SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 403
Cloud Computing Task Scheduling Algorithm Based on Modified
Genetic Algorithm
Ms. Manorma Kori 1, Mr. Rajneesh Pachouri2, Mr. Anurag Jain3
M.Tech Research Scholar Department of Computer Science Engineering AIST, Sagar
Assistant Professor, Department of Computer Science Engineering AIST, Sagar
Assistant Professor, Department of Computer Science Engineering AIST, Sagar
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The design of cloud computing allows for
scalable computing. The cloud components can be used to
process many requests and handle them in a timely manner.
The cloud aids in the handling of multiple requests and the
secure management of user data. There are components that
locate a suitable architecture and so offer communication
bonding between components. The key communication
components available in the cloud are virtual machines, data
centres, and user bases. As a result, it is always necessary to
handle many requests, assign the appropriatevirtualmachine
to the input request, and then provide the fastest response
time possible. There are numerous methods for balancing the
load on a virtual machine. The data locality preservation is
rigorous in the original article, which makes load balancing
across nodes a difficult task when the approach is used. a
heuristic method. Most range-queriable cloud storage
currently uses a combination of neighbour item exchangeand
neighbour migration methods, which has a highoverheadand
sluggish convergence. Algorithms like Round robin, throttle,
and other VM allocation aid with machine allocation, butonly
to a limited extent. While progress is being made toward
better virtual machine allocation, finding the best possible
allocation is constantly needed in order to increase
performance. In this paper, a Rule-based threshold heuristic
technique is described as an algorithm. This is the algorithm
that combines the many characteristicsofvirtualmachines, as
well as their statuses, to determine the optimum virtual
machine for request allocation. The method issimulated using
the Cloud Analyst simulation tool, andacomparison isdone by
applying an existing algorithm to several topologies.
Key Words: Cloud Load Balancing, Data sharing,
Virtualization, Heuristic Approach, Bully search, Localization,
Dynamic Allocation.
1. INTRODUCTION
“Cloud Environment is a platform that combines usable
entities from many sources and makes them available as a
service on the WWW Internet platform on an as-needed
basis, freeing users of the load of administering and
exchanging a dedicated complicated computing
infrastructure” [1]. “The availability of abundantly
provisioned given data management centres, as well as the
creation of elastic cloud infrastructures, open up new
applications and business models, and it may disrupt cloud
environment providers' operations” [2]. “Cloud computing
and data storage is a virtual platform that allowsforefficient
services through the internet. These on-demand IT useable
entities are efficiently generated and disposed of, auto-
completing utilising the various variables available
programmatic data UI, and invoicing is based on their
working and quantifiable component utilisation. Usable
entities are allotted in a traditional hosted environment
based on peak load needs” [3]. As the Cloud environment
data store and its computation emerge as a good way to
leverage available remote usable entitiess in a flexible, cost-
effective manner with its scaling way thanks to a usage-
based available here a cost model, security is one of the
available critical concerns that directly impact the adoption
working rate of the scenario Cloud paradigm [4]. System
virtualization, for example, hasbecomeextensivelyaccepted
to provide compute usable entities as a service, allowing the
dynamic spawning of virtual machines and their linked
nodes and communication infrastructureindata centres.[1].
When given by a provider to a group of set consumers, one
cloud service type known as software as a service (SaaS)has
attracted the attention of attackers who aim to exploit its
working weaknesses [5]. For security reasons, a defined VM
in the cloud is used with a proxy that replicates inbound
traffic to the devices and transmits it to the emulation
platform [6]. Below figure 1.1 shows discussion point from
cloud.
Figure 1 Complex Structure of Cloud
environment data store & its Computation.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 404
1.1 LOAD BALANCING
Load balancing is a procedure that distributes workload
evenly among all available nodes in the cloud. By spreading
workloads between multiple nodes, this enhances overall
system performance. When resources are not utilised
effectively, they might get overheated, resulting in carbon
emissions. Carbon emissions can be reduced by utilising
resources wisely [4]. A few measures that can be used to
evaluate load balancing systems include performance,
scalability, response time, resource consumption, and fault
tolerance. These criteria enable us to determine whether the
approach or algorithm for balancing the given load is
adequate for balancing the load [5].
2. PROBLEM DEFINITION
According to the writing review, many methods are used to
do calculations, and different results are seen, such as
PRISM, SVM, and other different techniques for planning
procedures on a large number of arranged information
packages available dataset.
Following confirmation of the specific circumstance and the
available approach, a variety of shorts accompany the
existing booking computation, which serves as the
foundation for our investigation work. The checked focuses
are next, which were identified as an issue and were further
broken down and completed with improvements.
1. Previous strategies, such as PRISM and other booking
calculations for handling model age, have an evidentissue in
creating better results and information allotment strategies
when the virtual matchine network is broken. This method
produces a better result than the present system, but it also
requires improvement, which the proposed system
provides..
2. Previous approach Due to a lack of rules, nave based
characterization does not provide a superior enrollment
grouping, and hence a superior probability model cannot be
produced using the method.
3.In the past, dispersion was usedsincetheknowledgeofthe
points varied, determining the disadvantage of unexpected
substances in contrast to recommended tasks such as
heuristic hunt and circulation calculation.
As a result, in order to propose a better forecast model
utilising arrangement and further join approaches, it is
necessary to promote a scheme that contributes to
improving results and framework; in thiscase,ourproposed
procedure heuristic is to use conspire instead of the
traditional booking approach.
3. PROPOSED METHODOLOGY
As a result of our observations of the prior technique and its
drawbacks in various contexts and scenarios. Our research
presents a novel approach that is both productive and high-
value, resulting in improved computational results when
applied to a large number of datasets.Ourresearchproposes
a novel method, Heuristic Based Prediction Model that
employs a new logistic normal distribution technique to
establish a relationship between the topics as well as a
flexible environment for the entire process, resulting in a
superior data transmission prediction model. The proposed
algorithm is described below:
1. Loading of all available data and packets from
the created message that are involved in the
communication.
2. Loading the dataset's whole node dictionary
pair.
3. Execute the specific algorithm that the user has
chosen for continued execution, such as an
existing or developed algorithm.
4. If any single match is obtained, perform node
down and matching operations, and conclude
whether or not utilising the model for data
shifting is working.
5. If the system performs at least two or more
dictionary matches, do the model and match
action.
6. Keeping parameter-by-parameter data for the
historical model.
7. Observing the values and thus it effect accuracy
and efficiency for the complete scenario.
8. Exit .
Figure 2 General Structure of Load balancing in
Cloud Environment.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 405
In this fig 3 tool and here as we load the dataset and verifies
the eligibility and taking their features for consideration or
not is the time taking process to identify and to load the
images and selection of password comesundertrainingtime
of a dataset, extracting the properties and making them in
process format is training time.
4. RESULT ANALYSIS
In this section, we'll go over the results that were achieved
after using the proposed technique instead of the old
method.
Parameters Description
Throughput: In general, throughput refers to the pace at
which something is produced or processed.
Computation Time: The amount of time it takes to finish a
process. Time to compute. The length of time necessary to
complete a computational process is known as computation
time (also known as running time). The computation time is
proportional to the number of rule applications when the
computation is represented as a sequence of rule
applications.
In the table presentbelowisa statistical comparison
of the values which are retrived as time taken by the
differentprocess algorithm,throughputandotherparameter
can be observe.
Table -1: Data distribution for different data packet.
The above table shows the amount of data values extracted
from the data and the algorithm used to extract them
Figure 4 Comparison of Line graph for technique
analysis
In the above graph, the x axis representsthedata fromwhich
posts were extracted for query processing for the specified
dataset, and the line graph is printed using the chart library
provided by Microsoft, allowing for easy further analysis.As
a result, the Heuristic based approach outperforms the best.
Our proposed approach outperforms the low forcasting
value in terms of efficiency, as shown by the graph
representation.
5. CONCLUSIONS
We investigated various load balancing strategies in the
Cloud Computing contextinthisarticle.We'vealsogoneover
some of the primary difficulties that must be considered
while developing any load balancing algorithm. There is no
concept of a one-time password in existing work that is
based on single authentication, where only the user name
Technique
Approach Date
packets
Proposed Existing
1024 3374ms 3889ms
2048 4098ms 4158ms
3072 5229ms 5344ms
4096 5310ms 5391ms
Figure 3 Flowchart of proposed algorithm
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 406
and password are required. To address this issue, a key-
based authentication system for multiple users has been
implemented to safeguard data. A one-time password is
issued and expires once the procedure is completed. A
emphasis will also be placed on throughput, with many
processes running at the same time. Using the proposed
approach, we were able to overcome the drawbacks of
earlier algorithms. A comparisonwasmade basedonseveral
factors such as throughput, reaction time,andsoon.Existing
algorithms are used to calculate the performance of various
topologies based on computing time and throughput.
6. FUTURE WORK
More cloud Computation over the Environment providers,
unlimited services, established quality, and best practises
can be expected in the future. In the future, we'll concentrate
on developing algorithms that maintain a better trade-off
between all performance characteristics.
REFERENCES
[1]. Xun Shao *, Masahiro Jibiki, Yuuichi Teranishi, Nozomu
Nishinaga, A proficient burden adjusting component for
heterogeneous reach queriable cloud storage✩,0167-
739X/© 2017
[2].Tinghuai Ma, Ya Chu, Licheng Zhao and Otgonbayar
Ankhbayar, Resource Allocation and Scheduling in Cloud
Computing: Policy and AlgorithmIETE Technical survey
Volume 31, Issue 1, January 2018, pages 4-16
[3]. B. P. Rima, E. Choi, and I. Lumb, A Taxonomy and Survey
of Cloud Computing Systems, Proceedings of fifth IEEE
International Joint Conference on INC, IMS and IDC, Seoul,
Korea, August 2017, pages 44-5l.
[4].Nidhi Jain Kansal, InderveerChana,CloudLoadBalancing
Techniques: A Step Towards Green Computing, IJCSI, Vol. 9,
Issue 1, January 2017.
[5].Hitesh Bheda, HirenBhatt,AnOverviewofLoadadjusting
Techniques in Cloud Computing Environments,Research
entryway JANUARY 2017.
[6].Hajara Idris., An improved insect state enhancement
calculation with adaptation to non-critical failure for work
planning for lattice registering frameworks, May 17, 2016
[7].Sukhvir Kaur, Supriya Kinger Review on Load Balancing
Techniques in Cloud Computing Environment, International
Journal of Science and Research (IJSR) 2017.
[8].X. Xu, W. Dou, X. Zhang, and J. Chen, Enreal: an
energyaware asset distribution strategy for logical work
process executions in cloud climate, 2016.
[9].Dr. Amit Agarwal, Saloni Jain Efficient ideal calculationof
assignment planning for distributed computing climate
International Journal of PC Trends and Technology
(IJCTT).2017
[10].X. Xu, W. Dou, X. Zhang, and J. Chen, Enreal: an
energyaware asset designation strategy for logical work
process executions in cloud climate, 2017.
[11].J. M. Galloway, K. L. Smith, and S. S. Vrbsky, Power
mindful burden adjusting for distributed computing, in
Proceedings of the World Congress on Engineering and
Computer Science, vol. 1, pp. 19–21, 2018.
[12].S. Sethi, A. Sahu, and S. K. Jena, Efficient burden
adjusting in distributed computing utilizing fluffy logic,IOSR
Journal of Engineering, vol. 2, no. 7, pp. 65–71, 2016.
[13]. T. Kokilavani J.J. School of Engineering and Technology
and Research Scholar, Bharathiar University, Tamil Nadu,
India, LoadBalancedMin-MinAlgorithmforStaticMeta-Task
Scheduling in Grid ComputingInternational Journal of
Computer Applications(0975 – 8887)Volume20–No.2,April
2017.
[14].M. Akbari and H. Rashidi, A multi-destinations booking
calculation dependent on cuckoo streamlining for task
allotment issue at arrange time in heterogeneous
frameworks, Expert Systems with Applications, vol. 60, pp.
234–248, 2018.
[15].Zenon Chaczko, Venkatesh Mahadevan, Shahrzad
Aslanzadeh, Christopher Mcdermid (2011),Availabity and
Load Balancing in Cloud Computing International
Conference on Computer and Software Modeling IPCSIT
vol.14 IACSIT Press,Singapore 2015.

More Related Content

Similar to Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm

Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
IRJET- Load Balancing and Crash Management in IoT Environment
IRJET-  	  Load Balancing and Crash Management in IoT EnvironmentIRJET-  	  Load Balancing and Crash Management in IoT Environment
IRJET- Load Balancing and Crash Management in IoT EnvironmentIRJET Journal
 
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...
Development of a Suitable Load Balancing Strategy In Case Of a  Cloud Computi...Development of a Suitable Load Balancing Strategy In Case Of a  Cloud Computi...
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...IJMER
 
Hybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
Hybrid Task Scheduling Approach using Gravitational and ACO Search AlgorithmHybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
Hybrid Task Scheduling Approach using Gravitational and ACO Search AlgorithmIRJET Journal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...IRJET Journal
 
Cloud service analysis using round-robin algorithm for qualityof-service awar...
Cloud service analysis using round-robin algorithm for qualityof-service awar...Cloud service analysis using round-robin algorithm for qualityof-service awar...
Cloud service analysis using round-robin algorithm for qualityof-service awar...IJECEIAES
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTpharmaindexing
 
IRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET Journal
 
An Optimized-Throttled Algorithm for Distributing Load in Cloud Computing
An Optimized-Throttled Algorithm for Distributing Load in Cloud ComputingAn Optimized-Throttled Algorithm for Distributing Load in Cloud Computing
An Optimized-Throttled Algorithm for Distributing Load in Cloud ComputingIRJET Journal
 
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...IRJET Journal
 
Anonymous Data Sharing in Cloud using Pack Algorithm
Anonymous Data Sharing in Cloud using Pack AlgorithmAnonymous Data Sharing in Cloud using Pack Algorithm
Anonymous Data Sharing in Cloud using Pack AlgorithmIRJET Journal
 
Resource Provisioning Algorithms for Resource Allocation in Cloud Computing
Resource Provisioning Algorithms for Resource Allocation in Cloud ComputingResource Provisioning Algorithms for Resource Allocation in Cloud Computing
Resource Provisioning Algorithms for Resource Allocation in Cloud ComputingIRJET Journal
 
IRJET- Advance Approach for Load Balancing in Cloud Computing using (HMSO) Hy...
IRJET- Advance Approach for Load Balancing in Cloud Computing using (HMSO) Hy...IRJET- Advance Approach for Load Balancing in Cloud Computing using (HMSO) Hy...
IRJET- Advance Approach for Load Balancing in Cloud Computing using (HMSO) Hy...IRJET Journal
 
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGIRJET Journal
 
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.IRJET Journal
 
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World IRJET Journal
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET Journal
 
An Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentAn Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentIRJET Journal
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...IRJET Journal
 

Similar to Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm (20)

Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
IRJET- Load Balancing and Crash Management in IoT Environment
IRJET-  	  Load Balancing and Crash Management in IoT EnvironmentIRJET-  	  Load Balancing and Crash Management in IoT Environment
IRJET- Load Balancing and Crash Management in IoT Environment
 
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...
Development of a Suitable Load Balancing Strategy In Case Of a  Cloud Computi...Development of a Suitable Load Balancing Strategy In Case Of a  Cloud Computi...
Development of a Suitable Load Balancing Strategy In Case Of a Cloud Computi...
 
Hybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
Hybrid Task Scheduling Approach using Gravitational and ACO Search AlgorithmHybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
Hybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
IRJET- Optimization of Completion Time through Efficient Resource Allocation ...
 
Cloud service analysis using round-robin algorithm for qualityof-service awar...
Cloud service analysis using round-robin algorithm for qualityof-service awar...Cloud service analysis using round-robin algorithm for qualityof-service awar...
Cloud service analysis using round-robin algorithm for qualityof-service awar...
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
 
IRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database TechniquesIRJET- Recommendation System based on Graph Database Techniques
IRJET- Recommendation System based on Graph Database Techniques
 
An Optimized-Throttled Algorithm for Distributing Load in Cloud Computing
An Optimized-Throttled Algorithm for Distributing Load in Cloud ComputingAn Optimized-Throttled Algorithm for Distributing Load in Cloud Computing
An Optimized-Throttled Algorithm for Distributing Load in Cloud Computing
 
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
 
Anonymous Data Sharing in Cloud using Pack Algorithm
Anonymous Data Sharing in Cloud using Pack AlgorithmAnonymous Data Sharing in Cloud using Pack Algorithm
Anonymous Data Sharing in Cloud using Pack Algorithm
 
Resource Provisioning Algorithms for Resource Allocation in Cloud Computing
Resource Provisioning Algorithms for Resource Allocation in Cloud ComputingResource Provisioning Algorithms for Resource Allocation in Cloud Computing
Resource Provisioning Algorithms for Resource Allocation in Cloud Computing
 
IRJET- Advance Approach for Load Balancing in Cloud Computing using (HMSO) Hy...
IRJET- Advance Approach for Load Balancing in Cloud Computing using (HMSO) Hy...IRJET- Advance Approach for Load Balancing in Cloud Computing using (HMSO) Hy...
IRJET- Advance Approach for Load Balancing in Cloud Computing using (HMSO) Hy...
 
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTING
 
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
Job Scheduling Mechanisms in Fog Computing Using Soft Computing Techniques.
 
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
 
An Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentAn Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud Environment
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

cme397 surface engineering unit 5 part A questions and answers
cme397 surface engineering unit 5 part A questions and answerscme397 surface engineering unit 5 part A questions and answers
cme397 surface engineering unit 5 part A questions and answerskarthi keyan
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...amrabdallah9
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Amil baba
 
The relationship between iot and communication technology
The relationship between iot and communication technologyThe relationship between iot and communication technology
The relationship between iot and communication technologyabdulkadirmukarram03
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid BodyAhmadHajasad2
 
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.pptOracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.pptDheerajKashnyal
 
Carbohydrates principles of biochemistry
Carbohydrates principles of biochemistryCarbohydrates principles of biochemistry
Carbohydrates principles of biochemistryKomakeTature
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecTrupti Shiralkar, CISSP
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...soginsider
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfNaveenVerma126
 
specification estimation and valuation of a building
specification estimation and valuation of a buildingspecification estimation and valuation of a building
specification estimation and valuation of a buildingswethasekhar5
 
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfRenewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfodunowoeminence2019
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS Bahzad5
 
Tachyon 100G PCB Performance Attributes and Applications
Tachyon 100G PCB Performance Attributes and ApplicationsTachyon 100G PCB Performance Attributes and Applications
Tachyon 100G PCB Performance Attributes and ApplicationsEpec Engineered Technologies
 
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfsdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfJulia Kaye
 
CSR Managerial Round Questions and answers.pptx
CSR Managerial Round Questions and answers.pptxCSR Managerial Round Questions and answers.pptx
CSR Managerial Round Questions and answers.pptxssusera0771e
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 

Recently uploaded (20)

Présentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdfPrésentation IIRB 2024 Chloe Dufrane.pdf
Présentation IIRB 2024 Chloe Dufrane.pdf
 
cme397 surface engineering unit 5 part A questions and answers
cme397 surface engineering unit 5 part A questions and answerscme397 surface engineering unit 5 part A questions and answers
cme397 surface engineering unit 5 part A questions and answers
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
Strategies of Urban Morphologyfor Improving Outdoor Thermal Comfort and Susta...
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
 
The relationship between iot and communication technology
The relationship between iot and communication technologyThe relationship between iot and communication technology
The relationship between iot and communication technology
 
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
Engineering Mechanics  Chapter 5  Equilibrium of a Rigid BodyEngineering Mechanics  Chapter 5  Equilibrium of a Rigid Body
Engineering Mechanics Chapter 5 Equilibrium of a Rigid Body
 
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.pptOracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
Oracle_PLSQL_basic_tutorial_with_workon_Exercises.ppt
 
Carbohydrates principles of biochemistry
Carbohydrates principles of biochemistryCarbohydrates principles of biochemistry
Carbohydrates principles of biochemistry
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...Transforming Process Safety Management: Challenges, Benefits, and Transition ...
Transforming Process Safety Management: Challenges, Benefits, and Transition ...
 
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdfSummer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
Summer training report on BUILDING CONSTRUCTION for DIPLOMA Students.pdf
 
specification estimation and valuation of a building
specification estimation and valuation of a buildingspecification estimation and valuation of a building
specification estimation and valuation of a building
 
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdfRenewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
Renewable Energy & Entrepreneurship Workshop_21Feb2024.pdf
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
 
Tachyon 100G PCB Performance Attributes and Applications
Tachyon 100G PCB Performance Attributes and ApplicationsTachyon 100G PCB Performance Attributes and Applications
Tachyon 100G PCB Performance Attributes and Applications
 
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdfsdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
sdfsadopkjpiosufoiasdoifjasldkjfl a asldkjflaskdjflkjsdsdf
 
CSR Managerial Round Questions and answers.pptx
CSR Managerial Round Questions and answers.pptxCSR Managerial Round Questions and answers.pptx
CSR Managerial Round Questions and answers.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Lecture 4 .pdf
Lecture 4                              .pdfLecture 4                              .pdf
Lecture 4 .pdf
 

Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 403 Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm Ms. Manorma Kori 1, Mr. Rajneesh Pachouri2, Mr. Anurag Jain3 M.Tech Research Scholar Department of Computer Science Engineering AIST, Sagar Assistant Professor, Department of Computer Science Engineering AIST, Sagar Assistant Professor, Department of Computer Science Engineering AIST, Sagar ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The design of cloud computing allows for scalable computing. The cloud components can be used to process many requests and handle them in a timely manner. The cloud aids in the handling of multiple requests and the secure management of user data. There are components that locate a suitable architecture and so offer communication bonding between components. The key communication components available in the cloud are virtual machines, data centres, and user bases. As a result, it is always necessary to handle many requests, assign the appropriatevirtualmachine to the input request, and then provide the fastest response time possible. There are numerous methods for balancing the load on a virtual machine. The data locality preservation is rigorous in the original article, which makes load balancing across nodes a difficult task when the approach is used. a heuristic method. Most range-queriable cloud storage currently uses a combination of neighbour item exchangeand neighbour migration methods, which has a highoverheadand sluggish convergence. Algorithms like Round robin, throttle, and other VM allocation aid with machine allocation, butonly to a limited extent. While progress is being made toward better virtual machine allocation, finding the best possible allocation is constantly needed in order to increase performance. In this paper, a Rule-based threshold heuristic technique is described as an algorithm. This is the algorithm that combines the many characteristicsofvirtualmachines, as well as their statuses, to determine the optimum virtual machine for request allocation. The method issimulated using the Cloud Analyst simulation tool, andacomparison isdone by applying an existing algorithm to several topologies. Key Words: Cloud Load Balancing, Data sharing, Virtualization, Heuristic Approach, Bully search, Localization, Dynamic Allocation. 1. INTRODUCTION “Cloud Environment is a platform that combines usable entities from many sources and makes them available as a service on the WWW Internet platform on an as-needed basis, freeing users of the load of administering and exchanging a dedicated complicated computing infrastructure” [1]. “The availability of abundantly provisioned given data management centres, as well as the creation of elastic cloud infrastructures, open up new applications and business models, and it may disrupt cloud environment providers' operations” [2]. “Cloud computing and data storage is a virtual platform that allowsforefficient services through the internet. These on-demand IT useable entities are efficiently generated and disposed of, auto- completing utilising the various variables available programmatic data UI, and invoicing is based on their working and quantifiable component utilisation. Usable entities are allotted in a traditional hosted environment based on peak load needs” [3]. As the Cloud environment data store and its computation emerge as a good way to leverage available remote usable entitiess in a flexible, cost- effective manner with its scaling way thanks to a usage- based available here a cost model, security is one of the available critical concerns that directly impact the adoption working rate of the scenario Cloud paradigm [4]. System virtualization, for example, hasbecomeextensivelyaccepted to provide compute usable entities as a service, allowing the dynamic spawning of virtual machines and their linked nodes and communication infrastructureindata centres.[1]. When given by a provider to a group of set consumers, one cloud service type known as software as a service (SaaS)has attracted the attention of attackers who aim to exploit its working weaknesses [5]. For security reasons, a defined VM in the cloud is used with a proxy that replicates inbound traffic to the devices and transmits it to the emulation platform [6]. Below figure 1.1 shows discussion point from cloud. Figure 1 Complex Structure of Cloud environment data store & its Computation.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 404 1.1 LOAD BALANCING Load balancing is a procedure that distributes workload evenly among all available nodes in the cloud. By spreading workloads between multiple nodes, this enhances overall system performance. When resources are not utilised effectively, they might get overheated, resulting in carbon emissions. Carbon emissions can be reduced by utilising resources wisely [4]. A few measures that can be used to evaluate load balancing systems include performance, scalability, response time, resource consumption, and fault tolerance. These criteria enable us to determine whether the approach or algorithm for balancing the given load is adequate for balancing the load [5]. 2. PROBLEM DEFINITION According to the writing review, many methods are used to do calculations, and different results are seen, such as PRISM, SVM, and other different techniques for planning procedures on a large number of arranged information packages available dataset. Following confirmation of the specific circumstance and the available approach, a variety of shorts accompany the existing booking computation, which serves as the foundation for our investigation work. The checked focuses are next, which were identified as an issue and were further broken down and completed with improvements. 1. Previous strategies, such as PRISM and other booking calculations for handling model age, have an evidentissue in creating better results and information allotment strategies when the virtual matchine network is broken. This method produces a better result than the present system, but it also requires improvement, which the proposed system provides.. 2. Previous approach Due to a lack of rules, nave based characterization does not provide a superior enrollment grouping, and hence a superior probability model cannot be produced using the method. 3.In the past, dispersion was usedsincetheknowledgeofthe points varied, determining the disadvantage of unexpected substances in contrast to recommended tasks such as heuristic hunt and circulation calculation. As a result, in order to propose a better forecast model utilising arrangement and further join approaches, it is necessary to promote a scheme that contributes to improving results and framework; in thiscase,ourproposed procedure heuristic is to use conspire instead of the traditional booking approach. 3. PROPOSED METHODOLOGY As a result of our observations of the prior technique and its drawbacks in various contexts and scenarios. Our research presents a novel approach that is both productive and high- value, resulting in improved computational results when applied to a large number of datasets.Ourresearchproposes a novel method, Heuristic Based Prediction Model that employs a new logistic normal distribution technique to establish a relationship between the topics as well as a flexible environment for the entire process, resulting in a superior data transmission prediction model. The proposed algorithm is described below: 1. Loading of all available data and packets from the created message that are involved in the communication. 2. Loading the dataset's whole node dictionary pair. 3. Execute the specific algorithm that the user has chosen for continued execution, such as an existing or developed algorithm. 4. If any single match is obtained, perform node down and matching operations, and conclude whether or not utilising the model for data shifting is working. 5. If the system performs at least two or more dictionary matches, do the model and match action. 6. Keeping parameter-by-parameter data for the historical model. 7. Observing the values and thus it effect accuracy and efficiency for the complete scenario. 8. Exit . Figure 2 General Structure of Load balancing in Cloud Environment.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 405 In this fig 3 tool and here as we load the dataset and verifies the eligibility and taking their features for consideration or not is the time taking process to identify and to load the images and selection of password comesundertrainingtime of a dataset, extracting the properties and making them in process format is training time. 4. RESULT ANALYSIS In this section, we'll go over the results that were achieved after using the proposed technique instead of the old method. Parameters Description Throughput: In general, throughput refers to the pace at which something is produced or processed. Computation Time: The amount of time it takes to finish a process. Time to compute. The length of time necessary to complete a computational process is known as computation time (also known as running time). The computation time is proportional to the number of rule applications when the computation is represented as a sequence of rule applications. In the table presentbelowisa statistical comparison of the values which are retrived as time taken by the differentprocess algorithm,throughputandotherparameter can be observe. Table -1: Data distribution for different data packet. The above table shows the amount of data values extracted from the data and the algorithm used to extract them Figure 4 Comparison of Line graph for technique analysis In the above graph, the x axis representsthedata fromwhich posts were extracted for query processing for the specified dataset, and the line graph is printed using the chart library provided by Microsoft, allowing for easy further analysis.As a result, the Heuristic based approach outperforms the best. Our proposed approach outperforms the low forcasting value in terms of efficiency, as shown by the graph representation. 5. CONCLUSIONS We investigated various load balancing strategies in the Cloud Computing contextinthisarticle.We'vealsogoneover some of the primary difficulties that must be considered while developing any load balancing algorithm. There is no concept of a one-time password in existing work that is based on single authentication, where only the user name Technique Approach Date packets Proposed Existing 1024 3374ms 3889ms 2048 4098ms 4158ms 3072 5229ms 5344ms 4096 5310ms 5391ms Figure 3 Flowchart of proposed algorithm
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 406 and password are required. To address this issue, a key- based authentication system for multiple users has been implemented to safeguard data. A one-time password is issued and expires once the procedure is completed. A emphasis will also be placed on throughput, with many processes running at the same time. Using the proposed approach, we were able to overcome the drawbacks of earlier algorithms. A comparisonwasmade basedonseveral factors such as throughput, reaction time,andsoon.Existing algorithms are used to calculate the performance of various topologies based on computing time and throughput. 6. FUTURE WORK More cloud Computation over the Environment providers, unlimited services, established quality, and best practises can be expected in the future. In the future, we'll concentrate on developing algorithms that maintain a better trade-off between all performance characteristics. REFERENCES [1]. Xun Shao *, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga, A proficient burden adjusting component for heterogeneous reach queriable cloud storage✩,0167- 739X/© 2017 [2].Tinghuai Ma, Ya Chu, Licheng Zhao and Otgonbayar Ankhbayar, Resource Allocation and Scheduling in Cloud Computing: Policy and AlgorithmIETE Technical survey Volume 31, Issue 1, January 2018, pages 4-16 [3]. B. P. Rima, E. Choi, and I. Lumb, A Taxonomy and Survey of Cloud Computing Systems, Proceedings of fifth IEEE International Joint Conference on INC, IMS and IDC, Seoul, Korea, August 2017, pages 44-5l. [4].Nidhi Jain Kansal, InderveerChana,CloudLoadBalancing Techniques: A Step Towards Green Computing, IJCSI, Vol. 9, Issue 1, January 2017. [5].Hitesh Bheda, HirenBhatt,AnOverviewofLoadadjusting Techniques in Cloud Computing Environments,Research entryway JANUARY 2017. [6].Hajara Idris., An improved insect state enhancement calculation with adaptation to non-critical failure for work planning for lattice registering frameworks, May 17, 2016 [7].Sukhvir Kaur, Supriya Kinger Review on Load Balancing Techniques in Cloud Computing Environment, International Journal of Science and Research (IJSR) 2017. [8].X. Xu, W. Dou, X. Zhang, and J. Chen, Enreal: an energyaware asset distribution strategy for logical work process executions in cloud climate, 2016. [9].Dr. Amit Agarwal, Saloni Jain Efficient ideal calculationof assignment planning for distributed computing climate International Journal of PC Trends and Technology (IJCTT).2017 [10].X. Xu, W. Dou, X. Zhang, and J. Chen, Enreal: an energyaware asset designation strategy for logical work process executions in cloud climate, 2017. [11].J. M. Galloway, K. L. Smith, and S. S. Vrbsky, Power mindful burden adjusting for distributed computing, in Proceedings of the World Congress on Engineering and Computer Science, vol. 1, pp. 19–21, 2018. [12].S. Sethi, A. Sahu, and S. K. Jena, Efficient burden adjusting in distributed computing utilizing fluffy logic,IOSR Journal of Engineering, vol. 2, no. 7, pp. 65–71, 2016. [13]. T. Kokilavani J.J. School of Engineering and Technology and Research Scholar, Bharathiar University, Tamil Nadu, India, LoadBalancedMin-MinAlgorithmforStaticMeta-Task Scheduling in Grid ComputingInternational Journal of Computer Applications(0975 – 8887)Volume20–No.2,April 2017. [14].M. Akbari and H. Rashidi, A multi-destinations booking calculation dependent on cuckoo streamlining for task allotment issue at arrange time in heterogeneous frameworks, Expert Systems with Applications, vol. 60, pp. 234–248, 2018. [15].Zenon Chaczko, Venkatesh Mahadevan, Shahrzad Aslanzadeh, Christopher Mcdermid (2011),Availabity and Load Balancing in Cloud Computing International Conference on Computer and Software Modeling IPCSIT vol.14 IACSIT Press,Singapore 2015.