尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
DOI:10.5121/ijfcst.2016.6107 87
REVIEW AND COMPARISON OF TASKS SCHEDULING
IN CLOUD COMPUTING
Yousef Tohidirad1
, Zahed Soltani aliabadi2
, Abdolsalam Azizi3
, Siamak Abdezadeh4
and Mohammad Moradi5
1
Department of Computer Engineering, Electronic Branch, Islamic Azad University,
Tehran, Iran
2,3
Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia,
Iran
4
Department of Computer, Boukan Branch, Islamic Azad University, Boukan, Iran
5
Department of Computer, Baneh Branch, Islamic Azad University, Baneh, Iran
ABSTRACT
Recently, there has been a dramatic increase in the popularity of cloud computing systems that rent
computing resources on-demand, bill on a pay-as-you-go basis, and multiplex many users on the same
physical infrastructure. It is a virtual pool of resources which are provided to users via Internet. It gives
users virtually unlimited pay-per-use computing resources without the burden of managing the underlying
infrastructure. One of the goals is to use the resources efficiently and gain maximum profit. Scheduling is a
critical problem in Cloud computing, because a cloud provider has to serve many users in Cloud
computing system. So scheduling is the major issue in establishing Cloud computing systems. The
scheduling algorithms should order the jobs in a way where balance between improving the performance
and quality of service and at the same time maintaining the efficiency and fairness among the jobs. This
paper introduces and explores some of the methods provided for in cloud computing has been scheduled.
Finally the waiting time and time to implement some of the proposed algorithm is evaluated.
KEYWORDS
Cloud Computing, scheduling algorithms, Scheduling Management, Virtual Machine (VM), CloudSim.
1. INTRODUCTION
Modern communication has been termed as ‘viral exchange of information’. This follows to the
effect that the contemporary world is subject to internet communication, which sees people share
information in a ‘ghostly’ manner. In the actual sense, the ‘people’ who communicate during this
process are the machines involved, mostly the computers and servers [1]. Users of the internet
have seen continuous manipulation of data that they share. This aspect is controlled by the fact
that users are many, thereby making the computers to be subject to heavy task scheduling
protocols. This aims to have many people access the internet with ease and in the required
bandwidth. The interconnection of these processes, despite the difference in the computer
processors, is termed as Cloud Computing.
Cloud computing is a technique that uses the most elemental issues of information sharing. In this
manner, there is a rightly developed infrastructure as well as the interrelating services. Different
relating concepts are described within the aspects of the process. A number of computers are
always connected in the network in real-time [2]. Users have the ability to reach the GUI features
without knowing the applied expertise on the same. This is well laid under the principle of
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
88
visualization. Visualization is the main intention of the technology with the intention of running
numerous VMs on a single machine with the required specifications of load balancing. In this
way, a good task scheme is used to expand the ability for the load balancing under task
scheduling within the specified distribution system. There is an ABC presence inspired by the life
of the honeybee. To improve the performance of the process, there are created set of behaviours
and techniques designed by the required personnel to utilize the given designs under the designs
of the ABC algorithm [3].
2. MATERIALS AND METHODS
2.1. Basics of ABC
As a concern of VM scheduling, ABC algorithm has stood as the ideal measure for its success for
most special implementations [4].While being used from time to time, the algorithm has been
effective for the establishment of the right value. While working under the principle of the
honeybees, information sharing on machines is based on source details, destination, network
quality, player of the network, threats and design tricks of the network. This can be describes by
the ABC pseudo code shown in Figure 1 [1].
Figure 1. ABC pseudo code/ basic algorithm of ABC aimed at having tasks scheduled [1]
2.2. ABC in application
The major intention of Cloud Computing is the existence of self-motivated a pool of VM
resources [5]. The VM requirements are defined according to the system’s users. This is done in
accordance with the expected design specifications. Using the acceptable Cloud Management
policies, possibility for routing specifications is established. This aspect is done within the limits
of the available servers while looking at the cloud management. Under the same specifications, it
is possible have different degrees of scheduling management while considering the load levels
within VMs. The balancing along this line should leave the best room for the reduction of
maskespan and response time.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
89
Since the machines have the general outlook of virtual presence, it is good to represent them
under a set of numbers for the resultant or overall virtuosity as shown in the equation (1) [1].
VM = {VM1, VM2, VM3,… ,VMN} (1)
These machines are subject to individual tasks that result into an overall system task as shown in
the equation (2) [1].
Tack = {tack1, tack2, tack3,… ,tackK} (2)
The machines work in tandem (parallel) using different processors. In this way, the scheduling
ability is non-preventive. As a result, figure 2 shows the diagram a flowchart of the task
scheduling under the ABC instructions [1].
Figure 2. ABC instruction and the scheduling modality [1]
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
90
In the second process, evaluation of the population’s fitness is a calculation based on the formula
(3) [1].
j
n
i
ij
ij
VMofcapacitytheofevalution
lengthtask
fit
∑=
= 1
_
(3)
In this case, the fitness of the process numbers are shown by fit within the capacity of VM within
the tasks of descriptions task length. To obtain the overall capacity, equation (4) is applicable [1].
jjj bwvmmipspenumpecapacityj __*_ += (4)
In this case, the number of processors in the system is indicated by _ within the
instruction limits shown by _ in the required bandwidth of _ as per the ability of
the virtual machines. The identification and the allocation of these elements lead to the fitness
selection of the required neighbourhood VMs. When the process recruitment reaches, the
bounding element is definable by the formula (5) [1].
j
n
i
i
ij
VMofcapacitytheofevalution
lengthinputfilelengthtask
fit
∑=
+
= 1
__
(5)
In this case, the input File length becomes the size of the task with pending execution details.
Once this is done, the overshadowing fitness is chosen in line with the assign task VM. This
allows the calculation of load balance within the workload VMs as per the information obtained
from the datacentre [6]. It becomes easier to get the standard deviation with respect to the actual
load VMs as formula (6) [1].
2^)(
1
..
0
∑=
−=
n
j
j XX
n
DS (6)
Any VM now has a processing time indicated by the equation (7) [1].
j
k
i
i
j
capacity
lengthtask
X
∑=
= 1
_
(7)
The mean processing time for all the VMs is also indicated as formula (8) [1].
n
X
X
n
j
j∑=
=
1
(8)
From the above conclusive equations, it can be stated that whenever S.D. of the full VM becomes
less or equal to mean, a balanced state of the system is experienced. In case S.D. is higher than
the mean, the imbalance state prevails [7].
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
91
2.3. Results and discussion
By the use of a CloudSim tool (any version from 3.0.1); the simulation platform is subject to the
table 1 [1].
TABLE 1. Parameters for the CloudSim setting [1]
For setting the ABC algorithm, the parameters are shown in TABLE 2 [1].
TABLE 2. Parameters for improved ABC setting [1]
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
92
As possible to establish, the assessment of the procedure is describable under three algorithmic
instructions. There is the presence of First Come First Served (FCFS) that works on the
chronological reach of the given task. There is the Shortest Job First (SJF) that considers the
sequencing by making the selection of the first job in short terms stated [8]. The Longest Job First
(LJF) ensures that the heavy job is selected first. The results of the first and the second
experiments are shown in Figures 3 and 4[1, 5].
Figure 3. Comparison of makespan and the tasks
Figure 4. Comparison of makespan and the number of VMs
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
93
As shown in figure 3, there are a number of increasing requests. As a result, the average numbers
of requests being made are progressing under the same design specifications [9, 10, 11, and 12].
Consequently, ABC_LJF can be said to be effective within the required scheduling on the full
system [12, 13]. As for the second experiment, there is an exponential decay of makespan with
the number of VMs. In the same design show, the previous conclusion still prevails.
3. CONCLUSION
As the paper indicates, ABC controlled algorithm is seen to be suitable for solutions surrounding
VM scheduling management so that the tasks are scheduled in the right manner and needs. This
goes under the adjustable features in Cloud Computing. As these parameters are optimized, the
stability of the system still prevails. This allows the system to operate with optimum utility. It is
then imperative to state that ABC algorithm is good for Cloud Computing and its environment
under the utility of the required parameters in a manner that the tasks are handled with utmost
utility. This stability makes the system to works without crashing in the manners of ABC_LJF
needs and designs.
REFERENCES
[1] B. Kruekaew, W. Kimpan, “Virtual Machine Scheduling Management on Cloud Computing Using
Artificial Bee Colony”, Proceedings of the International MultiConference of Engineers and Computer
Scientists, pp.978-988, 2014.
[2] D.H. Khan, D. Kapgate, P.S. Prasad, “A Review on Virtual Machine Management Techniques and
Scheduling in Cloud Computing” International Journal of Advanced Research in Computer Science
and Software Engineering, 3(12), pp.838-845, 2013.
[3] S. Hadi, “Advantages, Challenges and Optimizations of Virtual Machine Scheduling in Cloud
Computing Environments”, International Journal of Computer Theory and Engineering, 4(2), 2012.
[4] G. TARUN, “Host Scheduling Algorithm Using Genetic Algorithm In Cloud Computing
Environment”, International Journal of Research in Engineering & Technology, 1(1), 2013.
[5] K. Kiran, “An Adaptive Algorithm For Dynamic Priority Based Virtual Machine Scheduling In
Cloud”, International Journal of Computer Science Issues, 9(6), 2012.
[6] I. Moschakis, H. Karatza, “Performance and Cost evaluation of Gang Scheduling in a Cloud
Computing System with Job Migrations and Starvation Handling”, Thessaloniki: Aristotle University
of Thessaloniki, 2013
[7] N. Ramkumar, “Efficient Resource Utilization Algorithm (ERUA) for Service Request Scheduling in
Cloud”, International Journal of Engineering and Technology, 5(2), 2013.
[8] V. Vignesh, K.K. Sendhil, N. Jaisankar, “Resource management and scheduling in cloud
environment”, International Journal of Scientific and Research Publications, 3(6), 2013.
[9] K. Rasmi, V. Vive, “Resource Management Techniques in Cloud Environment - A Brief Survey”,
International Journal of Innovation and Applied Studies, 2(4), 2013.
[10] S.P. Abirami, R. Shalini, “Linear Scheduling Strategy for Resource allocation in Cloud
Environment”, International Journal on Cloud Computing and Architecture, 2(1), 2012.
[11] S. Paulus, U. Riemann, “An Approach for a Business-driven Cloud-compliance Analysis Covering
Public Sector Process Improvement Requirements”, International Journal of Managing Public Sector
Information and Communication Technologies (IJMPICT), Vol. 4, No. 3, pp. 1-13, 2013.
[12] R. Saini, Indu, “EFFICIENT JOB SCHEDULING OF VIRTUAL MACHINES IN CLOUD
COMPUTING”, International Journal of Advanced Research in Computer and Communication
Engineering, pp.3349-3354, 2013.
[13] S. Hashemi, “Cloud computing technology for E-government architecture”, International Journal in
Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, pp. 15-23, 2013.

More Related Content

What's hot

IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET Journal
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
IRJET Journal
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET Journal
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
VLSICS Design
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Editor IJCATR
 
Solving linear equations from an image using ann
Solving linear equations from an image using annSolving linear equations from an image using ann
Solving linear equations from an image using ann
eSAT Journals
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
vineet raj
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET Journal
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain Tumor
IRJET Journal
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classification
ijtsrd
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
AM Publications
 
Kandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kandemir Inferring Object Relevance From Gaze In Dynamic ScenesKandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kalle
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
IJERA Editor
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
Iasir Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
IRJET Journal
 
B018110915
B018110915B018110915
B018110915
IOSR Journals
 
Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.
Tushar Shinde
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
IOSRjournaljce
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET Journal
 

What's hot (20)

IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different Classifier
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
Solving linear equations from an image using ann
Solving linear equations from an image using annSolving linear equations from an image using ann
Solving linear equations from an image using ann
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System Operations
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain Tumor
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classification
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
Kandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kandemir Inferring Object Relevance From Gaze In Dynamic ScenesKandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kandemir Inferring Object Relevance From Gaze In Dynamic Scenes
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
 
B018110915
B018110915B018110915
B018110915
 
Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...
 

Viewers also liked

Step up to serve: presentation to CCCW, Dec 2014
Step up to serve: presentation to CCCW, Dec 2014Step up to serve: presentation to CCCW, Dec 2014
Rede Mulher Empreendedora
Rede Mulher Empreendedora Rede Mulher Empreendedora
Rede Mulher Empreendedora
ANA FONTES
 
XING & Karriere-Entwicklung
XING & Karriere-Entwicklung XING & Karriere-Entwicklung
XING & Karriere-Entwicklung
Jo Havemann
 
Resource Efficient Wales (REW)
Resource Efficient Wales (REW)Resource Efficient Wales (REW)
Ctm verso altrobilancio-2010
Ctm verso altrobilancio-2010Ctm verso altrobilancio-2010
Ctm verso altrobilancio-2010
Guido Vittorio Leoni
 
Planejamento de Marketing para PMES -FGV Maio de 2014
Planejamento de Marketing para PMES -FGV Maio de 2014 Planejamento de Marketing para PMES -FGV Maio de 2014
Planejamento de Marketing para PMES -FGV Maio de 2014
ANA FONTES
 
Viretori Main Pres 090909/ Workshop 1/Arne van Osterom
Viretori Main Pres 090909/ Workshop 1/Arne van OsteromViretori Main Pres 090909/ Workshop 1/Arne van Osterom
Viretori Main Pres 090909/ Workshop 1/Arne van Osterom
Satu Miettinen
 
Amazing optical illusion photography Part-4
Amazing optical illusion photography Part-4Amazing optical illusion photography Part-4
Amazing optical illusion photography Part-4
Sayyedul Hoq
 
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
ANA FONTES
 
5 semestre integrada gabarito
5 semestre integrada gabarito5 semestre integrada gabarito
5 semestre integrada gabarito
pablonaba
 
体验的历程 Afooli
体验的历程 Afooli体验的历程 Afooli
体验的历程 Afooli
Alite Yu
 
Mobile apps for your sale
Mobile apps for your saleMobile apps for your sale
Mobile apps for your sale
Whalla Labs
 
性權:台鐵 火車趴報告
性權:台鐵 火車趴報告性權:台鐵 火車趴報告
性權:台鐵 火車趴報告柏臣 陳
 
WikiVermo
WikiVermoWikiVermo
WikiVermo
Peter Tattersall
 
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech
 
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.082016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
vinhbinh2010
 
Pozvánka
PozvánkaPozvánka
Pozvánka
Miky Kuboňová
 
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)小均 張
 
Top 10 Blacks
Top 10 BlacksTop 10 Blacks
Top 10 Blacks
jaloisi
 
Playing With Spanish Words
Playing With Spanish WordsPlaying With Spanish Words
Playing With Spanish Words
teachersite
 

Viewers also liked (20)

Step up to serve: presentation to CCCW, Dec 2014
Step up to serve: presentation to CCCW, Dec 2014Step up to serve: presentation to CCCW, Dec 2014
Step up to serve: presentation to CCCW, Dec 2014
 
Rede Mulher Empreendedora
Rede Mulher Empreendedora Rede Mulher Empreendedora
Rede Mulher Empreendedora
 
XING & Karriere-Entwicklung
XING & Karriere-Entwicklung XING & Karriere-Entwicklung
XING & Karriere-Entwicklung
 
Resource Efficient Wales (REW)
Resource Efficient Wales (REW)Resource Efficient Wales (REW)
Resource Efficient Wales (REW)
 
Ctm verso altrobilancio-2010
Ctm verso altrobilancio-2010Ctm verso altrobilancio-2010
Ctm verso altrobilancio-2010
 
Planejamento de Marketing para PMES -FGV Maio de 2014
Planejamento de Marketing para PMES -FGV Maio de 2014 Planejamento de Marketing para PMES -FGV Maio de 2014
Planejamento de Marketing para PMES -FGV Maio de 2014
 
Viretori Main Pres 090909/ Workshop 1/Arne van Osterom
Viretori Main Pres 090909/ Workshop 1/Arne van OsteromViretori Main Pres 090909/ Workshop 1/Arne van Osterom
Viretori Main Pres 090909/ Workshop 1/Arne van Osterom
 
Amazing optical illusion photography Part-4
Amazing optical illusion photography Part-4Amazing optical illusion photography Part-4
Amazing optical illusion photography Part-4
 
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
 
5 semestre integrada gabarito
5 semestre integrada gabarito5 semestre integrada gabarito
5 semestre integrada gabarito
 
体验的历程 Afooli
体验的历程 Afooli体验的历程 Afooli
体验的历程 Afooli
 
Mobile apps for your sale
Mobile apps for your saleMobile apps for your sale
Mobile apps for your sale
 
性權:台鐵 火車趴報告
性權:台鐵 火車趴報告性權:台鐵 火車趴報告
性權:台鐵 火車趴報告
 
WikiVermo
WikiVermoWikiVermo
WikiVermo
 
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
 
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.082016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
 
Pozvánka
PozvánkaPozvánka
Pozvánka
 
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
 
Top 10 Blacks
Top 10 BlacksTop 10 Blacks
Top 10 Blacks
 
Playing With Spanish Words
Playing With Spanish WordsPlaying With Spanish Words
Playing With Spanish Words
 

Similar to Review and comparison of tasks scheduling in cloud computing

Review and Comparison of Tasks Scheduling in Cloud Computing
Review and Comparison of Tasks Scheduling in Cloud Computing   Review and Comparison of Tasks Scheduling in Cloud Computing
Review and Comparison of Tasks Scheduling in Cloud Computing
ijfcstjournal
 
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
IJEACS
 
Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...
ijccsa
 
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
IJCNCJournal
 
Cloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyCloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based Survey
INFOGAIN PUBLICATION
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
IRJET Journal
 
Resource provisioning for video on demand in saas
Resource provisioning for video on demand in saasResource provisioning for video on demand in saas
Resource provisioning for video on demand in saas
IAEME Publication
 
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIMELOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
ijccsa
 
Load Balancing Algorithm to Improve Response Time on Cloud Computing
Load Balancing Algorithm to Improve Response Time on Cloud ComputingLoad Balancing Algorithm to Improve Response Time on Cloud Computing
Load Balancing Algorithm to Improve Response Time on Cloud Computing
neirew J
 
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTINGLOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
ijccsa
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
IOSRjournaljce
 
A load balancing strategy for reducing data loss risk on cloud using remodif...
A load balancing strategy for reducing data loss risk on cloud  using remodif...A load balancing strategy for reducing data loss risk on cloud  using remodif...
A load balancing strategy for reducing data loss risk on cloud using remodif...
IJECEIAES
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
ijgca
 
D04573033
D04573033D04573033
D04573033
IOSR-JEN
 
I018215561
I018215561I018215561
I018215561
IOSR Journals
 
A hybrid approach for scheduling applications in cloud computing environment
A hybrid approach for scheduling applications in cloud computing environment A hybrid approach for scheduling applications in cloud computing environment
A hybrid approach for scheduling applications in cloud computing environment
IJECEIAES
 
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENTVIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
ijmpict
 
An Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentAn Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud Environment
IRJET Journal
 
G216063
G216063G216063
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
IJCNCJournal
 

Similar to Review and comparison of tasks scheduling in cloud computing (20)

Review and Comparison of Tasks Scheduling in Cloud Computing
Review and Comparison of Tasks Scheduling in Cloud Computing   Review and Comparison of Tasks Scheduling in Cloud Computing
Review and Comparison of Tasks Scheduling in Cloud Computing
 
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
 
Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...
 
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
 
Cloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyCloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based Survey
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
 
Resource provisioning for video on demand in saas
Resource provisioning for video on demand in saasResource provisioning for video on demand in saas
Resource provisioning for video on demand in saas
 
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIMELOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
 
Load Balancing Algorithm to Improve Response Time on Cloud Computing
Load Balancing Algorithm to Improve Response Time on Cloud ComputingLoad Balancing Algorithm to Improve Response Time on Cloud Computing
Load Balancing Algorithm to Improve Response Time on Cloud Computing
 
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTINGLOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
 
A load balancing strategy for reducing data loss risk on cloud using remodif...
A load balancing strategy for reducing data loss risk on cloud  using remodif...A load balancing strategy for reducing data loss risk on cloud  using remodif...
A load balancing strategy for reducing data loss risk on cloud using remodif...
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
 
D04573033
D04573033D04573033
D04573033
 
I018215561
I018215561I018215561
I018215561
 
A hybrid approach for scheduling applications in cloud computing environment
A hybrid approach for scheduling applications in cloud computing environment A hybrid approach for scheduling applications in cloud computing environment
A hybrid approach for scheduling applications in cloud computing environment
 
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENTVIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
 
An Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentAn Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud Environment
 
G216063
G216063G216063
G216063
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
 

More from ijfcstjournal

A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
ijfcstjournal
 
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ijfcstjournal
 
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ijfcstjournal
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
ijfcstjournal
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
ijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
ijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
ijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
ijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
ijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
ijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
ijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
ijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
ijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
ijfcstjournal
 

More from ijfcstjournal (20)

A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORMA SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
A SEMI-BLIND WATERMARKING SCHEME FOR RGB IMAGE USING CURVELET TRANSFORM
 
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 

Recently uploaded

Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
ThousandEyes
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
Cynthia Thomas
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
UiPathCommunity
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 

Recently uploaded (20)

Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
APJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes WebinarAPJC Introduction to ThousandEyes Webinar
APJC Introduction to ThousandEyes Webinar
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My IdentityCNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
CNSCon 2024 Lightning Talk: Don’t Make Me Impersonate My Identity
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Day 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data ManipulationDay 4 - Excel Automation and Data Manipulation
Day 4 - Excel Automation and Data Manipulation
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 

Review and comparison of tasks scheduling in cloud computing

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 DOI:10.5121/ijfcst.2016.6107 87 REVIEW AND COMPARISON OF TASKS SCHEDULING IN CLOUD COMPUTING Yousef Tohidirad1 , Zahed Soltani aliabadi2 , Abdolsalam Azizi3 , Siamak Abdezadeh4 and Mohammad Moradi5 1 Department of Computer Engineering, Electronic Branch, Islamic Azad University, Tehran, Iran 2,3 Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran 4 Department of Computer, Boukan Branch, Islamic Azad University, Boukan, Iran 5 Department of Computer, Baneh Branch, Islamic Azad University, Baneh, Iran ABSTRACT Recently, there has been a dramatic increase in the popularity of cloud computing systems that rent computing resources on-demand, bill on a pay-as-you-go basis, and multiplex many users on the same physical infrastructure. It is a virtual pool of resources which are provided to users via Internet. It gives users virtually unlimited pay-per-use computing resources without the burden of managing the underlying infrastructure. One of the goals is to use the resources efficiently and gain maximum profit. Scheduling is a critical problem in Cloud computing, because a cloud provider has to serve many users in Cloud computing system. So scheduling is the major issue in establishing Cloud computing systems. The scheduling algorithms should order the jobs in a way where balance between improving the performance and quality of service and at the same time maintaining the efficiency and fairness among the jobs. This paper introduces and explores some of the methods provided for in cloud computing has been scheduled. Finally the waiting time and time to implement some of the proposed algorithm is evaluated. KEYWORDS Cloud Computing, scheduling algorithms, Scheduling Management, Virtual Machine (VM), CloudSim. 1. INTRODUCTION Modern communication has been termed as ‘viral exchange of information’. This follows to the effect that the contemporary world is subject to internet communication, which sees people share information in a ‘ghostly’ manner. In the actual sense, the ‘people’ who communicate during this process are the machines involved, mostly the computers and servers [1]. Users of the internet have seen continuous manipulation of data that they share. This aspect is controlled by the fact that users are many, thereby making the computers to be subject to heavy task scheduling protocols. This aims to have many people access the internet with ease and in the required bandwidth. The interconnection of these processes, despite the difference in the computer processors, is termed as Cloud Computing. Cloud computing is a technique that uses the most elemental issues of information sharing. In this manner, there is a rightly developed infrastructure as well as the interrelating services. Different relating concepts are described within the aspects of the process. A number of computers are always connected in the network in real-time [2]. Users have the ability to reach the GUI features without knowing the applied expertise on the same. This is well laid under the principle of
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 88 visualization. Visualization is the main intention of the technology with the intention of running numerous VMs on a single machine with the required specifications of load balancing. In this way, a good task scheme is used to expand the ability for the load balancing under task scheduling within the specified distribution system. There is an ABC presence inspired by the life of the honeybee. To improve the performance of the process, there are created set of behaviours and techniques designed by the required personnel to utilize the given designs under the designs of the ABC algorithm [3]. 2. MATERIALS AND METHODS 2.1. Basics of ABC As a concern of VM scheduling, ABC algorithm has stood as the ideal measure for its success for most special implementations [4].While being used from time to time, the algorithm has been effective for the establishment of the right value. While working under the principle of the honeybees, information sharing on machines is based on source details, destination, network quality, player of the network, threats and design tricks of the network. This can be describes by the ABC pseudo code shown in Figure 1 [1]. Figure 1. ABC pseudo code/ basic algorithm of ABC aimed at having tasks scheduled [1] 2.2. ABC in application The major intention of Cloud Computing is the existence of self-motivated a pool of VM resources [5]. The VM requirements are defined according to the system’s users. This is done in accordance with the expected design specifications. Using the acceptable Cloud Management policies, possibility for routing specifications is established. This aspect is done within the limits of the available servers while looking at the cloud management. Under the same specifications, it is possible have different degrees of scheduling management while considering the load levels within VMs. The balancing along this line should leave the best room for the reduction of maskespan and response time.
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 89 Since the machines have the general outlook of virtual presence, it is good to represent them under a set of numbers for the resultant or overall virtuosity as shown in the equation (1) [1]. VM = {VM1, VM2, VM3,… ,VMN} (1) These machines are subject to individual tasks that result into an overall system task as shown in the equation (2) [1]. Tack = {tack1, tack2, tack3,… ,tackK} (2) The machines work in tandem (parallel) using different processors. In this way, the scheduling ability is non-preventive. As a result, figure 2 shows the diagram a flowchart of the task scheduling under the ABC instructions [1]. Figure 2. ABC instruction and the scheduling modality [1]
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 90 In the second process, evaluation of the population’s fitness is a calculation based on the formula (3) [1]. j n i ij ij VMofcapacitytheofevalution lengthtask fit ∑= = 1 _ (3) In this case, the fitness of the process numbers are shown by fit within the capacity of VM within the tasks of descriptions task length. To obtain the overall capacity, equation (4) is applicable [1]. jjj bwvmmipspenumpecapacityj __*_ += (4) In this case, the number of processors in the system is indicated by _ within the instruction limits shown by _ in the required bandwidth of _ as per the ability of the virtual machines. The identification and the allocation of these elements lead to the fitness selection of the required neighbourhood VMs. When the process recruitment reaches, the bounding element is definable by the formula (5) [1]. j n i i ij VMofcapacitytheofevalution lengthinputfilelengthtask fit ∑= + = 1 __ (5) In this case, the input File length becomes the size of the task with pending execution details. Once this is done, the overshadowing fitness is chosen in line with the assign task VM. This allows the calculation of load balance within the workload VMs as per the information obtained from the datacentre [6]. It becomes easier to get the standard deviation with respect to the actual load VMs as formula (6) [1]. 2^)( 1 .. 0 ∑= −= n j j XX n DS (6) Any VM now has a processing time indicated by the equation (7) [1]. j k i i j capacity lengthtask X ∑= = 1 _ (7) The mean processing time for all the VMs is also indicated as formula (8) [1]. n X X n j j∑= = 1 (8) From the above conclusive equations, it can be stated that whenever S.D. of the full VM becomes less or equal to mean, a balanced state of the system is experienced. In case S.D. is higher than the mean, the imbalance state prevails [7].
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 91 2.3. Results and discussion By the use of a CloudSim tool (any version from 3.0.1); the simulation platform is subject to the table 1 [1]. TABLE 1. Parameters for the CloudSim setting [1] For setting the ABC algorithm, the parameters are shown in TABLE 2 [1]. TABLE 2. Parameters for improved ABC setting [1]
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 92 As possible to establish, the assessment of the procedure is describable under three algorithmic instructions. There is the presence of First Come First Served (FCFS) that works on the chronological reach of the given task. There is the Shortest Job First (SJF) that considers the sequencing by making the selection of the first job in short terms stated [8]. The Longest Job First (LJF) ensures that the heavy job is selected first. The results of the first and the second experiments are shown in Figures 3 and 4[1, 5]. Figure 3. Comparison of makespan and the tasks Figure 4. Comparison of makespan and the number of VMs
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 93 As shown in figure 3, there are a number of increasing requests. As a result, the average numbers of requests being made are progressing under the same design specifications [9, 10, 11, and 12]. Consequently, ABC_LJF can be said to be effective within the required scheduling on the full system [12, 13]. As for the second experiment, there is an exponential decay of makespan with the number of VMs. In the same design show, the previous conclusion still prevails. 3. CONCLUSION As the paper indicates, ABC controlled algorithm is seen to be suitable for solutions surrounding VM scheduling management so that the tasks are scheduled in the right manner and needs. This goes under the adjustable features in Cloud Computing. As these parameters are optimized, the stability of the system still prevails. This allows the system to operate with optimum utility. It is then imperative to state that ABC algorithm is good for Cloud Computing and its environment under the utility of the required parameters in a manner that the tasks are handled with utmost utility. This stability makes the system to works without crashing in the manners of ABC_LJF needs and designs. REFERENCES [1] B. Kruekaew, W. Kimpan, “Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony”, Proceedings of the International MultiConference of Engineers and Computer Scientists, pp.978-988, 2014. [2] D.H. Khan, D. Kapgate, P.S. Prasad, “A Review on Virtual Machine Management Techniques and Scheduling in Cloud Computing” International Journal of Advanced Research in Computer Science and Software Engineering, 3(12), pp.838-845, 2013. [3] S. Hadi, “Advantages, Challenges and Optimizations of Virtual Machine Scheduling in Cloud Computing Environments”, International Journal of Computer Theory and Engineering, 4(2), 2012. [4] G. TARUN, “Host Scheduling Algorithm Using Genetic Algorithm In Cloud Computing Environment”, International Journal of Research in Engineering & Technology, 1(1), 2013. [5] K. Kiran, “An Adaptive Algorithm For Dynamic Priority Based Virtual Machine Scheduling In Cloud”, International Journal of Computer Science Issues, 9(6), 2012. [6] I. Moschakis, H. Karatza, “Performance and Cost evaluation of Gang Scheduling in a Cloud Computing System with Job Migrations and Starvation Handling”, Thessaloniki: Aristotle University of Thessaloniki, 2013 [7] N. Ramkumar, “Efficient Resource Utilization Algorithm (ERUA) for Service Request Scheduling in Cloud”, International Journal of Engineering and Technology, 5(2), 2013. [8] V. Vignesh, K.K. Sendhil, N. Jaisankar, “Resource management and scheduling in cloud environment”, International Journal of Scientific and Research Publications, 3(6), 2013. [9] K. Rasmi, V. Vive, “Resource Management Techniques in Cloud Environment - A Brief Survey”, International Journal of Innovation and Applied Studies, 2(4), 2013. [10] S.P. Abirami, R. Shalini, “Linear Scheduling Strategy for Resource allocation in Cloud Environment”, International Journal on Cloud Computing and Architecture, 2(1), 2012. [11] S. Paulus, U. Riemann, “An Approach for a Business-driven Cloud-compliance Analysis Covering Public Sector Process Improvement Requirements”, International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT), Vol. 4, No. 3, pp. 1-13, 2013. [12] R. Saini, Indu, “EFFICIENT JOB SCHEDULING OF VIRTUAL MACHINES IN CLOUD COMPUTING”, International Journal of Advanced Research in Computer and Communication Engineering, pp.3349-3354, 2013. [13] S. Hashemi, “Cloud computing technology for E-government architecture”, International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, pp. 15-23, 2013.
  翻译: