﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-2026051923</doi_batch_id><timestamp>20260519230932</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>9</month><day>4</day><year>2021</year></publication_date><journal_volume><volume>18</volume></journal_volume><issue>4</issue></journal_issue><journal_article publication_type="full_text"><titles><title>An Intelligent Novel Hybrid Live Video Streaming Method in Mesh-Based Peer-to-Peer Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Naghmeh</given_name><surname>Farhadian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>behrang</given_name><surname>barekatain</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Majid</given_name><surname>Haroni</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Behzad</given_name><surname>Soleimani Neysiani</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2021</year></publication_date><pages><first_page>261</first_page><last_page>275</last_page></pages><doi_data><doi>10.66224/ijece.28458.18.4.261</doi><resource>http://ijece.org/en/Article/28458</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28458</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28458</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28458</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28458</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28458</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28458</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28458</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Li, "On peer-to-peer (P2P) content delivery," Peer-to-Peer Networking and Applications, vol. 1, no. 1, pp. 45-63, 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. R. Civanlar, O. Ozkasap, and T. Celebi, "Peer-to-peer multipoint video conferencing on the internet," Signal Processing: Image Communication, vol. 20, no. 8, pp. 743-754, Sept. 2005. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. R. Ghaeini, B. Akbari, B. Barekatain, and A. Trivino-Cabrera, "Adaptive video protection in large scale peer-to-peer video streaming over mobile wireless mesh networks," International J. of Communication Systems, vol. 29, no. 18, pp 2580-2603, Dec. 2015. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Ghaeini, B. Akbari, and B. Barekatain, "An adaptive packet loss recovery method for peer-to-peer video streaming over wireless mesh network, " in Emerging Technologies for Information Systems, Computing, and Management, W.E. Wong and T. Ma, Editors, pp. 713-721, New York: Springer, 2013. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Goudarzi, "Scalable video transmission over multi-hop wireless networks with enhanced quality of experience using swarm intelligence," Signal Processing: Image Communication, vol. 27, 
no. 7, pp. 722-736, Aug. 2012. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	B. Barekatain, M. Aizaini Maarof, A. Ariza Quintana, and H. R. Ghaeini, "Performance evaluation of routing protocols in live video streaming over wireless mesh networks," Jurnal Teknologi, vol. 62, no. 1, pp. 85-94, May 2013. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	H. T. T. Tran, Y. Won, and J. Kim, "An efficient hybrid push-pull methodology for peer-to-peer video live streaming system on mobile broadcasting social media," Multimedia Tools and Applications, 
vol. 76, no. 2, pp. 2557-2568, 2017. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	I. E. Richardson, The H.264 Advanced Video Compression Standard, 2 Ed., UK: John Wiley &amp; Sons Ltd. p. 348, 2010. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	B. Barekatain, D. Khezrimotlagh, M. Maarof, H. Ghaeini, A. Quintana, and A. Cabrera, "Efficient P2P live video streaming over hybrid WMNs using random network coding," Wireless Personal Communications, vol. 80, no. 4, pp. 1761-1789, 2015. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Bikfalvi, J. Garcia-Reinoso, I. Vidal, F. Valera, and A. Azcorra, "P2P vs. IP multicast: comparing approaches to IPTV streaming based on TV channel popularity," Computer Networks, vol. 55, no. 6, pp. 1310-1325, Apr. 2011. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	A. S. Tanenbaum, Computer Networks 4th ed. Computer Networks. 2008: Dorling Kindersley Pvt Ltd. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. Passarella, "A survey on content-centric technologies for the current internet: CDN and P2P solutions," Computer Communications, vol. 35, no. 1, pp. 1-32, Jan. 2012. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. Meskovic, H. Bajric, and M. Kos, "Content delivery architectures for live video streaming: hybrid CDN-P2P as the best option," in Proc. 5th Int. Conf. on Communication Theory, Reliability, and Quality of Service, pp. 26-32, Chamonix, France, 29 Apr.-4 May 2012. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	J. A. Oliveira, F. Prado, F. M. de Lima, M. Rubinstein, and A. Sztajnberg, "Improving peer neighborhood on P2P video distribution networks using push/pull protocol," Computer Communications, vol. 61, Iss. C, pp. 17-33, May 2015. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	B. Barekatain, D. Khezrimotlagh, M. A. Maarof, A. A. Quintana, and A. T. Cabrera, "GAZELLE: an enhanced random network coding based framework for efficient P2P live video streaming over hybrid WMNs," Wireless Personal Communications, vol. 95, no. 3, pp. 2485-2505, 2017. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	C. G. Gulrel and M. Tekalp, "Peer-to-peer system design for adaptive 3D video streaming," IEEE Communications Magazine, vol. 51, no. 5, pp. 108-114, May 2013. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	B. Barekatain, et al., "MATIN: a random network coding based framework for high quality peer-to-peer live video streaming," PLoS ONE, vol. 8, no. 8, Article No.:e69844, 17 pp., Aug. 2013. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Kai-Lung, et al., "A novel scalable video streaming system on P2P networks," in Proc. Int. Conf. on Computing, Networking and Communications, ICNC’13, pp. 676-680, San Diego, CA, USA, 28-31 Jan. 2013. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	X. Shen, H. Yu, J. Buford, and M. Akon, Handbook of Peer-to-Peer Networking, 1 ed, London: Springer, 2010. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	A. Ghaffari Sheshjavani and B. Akbari, "An adaptive buffer-map exchange mechanism for pull-based peer-to-peer video-on-demand streaming systems," Multimedia Tools and Applications, vol. 76, 
no. 5, pp. 7535-7561, Mar. 2017. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	A. Russo and R. L. Cigno, "Delay-aware push/pull protocols for live video streaming in P2P systems," in Proc. IEEE Int Conf. on Communications, 5 pp., Cape Town, South Africa, 23-27 May 2010. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	T. Sanguankotchakorn and N. Krueakampliw, "A hybrid pull-push protocol in hybrid CDN-P2P mesh-based architecture for live video streaming," in Proc. 19th Asia-Pacific Network Operations and Management Symp., APNOMS’17, pp. 187-19, Seoul, South Korea, 27-29 Sept. 2017. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	T. Ruso, C. Chellappan, and P. Sivasankar, "Ppssm: push/pull smooth video streaming multicast protocol design and implementation for 
an overlay network," Multimedia Tools and Applications, vol. 75, no. 24, pp. 17097-17119, Oct. 2016. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>

[24]	R. Rodriguez-Sanchez, J. L. Martinez, G. Fernandez-Escribano, J. M. Claver, and J. L. Sanchez, "Reducing complexity in H.264/AVC motion estimation by using a GPU," in Proc. 13th IEEE  Int. Workshop on Multimedia Signal Processing, MMSP’11, 6 pp., Hangzhou, China, 17-19 Oct. 2011. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Wang and B. Li, "R2: random push with random network 
coding in live peer-to-peer streaming," IEEE J. on Selected Areas in Communications, vol. 25, no. 9, pp. 1655-1666, Dec. 2007. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Z. Xiangyang and H. Hassanein, "Treeclimber: a network-driven push-pull hybrid scheme for peer-to-peer video live streaming," in Proc. IEEE 35th Conf. on Local Computer Networks, LCN’10, pp. 368-371, Denver, CO, USA, 10-14 Oct. 2010. </unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	M. Zhang, J. G. Luo, Z. Li, and S. Q. Yang, "A peer-to-peer network for live media streaming using a push-pull approach," in Proc. of the 13th Annual ACM Int. Conf. on Multimedia, pp. 287-290, Hilton, Singapore, 6-11 Nov. 2005. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	F. Wang, Y. Xiong, and J. Liu, "mTreebone: a hybrid tree/mesh overlay for application-layer live video multicast," in Proc. of IEEE 27th Int. Con. on Distributed Computing Systems , ICDCS 07, pp. 49-49, Toronto, Canada 25-27 Jun. 2007. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Duhwan, H. Sumi, K. Eunsam, and L. Wonjun, "Adaptive push-pull protocols for P2P-based video streaming," IEICE Trans. on Communications, vol. E94-B, no. 10, pp. 2759-2762, Oct. 2011. </unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	L. Renato, A. Russo, and D. Carra, "On some fundamental properties of P2P push/pull protocols," in Proc. 2nd Int. Conf. on Communications and Electronics, ICCE’08, pp. 67-73, Hoi An, Vietnam, 4-6 Jun. 2008. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	A. Ghanbari, H. R. Rabiee, M. Khansari, and M. Salehi, "PPM-a hybrid push-pull mesh-based peer-to-peer live video streaming protocol," in Proc. IEEE 21st Int. Conf. on Computer Communications and Networks, 8 pp., Munich, Germany, 30 Jul.-2 Aug. 2012. </unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. Zhang, Y. Tang, L. Zhao, J. G. Luo, and S. Q. Yang, "Gridmedia: a multi-sender based peer-to-peer multicast system for video streaming," in Proc. Int. Conf. on Multimedia and Expo, ICME’05, pp. 614-617, Amsterdam, Netherlands, 6-6 Jul. 2005. </unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	A. Russo and R. Lo Cigno, "Delay-aware push/pull protocols for live video streaming in P2P systems," in Proc. IEEE Int. Conf. on Communications, ICC’10, 5 pp., Cape Town, South Africa, 23-27 May 2010. </unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	H. B. T. Lan and H. S. Nguyen, "A low-delay push-pull based application layer multicast for P2P live video streaming," in Proc. 3rd Int. Conf. on Knowledge and Systems Engineering, KSE’11, pp. 104-111, Hanoi, Vietnam, 14-17 Oct. 2011. </unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	Z. Li, Y. Yu, X. Hei, and D. H. K. Tsang, "Towards low-redundancy push-pull P2P live streaming," in Proc. of the 5th International ICST Conf. on Heterogeneous Networking for Quality, Reliability, Security and Robustness, 7 pp., HongKong, 28-31Jul. 2008. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	D. Qiu and R. Srikant, "Modeling and performance analysis of BitTorrent-like peer-to-peer networks," SIGCOMM Comput. Commun. Rev., vol. 34, no. 4, pp. 367-378, Oct. 2004. </unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	S. Xie, B. Li, G. Y. Keung, and X. Zhan, "Coolstreaming: design, theory, and practice," IEEE Trans. on Multimedia, 
vol. 9, no. 8, pp. 1661-1671, Dec. 2007. </unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	B. Li, et al., "Inside the new coolstreaming: principles, measurements and performance implications," in Proc. the 27th IEEE Conf. on Computer Communications, INFOCOM’08, pp. 1031-1039, Phoenix, AZ, USA, 13-18 Apr. 2008. </unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	C. Y. Keong, P. K. Hoong, and C. Ting, "Efficient hybrid push-pull based P2P media streaming system," in Proc. IEEE 17th Int. Conf. on Parallel and Distributed Systems, pp. 735-740, Tainan, Taiwan, 7-9 Dec. 2011. </unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	E. Kim, B. Kang, and C. Lee, "A hybrid push/pull streaming scheme using interval caching in P2P VOD systems," IEICE Trans. on Information and Systemsvol. 100-D, no. 3, pp. 582-586, Mar. 2017. </unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	S. M. Ronaghi, "A hybrid push-pull overlay network for peer-to-peer video streaming," International J. of Peer to Peer Networks, vol. 6, no. 1, 9 pp., Feb. 2015. </unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	C. Lee, S. Kim, and E. Kim, "Expediting P2P video delivery through a hybrid push-pull protocol," Advances in Electrical and Computer Engineering, vol. 15, no. 4, pp. 3-8, Nov. 2015. </unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	H. Ayatollahi, M. Khansari, and H. R. Rabiee, "A push-pull network coding protocol for live peer-to-peer streaming," Computer Networks, vol. 130, pp. 145-155, Jan. 2018. </unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	DENACAST. DENACAST: P2P video streaming simulation framework. 2011; Available from: http://www.omnetpp.org/omnetpp/doc_details/2260-denacast. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Grayscale Images Deblurring Using Robust Optimization Problem in Uncertainty Conditions in Blurring Model Parameters</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Zeinab</given_name><surname>Mohammadi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name> Ebrahim</given_name><surname>Daneshifar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Abbas</given_name><surname>Ebrahimi moghadam</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>M.</given_name><surname>Khademi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2021</year></publication_date><pages><first_page>318</first_page><last_page>326</last_page></pages><doi_data><doi>10.66224/ijece.28463.18.4.318</doi><resource>http://ijece.org/en/Article/28463</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28463</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28463</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28463</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28463</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28463</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28463</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28463</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. G. N. PerChristian Hansen and D. P. O’Leary, Deblurring Images Matrices, Spectra, and Filtering, Siam, 2006.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Gong, X. Jiang, and H. Li, "Optimization methods for regularization-based ill-posed problems: a survey and a multi-objective framework," Front. Comput. Sci., vol. 11, no. 3, pp. 362-391, Jun. 2017. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	J. M. Bioucas-Dias, "Blind estimation of motion blur parameters for image deconvolution," in Proc. Iberian Conference on Pattern Recognition and Image Analysis, pp. 604-611, Girona, Spain, 6-8 Jun. 2007. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	S. Xie, X. Zheng, W. Z. Shao, Y. D. Zhang, T. Lv, and H. Li, "Non-blind image deblurring method by the total variation deep network," IEEE Access, vol. 7, pp. 37536-37544, 2019. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. Q. Liu, X. Du, H. L. Shen, and S. J. Chen, "Estimating generalized Gaussian blur kernels for out-of-focus image deblurring," IEEE Trans. Circuits Syst. Video Technol., vol. 31, no. 3, pp. 829-843, Mar. 2020. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	م. دهقان و م. محزون، "حذف تاری از تصاویر تارشده در اثر لرزش دوربین،" هفتمین کنفرانس ماشین بینایی و پردازش تصویر، 5 صص.، تهران، ایران، 26-25 آبان 1390. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Welk, "A robust variational model for positive image deconvolution," Signal, Image Video Process., vol. 10, no. 2, pp. 369-378, 2016. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	M. Tofighi and O. Yorulmaz, "Phase and TV based convex sets for blind deconvolution of microscopic images," IEEE J. Sel. Top. Signal Process., vol. 4553, no. 1, pp. 1-11, Feb. 2015. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Yang, X. Su, and S. Chen, "Blind image deconvolution algorithm based on sparse optimization with an adaptive blur kernel estimation," Appl. Sci., vol. 10, no. 7, p. 2437, 2020. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	L. Chen, F. Fang, T. Wang, and G. Zhang, "Blind image deblurring with local maximum gradient prior," in Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pp. 1742-1750, Long Beach, CA, USA, 15-20 Jun. 2019. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	ز. دلخسته و م. طالبی، "حذف اثر تاری ناشی از حرکت در تصاویر،" چهارمین کنفرانس ملی فناوری اطلاعات، کامپیوتر و مخابرات ،18 صص.، مشهد، دانشگاه تربت حیدریه، 22 تير 1396. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	R. M. Kudupudi and A. K. Jagannatham, "Robust blurred image recovery using minimax and semi-definite programming approaches," in Proc. IEEE Int. Conf. on Multimedia and Expo, ICME’13, 6 pp., San Jose, CA, USA, 15-19 Jul. 2013. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	K. B. Petersen and M. S. Pedersen, The Matrix Cookbook, Technical University of Denmark, Nov. 2012. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	Y. Shi and Q. Chang, "Acceleration methods for image restoration problem with different boundary conditions," Appl. Numer. Math., vol. 58, no. 5, pp. 602-614, 2008. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Y. Xue-Fei, X. Ting-Fa, and B. Ting-Zhu, "Improved fixed point method for image restoration," Chinese J. Opt. Appl. Opt., vol. 6, 
no. 3, pp. 318-324, 2013. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	R. C. Gonzalez, Digital Image Processing, vol. 14, no. 3. 2002. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	L. E. L. Ghaoui, "Robust Solutions to Least-Squares Problems with Uncertain Data," 1997. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	H. Ji and K. Wang, "Robust image deblurring with an inaccurate blur kernel," IEEE Trans. on Image Processing, vol. 21, no. 4, pp. 1624-1634, Apr. 2012. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	A. Ben-Tal, L. El Ghaoui, and A. Nemirovski, Robust Optimization, Princeton University Press, 2009. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	E. A. Gharavol, Y. C. Liang, and K. Mouthaan, "Robust linear transceiver design in MIMO Ad Hoc cognitive radio networks," in Proc. IEEE 71st Veh. Technol. Conf., 5 pp, Taipei, Taiwan, 16-19 May 2010. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	B. Zhang, Z. He, K. Niu, and L. Zhang, "Robust linear beamforming for MIMO relay broadcast channel with limited feedback," IEEE Signal Process. Lett., vol. 17, no. 2, pp. 209-212, Feb. 2010. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. F. Sturm, "Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones," pp. 1-24, 1998. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	M. H. Al-Towaiq and Y. S. Abu, "Two improved classes of Broyden's methods for solving nonlinear systems of equations," J. Math. Comput. Sci., vol. 17, pp. 22-31, 2017. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	F. Toutounian, J. Saberi-Nadjafi, and S. H. Taheri, "A hybrid of the newton-GMRES and electromagnetic meta-heuristic methods for solving systems of nonlinear equations," J. Math. Model. Algorithms, vol. 8, no. 4, pp. 425-443, 2009. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	A. Ben-Tal and A. Nemirovski, Lectures on Modern Convex Optimization: Analysis, Algorithms, and Engineering Applications, Siam, 2001. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004. </unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	A. Hore and D. Ziou, "Image quality metrics: PSNR vs. SSIM," in Proc. Int. Conf. Pattern Recognit., pp. 2366-2369, Istanbul, Turkey, 23-26 Aug. 2010. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	U. Sara, M. Akter, and M. S. Uddin, "Image quality assessment through FSIM, SSIM, MSE and PSNR-a comparative study," J. Journal of Computational Chemistry., vol. 7, no. 3, pp. 8-18, 2019. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Z. Al-Ameen, "Faster deblurring for digital images using an ameliorated Richardson-Lucy algorithm," IEIE Trans. Smart Process. Comput., vol. 7, no. 4, pp. 289-295, 2018. </unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	E. A. Gharavol, Y. C. Liang, and K. Mouthaan, "Robust downlink beamforming in multiuser MISO cognitive radio networks," in Proc. IEEE 20th In. Symp. on Personal, Indoor, and Mobile Radio Communications pp. 808-812, Tokyo, Japan,13-16  Sept. 2009. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Scheduling of Scientific Workflow Applications in Multi-Cloud Environment Using Cuckoo Search Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>S.</given_name><surname>Mohammad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Latif</given_name><surname>PourKarimi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Somayeh</given_name><surname>Abdi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2021</year></publication_date><pages><first_page>337</first_page><last_page>344</last_page></pages><doi_data><doi>10.66224/ijece.28664.18.4.337</doi><resource>http://ijece.org/en/Article/28664</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28664</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28664</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28664</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28664</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28664</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28664</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28664</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	M. Mattoso, C. Werner, G. H. Travassos, V. Braganholo, E. Ogasawara, D. Oliveira, S. Cruz, W. Martinho, and L. Murta, "Towards supporting the life cycle of large scale scientific experiments," Int. J. Bus. Process Integr. Manag., vol. 5, no. 1, pp. 79-92, May 2010.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	T. Hey, S. Tansley, and K. M. Tolle, The Fourth Paradigm: Data-Intensive Scientific Discovery, vol. 1. Microsoft Research Redmond, WA, 2009. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	I. J. Taylor, E. Deelman, D. B. Gannon, and M. Shields, Workflows for E-Science: Scientific Workflows for Grids, Springer Publishing Company, Incorporated, 2014. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	L. Grandinetti, High Performance Computing and Grids in Action, vol. 16, IOS Press, 2008. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50-55, Dec. 2008. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared," in Proc. Grid Computing Environments Workshop, 10 pp., Austin, TX, USA , 12-16 Nov. 2008. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	F. Wu, Q. Wu, and Y. Tan, "Workflow scheduling in cloud: a survey," J. Supercomput., vol. 71, no. 9, pp. 3373-3418, May 2015. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Abrishami, M. Naghibzadeh, and D. H. J. Epema, "Deadline-constrained workflow scheduling algorithms for infrastructure as a service clouds," Futur. Gener. Comput. Syst., vol. 29, no. 1, pp. 158-169, Jun. 2013. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Abrishami, M. Naghibzadeh, and D. H. J. Epema, "Cost-driven scheduling of grid workflows using partial critical paths," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1400-1414, Aug. 2012. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	B. Lin, W. Guo, G. Chen, N. Xiong, and R. Li, "Cost-driven scheduling for deadline-constrained workflow on multi-clouds," in Proc. IEEE Int. Parallel and Distributed Processing Symp. Workshop, IPDPSW’15 , pp. 1191-1198, Hyderabad, India, 25-29 May 2015. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	B. Lin, et al., "A pretreatment workflow scheduling approach for big data applications in multi cloud environments," IEEE Trans. on Network and Service Management, vol. 13, no. 3, pp. 581-594, Sept. 2016. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. M. Fard, R. Prodan, and T. Fahringer, "A truthful dynamic workflow scheduling mechanism for commercial multicloud environments," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1203-1212, Jun. 2013. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Mohammadi, H. Pedram, and L. PourKarimi, "Integer linear programming-based cost optimization for scheduling scientific workflows in multi-cloud environments," the J. of Supercomputing, vol. 74, no. 9, pp. 4717-4745, Sep. 2018. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	M. S. Hosseini Shirvani, "A hybrid meta-heuristic algorithm for scientific workflow scheduling in heterogeneous distributed computing systems," Engineering Applications of Artificial Intelligence, vol. 90, Article No.: 103501, 20 pp., Apr. 2020. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	K. R. Escott, H. Ma, and G. Chen, "Genetic programming based hyper heuristic approach for dynamic workflow scheduling in the cloud," in Proc. Int. Conf. on Database and Expert Systems Applications, pp. 3141-3148, Canberra, ACT, Australia, 1-4 Dec. 2020. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	N. Rizvi and D. Ramesh, "HBDCWS: heuristic-based budget 
and deadline constrained workflow scheduling approach for heterogeneous clouds," Soft Computing, vol. 24, pp. 18971-18990, Jul. 2020. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	G. B. Berriman, et al., "Montage: a grid-enabled engine for delivering custom science-grade mosaics on demand," SPIE Astronomical Telescopes+ Instrumentation, pp. 221-232, Sept. 2004. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. Maechling, et al., "SCEC cybershake workflows-automating probabilistic seismic hazard analysis calculations," in Workflows for E-Science: Scientific Workflows for Grids, I. J. Taylor, E. Deelman, , D. B. Gannon, and M. Shields, (Eds.), pp. 143-163, Springer, 2007. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	-, USC Epigenome Center, [Online]. Available: http://epigenome.usc.edu. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	"LIGO project, LIGO-laser interferometer gravitational wave observatory," [Online]. Available: http://www.ligo.caltech.edu/.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	X. S. Yang and S. Deb, "Cuckoo search via Levy flights," in Proc. World Congress on,Nature &amp; Biologically Inspired Computing, NaBIC’09, pp. 210-214, Coimbatore, India, 91-11 Dec. 2009. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>SAHAR: An Architecture to Strengthen the Control Plane of the Software-Defined Network Against Denial of Service Attacks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>mehran</given_name><surname>shetabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ahmad</given_name><surname>Akbari</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2021</year></publication_date><pages><first_page>291</first_page><last_page>304</last_page></pages><doi_data><doi>10.66224/ijece.28703.18.4.291</doi><resource>http://ijece.org/en/Article/28703</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28703</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28703</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28703</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28703</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28703</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28703</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28703</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. McKeown, et al., "OpenFlow: enabling innovation in campus networks," SIGCOMM Comput Commun Rev., vol. 38, no. 2, pp. 69-74, Apr. 2008.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	H. Farhady, H. Lee, and N. Akihiro, "Software-defined networking: a survey," Computer Networks, vol. 81, pp. 79-95, 2015. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	I. Ahmad, S. Namal, M. Ylianttila, and A. Gurtov, "Security in software defined networks: a survey," IEEE Commun Surveys Tutorials, vol. 17, no. 4, pp. 2317-2346, 4th Quarter 2015. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	W. Li, W. Meng, and L. F. Kwok, "A survey on OpenFlow-based software defined networks: security challenges and countermeasures," J. Network Comput Appl., vol. 68, pp. 126-139, 2016. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	J. Benabbou, K. Elbaamrani, and N. Idboufker, "Security in OpenFlow-based SDN, opportunities and challenges," Photon Netw Commun, vol. 37, no. 1, pp. 1-23, 2019. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	S. Shin and G. Gu, "Attacking software-defined networks: a first feasibility study," in Proc. of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN '13, pp. 165-166, New York, NY, USA, Aug. 2013. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Dong, K. Abbas, and R. Jain, "A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments," IEEE Access, vol. 7, pp. 80813-80828, 2019. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	R. Swami, M. Dave, and V. Ranga, "Software defined networking based DDoS defense mechanisms," ACM Computing Surveys, vol. 52, no. 2, Article No.: 28, May 2019. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Open Networking Foundation, OpenFlow Switch Specification, version 1.2, Dec. 2011. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	H. Wang, L. Xu, and G. Gu, OF-GUARD: a DoS attack prevention extension in software-defined networks. Poster presented at: The Open Networking Summit 2014; 2014; Santa Clara, CA. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	S. Shin, V. Yegneswaran, P. Porras, and G. Gu, "AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks," in Proc. ACM SIGSAC Conf. on Computer &amp; Communications Security, CCS'13, pp. 413-424, New York, NY, USA, Nov. 2013. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	M. Ambrosin, M. Conti, F. De Gaspari, and R. Poovendran, "LineSwitch: tackling control plane saturation attacks in software-defined networking," IEEE/ACM Trans. Networking, vol. 25, no. 2, pp. 1206-1219, Apr. 2017. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	K. Y. Chen, A. R. Junuthula, I. K. Siddhrau, Y. Xu, and H. J. Chao, "SDNShield: towards more comprehensive defense against DDoS attacks on SDN control plane," in Proc. IEEE Conf. on Communications and Network Security, CNS'16, pp. 28-36, Philadelphia, PA, USA, 17-19 Oct. 2016. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Wang, L. Xu, and G. Gu, "FloodGuard: a DoS attack prevention extension in software-defined networks," in Proc. 45th Annual IEEE/IFIP Int. Conf. on Dependable Systems and Networks, pp. 239-250, Rio de Janeiro, Brazil, 22-25 Jun. 2015. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	L. Wei and C. Fung, "FlowRanger: a request prioritizing algorithm for controller DoS attacks in software defined networks," in Proc. IEEE Int. Conf. on Communications, ICC'15, pp. 5254-5259, London, UK, 8-12 Jun. 2015. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	T. Wang and H. Chen, "SGuard: a lightweight SDN safe-guard architecture for DoS attacks," China Commun., vol. 14, no. 6, pp. 113-125, 2017. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Lim, S. Yang, Y. Kim, S. Yang, and H. Kim, "Controller scheduling for continued SDN operation under DDoS attacks," Electron Lett., vol. 51, no. 16, pp. 1259-1261, Aug. 2015. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. Zhang, H. Wang, C. Hu, and C. Lin, "On denial of service attacks in software defined networks," IEEE Network, vol. 30, no. 6, pp. 28-33, Nov./Dec. 2016. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. Gao, Z. Peng, B. Xiao, A. Hu, and K. Ren, "FloodDefender: protecting data and control plane resources under SDN-aimed DoS attacks," in Proc. INFOCOM IEEE Conf. on Computer Communications, 9 pp., Atlanta, GA, USA, 1-4 May 2017. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	P. Wu, L. Yao, C. Lin, G. Wu, and M. S. Obaidat, "FMD: a DoS mitigation scheme based on flow migration in software-defined-networking," Int. J. Commun. Syst., vol. 31, no. 9, Article No.: e3543, Jun. 2018. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	Y. Wang, T. Hu, G. Tang, J. Xie, and J. Lu, "SGS: safe-guard scheme for protecting control plane against DDoS attacks in software-defined networking," IEEE Access, vol. 7, pp. 34699-34710, 2019. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Open Networking Foundation, OpenFlow Switch Specification, Version 1.3.5, Mar. 2015. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	https://se.mathworks.com/products/new_products/release2018b.html (Accessed Apr. 2019) </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Y. Han, J. H. Yoo, and J. Won-Ki Hong, "Poisson shot-noise process based flow-level traffic matrix generation for data center networks," in Proc. IFIP/IEEE Int. Symp. on Integrated Network Management, IM'15, pp. 450-457, Ottawa, Canada, 11-15 May 2015. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	B. Y. Yu, G. Yang, and C. Yoo, "Comprehensive prediction models of control traffic for SDN controllers," in Proc. IEEE Int. Conf. on Network Softwarization (NetSoft)-Technical Sessions, pp. 62-266, Montreal, Canada, 25-29 Jun. 2018. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	K. Kuroki, et al., "Redundancy method for highly available openflow controller," International J. on Advances in Internet Technology, vol. 7, no. 1-2, pp. 114-123, 2014. </unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	http://ryu.readthedocs.io/en/latest/nicira_ext_ref.html, (Accessed Apr. 2019). </unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	M. Faizul Bari, et al., "Dynamic controller provisioning in software defined networks," in Proc. of the 9th Int.l Conf. on Network and Service Management, CNSM'13, pp. 18-25, Zurich, Switzerland, 14-18 Oct. 2013. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	L. Peng, B. Yang, Y. Chen, and Z. Chen, "Effectiveness of statistical features for early stage internet trafﬁc identiﬁcation," Int. J. Parallel Program., vol. 44, no. 1, pp. 181-197, 2016. </unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	A. S. da Silva, C. C. Machado, R. V. Bisol, L. Z. Granville, and A. Schaeffer-Filho, "Identification and selection of ﬂow features for accurate trafﬁc classiﬁcation in SDN," in Proc. IEEE 14th Int. Symp. Netw. Comput. Appl., pp. 134-141, Cambridge, MA, USA, 28-30 Sept. 2015. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Hayes, B. Ng, A. Pekar, and W. K. G. Seah, "Scalable architecture for SDN trafﬁc classiﬁcation," IEEE Systems J., vol. 12, no. 4, pp. 3203-3214, Dec. 2017. </unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	M. Al-Maolegi and B. Arkok, "An improved apriori algorithm for association rules," International J. on Natural Language Computing, vol. 3, no. 1, pp. 22-29, Feb. 2014. </unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	Y. Zhao and Y. Zhang, "Comparison of decision tree methods for ﬁnding active objects," Advances in Space Research, vol. 41, no. 12, pp. 1955-1959, 2008. </unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	R. Quinlan, C4.5: Programs for Machine Learning, Morgan Kaufmann Publishers, 1993. </unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	N. Shelly, E. J. Jackson, T. Koponen, N. McKeown, and J. Rajahalme, "Flow caching for high entropy packet ﬁelds," ACM SIGCOMM Computer Communication Review., vol. 44, no. 4, pp. 151-156, Oct. 2014. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	S. Luo, H. Yu, and L. M. Li, "Fast incremental flow table aggregation in SDN," in Proc. 23rd Int. Conf. Computer Communication and Networks, ICCCN'14, 8 pp., Shanhai, China, 4-7 Aug. 2014. </unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	M. Rifai, et al., "Too many SDN rules? Compress them with MINNIE," in Proc. IEEE Global Communications Conference, GLOBECOM'15, 7 pp., San Diego, CA, USA, 6-10 Dec. 2015. </unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	Mininet Team 2018, "Mininet: an Instant Virtual Network on your Laptop (or other PC)," Available: http://mininet.org/</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	B. Lantz, B. Heller, and N. McKeown, "A network in a laptop: rapid prototyping for software-defined networks," in Proc. 9th ACM SIGCOMM Workshop on Hot Topics in NetworksArticle No.: 19, 6 pp., Oct. 2010. </unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	RYU SDN Framework, Ryubook 1.0 Documentation, Available: http://osrg.github.io/ryu/ (Accessed Apr. 2019). </unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	B. Pfaff, et al., "Extending networking into the virtualization layer," in Proc. of the ACM SIGCOMM HotNets Workshop, 6 pp., 2009. </unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	J. Dugan, et al., "Iperf-The TCP, UDP and SCTP network bandwidth measurement tool," [Online]. Available: https://iperf.fr/</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	Robin Richter, Hyenae, Available: https:// sourceforge.net/projects/hyenae/ (Dec. 2010) </unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	bwm-ng v0.6.2 Copyright (C) 2004-2019 Volker Gropp (bwmng@gropp.org) http://www.gropp.org/?id=projects&amp;sub=bwm-ng, Available: https://github.com/vgropp/bwm-ng</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Feature Selection Algorithm in Online Stream Dataset Based on Multivariate Mutual Information</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Maryam</given_name><surname>Rahmaninia</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Parham</given_name><surname>Moradi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2021</year></publication_date><pages><first_page>327</first_page><last_page>336</last_page></pages><doi_data><doi>10.66224/ijece.28768.18.4.327</doi><resource>http://ijece.org/en/Article/28768</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28768</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28768</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28768</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28768</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28768</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28768</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28768</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Dean, Big Data, Data Mining, and Machine Learning: Value Creation for Business Leaders and Practitioners, CreateSpace Independent Publishing Platform. 318, 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	S. Gilpin, B. Qian, and I. Davidson, "Efficient hierarchical clustering of large high dimensional datasets," in Proc. of the 22nd ACM Int. Conf. on Information, Knowledge Management, pp. 1371-1380, San Francisco, CA, USA, 27 Oct.-1 Nov. 2013. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. K. Farahat and A. Elgohary, A. Ghodsi, and M. Kamel, "Greedy column subset selection for large-scale data sets," Knowledge and Information Systems, vol. 45, pp. 1-34, 2014. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. Moradi and M. Gholampour, "A hybrid particle swarm optimization for feature subset selection by integrating a novel local search strategy," Applied Soft Computing, vol. 43, pp. 117-130, Jun. 2016. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Labani, et al., "A novel multivariate filter method for feature selection in text classification problems," Engineering Applications of Artificial Intelligence, vol. 70, pp. 25-37, Apr. 2018. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	H. Peng, F. Long, and C. Ding, "Feature selection based on mutual information: criteria of max-dependency, max-relevance, and min-redundancy," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 27, no. 8, pp. 1226-1238, Aug. 2005. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Wang, H. Li, D. Tao, K. Lu, and X. Wu, "Multimodal graph-based reranking for web image search," IEEE Trans. on on Image Processing, vol. 21, no. 11, pp. 4649-4661, Jul. 2012. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	X. Hu, P. Zhou, P. Li, J. Wang, and X. Wu, "A survey on online feature selection with streaming features," Frontiers of Computer Science, vol. 12, no. 3, pp. 479-493, May 2018. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. C. H. Hoi, J. Wang, P. Zhao, and R. Jin, "Online feature selection for mining big data," in Proc. of the 1st Int. Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications, pp. 93-100, Beijing, China, 12-14 Aug. 2012. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	K. Yu, et al., "Scalable and accurate online feature selection for big data," ACM Trans. on Knowledge Discovery from Data, vol. 11, no. 2, pp. 1-39, Jul. 2016. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	X. Wu, X. Wu, W. Ding, and J. Pei, "Online streaming feature selection," in Proc. of the 27th Int. Conf. on Machine Learning, pp. 1159-1166, 21-30, Jun. 2010. </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	J. Zhou, D. P. Foster, R. A. Stine, and L.  H. Ungar, "Streamwise feature selection," Journal of Machine Learning Research, vol. 7, no. 67, pp. 1861-1885, Jul. 2006. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Perkins and J. Theiler, "Online feature selection using grafting," in Proc. of the 12th Int. Conf. on Machine Learning, pp. 592-599, Washington, DC, USA,12-21Aug. 2003. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	X. Wu, et al., "Online feature selection with streaming features," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 35, no. 5, pp. 1178-1192, May 2013. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	J. Zhou, et al., "Streaming feature selection using alpha-investing," in Proc. of the 11th ACM SIGKDD Int. Conf. on Knowledge Discovery in Data Mining, pp. 384-393, Chicago, IL, USA, Chicago, IL, USA, 21-24 Aug. 2005. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	M. Rahmaninia and P. Moradi, "OSFSMI: online stream feature selection method based on mutual information," Applied Soft Computing, vol. 68, pp. 733-746, Jul. 2018. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	J. Liang, F. Wang, C. Dang and Y. Qian, "A group incremental approach to feature selection applying rough set technique," IEEE Trans. on Knowledge and Data Engineering, vol. 26, no. 2, pp. 294-308, Feb. 2014. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	K. Henni, N. Mezghani, and C. Gouin-Vallerand, "Unsupervised graph-based feature selection via subspace and pagerank centrality," Expert Systems with Applications, vol. 114, pp. 46-53, Dec. 2018. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	M. Bennasar, Y. Hicks, and R. Setchi, "Feature selection based on joint mutual information," Expert Systems with Applications, vol. 14, pp. 1-55, Sept. 2015. </unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	R. Battiti, "Using mutual information for selecting features in supervised neural net learning," IEEE Trans. on Neural Networks, vol. 5, no. 4, pp. 537-550, Jul. 1994. </unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	C. Lai, M. J. T. Reinders, and L. Wessels, "Random subspace method for multivariate feature selection," Pattern Recognition Letters, vol. 27, no. 10, pp. 1067-1076, Jul. 2006. </unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	M. Haindl, P. Somol, D. Ververidis, and C. Kotropoulos, "Feature selection based on mutual correlation," Pattern Recognition, Image Analysis and Applications, CIARP'06, Lecture Notes in Computer Science, vol. 4225, pp. 569-577, Jul. 2006. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. J. Ferreira and M. A. T. Figueiredo, "An unsupervised approach to feature discretization and selection," Pattern Recognition, vol. 45, no. 9, pp. 3048-3060, Sept. 2012. </unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	J. Liang, F. Wang, C. Dang, and Y. Qian, "A group incremental approach to feature selection applying rough set technique," IEEE Trans. on Knowledge and Data Engineering, vol. 26, no. 2, pp. 294-308, Feb. 2014. </unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Y. Zhang, A. Yang, C. Xiong, T. Wang, and Z. Zhang, "Feature selection using data envelopment analysis," Knowledge-Based Systems, vol. 64, pp. 70-80, Apr. 2014. </unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	S. J. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, Prentice Hall, 2005. </unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	D. B. Skalak, "Prototype and feature selection by sampling and random mutation hill climbing algorithms," in Proc. 11th Int. Conf. on Machine Learning, vol. 11, pp. 293-301, New Brunswick, NJ, USA, 10-13 Jul. 1994. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	D. Gelbart, N. Morgan, and A. Tsymbal, "Hill-climbing feature selection for multi-stream ASR," in Proc. 10th Annual Conf. of the Int. Speech Communication Association, INTERSPEECH'09, 4 pp., Brighton, UK, Sept. 2009. </unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	S. Tabakhi, P. Moradi, and F. Akhlaghian, "An unsupervised feature selection algorithm based on ant colony optimization," Engineering Applications of Artificial Intelligence, vol. 32, pp. 112-123, Feb. 2014. </unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	I. Guyon,  J. Weston, S. Barnhill, and V. Vapnik, "Gene selection for cancer classification using support vector machines," Machine Learning, vol. 46, no. 1-3, pp. 389-422, Jan. 2002. </unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	M. Pratama, G. Zhang, M. J. Er, and S. Anavatti, "An incremental type-2 meta-cognitive extreme learning machine," IEEE Trans. on Cybernetics, vol. 47, no. 2, pp. 339-353, Feb. 2017. </unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	E. Lughofer, "On-line incremental feature weighting in evolving fuzzy classifiers," Fuzzy Sets and Systems, vol. 163, no. 1, pp. 1-23, Jan. 2011. </unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	S. Eskandari and M. M. Javidi, "Online streaming feature selection using rough sets," International Journal of Approximate Reasoning, vol. 69, pp. 35-57, Feb. 2016. </unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	J. Liu, Y. Lin, T. Li, W. Wang, and S. Wu, "Online multi-label streaming feature selection based on neighborhood rough set," Pattern Recognition, vol. 84, pp. 273-287, Jul. 2018. </unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	H. Wang, et al., "Multi-label online streaming feature selection based on spectral granulation and mutual information," in Rough Sets, Cham: Springer International Publishing, 2018. </unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	H. Li, X. Wu; Z. Li, and W. Ding, "Group feature selection with streaming features," in Proc. IEEE 13th Int. Conf. on Data Mining pp. 1109-1114,, Dallas, TX, USA, Dec. 2013. </unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	J. Wang, et al., "Online feature selection with group structure analysis," IEEE Trans. on Knowledge and Data Engineering, vol. 27, no. 11, pp. 3029-3041, Nov. 2015. </unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	J. Liu, Y. Lin, S. Wu, and C. Wang, "Online multi-label group feature selection," Knowledge-Based Systems, vol. 143, pp. 42-57, Mar. 2018. </unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	T. M. Cover and J. A. Thomas, Elements of Information Theory, Wiley-Interscience, 2006. </unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	K. He and G. Meeden, "Selecting the number of bins in a histogram: a decision theoretic approach," J. of Statistical Planning and Inference, vol. 61, no. 1, pp. 49-59, May 1997. </unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	W. McGill, "Multivariate information transmission," Trans. of the IRE Professional Group on Information Theory, vol. 4, no. 4, pp. 93-111, Jun. 1954. </unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	N. S. Altman, "An introduction to kernel and nearest-neighbor nonparametric regression," The American Statistician, vol. 46, no. 3, pp. 175-185, Aug. 1992. </unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	I. H. Witten, E. Frank, and M. A. Hall, Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann Publishers Inc., 2011. </unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	M. Friedman, "A comparison of alternative tests of significance for the problem of m rankings," The Annals of Mathematical Statistics, vol. 11, no. 1, pp. 86-92, Mar. 1940. </unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	K. Yu, W. Ding, and X. Wu, "LOFS: a library of online streaming feature selection," Knowledge-Based Systems, vol. 113, pp. 1-3, Mar. 2016. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>An Adaptive Multi-Objective Clustering Algorithm based on Auction_Prediction for Mobile Target Tracking in Wireless Sensor Network</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Roghieh</given_name><surname>Alinezhad</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Sepideh</given_name><surname>Adabi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>arash</given_name><surname>Sharifi</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2021</year></publication_date><pages><first_page>276</first_page><last_page>290</last_page></pages><doi_data><doi>10.66224/ijece.28824.18.4.276</doi><resource>http://ijece.org/en/Article/28824</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28824</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28824</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28824</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28824</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28824</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28824</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28824</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Zheng, et al., "Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks," Special Issue on Ubiquitous Computing and Future Communication Systems, vol. 39, pp. 88-99, Oct. 2014.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Chen, C. Zhang, W. Liang, and H. Yu, "Auction based dynamic coalition for single target tracking in wireless sensor networks," 
in Proc. of the 6th World Congress on Intelligent Control and Automation, pp. 94-98, Dalian, China, 21-23 Jun. 2006. </unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Alaybeyoglu, O. Dagdeviren, K. Erciyes, and A. Kantarci, "Performance evaluation of cluster-based target tracking protocols for wireless sensor networks," in Proc. of the 24th Int. Symp. on Computer and Information Sciences, pp. 357-362, Guzelyurt, Northern Cyprus, 14-16 Sept. 2009. </unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	F. Hamzeloei and M. K. Dermany, "Topsis based cluster head selection for wireless sensor network," Procedia Computer Science, vol. 98, pp. 8-15, 2016. </unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	M. Abdolkarimi, S. Adabi, and A. Sharifi, "A new multi-objective distributed fuzzy clustering algorithm for wireless sensor networks with mobile gateways," AEU-International J. of Electronics and Communications, vol. 89, pp. 92-104, May 2018. </unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Liu and S. Zhao, "High-performance target tracking scheme with low prediction precision requirement in WSNs," International J. of Ad Hoc and Ubiquitous Computing, vol. 29, no. 4, pp. 270-289, 2018. </unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	M. Elhoseny and A. E. Hassanien, "Optimizing cluster head selection in WSN to prolong its existence," Dynamic Wireless Sensor Networks. Studies in Systems, Decision and Control, vol. 165, pp. 93-111, 2019. </unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	J. R. Parvin and C. Vasanthanayaki, "Particle swarm optimization-based energy efficient target tracking in wireless sensor network," Measurement, vol. 147, Article No.: 106882, 8 pp., Dec. 2019. </unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	T. Wang, et al., "Target localization and tracking based improved bayesian enhanced least-squares algorithm in wireless sensor networks," Computer Networks, vol. 167, Article No.: 106968, 11 Feb. 2020. </unstructured_citation></citation><citation key="ref10"><unstructured_citation>


 
[10]	C. Lersteau, A. Rossi, and M. Sevaux, "Minimum energy target tracking with coverage guarantee in wireless sensor networks," European J. of Operational Research, vol. 265, no. 3, pp. 882-894, 16 Mar. 2018. </unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	F. Delavernhe, C. Lersteau, A. Rossi, and M. Servaux, "Robust scheduling for target tracking using wireless sensor networks," Computers &amp; Operations Research, vol. 116, Article No.: 104873, Apr. 2020</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	E. Fayazi Barjini, D. Gharavian, and M. Shahgholian, "Target tracking in wireless sensor networks using NGEKF algorithm," J. of Ambient Intelligence and Humanized Computing, vol. 11, pp. 3417-3429, 2020. </unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	X. Lu, Y. Zhang, J. Liu, F. Yuan, and L. Cheng, "Mobile target tracking algorithm for wireless camera sensor networks with adjustable monitoring direction of nodes," International J. of Communication Systems, vol. 32, no. 10, Article No.: e3944, 10 Jul. 2019. </unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	H. Ahmadi, F. Viani, and R. Bouallegue, "An accurate prediction method for moving target localization and tracking in wireless sensor network," Ad Hoc Networks, vol. 70, pp. 14-22, Mar. 2018. </unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	A. Milan, S. H. Rezatofighi, and A. Dick, "Online multi-target tracking using recurrent neural networks," in Proc. of the 31st AAAI Conf. on Artificial Intelligence, AAAI’17, pp. 4225-4232, San Francisco, CA, USA, 4-9 Feb. 2017. </unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	J. Munjani and M. Joshi, "Target tracking in WSN using time delay neural network," J. of Machine Intelligence, vol. 2, no. 2, pp. 16-22, 2017. </unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	G. Han, J. Chao, C. Zhang, L. Shu, and Q. Li, "The impacts of mobility models on DV-hop based localization in mobile wireless sensor networks," J. of Network and Computer Applications, vol. 42, pp. 70-79, Jun. 2014. </unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	F. Zhen, Z. Zhao, D. Geng, Y. Xuan, L. Du, and C. Xunxue, "RSSI variability characterization and calibration method in wireless sensor network," in Proc. Int. Conf. on Information and Automation, Harbin, China, pp. 1532-1537, 20-23 Jun. 2010. </unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Green Cloud Computing with Reduced Energy Consumption in Live Migration Prioritizing Services </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mohammad</given_name><surname>Rostami</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Salman</given_name><surname>Goli</surname></person_name></contributors><publication_date media_type="online"><month>9</month><day>4</day><year>2021</year></publication_date><pages><first_page>305</first_page><last_page>317</last_page></pages><doi_data><doi>10.66224/ijece.28855.18.4.305</doi><resource>http://ijece.org/en/Article/28855</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/en/Article/Download/28855</resource></item><item crawler="google"><resource>http://ijece.org/en/Article/Download/28855</resource></item><item crawler="msn"><resource>http://ijece.org/en/Article/Download/28855</resource></item><item crawler="altavista"><resource>http://ijece.org/en/Article/Download/28855</resource></item><item crawler="yahoo"><resource>http://ijece.org/en/Article/Download/28855</resource></item><item crawler="scirus"><resource>http://ijece.org/en/Article/Download/28855</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/en/Article/Download/28855</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	X. Ye, Y. Yin, and L. Lan, "Energy-efficient many-objective virtual machine placement optimization in a cloud computing environment," IEEE Access, vol. 5, pp. 16006-16020, 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	P. Bezerra, G. Martins, R. Gomes, F. Cavalcante and A. Costa, "Evaluating live virtual machine migration overhead on client's application perspective," in Proc. Int. Conf. on Information Networking, ICOIN'17, pp. 503-508, Da Nang, Vietnam, 11-13 Jan. 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. Beloglazov and R. Buyya, "Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers," Concurrency and Computation: Practice and Experience, vol. 24, no. 13, pp. 1397-1420, Sept. 2012.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	P. G. J. Leelipushpam, J. Sharmila, "Live VM migration techniques in cloud environment - a survey," in Proc. IEEE Conf. on Information &amp; Communication Technologies, pp. 408-413, Thuckalay, India, 11-12 Apr. 2013</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	W. S. Cleveland, "Robust locally weighted regression and smoothing scatterplots," J. of the American Statistical Association, vol. 74, 
no. 368, pp. 829-836, Dec. 1979.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Verma, G. Dasgupta, T. K. Nayak,  P. De, and R. Kothari, "Server workload analysis for power minimization using consolidation," in Proc. of the Conf. on USENIX Annual Technical Conf., pp. 1-28, San Diego, CA, USA, 14-19 Jun. 2009.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	X. Fu and C. Zhou, "Virtual machine selection and placement for dynamic consolidation in cloud computing environment," Frontiers of Computer Science, vol. 9, no. 2, pp. 322-330, Feb. 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Esfandiarpoor, A. Pahlavan, and M. Goudarzi, "Structure-aware online virtual machine consolidation for datacenter energy improvement in cloud computing," Computers &amp; Electrical Engineering, vol. 42, no. 1, pp. 74-89, Feb. 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	D. Patel, R. K. Gupta, and R. Pateriya, "Energy-aware prediction-based load balancing approach with VM migration for the cloud environment," Data, Engineering and Applications, vol. 2, no. 1, pp. 59-74, Apr. 2019.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	J. Gao and G. Tang, "Virtual machine placement strategy research," in Proc. IEEE Int. Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp 294-297,  Beijing, China, 10-12 Oct. 2013.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	J. Wan, F. Pan, and C. Jiang, "Placement strategy of virtual machines based on workload characteristics," in Proc. IEEE 26th Int. Parallel and Distributed Processing Symp. Workshops &amp; PhD Forum, pp. 2140-2145,  Shanghai, China, 21-25 May 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	A. J. Younge, et al., "Efficient resource management for cloud computing environments," in Proc. IEEE Int. Conf. on Green Computing, pp. 357-364, Chicago, IL, USA, 15-18 Aug. 2010.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. B. Nagpure, P. Dahiwale, and P. Marbate, "An efficient dynamic resource allocation strategy for VM environment in cloud," in Proc. IEEE Int. Conf. on Pervasive Computing, ICPC'15, 5 pp., Pune, India, 8-10 Jan.  2015.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	X. Zheng and Y. Cai, "Dynamic virtual machine placement for cloud computing environments," in Proc. IEEE 43rd Int. Conf. on Parallel Processing Workshops, pp. 121-128, Minneapolis, MN, USA, 9-12 Sept. 2014.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	E. Asyabi and M. Sharifi, "A new approach for dynamic virtual machine consolidation in cloud data centers," International J. of Modern Education and Computer Science, vol. 7, no. 4, pp. 61-66, Apr. 2015.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	D. Gmach, et al., "Capacity management and demand prediction for next generation data centers," in Proc. IEEE Int. Conf. on Web Services, ICWS'07, pp. 43-50, Salt Lake City, UT, USA, 9-13 Jul. 2007.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	T. Wood, et al., "Profiling and modeling resource usage of virtualized applications," in Proc. ACM/IFIP/USENIX Int. Conf. on Distributed Systems Platforms and Open Distributed Processing, pp. 366-387, Berlin, Germany, 2008.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	J. Sonnek, et al., "Starling: minimizing communication overhead in virtualized computing platforms using decentralized affinity-aware migration," in Proc. IEEE 39th Int. Conf. on Parallel Processing, pp. 228-237, San Diego, CA, USA, 13-16 Sept. 2010.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	L. Hu, et al., "Net-cohort: detecting and managing vm ensembles in virtualized data centers," in Proc. of the 9th Int. Conf. on Autonomic Computing, pp. 3-12, San Jose, CA, USA, 18-21 Sept. 2012.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	J. T. Piao and J. Yan, "A network-aware virtual machine placement and migration approach in cloud computing," in Proc. IEEE 9th Int. Conf. on Grid and Cloud Computing, pp. 87-92, Nanjing, China, 1-5 Nov. 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	K. Tsakalozos, M. Roussopoulos, and A. Delis, "Hint-based execution of workloads in clouds with nefeli," IEEE Trans. on Parallel and Distributed Systems, vol. 24, no. 7, pp. 1331-1340, Jul. 2012.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	Z. Xiao, Q. Chen, and H. Luo, "Automatic scaling of internet applications for cloud computing services," IEEE Trans. on Computers, vol. 63, no. 5, pp. 1111-1123, Nov. 2012.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	S. Srikantaiah, A. Kansal, and F. Zhao, "Energy aware consolidation for cloud computing," in Proc. of the Conf. on Power Aware Computing and Systems, vol. 10, pp. 46-56, Berkeley, CA, USA, 7-10 Dec. 2008.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	M. Cardosa, M. R. Korupolu, and A. Singh, "Shares and utilities based power consolidation in virtualized server environments," in Proc. IFIP/IEEE Int. Symp. on Integrated Network Management, pp. 327-334, New York, NY, USA, 1-5 Jun. 2009.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	M. Noshy, A. Ibrahim, and H. A. Ali, "Optimization of live virtual machine migration in cloud computing: a survey and future directions," J. of Network and Computer Applications, vol. 110, no. 1, pp. 1-10, May 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	A. Alarifi, et al., "Energy-efficient hybrid framework for green cloud computing," IEEE Access, vol. 8, pp. 115356-115369, Jun. 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	P. Geetha and C. R. R. Robin, "Power conserving resource allocation scheme with improved QoS to promote green cloud computing," J. of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 7153–7164, Jul. 2020.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	N. J. Kansal and I. Chana, "Energy-aware virtual machine migration for cloud computing-a firefly optimization approach," J. of Grid Computing, vol. 14, no. 2, pp. 327-345, Feb. 2016.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	J. Meshkati and F. Safi-Esfahani, "Energy-aware resource utilization based on particle swarm optimization and artificial bee colony algorithms in cloud computing," The J. of Supercomputing, vol. 75, no. 5, pp. 2455-2496, May 2019.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	G. Singh, M. Malhotra, and A. Sharma, "A comprehensive study 
on virtual machine migration techniques of cloud computing," Applications of Computing, Automation and Wireless Systems in Electrical Engineering, vol. 553, no. 1, pp. 591-603, Jun. 2019.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	K. Park and V. S. Pai, "CoMon: a mostly-scalable monitoring system for PlanetLab," ACM SIGOPS Operating Systems Review, vol. 40, no. 1, pp. 65-74, Jun. 2006.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>