SlideShare a Scribd company logo
1 of 6
Download to read offline
2
OPERATING SYSTEM
REPORT TITLE
DESIGNING A MODEL
FOR IMPROVING CPU SCHEDULING
BY USING MACHINE LEARNING
SUBMITTED BY
MUSKAN RATH
IIIT Bhubaneswar
3
OPERATING SYSTEM
REPORT TITLE
DESIGNING A MODEL FOR IMPROVING CPU SCHEDULING BY
USING MACHINE LEARNING
Problem Statement
The main concern of our paper describes that we are proposing a model for a uniprocessor system for
improving CPU scheduling. Our model is implemented at low-level language or assembly language and
LINUX is used for the implementation of the model as it is an open-source environment and its kernel is
editable.
There are several methods to predict the length of the CPU-bursts, such as exponential averaging method,
however these methods may not give an accurate or reliable predicted values. In this paper, we will
propose a Machine Learning (ML) based best approach to estimate the length of the CPU-bursts for
processes. We will make use of Bayesian Theory for our model as a classifier tool that will decide which
process will execute first in the ready queue. The proposed approach aims to select the most significant
attributes of the process using feature selection techniques and then predicts the CPU-burst for the process
in the grid. Furthermore, applying attribute selection techniques improves the performance in terms of
space, time and estimation.
Material and Methods
1.Bayesian Decision Theory
The methodology of selecting process which will be first executed on the ready queue involves two
phases. They are comparison of static and dynamic properties of new processes in the queue with the
properties of the dataset of the previously executed process. Data comes from a process that is not
completely known. The dataset is divided into two categories of processes; useful processes and not-
useful processes. The new process will be categorized as either useful or not useful depending on the
results of the comparison of properties. Furthermore, we can find the probability of the new process in the
ready queue to be executed given that the previous process has been executed as:
P(A|B)=P(A∩B)/P(B)
4
=> P(A∩B)=P(A|B).P(B) --------(i)
Also, P(B|A)=P(B∩A)/P(A)
=> P(B∩A)=P(B|A).P(A) ----------(ii)
Since (i) and (ii) are equal. We have,
P(A|B).P(B)=P(B|A).P(A)
In the above formula, A is a new process which is yet to be executed and B is a previous process which
has been executed. The process A is a hypothesis while process B is the evidence or data. In the above
case, we are finding the probability of hypothesis when we have given some evidence or data. By
knowing the probability of a new process occurring we can optimise CPU Scheduling. But if wrong
decision is taken, then there might be losses. A decision rule α(.) takes input x and outputs a decision α(x).
We will usually require that α(.) lies in a class of decision rules A, i.e. α(.) ∈ A. A is sometimes called
the hypothesis class. In Bayes Decision Theory there are usually no restrictions placed on A (i.e. all rules
α(.) are allowed). In Machine Learning, we will usually put restrictions on A to ensure that we have
enough data to learn them. The loss function L(α(x), y) is the cost you pay if you make decision α(x), but
the true state is y.To put everything together, we have :
likelihood function: p(x|y) x ∈ X, y ∈ Y
prior: p(y)
decision rule: α(x) α(x) ∈ Y
loss function: L(α(x), y) cost of making decision α(x) when true state is y.
The risk function combines the loss function, the decision rule, and the probabilities. More precisely, the
risk of a decision rule α(.) is the expected loss L(., .) with respect to the probabilities p(., .). R(α) = X x,y
L(α(x), y)P(x, y) (Note: if x takes continuous values (instead of discrete values) then we replace P x,y by
P y R dx.) According to Bayes Decision Theory one has to pick the decision rule ˆα which minimizes the
risk. αˆ = arg min α∈A R(α), i.e. R(ˆα) ≥ R(α) ∀α ∈ A (set of all decision rules). αˆ is the Bayes
Decision R(ˆα) is the Bayes Risk.
2.Proposed Approach
Our purpose in the proposed model is to reduce the possibility of selecting an inappropriate process that
may increase the waiting time of all other processes waiting for CPU. Furthermore, (throughput) will be
5
decreased on selecting the process which will take maximum time of CPU. Bayesian Decision Theory
(BDT), works on previous knowledge and distribution of the data from which we have to select the
appropriate data item expecting to achieve the target. Our model proposes the data set of 100 execution
instances of five programs: (1) matrix multiplication, (2) quick sort, (3) merges sort, (4) heap sort and (5)
a recursive Fibonacci number generator. The data collection may be performed by saving the process
control blocks of the executed processes. Data of about 100 instances of the five programs is enough and
made into 02 categories; useful and not-useful processes.
Training and Testing methodology: We proposed two types of tests on the training examples with all the
learners described in the section, BDT will be applied as classifier, on the data sets collected in the first
phase.
The tests are:
Use Training Set: The classifier is evaluated on how well it predicts the class of the instance it was trained
on.
Cross-Validation: The classifier can be evaluated by cross-validation, using the number of processes that
are entered in the system. Recognition accuracy can be tested via cross validation.
BASIC APPROACH
1) The programs are run according to different time slices using the scheduler in order to find the best
STS that is the best time slice which will help in giving the minimum turnaround time , that is the
minimum time required to complete the entire process of a CPU Scheduling.
2) Taking the help of basic static and dynamic properties of our process, we fetch the properties to the
BDT(Bayesian Classifier) in order to classify the processes into useful and non useful categories in order
to help us determine which process should be scheduled first.
3) If a new program comes, classify it and run the program with this predicted STS.
4) If the new program instance is not in the knowledge-base, go to step 1.
5) BDT works as effective classifier to classify the process which may or may not be useful process for
the system from both user and system point of view. The BDT is solely based on probabilistic and
statistical data so as a result the ratio of accuracy of selecting the appropriate process may vary from time
to time.
6
A variety of criteria are used in designing the real-time scheduler. Some of these criteria relate to the
behavior of the system as perceived by the individual user (user oriented), while others view the total
effectiveness of the system in meeting the needs of all users (system oriented). Some of the criteria relate
specifically to quantitative measures of performance, while others are more qualitative in nature. From a
user’s point of view, response time is generally the most important characteristic of a system, while from
a system point of view, throughput or processor utilization is important. In this work, BDT works as
effective classifier to classify the process which may or may not be useful process for the system from
both user and system point of view. The BDT is solely based on probabilistic and statistical data so as a
result the ratio of accuracy of selecting the appropriate process may vary from time to time.
7

More Related Content

What's hot

Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmeSAT Journals
 
A Novel Methodology to Implement Optimization Algorithms in Machine Learning
A Novel Methodology to Implement Optimization Algorithms in Machine LearningA Novel Methodology to Implement Optimization Algorithms in Machine Learning
A Novel Methodology to Implement Optimization Algorithms in Machine LearningVenkata Karthik Gullapalli
 
SigOpt_Bayesian_Optimization_Primer
SigOpt_Bayesian_Optimization_PrimerSigOpt_Bayesian_Optimization_Primer
SigOpt_Bayesian_Optimization_PrimerIan Dewancker
 
Query optimization
Query optimizationQuery optimization
Query optimizationPooja Dixit
 
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATADETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATAIJCSEA Journal
 
Study on Sorting Algorithm and Position Determining Sort
Study on Sorting Algorithm and Position Determining SortStudy on Sorting Algorithm and Position Determining Sort
Study on Sorting Algorithm and Position Determining SortIRJET Journal
 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemslaxmanLaxman03209
 
Application of Principal Components Analysis in Quality Control Problem
Application of Principal Components Analysisin Quality Control ProblemApplication of Principal Components Analysisin Quality Control Problem
Application of Principal Components Analysis in Quality Control ProblemMaxwellWiesler
 
Selection Sort with Improved Asymptotic Time Bounds
Selection Sort with Improved Asymptotic Time BoundsSelection Sort with Improved Asymptotic Time Bounds
Selection Sort with Improved Asymptotic Time Boundstheijes
 
Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...eSAT Journals
 
Using the black-box approach with machine learning methods in ...
Using the black-box approach with machine learning methods in ...Using the black-box approach with machine learning methods in ...
Using the black-box approach with machine learning methods in ...butest
 
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATABINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATAacijjournal
 

What's hot (17)

Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithm
 
Chapter15
Chapter15Chapter15
Chapter15
 
A Novel Methodology to Implement Optimization Algorithms in Machine Learning
A Novel Methodology to Implement Optimization Algorithms in Machine LearningA Novel Methodology to Implement Optimization Algorithms in Machine Learning
A Novel Methodology to Implement Optimization Algorithms in Machine Learning
 
SigOpt_Bayesian_Optimization_Primer
SigOpt_Bayesian_Optimization_PrimerSigOpt_Bayesian_Optimization_Primer
SigOpt_Bayesian_Optimization_Primer
 
Query optimization
Query optimizationQuery optimization
Query optimization
 
mlsys_portrait
mlsys_portraitmlsys_portrait
mlsys_portrait
 
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATADETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
DETECTION OF RELIABLE SOFTWARE USING SPRT ON TIME DOMAIN DATA
 
Study on Sorting Algorithm and Position Determining Sort
Study on Sorting Algorithm and Position Determining SortStudy on Sorting Algorithm and Position Determining Sort
Study on Sorting Algorithm and Position Determining Sort
 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problems
 
Application of Principal Components Analysis in Quality Control Problem
Application of Principal Components Analysisin Quality Control ProblemApplication of Principal Components Analysisin Quality Control Problem
Application of Principal Components Analysis in Quality Control Problem
 
Selection Sort with Improved Asymptotic Time Bounds
Selection Sort with Improved Asymptotic Time BoundsSelection Sort with Improved Asymptotic Time Bounds
Selection Sort with Improved Asymptotic Time Bounds
 
Query trees
Query treesQuery trees
Query trees
 
Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...
 
Cs 331 Data Structures
Cs 331 Data StructuresCs 331 Data Structures
Cs 331 Data Structures
 
Using the black-box approach with machine learning methods in ...
Using the black-box approach with machine learning methods in ...Using the black-box approach with machine learning methods in ...
Using the black-box approach with machine learning methods in ...
 
pdf
pdfpdf
pdf
 
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATABINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
 

Similar to A report on designing a model for improving CPU Scheduling by using Machine Learning

Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsDinusha Dilanka
 
Timetable management system(chapter 3)
Timetable management system(chapter 3)Timetable management system(chapter 3)
Timetable management system(chapter 3)Emeer95
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Software Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelSoftware Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelWaqas Tariq
 
Genetic Algorithm for Process Scheduling
Genetic Algorithm for Process SchedulingGenetic Algorithm for Process Scheduling
Genetic Algorithm for Process SchedulingLogin Technoligies
 
Optimal Feature Selection from VMware ESXi 5.1 Feature Set
Optimal Feature Selection from VMware ESXi 5.1 Feature SetOptimal Feature Selection from VMware ESXi 5.1 Feature Set
Optimal Feature Selection from VMware ESXi 5.1 Feature Setijccmsjournal
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Mumbai Academisc
 
Adaptive check-pointing and replication strategy to tolerate faults in comput...
Adaptive check-pointing and replication strategy to tolerate faults in comput...Adaptive check-pointing and replication strategy to tolerate faults in comput...
Adaptive check-pointing and replication strategy to tolerate faults in comput...IOSR Journals
 
Chapter 1 Data structure.pptx
Chapter 1 Data structure.pptxChapter 1 Data structure.pptx
Chapter 1 Data structure.pptxwondmhunegn
 
Modeling of multiversion concurrency control
Modeling of multiversion concurrency controlModeling of multiversion concurrency control
Modeling of multiversion concurrency controlJawid Ahmad Baktash
 
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...Eswar Publications
 
Bt0081 software engineering2
Bt0081 software engineering2Bt0081 software engineering2
Bt0081 software engineering2Techglyphs
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Journals
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Publishing House
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachAssessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachIJCSEA Journal
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach IJCSEA Journal
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET Journal
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...ijcsa
 

Similar to A report on designing a model for improving CPU Scheduling by using Machine Learning (20)

Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
 
Timetable management system(chapter 3)
Timetable management system(chapter 3)Timetable management system(chapter 3)
Timetable management system(chapter 3)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Software Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power ModelSoftware Process Control on Ungrouped Data: Log-Power Model
Software Process Control on Ungrouped Data: Log-Power Model
 
Genetic Algorithm for Process Scheduling
Genetic Algorithm for Process SchedulingGenetic Algorithm for Process Scheduling
Genetic Algorithm for Process Scheduling
 
Optimal Feature Selection from VMware ESXi 5.1 Feature Set
Optimal Feature Selection from VMware ESXi 5.1 Feature SetOptimal Feature Selection from VMware ESXi 5.1 Feature Set
Optimal Feature Selection from VMware ESXi 5.1 Feature Set
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...
 
genetic paper
genetic papergenetic paper
genetic paper
 
Adaptive check-pointing and replication strategy to tolerate faults in comput...
Adaptive check-pointing and replication strategy to tolerate faults in comput...Adaptive check-pointing and replication strategy to tolerate faults in comput...
Adaptive check-pointing and replication strategy to tolerate faults in comput...
 
E01113138
E01113138E01113138
E01113138
 
Chapter 1 Data structure.pptx
Chapter 1 Data structure.pptxChapter 1 Data structure.pptx
Chapter 1 Data structure.pptx
 
Modeling of multiversion concurrency control
Modeling of multiversion concurrency controlModeling of multiversion concurrency control
Modeling of multiversion concurrency control
 
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Funct...
 
Bt0081 software engineering2
Bt0081 software engineering2Bt0081 software engineering2
Bt0081 software engineering2
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics ApproachAssessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach
 
Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach Assessing Software Reliability Using SPC – An Order Statistics Approach
Assessing Software Reliability Using SPC – An Order Statistics Approach
 
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
IRJET- Expert Independent Bayesian Data Fusion and Decision Making Model for ...
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
 

More from MuskanRath1

CryptoImpact.docx
CryptoImpact.docxCryptoImpact.docx
CryptoImpact.docxMuskanRath1
 
IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxMuskanRath1
 
Bitcoin ppt.pptx
Bitcoin ppt.pptxBitcoin ppt.pptx
Bitcoin ppt.pptxMuskanRath1
 
Big data analytics of ev charging stations
Big data analytics of ev charging stationsBig data analytics of ev charging stations
Big data analytics of ev charging stationsMuskanRath1
 
Connected cars article
Connected cars articleConnected cars article
Connected cars articleMuskanRath1
 
A review on power quality disturbance classification using deep learning appr...
A review on power quality disturbance classification using deep learning appr...A review on power quality disturbance classification using deep learning appr...
A review on power quality disturbance classification using deep learning appr...MuskanRath1
 

More from MuskanRath1 (6)

CryptoImpact.docx
CryptoImpact.docxCryptoImpact.docx
CryptoImpact.docx
 
IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docx
 
Bitcoin ppt.pptx
Bitcoin ppt.pptxBitcoin ppt.pptx
Bitcoin ppt.pptx
 
Big data analytics of ev charging stations
Big data analytics of ev charging stationsBig data analytics of ev charging stations
Big data analytics of ev charging stations
 
Connected cars article
Connected cars articleConnected cars article
Connected cars article
 
A review on power quality disturbance classification using deep learning appr...
A review on power quality disturbance classification using deep learning appr...A review on power quality disturbance classification using deep learning appr...
A review on power quality disturbance classification using deep learning appr...
 

Recently uploaded

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 

Recently uploaded (20)

ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 

A report on designing a model for improving CPU Scheduling by using Machine Learning

  • 1. 2 OPERATING SYSTEM REPORT TITLE DESIGNING A MODEL FOR IMPROVING CPU SCHEDULING BY USING MACHINE LEARNING SUBMITTED BY MUSKAN RATH IIIT Bhubaneswar
  • 2. 3 OPERATING SYSTEM REPORT TITLE DESIGNING A MODEL FOR IMPROVING CPU SCHEDULING BY USING MACHINE LEARNING Problem Statement The main concern of our paper describes that we are proposing a model for a uniprocessor system for improving CPU scheduling. Our model is implemented at low-level language or assembly language and LINUX is used for the implementation of the model as it is an open-source environment and its kernel is editable. There are several methods to predict the length of the CPU-bursts, such as exponential averaging method, however these methods may not give an accurate or reliable predicted values. In this paper, we will propose a Machine Learning (ML) based best approach to estimate the length of the CPU-bursts for processes. We will make use of Bayesian Theory for our model as a classifier tool that will decide which process will execute first in the ready queue. The proposed approach aims to select the most significant attributes of the process using feature selection techniques and then predicts the CPU-burst for the process in the grid. Furthermore, applying attribute selection techniques improves the performance in terms of space, time and estimation. Material and Methods 1.Bayesian Decision Theory The methodology of selecting process which will be first executed on the ready queue involves two phases. They are comparison of static and dynamic properties of new processes in the queue with the properties of the dataset of the previously executed process. Data comes from a process that is not completely known. The dataset is divided into two categories of processes; useful processes and not- useful processes. The new process will be categorized as either useful or not useful depending on the results of the comparison of properties. Furthermore, we can find the probability of the new process in the ready queue to be executed given that the previous process has been executed as: P(A|B)=P(A∩B)/P(B)
  • 3. 4 => P(A∩B)=P(A|B).P(B) --------(i) Also, P(B|A)=P(B∩A)/P(A) => P(B∩A)=P(B|A).P(A) ----------(ii) Since (i) and (ii) are equal. We have, P(A|B).P(B)=P(B|A).P(A) In the above formula, A is a new process which is yet to be executed and B is a previous process which has been executed. The process A is a hypothesis while process B is the evidence or data. In the above case, we are finding the probability of hypothesis when we have given some evidence or data. By knowing the probability of a new process occurring we can optimise CPU Scheduling. But if wrong decision is taken, then there might be losses. A decision rule α(.) takes input x and outputs a decision α(x). We will usually require that α(.) lies in a class of decision rules A, i.e. α(.) ∈ A. A is sometimes called the hypothesis class. In Bayes Decision Theory there are usually no restrictions placed on A (i.e. all rules α(.) are allowed). In Machine Learning, we will usually put restrictions on A to ensure that we have enough data to learn them. The loss function L(α(x), y) is the cost you pay if you make decision α(x), but the true state is y.To put everything together, we have : likelihood function: p(x|y) x ∈ X, y ∈ Y prior: p(y) decision rule: α(x) α(x) ∈ Y loss function: L(α(x), y) cost of making decision α(x) when true state is y. The risk function combines the loss function, the decision rule, and the probabilities. More precisely, the risk of a decision rule α(.) is the expected loss L(., .) with respect to the probabilities p(., .). R(α) = X x,y L(α(x), y)P(x, y) (Note: if x takes continuous values (instead of discrete values) then we replace P x,y by P y R dx.) According to Bayes Decision Theory one has to pick the decision rule ˆα which minimizes the risk. αˆ = arg min α∈A R(α), i.e. R(ˆα) ≥ R(α) ∀α ∈ A (set of all decision rules). αˆ is the Bayes Decision R(ˆα) is the Bayes Risk. 2.Proposed Approach Our purpose in the proposed model is to reduce the possibility of selecting an inappropriate process that may increase the waiting time of all other processes waiting for CPU. Furthermore, (throughput) will be
  • 4. 5 decreased on selecting the process which will take maximum time of CPU. Bayesian Decision Theory (BDT), works on previous knowledge and distribution of the data from which we have to select the appropriate data item expecting to achieve the target. Our model proposes the data set of 100 execution instances of five programs: (1) matrix multiplication, (2) quick sort, (3) merges sort, (4) heap sort and (5) a recursive Fibonacci number generator. The data collection may be performed by saving the process control blocks of the executed processes. Data of about 100 instances of the five programs is enough and made into 02 categories; useful and not-useful processes. Training and Testing methodology: We proposed two types of tests on the training examples with all the learners described in the section, BDT will be applied as classifier, on the data sets collected in the first phase. The tests are: Use Training Set: The classifier is evaluated on how well it predicts the class of the instance it was trained on. Cross-Validation: The classifier can be evaluated by cross-validation, using the number of processes that are entered in the system. Recognition accuracy can be tested via cross validation. BASIC APPROACH 1) The programs are run according to different time slices using the scheduler in order to find the best STS that is the best time slice which will help in giving the minimum turnaround time , that is the minimum time required to complete the entire process of a CPU Scheduling. 2) Taking the help of basic static and dynamic properties of our process, we fetch the properties to the BDT(Bayesian Classifier) in order to classify the processes into useful and non useful categories in order to help us determine which process should be scheduled first. 3) If a new program comes, classify it and run the program with this predicted STS. 4) If the new program instance is not in the knowledge-base, go to step 1. 5) BDT works as effective classifier to classify the process which may or may not be useful process for the system from both user and system point of view. The BDT is solely based on probabilistic and statistical data so as a result the ratio of accuracy of selecting the appropriate process may vary from time to time.
  • 5. 6 A variety of criteria are used in designing the real-time scheduler. Some of these criteria relate to the behavior of the system as perceived by the individual user (user oriented), while others view the total effectiveness of the system in meeting the needs of all users (system oriented). Some of the criteria relate specifically to quantitative measures of performance, while others are more qualitative in nature. From a user’s point of view, response time is generally the most important characteristic of a system, while from a system point of view, throughput or processor utilization is important. In this work, BDT works as effective classifier to classify the process which may or may not be useful process for the system from both user and system point of view. The BDT is solely based on probabilistic and statistical data so as a result the ratio of accuracy of selecting the appropriate process may vary from time to time.
  • 6. 7