL. We have developed an algorithm for ease of data transfer in the IoT, which provides better performance than existing protocols, especially when dealing with a mobile network. The performance evaluation criteria considered for simulation are load balancing, energy consumption, number of table entries, Packet Delivery Ratio (PDR), End-to-End (E2E) latency, network throughput, convergence speed, and control packet overhead.
- Published
- 2023
- Full Text
- View/download PDF
10. An Improved hybrid Salp Swarm Optimization and African Vulture Optimization Algorithm for Global Optimization Problems and Its Applications in Stock Market Prediction
- Author
-
Ali Alizadeh, Farhad Soleimanian Gharehchopogh, Mohammad Masdari, and Ahmad Jafarian
- Abstract
Optimization is necessary for solving and improving the solution of various complex problems. Every meta-heuristic algorithm can have a weak point, and multiple mechanisms and methods can be used to overcome these weaknesses. We can use hybrid meta-heuristic algorithms to arrive at an efficient algorithm. This paper presents a new and intelligent approach by hybridizing meta-heuristic algorithms and using different mechanisms simultaneously without significantly increasing the time complexity. For this purpose, two algorithms, Salp Swarm Optimization(SSO) and the African Vulture Optimization Algorithm (AVOA) have been hybridized. And to improve the optimization process of the Modified Choice Function and Learning Automata mechanisms. In addition, two other improving mechanisms, named Opposition-Based Learning (OBL) and β-hill climbing (BHC) technique, have been presented and integrated with the AVOA-SSA algorithm. Fifty-two standard benchmarks were used to test and evaluate the AVOA-SSA algorithm. Finally, an improved version of the Extreme Learning Machine(ELM) classifier has been used with real stock market data for stock market prediction. The obtained results indicate the excellent and acceptable performance of the AVOA-SSA algorithm in `solving optimization problems and has been able to achieve high-quality solutions.
- Published
- 2023
- Full Text
- View/download PDF
11. A novel feature selection algorithm for IoT networks intrusion detection system based on parallel CNN-LSTM model
- Author
-
Roya Zareh Farkhady, Kambiz Majidzadeh, Mohammad Masdari, and Ali Ghaffari
- Abstract
As the Internet of Things networks expand globally, it is becoming increasingly important to protect against threats. one of the main reasons for the high number of false positives and low detection rates is the presence of redundant and irrelevant features. To address this problem, we propose a binary chimpanzee optimization algorithm for the feature selection process. This paper presents accurate network-based intrusion detection network, named parallel convolutional neural network long and short-term memory network branch, which has two branches. The input vector of the network is permuted in a 3-dimention space. This allows the model to extract highly discriminative features using a small number of layers. On the second branch, we used long and short-term memory network in parallel. The efficacy of the proposed deep model has been evaluated using three benchmark internet of things intrusion detection datasets, namely ToN-IoT, UNSW-NB15, and IoTID20 datasets. The experimental results demonstrated that the proposed binary chimpanzee optimization approach reduces about 60% of features, and the effectiveness of the proposed model was demonstrated by experimental results showing a high detection rate, high accuracy, and a relatively low false positive rate, which are measured as 99.54%, 99.56%, and 0.024 in the ToN-IoT and 99.79%, 99.78%, and 0.0032 in UNSW-NB15 and 100%, 100%, and zero in IoTID20 datasets, respectively.
- Published
- 2023
- Full Text
- View/download PDF
12. Network-on-chip router input port architectures
- Author
-
elnaz shafigh fard, mohammad ali jabrael jamali, mohammad masdari, and kambiz majidzadeh
- Abstract
With the increase in the number of processing cores on a chip, a highly efficient and scalable structure such as a network on a chip was proposed. Network-on-chip is a technology presented to solve the limitations of system-on-chip that includes a set of multiprocessors. In network-on-chip systems, delay in communication and reaching the ideal speed is one of the concerns of academic and industrial researchers today. Although network-on-chip offers a favorable solution to reduce the problem of the long delay of wires compared to traditional structures, communication delay is still a challenge. In this article, the various types of network router input ports architecture on the chip are reviewed and the operational comparison and evaluation of the technologies proposed in this field are mentioned.
- Published
- 2022
- Full Text
- View/download PDF
13. RR-SFVP: Design of arbitration unit based on Round Robin method with Strong Fairness and Variable Priority for NoC Router
- Author
-
Elnaz Shafigh fard, Mohammad Ali Jabraeil Jamali, Mohammad Masdari, and Kambiz Majidzadeh
- Abstract
Network on chip (NoC) is one of the communicative structures for multiple cores that has scalability. In designing the NoC micro-router architecture, the arbitration unit is very important due to its significant impact on performance, chip occupation level and NoC power consumption. In this paper, a router arbitration architecture is proposed with a combination of variable priority arbitration and Round Robin. In this architecture, arbitration examines the requests of other channels based on the Round Robin index after requesting the flit to exit the virtual channel in addition to checking the availability of the relevant virtual channel.The simulation results show that the architecture of the RR-SFVP arbitration unit compared to the standard RR method, is 13.7% smaller in area and has 5.7% less power consumption and 53.7% less critical path delay.
- Published
- 2022
- Full Text
- View/download PDF
14. Energy-Aware Computation Offloading in Mobile Edge Computing Using Quantum-Based Arithmetic Optimization Algorithm
- Author
-
Mohammad Masdari, Kambiz Majidzadeh, Elahe Doustsadigh, Amin Babazadeh, and Reza Asemi
- Abstract
The Internet of Things (IoT) has rapidly grown recently, and mobile devices (MDs) have encountered widespread usage. All of these cause an increase in the demand for more powerful computing resources. Meanwhile, a new concept called mobile edge computing (MEC) was introduced as a promising technology to access powerful computing resources closer to the user side for a quick and effective response, especially for time-intensive applications. Task offloading has emerged as a solution to allocate resources among computing resources of smart devices or computational resources available in MEC. This study presents a new binary quantum approach based on an arithmetic optimization algorithm (BQAOA) for computational tasks offloading decisions on MDs with low complexity and guaranteed convergence. However, since task offloading is an NP-hard problem, there is a need to use methods that provide the optimal possible solution for various quality criteria, including response time and energy consumption. Indeed, this is where the advantages of arithmetic optimization algorithms (AOA) and quantum computing have been used to improve the performance of MDs. This paper introduces a 2-tier architecture from the user to the cloud computing server-side. Also, a Markov model is proposed to compute the average network bandwidth in the offloading problem. The proposed BQAOA is compared with the best state-of-the-art algorithms in heuristic and meta-heuristic fields in different scenarios. The simulation results showed 12.5%, 12%, and 26% improvement in energy consumption, makespan, and Energy SLA Violations (ESV) optimization parameters, respectively.
- Published
- 2022
- Full Text
- View/download PDF
15. Scientific workflow scheduling in multi-cloud computing using a hybrid multi-objective optimization algorithm
- Author
-
Mohammad Masdari and Ali Mohammadzadeh
- Subjects
Workflow ,General Computer Science ,Job shop scheduling ,Computer science ,business.industry ,Distributed computing ,CloudSim ,Computational intelligence ,Cloud computing ,Heuristics ,business ,Multi-objective optimization ,Throughput (business) - Abstract
Multi-cloud is the use of multiple cloud computing in a single heterogeneous architecture. Workflow scheduling in multi-cloud computing is an NP-Hard problem for which many heuristics and meta-heuristics are introduced. This paper first presents a hybrid multi-objective optimization algorithm denoted as HGSOA-GOA, which combines the Seagull Optimization Algorithm (SOA) and Grasshopper Optimization Algorithm (GOA). The HGSOA-GOA applies chaotic maps for producing random numbers and achieves a good trade-off between exploitation and exploration, leading to an improvement in the convergence rate. Then, HGSOA-GOA is applied for scientific workflow scheduling problems in multi-cloud computing environments by considering factors such as makespan, cost, energy, and throughput. In this algorithm, a solution from the Pareto front is selected using a knee-point method and then is applied for assigning the scientific workflows’ tasks in a multi-cloud environment. Extensive comparisons are conducted using the CloudSim and WorkflowSim tools and the results are compared to the SPEA2 algorithm. The achieved results exhibited that the HGSOA-GOA can outperform other algorithms in terms of metrics such as IGD, coverage ratio, and so on.
- Published
- 2021
- Full Text
- View/download PDF
16. Optimized fuzzy clustering using moth-flame optimization algorithm in wireless sensor networks
- Author
-
Bao Huynh, Moazam Bidaki, Amir Masoud Rahmani, Mehdi Hosseinzadeh, Mohammad Masdari, and Cuong Trinh
- Subjects
Linguistics and Language ,Fuzzy clustering ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Energy consumption ,Random early detection ,Fuzzy logic ,Language and Linguistics ,Network congestion ,Artificial Intelligence ,Packet loss ,business ,Cluster analysis ,Wireless sensor network ,Computer network - Abstract
Energy consumption is one of the main concerns in wireless sensor networks (WSNs). In this context, congestion is one of the problems which by dropping the data packets, increases the energy consumption of WSN, and reduces its lifetime. In this paper, we deal with these problems and present a distributed fuzzy clustering scheme that uses two Fuzzy Logic Controllers (FLCs) to organize WSN into some clusters. Besides, in this scheme, we consider multiple mobile sink nodes and provide another FLC for fuzzy sink selection used by cluster heads (CHs). In this scheme, CHs cooperate in multi-hop routing of data packets to minimize the energy consumption of WSN. However, in the data routing step, congestion may happen in the data forwarding nodes. In this scheme, we deal with the congestion problem by proposing a distance-based version of the Random Early Detection (RED) congestion control method to drop the data packets more intelligently. Besides, to increase the effectiveness of the proposed FLCs, we tune them using the Moth-Flame Optimization algorithm and minimize their rules. Simulation results indicate the effectiveness of the proposed clustering and distance-based RED congestion control method in improving the WSN’s lifespan, reducing the number of retransmissions, and mitigating the percentage of packet loss.
- Published
- 2021
- Full Text
- View/download PDF
17. Clustering‐based routing protocol using gray wolf optimization and technique for order of preference by similarity to ideal solution algorithms in the vehicular ad hoc networks
- Author
-
Behbod Kheradmand, Ali Ghaffari, Farhad Soleimanian Gharehchopogh, and Mohammad Masdari
- Subjects
Computational Theory and Mathematics ,Computer Networks and Communications ,Software ,Computer Science Applications ,Theoretical Computer Science - Published
- 2022
- Full Text
- View/download PDF
18. A range‐free localization algorithm for IoT networks
- Author
-
Vahid Hosseini, Gaurav Dhiman, Mohammad Masdari, Saeid Barshandeh, and Krishna Kant Singh
- Subjects
Human-Computer Interaction ,Artificial Intelligence ,business.industry ,Computer science ,Real-time computing ,Internet of Things ,business ,Software ,Theoretical Computer Science ,Range (computer programming) - Published
- 2021
- Full Text
- View/download PDF
19. A chaotic and hybrid gray wolf-whale algorithm for solving continuous optimization problems
- Author
-
Farhad Soleimanian Gharehchopogh, Kayvan Asghari, Rahim Saneifard, and Mohammad Masdari
- Subjects
Continuous optimization ,business.industry ,Computer science ,Chaotic ,Computational intelligence ,Feature selection ,02 engineering and technology ,Intrusion detection system ,Local optimum ,Artificial Intelligence ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Benchmark (computing) ,020201 artificial intelligence & image processing ,Local search (optimization) ,business ,Algorithm - Abstract
The gray wolf optimizer (GWO) and the whale optimization algorithm (WOA) are two esteemed optimization algorithms, and their various modified versions are proposed in recent years for different applications. The GWO and WOA simulate the hunting method of gray wolves and humpback whales, respectively. These algorithms have several operators for moving the search agents toward the optimum solution in the search space. But, the GWO and WOA encounter some problems such as falling in local optima and slow convergence. Various proposals have been presented so far to develop innovative and novel meta-heuristic optimization methods. Some of them are based on adding special evolutionary operators or local search steps to existing algorithms. Some others are established based on the combination of previous methods or applying the chaos theory in them. A novel hybrid method defined as chaotic GWO and WOA (CGWW) is proposed in this paper by modifying the WOA, merging it with GWO, and applying the chaotic maps. Also, the chaotic maps have been used in the CGWW algorithm to adjust the movement parameters and initialize the search agents. The combination of different operators of the mentioned algorithms and using the chaotic maps increases the exploration and exploitation power of the proposed algorithm and thus causes to obtain better results. Twenty-three mathematical benchmark functions are used to evaluate the CGWW algorithm. Besides, the proposed algorithm is applied for solving the feature selection problem in intrusion detection systems, which is intrinsically multi-objective. The proposed algorithm finds competitive results in contrast to other well-known meta-heuristic algorithms in most of the experiments. It can avoid local optima and find the global optimum in most cases using its balanced exploration and exploitation ability.
- Published
- 2021
- Full Text
- View/download PDF
20. Data replication schemes in cloud computing: a survey
- Author
-
Mohammad Masdari, Mostafa Ghobaei-Arani, Ali Shakarami, Hamid Shakarami, and Ali Shahidinejad
- Subjects
Scheme (programming language) ,Computer Networks and Communications ,Group method of data handling ,business.industry ,Computer science ,Distributed computing ,Reliability (computer networking) ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Replication (computing) ,Data access ,0202 electrical engineering, electronic engineering, information engineering ,Data deduplication ,020201 artificial intelligence & image processing ,business ,Cloud storage ,computer ,Software ,computer.programming_language - Abstract
In recent years, cloud storage systems have emerged as a promising technology for storing data blocks on various cloud servers. One of the main mechanisms in cloud storage systems is data replication, for which various solutions are proposed. Data replication's main target is achieving higher performance for data-intensive applications by addressing some critical challenges of this criterion, such as availability, reliability, security, bandwidth, and response time of data access. However, to the best of the author’s knowledge, there is no systematic, comprehensive, and complete survey in the cloud data replication despite its impacts and maturity. This paper presents a comprehensive survey and classification of state-of-the-art data replication schemes among different existing cloud computing solutions in the form of a classical classification to define current schemes on the topic and present open issues. The presented classification comprises three main classes; data deduplication schemes, data auditing schemes, and data handling schemes. A complete comparative comparison of the replication schemes highlights their main properties, such as utilized classes, type of the scheme, the place of implementation, evaluation tools, and their advantages and weaknesses. Finally, open issues and future uncovered or weakly covered research challenges are discussed, and the survey will be concluded.
- Published
- 2021
- Full Text
- View/download PDF
21. A novel controller placement algorithm based on network portioning concept and a hybrid discrete optimization algorithm for multi-controller software-defined networks
- Author
-
Mohammad Masdari, Amin Babazadeh Sangar, Nasrin Firouz, and Kambiz Majidzadeh
- Subjects
Computer Networks and Communications ,Computer science ,Crossover ,020206 networking & telecommunications ,02 engineering and technology ,Propagation delay ,Rate of convergence ,Control theory ,Discrete optimization ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Forwarding plane ,020201 artificial intelligence & image processing ,Software-defined networking ,Algorithm ,Software - Abstract
Software defined network (SDN) has shown significant advantages in numerous real-life aspects with separating the control plane from the data plane that provides programmable management for networks. However, with the increase in the network size, a single controller of SDN imposes considerable limitations on various features. Therefore, in networks with immense scalability, multiple controllers are essential. Specifying the optimal number of controllers and their deployment place is known as the controller placement problem (CPP), which affects the network's performance. In the present paper, a novel controller placement algorithm has been introduced using the advantages of nature-inspired optimization algorithms and network portioning. Firstly, the Manta Ray Foraging Optimization (MRFO) and Salp Swarm Algorithm (SSA) have been discretized to solve CPP. Three new operators comprising a two-point swap, random insert, and half points crossover operators were introduced to discretized the algorithms. Afterward, the resulting discrete MRFO and SSA algorithms were hybridized in a promoting manner. Next, the proposed discrete algorithm has been evaluated on six well-known software-defined networks with a different number of controllers. In addition, the networks have been chosen from various sizes to evaluate the scalability of the proposed algorithm. The proposed algorithm has been compared with several other state-of-the-art algorithms regarding network propagation delay and convergence rate in experiments. The findings indicated the effectiveness of the contributions and the superiority of the proposed algorithm over the competitor algorithms.
- Published
- 2021
- Full Text
- View/download PDF
22. A survey study on trust-based security in Internet of Things: Challenges and issues
- Author
-
Mirsaeid Hosseini Shirvani and Mohammad Masdari
- Subjects
Artificial Intelligence ,Hardware and Architecture ,Management of Technology and Innovation ,Computer Science (miscellaneous) ,Engineering (miscellaneous) ,Software ,Computer Science Applications ,Information Systems - Published
- 2023
- Full Text
- View/download PDF
23. An Optimization-based Learning Black Widow Optimization Algorithm for Text Psychology
- Author
-
Ali Hosseinalipour, Farhad Soleimanian Gharehchopogh, mohammad masdari, and ALi Khademi
- Subjects
meta-heuristic algorithm ,feature selection ,black widow optimization algorithm ,Science ,T1-995 ,text psychology ,Technology (General) - Abstract
In recent years, social networks' growth has led to an increase in these networks' content. Therefore, text mining methods became important. As part of text mining, Sentiment analysis means finding the author's perspective on a particular topic. Social networks allow users to express their opinions and use others' opinions in other people's opinions to make decisions. Since the comments are in the form of text and reading them is time-consuming. Therefore, it is essential to provide methods that can provide us with this knowledge usefully. Black Widow Optimization (BWO) is inspired by black widow spiders' unique mating behavior. This method involves an exclusive stage, namely, cannibalism. For this reason, at this stage, species with an inappropriate evaluation function are removed from the circle, thus leading to premature convergence. In this paper, we first introduced the BWO algorithm into a binary algorithm to solving discrete problems. Then, to reach the optimal answer quickly, we base its inputs on the opposition. Finally, to use the algorithm in the property selection problem, which is a multi-objective problem, we convert the algorithm into a multi-objective algorithm. The 23 well-known functions were evaluated to evaluate the performance of the proposed method, and good results were obtained. Also, in evaluating the practical example, the proposed method was applied to several emotion datasets, and the results indicate that the proposed method works very well in the psychology of texts.
- Published
- 2021
24. QoS-driven metaheuristic service composition schemes: a comprehensive overview
- Author
-
Mehdi Nozad Bonab, Mohammad Masdari, and Suat Ozdemir
- Subjects
Linguistics and Language ,Computer science ,computer.internet_protocol ,Quality of service ,Distributed computing ,02 engineering and technology ,Service-oriented architecture ,computer.software_genre ,Language and Linguistics ,Task (project management) ,Workflow ,Artificial Intelligence ,020204 information systems ,Taxonomy (general) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Web service ,computer ,Metaheuristic ,Composition (language) - Abstract
Services Oriented Architecture provides Web Services (WSs) as reusable software components that can be applied to create more complicate composite services for users according to the specified QoS limitations. However, considering many WSs that may be appropriate for each task of a user-submitted workflow, finding the optimal WSs for a composite WS to maximize the overall QoS is an NP-hard problem. As a result, numerous composition schemes have been suggested in the literature to untangle this problem by using various metaheuristic algorithms. This paper presents a comprehensive survey and taxonomy of such QoS-oriented metaheuristic WS composition schemes provided in the literature. It investigates how metaheuristic algorithms are adapted for the WS composition problem and highlight their main features, advantages, and limitations. Also, in each category of the studied composition schemes, a comparison of their applied QoS factors, evaluated metrics, exploited simulators, and properties of the applied metaheuristic algorithms are explained. Finally, the concluding remarks and future research directions are summarized to help researchers in working in this area.
- Published
- 2021
- Full Text
- View/download PDF
25. A novel binary farmland fertility algorithm for feature selection in analysis of the text psychology
- Author
-
Farhad Soleimanian Gharehchopogh, Mohammad Masdari, Ali Khademi, and Ali Hosseinalipour
- Subjects
Computer science ,Value (computer science) ,Binary number ,Feature selection ,02 engineering and technology ,Sigmoid function ,Base (topology) ,Operator (computer programming) ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Analysis Dataset ,Algorithm - Abstract
Feature selection plays a key role in data mining and machine learning algorithms to reduce the processing time and increase the accuracy of classification of high dimensional datasets. One of the most common feature selection methods is the wrapper method that works on the feature set to reduce the number of features while improving the accuracy of the classification. In this paper, two different wrapper feature selection approaches are proposed based on Farmland Fertility Algorithm (FFA). Two binary versions of the FFA algorithm are proposed, denoted as BFFAS and BFFAG. The first version is based on the sigmoid function. In the second version, new operators called Binary Global Memory Update (BGMU) and Binary Local Memory Update (BLMU) and a dynamic mutation (DM) operator are used for binarization. Furthermore, the new approach (BFFAG) reduces the three parameters of the base algorithm (FFA) that are dynamically adjusted to maintain exploration and efficiency. Two proposed approaches have been compared with the basic meta-heuristic algorithms used in feature selection on 18 standard datasets. The results show better performance of the proposed approaches compared with the competing methods in terms of objective function value, the average number of selected features, and the classification accuracy. Also, the experiments on the emotion analysis dataset demonstrate the satisfactory results.
- Published
- 2021
- Full Text
- View/download PDF
26. A Hybrid Multi-objective Algorithm for Imbalanced Controller Placement in Software-Defined Networks
- Author
-
Nasrin firouz, Mohammad Masdari, Amin Babazadeh Sangar, and Kambiz Majidzadeh
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Strategy and Management ,Information Systems - Published
- 2022
- Full Text
- View/download PDF
27. SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification
- Author
-
Tohid Jafarian, Kambiz Majidzadeh, Mohammad Masdari, and Ali Ghaffari
- Subjects
Numerical Analysis ,Computer science ,Real-time computing ,020206 networking & telecommunications ,02 engineering and technology ,Network monitoring ,Computer Science Applications ,Theoretical Computer Science ,Constant false alarm rate ,Computational Mathematics ,Computational Theory and Mathematics ,Radial basis function kernel ,NetFlow ,0202 electrical engineering, electronic engineering, information engineering ,Information gain ratio ,020201 artificial intelligence & image processing ,Anomaly detection ,Software-defined networking ,Software ,Vulnerability (computing) - Abstract
The inherent features of software-defined networking (SDN) architecture revolutionize traditional network infrastructure and provide the opportunity for integrated and centralized network monitoring. One of the shortcomings of SDNs is related to its high vulnerability to distributed denial of service attacks and other similar ones. In this paper, a novel multi-stage modular approach is proposed for detecting and mitigating security anomalies in SDN environment (SADM-SDNC). The proposed approach uses NetFlow protocol for gathering information and generating dataset and information gain ratio in order to select the effective features. Also, the C-support vector classification algorithm with radial basis function kernel, and features of Floodlight controller for developing a structure with desirable performance were used in the proposed scheme. The experimental results demonstrate that the proposed approach performs better than other methods in terms of enhancing accuracy and detection rate, and reducing classification error and false alarm rate, which were measured as 99.67%, 99.26%, 0.33%, and 0.08% respectively. Finally, thanks to utilizing REST API and Static Entry Pusher technologies in the Floodlight controller, it makes it possible to disconnect any communications with the attacking factors and remove destructive users.
- Published
- 2020
- Full Text
- View/download PDF
28. A hybrid multi-objective metaheuristic optimization algorithm for scientific workflow scheduling
- Author
-
Ahmad Jafarian, Farhad Soleimanian Gharehchopogh, Mohammad Masdari, and Ali Mohammadzadeh
- Subjects
Job shop scheduling ,Computer Networks and Communications ,Metaheuristic optimization ,business.industry ,Computer science ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Energy consumption ,computer.software_genre ,Scheduling (computing) ,Workflow ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,Workflow scheduling ,020201 artificial intelligence & image processing ,business ,computer ,Algorithm ,Software - Abstract
Workflow is composed of some interdependent tasks and workflow scheduling in the cloud environment that refers to sorting the workflow tasks on virtual machines on the cloud platform. We will encounter many sorting modes with an increase in virtual machines and the variety in task size. Reaching an order with the least makespan is an NP-hard problem. The hardness of this problem increases even more with several contradictory goals. Hence, a meta-heuristic algorithm is what required in reaching the optimal response. Thus, the algorithm is a hybridization of the ant lion optimizer (ALO) algorithm with a Sine Cosine Algorithm (SCA) algorithm and used it multi-objectively to solve the problem of scheduling scientific workflows. The novelty of the proposed algorithm was to enhance search performance by making algorithms greedy and using random numbers according to Chaos Theory on the green cloud computing environment. The purpose was to minimize the makespan and cost of performing tasks, to reduce energy consumption to have a green cloud environment, and to increase throughput. WorkflowSim simulator was used for implementation, and the results were compared with the SPEA2 workflow scheduling algorithm. The results show a decrease in the energy consumed and makespan.
- Published
- 2020
- Full Text
- View/download PDF
29. A discrete chaotic multi-objective SCA-ALO optimization algorithm for an optimal virtual machine placement in cloud data center
- Author
-
Mohammad Masdari and Sasan Gharehpasha
- Subjects
General Computer Science ,Computer science ,business.industry ,Distributed computing ,CPU time ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Energy consumption ,computer.software_genre ,Virtualization ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,business ,computer ,Assignment problem ,Efficient energy use - Abstract
Cloud computing, with its immense potentials in low cost and on-demand services, is a promising computing platform for both commercial and non-commercial computation applications. It focuses on the sharing of information and computation in a large network that are quite likely to be owned by geographically disbursed different venders. Power efficiency in cloud data centers (DCs) has become an important topic in recent years as more and larger DCs have been established and the electricity cost has become a major expense for operating them. Server consolidation using virtualization technology has become an important technology to improve the energy efficiency of DCs. Virtual machine (VM) assignment is the key in server consolidation. In the past few years, many methods to VM assignment have been proposed, but existing VM assignment approaches to the VM assignment problem consider the energy consumption by physical machines (PM). In current paper a new approach is proposed that using a combination of the sine cosine algorithm (SCA) and ant lion optimizer (ALO) as discrete multi-objective and chaotic functions for optimal VM assignment. First objective of our proposed model is minimizing the power consumption in cloud DCs by balancing the number of active PMs. Second objective is reducing the resources wastage by using optimal VM assignment on PMs in cloud DCs. Reducing SLA levels was another purpose of this research. By using the method, the number of increase of migration of VMs to PMs is prevented. In this paper, several performance metrics such as resource wastage, power consumption, overall memory utilization, overall CPU utilization, overall storage space, and overall bandwidth, a number of active PMs, a number of shutdowns, a number of migrations, and SLA are used. Ultimately, the results obtained from the proposed algorithm were compared with those of the algorithms used in this regard, including First Fit (FF), VMPACS and MGGA.
- Published
- 2020
- Full Text
- View/download PDF
30. An optimal VM Placement in Cloud Data Centers Based on Discrete Chaotic Whale Optimization Algorithm
- Author
-
mohammad masdari, sasan Gharehpasha, and ahmad jafarian
- Subjects
Science ,T1-995 ,power consumption ,resource management ,whale optimization algorithm ,virtualization ,Technology (General) - Abstract
Cloud computing, with its immense potentials in low cost and on-demand services, is a promising computing platform for both commercial and non-commercial computation applications. It focuses on the sharing of information and computation in a large network that are quite likely to be owned by geographically disbursed different venders. Energy efficiency in data centers has become a hot topic in recent years as more and larger data centers have been established and the electricity cost has become a major expense for operating them. Server consolidation using virtualization technology has become an important technology to improve the energy efficiency of data centers. Virtual machine placement is the key in server consolidation. In the past few years, many approaches to virtual machine placement have been proposed, but existing virtual machine placement approaches to the virtual machine placement problem consider the energy consumption by physical machines. In this paper, we proposed a new approach for placement based on Discrete Chaotic whale optimization Algorithm. First goal of our presented algorithm is reducing the energy consumption in datacenters by decreasing the number of active physical machines. Second goal is decreasing waste of resources and management of them using optimal placement of virtual machines on physical machines in cloud data centers. By using the method, the increase in migration of virtual machines to physical machines is prevented. Finally, our proposed algorithm is compared to some algorithms in this area like FF, ACO, MGGA, GSA, and FCFS.
- Published
- 2020
31. Improving security using SVM-based anomaly detection: issues and challenges
- Author
-
Mehdi Hosseinzadeh, Mehran Zangakani, Amir Masoud Rahmani, Mohammad Masdari, Moazam Bidaki, and Bay Vo
- Subjects
0209 industrial biotechnology ,Computer science ,business.industry ,Computational intelligence ,02 engineering and technology ,Intrusion detection system ,Machine learning ,computer.software_genre ,Theoretical Computer Science ,Support vector machine ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Anomaly detection ,Geometry and Topology ,Artificial intelligence ,business ,computer ,Software - Abstract
Security is one of the main requirements of the current computer systems, and recently it gains much importance as the number and severity of malicious attacks increase dramatically. Anomaly detection is one of the main branches of the intrusion detection systems which enables to recognize the newer variants of the security attacks. This paper focuses on the anomaly detection schemes (ADS), which have applied support vector machine (SVM) for detecting intrusions and security attacks. For this purpose, it first presents the required concepts about the SVM classifier and intrusion detection systems. It then classifies the ADS approaches and discusses the various machine learning and artificial intelligence techniques that have been applied in combination with the SVM classifier to detect anomalies. Besides, it specifies the primary capabilities, possible limitations, or advantages of the ADS approaches. Furthermore, a comparison of the studied ADS schemes is provided to illuminate their various technical details.
- Published
- 2020
- Full Text
- View/download PDF
32. Power efficient virtual machine placement in cloud data centers with a discrete and chaotic hybrid optimization algorithm
- Author
-
Sasan Gharehpasha, Ahmad Jafarian, and Mohammad Masdari
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Process (computing) ,Cloud computing ,Virtualization ,computer.software_genre ,Service-level agreement ,Software ,Virtual machine ,The Internet ,Data center ,business ,computer - Abstract
Cloud computing is a new computation technology that provides services to consumers and businesses. The main idea of Cloud computing is to present software and hardware services through the Internet to the users and organizations at all levels. In Cloud computing, the users pay for the services, which means a usage-based payment system is used in this technology. Using virtualization technology in computation resources enables the appropriate utilization of resources in cloud computing. One of the most significant challenging issues in virtualization technology is the placement of optimal virtual machines on physical machines in cloud data centers. The placement of virtual machines comprises a process wherein virtual machines are mapped onto physical machines in cloud data centers. Optimal deployment leads to the reduction in power consumption, optimal use of resources, traffic reduction in data centers, costs reduction, and efficiency enhancement of the data center in the cloud. The present article proposed a new approach using a combination of the Sine–Cosine Algorithm and Salp Swarm Algorithm as discrete multi-objective and chaotic functions for optimal virtual machine placement. The first goal of the proposed algorithm was to reduce the power consumption in cloud data centers by condensing the number of active physical machines. The second goal was to reduce the waste of resources and manage it by optimally virtual machine placement on physical machines in cloud data centers. The third objective was to minimize and reduce Service Level Agreement among the active physical machines in cloud data centers. The proposed method prevent the increase in the migration of virtual machines onto physical machines. Ultimately, the results obtained from the proposed algorithm were compared with those of previous akin algorithms in the literature, including First Fit, Virtual Machine Placement Ant Colony System, and Modified Best Fit Decreasing. The proposed scheme is tested using Amazon EC2 Instances and the result indicated that the proposed algorithm performs better than the existing algorithms for various performance metrics.
- Published
- 2020
- Full Text
- View/download PDF
33. Virtual machine placement in cloud data centers using a hybrid multi-verse optimization algorithm
- Author
-
Sasan Gharehpasha, Mohammad Masdari, and Ahmad Jafarian
- Subjects
Linguistics and Language ,business.industry ,Computer science ,Distributed computing ,Computation ,Cloud computing ,02 engineering and technology ,Object (computer science) ,computer.software_genre ,Virtualization ,Language and Linguistics ,Resource (project management) ,Artificial Intelligence ,Virtual machine ,020204 information systems ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Data center ,business ,computer - Abstract
Cloud computing is a computing paradigm, where a large pool of systems is connected in private or public networks to provide dynamically scalable infrastructure for application, data, and file storage. With the advent of this technology, the cost of power computation, application hosting, content storage, resource wastage, and delivery is reduced significantly. Cloud computing provides the possibility of merely concentrating on business goals instead of expanding hardware resources for users. Challenging work in virtualization technology is the placement of virtual machines under optimal conditions on physical machines in cloud data centers. Optimal placement of virtual machines over physical ones in cloud data centers can lead to the management of resources and prevention of the resources waste. Hereby, a new approach is proposed based on the combination of the hybrid discrete multi-object whale optimization algorithm, multi-verse optimizer with chaotic functions for optimal placement in the cloud data center. The first object of the proposed algorithm is to decrease power consumption, which is consumed in cloud data centers by reducing active physical machines. The second goal is to cut the resource wastage and managing resources using the optimal placement of virtual machines over physical machines in cloud data centers. With this method, the increasing rate of virtual migration to physical machines is prevented. Finally, the results obtained from the proposed algorithm were compared to some algorithms such as first fit, VMPACS, MBFD.
- Published
- 2020
- Full Text
- View/download PDF
34. A survey and classification of the security anomaly detection mechanisms in software defined networks
- Author
-
Tohid Jafarian, Kambiz Majidzadeh, Ali Ghaffari, and Mohammad Masdari
- Subjects
National security ,Computer Networks and Communications ,Computer science ,business.industry ,Deep learning ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Intrusion ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Anomaly detection ,Artificial intelligence ,business ,Software-defined networking ,computer ,Software - Abstract
Software defined network (SDN) decouples the network control and data planes. Despite various advantages of SDNs, they are vulnerable to various security attacks such anomalies, intrusions, and Denial-of-Service (DoS) attacks and so on. On the other hand, any anomaly and intrusion in SDNs can affect many important domains such as banking system and national security. Therefore, the anomaly detection topic is a broad research domain, and to mitigate these security problems, a great deal of research has been conducted in the literature. In this paper, the state-of-the-art schemes applied in detecting and mitigating anomalies in SDNs are explained, categorized, and compared. This paper categorizes the SDN anomaly detection mechanisms into five categories: (1) flow counting scheme, (2) information-based scheme, (3) entropy-based scheme, (4) deep learning, and (5) hybrid scheme. The research gaps and major existing research issues regarding SDN anomaly detection are highlighted. We hope that the analyses, comparisons, and classifications might provide directions for further research.
- Published
- 2020
- Full Text
- View/download PDF
35. Improved chaotic binary grey wolf optimization algorithm for workflow scheduling in green cloud computing
- Author
-
Ali Mohammadzadeh, Ahmad Jafarian, Farhad Soleimanian Gharehchopogh, and Mohammad Masdari
- Subjects
Continuous optimization ,Mathematical optimization ,Job shop scheduling ,Computer science ,business.industry ,Cognitive Neuroscience ,Chaotic ,Binary number ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Scheduling (computing) ,Mathematics (miscellaneous) ,Local optimum ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,business ,Metaheuristic - Abstract
The workflow scheduling in the cloud computing environment is a well-known NP-complete problem, and metaheuristic algorithms are successfully adapted to solve this problem more efficiently. Grey wolf optimization (GWO) is a recently proposed interesting metaheuristic algorithm to deal with continuous optimization problems. In this paper, we proposed IGWO, an improved version of the GWO algorithm which uses the hill-climbing method and chaos theory to achieve better results. The proposed algorithm can increase the convergence speed of the GWO and prevents falling into the local optimum. Afterward, a binary version of the proposed IGWO algorithm, using various S functions and V functions, is introduced to deal with the workflow scheduling problem in cloud computing data centers, aiming to minimize their executions’ cost, makespan, and the power consumption. The proposed workflow scheduling scheme is simulated using the CloudSim simulator and the results show that our scheme can outperform other scheduling approaches in terms of metrics such as power consumption, cost, and makespan.
- Published
- 2020
- Full Text
- View/download PDF
36. A Survey on the Computation Offloading Approaches in Mobile Edge/Cloud Computing Environment: A Stochastic-based Perspective
- Author
-
Mehdi Hosseinzadeh, Mohammad Masdari, Mostafa Ghobaei-Arani, and Ali Shakarami
- Subjects
Mobile edge computing ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,Markov process ,Cloud computing ,Mobile cloud computing ,symbols.namesake ,Hardware and Architecture ,Server ,symbols ,Computation offloading ,Augmented reality ,business ,Mobile device ,Software ,Information Systems - Abstract
Fast growth of produced data from deferent smart devices such as smart mobiles, IoT/IIoT networks, and vehicular networks running different specific applications such as Augmented Reality (AR), Virtual Reality (VR), and positioning systems, demand more and more processing and storage resources. Offloading is a promising technique to cope with the inherent limitations of such devices by which the resource-intensive code or at least a part of it will be transferred to the nearby resource-rich servers. Different approaches have been proposed to help make better decisions in respect of whether, where, when, and how much to offload and to improve the efficiency of the offloading process in the literature. On the other hand, the dynamic behavior of mobile devices running on-demand applications faces the offloading to the new challenges, which could be described as stochastic behaviors. Therefore, various stochastic offloading models have been proposed in the literature. However, to the best of the author’s knowledge, despite the existence of plenty of related offloading studies in the literature, there is not any systematic, comprehensive, and detailed survey paper focusing on stochastic-based offloading mechanisms. In this paper, we propose a survey paper concerning the stochastic-based offloading approaches in various computation environments such as Mobile Cloud Computing (MCC), Mobile Edge Computing (MEC), and Fog Computing (FC) in which to identify new mechanisms, a classical taxonomy is presented. The proposed taxonomy is classified into three main fields: Markov chain, Markov process, and Hidden Markov Models. Then, open issues and future unexplored or inadequately explored research challenges are discussed, and the survey is finally concluded.
- Published
- 2020
- Full Text
- View/download PDF
37. Service selection using fuzzy multi-criteria decision making: a comprehensive review
- Author
-
Mohammad Masdari and Hemn Khezri
- Subjects
General Computer Science ,Operations research ,business.industry ,Computer science ,Quality of service ,020206 networking & telecommunications ,Cloud computing ,Context (language use) ,Computational intelligence ,02 engineering and technology ,computer.software_genre ,Multiple-criteria decision analysis ,Fuzzy logic ,Ranking ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Web service ,business ,computer - Abstract
The growing number of web services (WSs) and cloud services, which can meet the users’ functional and non-functional requirements, have inspired researchers to provide more effective approaches for ranking the available services, regarding different QoS factors and selecting the best of them. In this context, several service selection frameworks using the fuzzy multicriteria decision making (MCDM) techniques are introduced in the literature. This paper focuses on such schemes, and firstly provides the required background knowledge about service selection and MCDM methods. Then, it puts forward a taxonomy of the service selection schemes, regarding their utilized fuzzy MCDM methods, and describes how the fuzzy MCDM methods are adapted to handle the fuzziness of the users’ preferences and QoS properties. Furthermore, the main features of these schemes are compared, and their contributions and possible shortcomings are discussed. Finally, the concluding remarks are provided, and directions for future studies are illuminated.
- Published
- 2020
- Full Text
- View/download PDF
38. Towards fuzzy anomaly detection-based security: a comprehensive review
- Author
-
Hemn Khezri and Mohammad Masdari
- Subjects
0209 industrial biotechnology ,Adaptive neuro fuzzy inference system ,Neuro-fuzzy ,Logic ,Computer science ,Data security ,Context (language use) ,02 engineering and technology ,Intrusion detection system ,computer.software_genre ,Fuzzy logic ,020901 industrial engineering & automation ,Artificial Intelligence ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,Anomaly detection ,Data mining ,computer ,Software - Abstract
In the data security context, anomaly detection is a branch of intrusion detection that can detect emerging intrusions and security attacks. A number of anomaly detection systems (ADSs) have been proposed in the literature that using various algorithms and techniques try to detect the intrusions and anomalies. This paper focuses on the ADS schemes which have applied fuzzy logic in combination with other machine learning and data mining techniques to deal with the inherent uncertainty in the intrusion detection process. For this purpose, it first presents the key knowledge about intrusion detection systems and then classifies the fuzzy ADS approaches regarding their utilized fuzzy algorithm. Afterward, it summarizes their major contributions and illuminates their advantages and limitations. Finally, concluding issues and directions for future researches in the fuzzy ADS context are highlighted.
- Published
- 2020
- Full Text
- View/download PDF
39. Service Selection Using Multi-criteria Decision Making: A Comprehensive Overview
- Author
-
Hawkar Kamaran Hama, Marwan Yassin Ghafour, Mohammad Masdari, Omed Hassan Ahmed, Mehdi Hosseinzadeh, and Hemn Khezri
- Subjects
Computer Networks and Communications ,Process (engineering) ,Computer science ,Strategy and Management ,Quality of service ,Rank (computer programming) ,020206 networking & telecommunications ,Functional requirement ,02 engineering and technology ,Service provider ,Multiple-criteria decision analysis ,Ranking ,Risk analysis (engineering) ,Hardware and Architecture ,Taxonomy (general) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Information Systems - Abstract
The growing number of services that can meet the users’ functional requirements, inspired many researchers to provide some approaches to rank and select the best possible services regarding their quality of service (QoS) and users’ preferences. Considering various criteria which should be considered in the service selection process, multi-criteria decision making (MCDM) techniques have been vastly applied to help a decision-maker in determining the weight of each QoS factor and ranking the services provided by different service providers. This paper provides an extensive investigation of the state of the art MCDM-based service selection schemes proposed in the literature. It provides the required background knowledge and puts forward a taxonomy of the investigated service selection schemes regarding their applied MCDM methods. Also, it describes how the MCDM methods are adapted by the studied schemes, which datasets and QoS criteria are employed by each system, and which factors and environments are utilized to evaluate the service selection schemes. Finally, the concluding remarks are provided, and directions for future studies are highlighted.
- Published
- 2020
- Full Text
- View/download PDF
40. CALA-FOMF: a continuous action-set learning automata-based approach to finding optimized membership functions for fuzzy association rules in web usage data
- Author
-
Abdolreza Hatamlou, Mohammad Masdari, and Zohreh Anari
- Subjects
0209 industrial biotechnology ,Learning automata ,Computer science ,Process (computing) ,Computational intelligence ,02 engineering and technology ,Space (commercial competition) ,computer.software_genre ,Fuzzy logic ,Theoretical Computer Science ,Set (abstract data type) ,020901 industrial engineering & automation ,Web mining ,Web page ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Geometry and Topology ,Data mining ,computer ,Software - Abstract
Web usage data usually contain quantitative values, and this implies that fuzzy logic can be used to represent such values. The time spent by users on each web page is a part of web usage data, which can be used to analyze users’ browsing behavior. In existing research on fuzzy web mining, the time duration of web pages is shown as trapezoidal membership functions (TMFs), and the number and parameters of TMFs are already predefined. TMFs of each web page are different from those of other web pages. Therefore, instead of using predefined TMFs, in this study, we proposed a new algorithm called CALA-FOMF to find both the number of TMFs and their optimized parameters to mine fuzzy association rules in web usage data using a team of continuous action-set learning automata (CALA). CALA-FOMF contained two steps. In the first step, using a team of CALA, we introduced a new framework. The proposed framework obtained the number of TMFs as inputs and found their optimized parameters. The proposed framework was able to reduce the search space and eliminate inappropriate membership functions during the learning process. In the second step, we proposed a new algorithm using the proposed framework to find an appropriate number of TMFs and their optimized parameters. The performance of the CALA-FOMF approach was compared with that of the fuzzy web mining algorithm, which used uniform TMFs. Experiments on datasets with different sizes confirmed that the proposed CALA-FOMF increased the efficiency of mining fuzzy association rules by extracting optimized TMFs.
- Published
- 2020
- Full Text
- View/download PDF
41. Efficient offloading schemes using Markovian models: a literature review
- Author
-
Hemn Khezri and Mohammad Masdari
- Subjects
Numerical Analysis ,Mobile edge computing ,Computer science ,Stochastic modelling ,Process (engineering) ,Distributed computing ,Markov process ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,Theoretical Computer Science ,Mobile cloud computing ,Computational Mathematics ,symbols.namesake ,Open research ,Computational Theory and Mathematics ,Server ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,020201 artificial intelligence & image processing ,Mobile device ,Software - Abstract
The increasing demand for new mobile applications puts a heavy demand for more processing power and resources in smart mobile devices (SMD). Offloading is a promising solution for these issues which tries to move data, code, or computation from the SMDs to the remote or nearby resourceful servers. To increase the effectiveness of the offloading process and make better decisions, various stochastic offloading schemes are proposed in the literature which has adapted different stochastic models. Although offloading issues are vastly studied in the literature, there is a lack of comprehensive paper to focus on stochastic offloading solutions. This paper presents a meticulous review and classification of the stochastic offloading frameworks designed for different environments such as mobile cloud computing, mobile edge computing), and Fog computing. Following this, it first presents the required background concepts and key issues regarding the offloading problem and stochastic models. It then puts forward a taxonomy of the stochastic offloading approaches according to their applied stochastic models and highlights their architectures and contributions. In addition, in each category, a comparison of the stochastic offloading schemes is provided to illuminate their features. Finally, the concluding remarks and open research areas.
- Published
- 2020
- Full Text
- View/download PDF
42. Resource provisioning using workload clustering in cloud computing environment: a hybrid approach
- Author
-
Mostafa Ghobaei-Arani, Mohammad Masdari, and Ali Shahidinejad
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Quality of service ,Distributed computing ,020206 networking & telecommunications ,Provisioning ,Workload ,Cloud computing ,02 engineering and technology ,Resource (project management) ,Elasticity (cloud computing) ,Server ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Cluster analysis ,business ,Software - Abstract
In recent years, cloud computing paradigm has emerged as an internet-based technology to realize the utility model of computing for serving compute-intensive applications. In the cloud computing paradigm, the IT and business resources, such as servers, storage, network, and applications, can be dynamically provisioned to cloud workloads submitted by end-users. Since the cloud workloads submitted to cloud providers are heterogeneous in terms of quality attributes, management and analysis of cloud workloads to satisfy Quality of Service (QoS) requirements can play an important role in cloud resource management. Therefore, it is necessary for the provisioning of proper resources to cloud workloads using clustering of them according to QoS metrics. In this paper, we present a hybrid solution to handle the resource provisioning issue using workload analysis in a cloud environment. Our solution utilized the Imperialist Competition Algorithm (ICA) and K-means for clustering the workload submitted by end-users. Also, we use a decision tree algorithm to determine scaling decisions for efficient resource provisioning. The effectiveness of the proposed approach under two real workloads traces is evaluated. The simulation results demonstrate that the proposed solution reduces the total cost by up to 6.2%, and the response time by up to 6.4%, and increases the CPU utilization by up to 13.7%, and the elasticity by up to 30.8% compared with the other approaches.
- Published
- 2020
- Full Text
- View/download PDF
43. Discrete teaching–learning-based optimization algorithm for clustering in wireless sensor networks
- Author
-
Saeid Barshandeh and Mohammad Masdari
- Subjects
Scheme (programming language) ,Continuous optimization ,General Computer Science ,Optimization algorithm ,Computer science ,Distributed computing ,020206 networking & telecommunications ,Computational intelligence ,02 engineering and technology ,Scalability ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Cluster analysis ,Wireless sensor network ,computer ,Energy (signal processing) ,computer.programming_language - Abstract
Clustering is an appealing paradigm exploited to improve the lifetime and scalability of wireless sensor networks (WSNs). Considering the NP-completeness of the clustering problem, numerous meta-heuristic algorithms are provided in the literature for the clustering of WSNs. Teaching–learning-based optimization (TLBO) is an optimization algorithm employed to tackle continuous optimization problems. In this paper, a novel discrete version of the TLBO algorithm is being presented that employs the swap and mutation operators to deal with discrete solutions. Subsequently, the new-fangled algorithm was utilized to design a hierarchical energy-aware clustering scheme for the WSNs to minimize the energy usage of the sensor nodes. In addition, an energy-aware local search algorithm was provided to enhance the network lifetime by taking factors such as energy and distance into account. Extensive simulations are conducted to indicate the effectiveness of this scheme in reducing the power usage of the sensor nodes and improving the WSN lifetime.
- Published
- 2020
- Full Text
- View/download PDF
44. Efficient VM migrations using forecasting techniques in cloud computing: a comprehensive review
- Author
-
Mohammad Masdari and Hemn Khezri
- Subjects
Scheme (programming language) ,Computer Networks and Communications ,Computer science ,business.industry ,Process (engineering) ,Distributed computing ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Energy consumption ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,computer ,Software ,Efficient energy use ,computer.programming_language - Abstract
High cost of data centers’ energy consumption and its environmental effects such as CO2 emissions have inspired numerous researches to provide more efficient VM management approaches. VM migration is one of the critical VM management activities whose performance has a direct effect on the energy efficiency of cloud data centers (DCs). To conduct a more effective migration process and reduce the number of VM migrations, some of the VM management frameworks apply prediction algorithms to forecast various migration and VM-related factors. This paper presents an extensive survey and taxonomy of the predictive VM migration approaches adapted for the cloud DCs. For this purpose, it first provides the key issues regarding the VM migration and then classifies them based on their applied prediction algorithm. It illustrates the main contributions of each scheme and describes how prediction methods are integrated into the VM migration process, to make it more effective. Moreover, a comparison of the predictive migration schemes is provided. Finally, the concluding remarks and future research areas are specified.
- Published
- 2020
- Full Text
- View/download PDF
45. Scheduling of Scientific Workflows in Multi-Fog Environments Using Markov Models and a Hybrid Salp Swarm Algorithm
- Author
-
Joan Lu, Mohammad Masdari, Mehdi Hosseinzadeh, Amir Masoud Rahmani, Omed Hassan Ahmed, and Aram Mahmood Ahmed
- Subjects
General Computer Science ,Computer science ,workflow ,Distributed computing ,task ,Cloud computing ,Denial-of-service attack ,02 engineering and technology ,computer.software_genre ,Markov model ,Scheduling (computing) ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Edge computing ,Job shop scheduling ,Markov chain ,business.industry ,General Engineering ,Particle swarm optimization ,makespan ,020206 networking & telecommunications ,Virtual machine ,Task analysis ,Fog computing ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,computer ,optimization ,lcsh:TK1-9971 ,energy - Abstract
Security attacks are a nightmare to many computing environments such as fog computing, and these attacks should be addressed. Fog computing environments are vulnerable to various kinds of DDoS attacks, which can keep fog resources busy. Typically in such attacks, fog environments often have less available resources, which can negatively impact the scheduling of Internet of Things (IoT) submitted workflows. However, most of the existing scheduling schemes do not consider DDoS attacks’ effect in the scheduling process, increasing the deadline missed workflows and offloaded tasks on the cloud. For dealing with these issues, a hybrid optimization algorithm is proposed, comprising both Particle Swarm Optimization (PSO) and Salp Swarm algorithm (SSA), to solve the workflow scheduling problem in multiple fog computing environments. Two discrete-time Markov chain models are proposed for each fog computing environment to address DDoS attacks’ effects on them. Our first Markov model computes the average available network bandwidth for each fog. The second Markov model finds the average number of available virtual machines (VMs) for each fog; the models address different levels of DDoS attacks. Extensive simulations show that by predicting the effects of DDoS attacks on fog environments, the proposed approach can effectively mitigate the number of offloaded tasks on cloud data centers and can reduce the number of the deadline missed workflows.
- Published
- 2020
46. Towards Tax Evasion Detection Using Improved Particle Swarm Optimization Algorithm
- Author
-
Houri Mojahedi, Amin Babazadeh Sangar, and Mohammad Masdari
- Subjects
Article Subject ,General Mathematics ,General Engineering - Abstract
This paper employs machine learning algorithms to detect tax evasion and analyzes tax data. With the development of commercial businesses, traditional algorithms are not appropriate for solving the tax evasion detection problem. Hence, other algorithms with acceptable speed, precision, analysis, and data decisions must be used. In the case of assets and tax assessment, the integration of machine learning models with meta-heuristic algorithms increases accuracy due to optimal parameters. In this paper, intelligent machine learning algorithms are used to solve tax evasion detection. This research uses an improved particle swarm optimization (IPSO) algorithm to improve the multilayer perceptron neural network by finding the optimal weight and improving support vector machine (SVM) classifiers with optimal parameters. The IPSO-MLP and IPSO-SVM models using the IPSO algorithm are used as new models for tax evasion detection. Our proposed system applies the dataset collected from the general administration of tax affairs of West Azerbaijan province of Iran with 1500 samples for the tax evasion detection problem. The evaluations show that the IPSO-MLP model has a higher accuracy rate than the IPSO-SVM model and logistic regression. Moreover, the IPSO-MLP model has higher accuracy than SVM, Naive Bayes, k-nearest neighbor, C5.0 decision tree, and AdaBoost. The accuracy of IPSO-MLP and IPSO-SVM models is 93.68% and 92.24%, respectively.
- Published
- 2022
- Full Text
- View/download PDF
47. A learning-based metaheuristic administered positioning model for 3D IoT networks
- Author
-
Saeid Barshandeh, Shima Koulaeizadeh, Mohammad Masdari, Benyamin AbdollahZadeh, and Mahsa Ghasembaglou
- Subjects
Software - Published
- 2023
- Full Text
- View/download PDF
48. A new energy-efficient and temperature-aware routing protocol based on fuzzy logic for multi-WBANs
- Author
-
Danial Javaheri, Pooia Lalbakhsh, Saeid Gorgin, Jeong-A Lee, and Mohammad Masdari
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Software - Published
- 2023
- Full Text
- View/download PDF
49. A comprehensive survey of network traffic anomalies and DDoS attacks detection schemes using fuzzy techniques
- Author
-
Haiping Lin, Chengwen Wu, and Mohammad Masdari
- Subjects
General Computer Science ,Control and Systems Engineering ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
50. An improved discrete harris hawk optimization algorithm for efficient workflow scheduling in multi-fog computing
- Author
-
Danial Javaheri, Saeid Gorgin, Jeong-A. Lee, and Mohammad Masdari
- Subjects
General Computer Science ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.