تجاوز إلى المحتوى الرئيسي
User Image

أ.د. محمد آمون أحمد شرابي

Professor

أستاذ - مشرف مكتب الآيزو

كلية المجتمع بالرياض
مبنى 2، دور 2، مكتب 1
المنشورات
مقال فى مجلة
2018

On the design of reactive approach with flexible checkpoint interval to tolerate faults in cloud computing systems

Mohammed Amoon, . 2018

The likelihood of failures rises in cloud computing systems as a result of their unstable nature. Additionally, the size of a cloud computing system varies with time and thus failures become a common incident. Failures have a high impact on cloud performance and the expected benefits for both customers and providers. Fault tolerance is an essential challenge facing cloud providers in order to mitigate the effects of failures and maintaining the Service Level Agreement (SLA) satis‑ fied. Checkpointing is one of the most known reactive fault tolerance techniques used in distributed computing. However, it can incur considerable overheads that depend on the interval of the checkpoint applied and these overheads put down the performance of the cloud. In this paper, a reactive fault tolerance approach in the context of checkpointing is proposed and evaluated with the aim of getting better performance. The approach depends on applying a flexible interval of the checkpoint to reduce overheads. Simulation experiments indicate superior performance of the approach in terms of power consumption, response time, monetary cost and cloud capacity. 

نوع عمل المنشور
Research paper
مجلة/صحيفة
Journal of Ambient Intelligence and Humanized Computing
مزيد من المنشورات
publications

The increasing growth in the demand for cloud computing services, due to the increasing digital transformation and the high elasticity of the cloud, requires more efforts to improve the electrical…

2020
publications

This paper aims to reduce the embedding errors, maintain the image fidelity, and reduce the errors, when detecting the embedded messages in images.

2020
publications

حاليًّا، تَستخدم معظمُ المؤسسات والهيئات تقنيةَ المعلومات والإنترنت؛ ونتيجة لذلك تتعرض للعديد من التهديدات والهجمات السيبرانية. لذا، هناك حاجة ماسَّة لتوفير الحماية لتجنُّب تلك التهديدات أو…

بواسطة تأليف: Stefan Beissel, ترجمة أ.د. محمد آمون شرابي
2020
تم النشر فى:
دار جامعة الملك سعود للنشر