SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
DOI:10.5121/ijfcst.2016.6107 87
REVIEW AND COMPARISON OF TASKS SCHEDULING
IN CLOUD COMPUTING
Yousef Tohidirad1
, Zahed Soltani aliabadi2
, Abdolsalam Azizi3
, Siamak Abdezadeh4
and Mohammad Moradi5
1
Department of Computer Engineering, Electronic Branch, Islamic Azad University,
Tehran, Iran
2,3
Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia,
Iran
4
Department of Computer, Boukan Branch, Islamic Azad University, Boukan, Iran
5
Department of Computer, Baneh Branch, Islamic Azad University, Baneh, Iran
ABSTRACT
Recently, there has been a dramatic increase in the popularity of cloud computing systems that rent
computing resources on-demand, bill on a pay-as-you-go basis, and multiplex many users on the same
physical infrastructure. It is a virtual pool of resources which are provided to users via Internet. It gives
users virtually unlimited pay-per-use computing resources without the burden of managing the underlying
infrastructure. One of the goals is to use the resources efficiently and gain maximum profit. Scheduling is a
critical problem in Cloud computing, because a cloud provider has to serve many users in Cloud
computing system. So scheduling is the major issue in establishing Cloud computing systems. The
scheduling algorithms should order the jobs in a way where balance between improving the performance
and quality of service and at the same time maintaining the efficiency and fairness among the jobs. This
paper introduces and explores some of the methods provided for in cloud computing has been scheduled.
Finally the waiting time and time to implement some of the proposed algorithm is evaluated.
KEYWORDS
Cloud Computing, scheduling algorithms, Scheduling Management, Virtual Machine (VM), CloudSim.
1. INTRODUCTION
Modern communication has been termed as ‘viral exchange of information’. This follows to the
effect that the contemporary world is subject to internet communication, which sees people share
information in a ‘ghostly’ manner. In the actual sense, the ‘people’ who communicate during this
process are the machines involved, mostly the computers and servers [1]. Users of the internet
have seen continuous manipulation of data that they share. This aspect is controlled by the fact
that users are many, thereby making the computers to be subject to heavy task scheduling
protocols. This aims to have many people access the internet with ease and in the required
bandwidth. The interconnection of these processes, despite the difference in the computer
processors, is termed as Cloud Computing.
Cloud computing is a technique that uses the most elemental issues of information sharing. In this
manner, there is a rightly developed infrastructure as well as the interrelating services. Different
relating concepts are described within the aspects of the process. A number of computers are
always connected in the network in real-time [2]. Users have the ability to reach the GUI features
without knowing the applied expertise on the same. This is well laid under the principle of
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
88
visualization. Visualization is the main intention of the technology with the intention of running
numerous VMs on a single machine with the required specifications of load balancing. In this
way, a good task scheme is used to expand the ability for the load balancing under task
scheduling within the specified distribution system. There is an ABC presence inspired by the life
of the honeybee. To improve the performance of the process, there are created set of behaviours
and techniques designed by the required personnel to utilize the given designs under the designs
of the ABC algorithm [3].
2. MATERIALS AND METHODS
2.1. Basics of ABC
As a concern of VM scheduling, ABC algorithm has stood as the ideal measure for its success for
most special implementations [4].While being used from time to time, the algorithm has been
effective for the establishment of the right value. While working under the principle of the
honeybees, information sharing on machines is based on source details, destination, network
quality, player of the network, threats and design tricks of the network. This can be describes by
the ABC pseudo code shown in Figure 1 [1].
Figure 1. ABC pseudo code/ basic algorithm of ABC aimed at having tasks scheduled [1]
2.2. ABC in application
The major intention of Cloud Computing is the existence of self-motivated a pool of VM
resources [5]. The VM requirements are defined according to the system’s users. This is done in
accordance with the expected design specifications. Using the acceptable Cloud Management
policies, possibility for routing specifications is established. This aspect is done within the limits
of the available servers while looking at the cloud management. Under the same specifications, it
is possible have different degrees of scheduling management while considering the load levels
within VMs. The balancing along this line should leave the best room for the reduction of
maskespan and response time.
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
89
Since the machines have the general outlook of virtual presence, it is good to represent them
under a set of numbers for the resultant or overall virtuosity as shown in the equation (1) [1].
VM = {VM1, VM2, VM3,… ,VMN} (1)
These machines are subject to individual tasks that result into an overall system task as shown in
the equation (2) [1].
Tack = {tack1, tack2, tack3,… ,tackK} (2)
The machines work in tandem (parallel) using different processors. In this way, the scheduling
ability is non-preventive. As a result, figure 2 shows the diagram a flowchart of the task
scheduling under the ABC instructions [1].
Figure 2. ABC instruction and the scheduling modality [1]
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
90
In the second process, evaluation of the population’s fitness is a calculation based on the formula
(3) [1].
j
n
i
ij
ij
VMofcapacitytheofevalution
lengthtask
fit
∑=
= 1
_
(3)
In this case, the fitness of the process numbers are shown by fit within the capacity of VM within
the tasks of descriptions task length. To obtain the overall capacity, equation (4) is applicable [1].
jjj bwvmmipspenumpecapacityj __*_ += (4)
In this case, the number of processors in the system is indicated by _ within the
instruction limits shown by _ in the required bandwidth of _ as per the ability of
the virtual machines. The identification and the allocation of these elements lead to the fitness
selection of the required neighbourhood VMs. When the process recruitment reaches, the
bounding element is definable by the formula (5) [1].
j
n
i
i
ij
VMofcapacitytheofevalution
lengthinputfilelengthtask
fit
∑=
+
= 1
__
(5)
In this case, the input File length becomes the size of the task with pending execution details.
Once this is done, the overshadowing fitness is chosen in line with the assign task VM. This
allows the calculation of load balance within the workload VMs as per the information obtained
from the datacentre [6]. It becomes easier to get the standard deviation with respect to the actual
load VMs as formula (6) [1].
2^)(
1
..
0
∑=
−=
n
j
j XX
n
DS (6)
Any VM now has a processing time indicated by the equation (7) [1].
j
k
i
i
j
capacity
lengthtask
X
∑=
= 1
_
(7)
The mean processing time for all the VMs is also indicated as formula (8) [1].
n
X
X
n
j
j∑=
=
1
(8)
From the above conclusive equations, it can be stated that whenever S.D. of the full VM becomes
less or equal to mean, a balanced state of the system is experienced. In case S.D. is higher than
the mean, the imbalance state prevails [7].
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
91
2.3. Results and discussion
By the use of a CloudSim tool (any version from 3.0.1); the simulation platform is subject to the
table 1 [1].
TABLE 1. Parameters for the CloudSim setting [1]
For setting the ABC algorithm, the parameters are shown in TABLE 2 [1].
TABLE 2. Parameters for improved ABC setting [1]
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
92
As possible to establish, the assessment of the procedure is describable under three algorithmic
instructions. There is the presence of First Come First Served (FCFS) that works on the
chronological reach of the given task. There is the Shortest Job First (SJF) that considers the
sequencing by making the selection of the first job in short terms stated [8]. The Longest Job First
(LJF) ensures that the heavy job is selected first. The results of the first and the second
experiments are shown in Figures 3 and 4[1, 5].
Figure 3. Comparison of makespan and the tasks
Figure 4. Comparison of makespan and the number of VMs
International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016
93
As shown in figure 3, there are a number of increasing requests. As a result, the average numbers
of requests being made are progressing under the same design specifications [9, 10, 11, and 12].
Consequently, ABC_LJF can be said to be effective within the required scheduling on the full
system [12, 13]. As for the second experiment, there is an exponential decay of makespan with
the number of VMs. In the same design show, the previous conclusion still prevails.
3. CONCLUSION
As the paper indicates, ABC controlled algorithm is seen to be suitable for solutions surrounding
VM scheduling management so that the tasks are scheduled in the right manner and needs. This
goes under the adjustable features in Cloud Computing. As these parameters are optimized, the
stability of the system still prevails. This allows the system to operate with optimum utility. It is
then imperative to state that ABC algorithm is good for Cloud Computing and its environment
under the utility of the required parameters in a manner that the tasks are handled with utmost
utility. This stability makes the system to works without crashing in the manners of ABC_LJF
needs and designs.
REFERENCES
[1] B. Kruekaew, W. Kimpan, “Virtual Machine Scheduling Management on Cloud Computing Using
Artificial Bee Colony”, Proceedings of the International MultiConference of Engineers and Computer
Scientists, pp.978-988, 2014.
[2] D.H. Khan, D. Kapgate, P.S. Prasad, “A Review on Virtual Machine Management Techniques and
Scheduling in Cloud Computing” International Journal of Advanced Research in Computer Science
and Software Engineering, 3(12), pp.838-845, 2013.
[3] S. Hadi, “Advantages, Challenges and Optimizations of Virtual Machine Scheduling in Cloud
Computing Environments”, International Journal of Computer Theory and Engineering, 4(2), 2012.
[4] G. TARUN, “Host Scheduling Algorithm Using Genetic Algorithm In Cloud Computing
Environment”, International Journal of Research in Engineering & Technology, 1(1), 2013.
[5] K. Kiran, “An Adaptive Algorithm For Dynamic Priority Based Virtual Machine Scheduling In
Cloud”, International Journal of Computer Science Issues, 9(6), 2012.
[6] I. Moschakis, H. Karatza, “Performance and Cost evaluation of Gang Scheduling in a Cloud
Computing System with Job Migrations and Starvation Handling”, Thessaloniki: Aristotle University
of Thessaloniki, 2013
[7] N. Ramkumar, “Efficient Resource Utilization Algorithm (ERUA) for Service Request Scheduling in
Cloud”, International Journal of Engineering and Technology, 5(2), 2013.
[8] V. Vignesh, K.K. Sendhil, N. Jaisankar, “Resource management and scheduling in cloud
environment”, International Journal of Scientific and Research Publications, 3(6), 2013.
[9] K. Rasmi, V. Vive, “Resource Management Techniques in Cloud Environment - A Brief Survey”,
International Journal of Innovation and Applied Studies, 2(4), 2013.
[10] S.P. Abirami, R. Shalini, “Linear Scheduling Strategy for Resource allocation in Cloud
Environment”, International Journal on Cloud Computing and Architecture, 2(1), 2012.
[11] S. Paulus, U. Riemann, “An Approach for a Business-driven Cloud-compliance Analysis Covering
Public Sector Process Improvement Requirements”, International Journal of Managing Public Sector
Information and Communication Technologies (IJMPICT), Vol. 4, No. 3, pp. 1-13, 2013.
[12] R. Saini, Indu, “EFFICIENT JOB SCHEDULING OF VIRTUAL MACHINES IN CLOUD
COMPUTING”, International Journal of Advanced Research in Computer and Communication
Engineering, pp.3349-3354, 2013.
[13] S. Hashemi, “Cloud computing technology for E-government architecture”, International Journal in
Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, pp. 15-23, 2013.

More Related Content

What's hot

IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET Journal
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET Journal
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET Journal
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONVLSICS Design
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Editor IJCATR
 
Solving linear equations from an image using ann
Solving linear equations from an image using annSolving linear equations from an image using ann
Solving linear equations from an image using anneSAT Journals
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERvineet raj
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System OperationsIRJET Journal
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorIRJET Journal
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classificationijtsrd
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmAM Publications
 
Kandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kandemir Inferring Object Relevance From Gaze In Dynamic ScenesKandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kandemir Inferring Object Relevance From Gaze In Dynamic ScenesKalle
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...IRJET Journal
 
Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.Tushar Shinde
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A ReviewIOSRjournaljce
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET Journal
 

What's hot (20)

IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different Classifier
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
Solving linear equations from an image using ann
Solving linear equations from an image using annSolving linear equations from an image using ann
Solving linear equations from an image using ann
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
IRJET - Hand Gesture Recognition to Perform System Operations
IRJET -  	  Hand Gesture Recognition to Perform System OperationsIRJET -  	  Hand Gesture Recognition to Perform System Operations
IRJET - Hand Gesture Recognition to Perform System Operations
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain Tumor
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classification
 
Image Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic AlgorithmImage Steganography Using Wavelet Transform And Genetic Algorithm
Image Steganography Using Wavelet Transform And Genetic Algorithm
 
Kandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kandemir Inferring Object Relevance From Gaze In Dynamic ScenesKandemir Inferring Object Relevance From Gaze In Dynamic Scenes
Kandemir Inferring Object Relevance From Gaze In Dynamic Scenes
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
A Comparative study of K-SVD and WSQ Algorithms in Fingerprint Compression Te...
 
B018110915
B018110915B018110915
B018110915
 
Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.Intrusion Detection Model using Self Organizing Maps.
Intrusion Detection Model using Self Organizing Maps.
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
 
IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET- Optical Character Recognition using Neural Networks by Classification ...
IRJET- Optical Character Recognition using Neural Networks by Classification ...
 

Viewers also liked

Rede Mulher Empreendedora
Rede Mulher Empreendedora Rede Mulher Empreendedora
Rede Mulher Empreendedora ANA FONTES
 
XING & Karriere-Entwicklung
XING & Karriere-Entwicklung XING & Karriere-Entwicklung
XING & Karriere-Entwicklung Jo Havemann
 
Planejamento de Marketing para PMES -FGV Maio de 2014
Planejamento de Marketing para PMES -FGV Maio de 2014 Planejamento de Marketing para PMES -FGV Maio de 2014
Planejamento de Marketing para PMES -FGV Maio de 2014 ANA FONTES
 
Viretori Main Pres 090909/ Workshop 1/Arne van Osterom
Viretori Main Pres 090909/ Workshop 1/Arne van OsteromViretori Main Pres 090909/ Workshop 1/Arne van Osterom
Viretori Main Pres 090909/ Workshop 1/Arne van OsteromSatu Miettinen
 
Amazing optical illusion photography Part-4
Amazing optical illusion photography Part-4Amazing optical illusion photography Part-4
Amazing optical illusion photography Part-4Sayyedul Hoq
 
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES ANA FONTES
 
5 semestre integrada gabarito
5 semestre integrada gabarito5 semestre integrada gabarito
5 semestre integrada gabaritopablonaba
 
体验的历程 Afooli
体验的历程 Afooli体验的历程 Afooli
体验的历程 AfooliAlite Yu
 
Mobile apps for your sale
Mobile apps for your saleMobile apps for your sale
Mobile apps for your saleWhalla Labs
 
性權:台鐵 火車趴報告
性權:台鐵 火車趴報告性權:台鐵 火車趴報告
性權:台鐵 火車趴報告柏臣 陳
 
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...Welfare Tech
 
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.082016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.08vinhbinh2010
 
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)小均 張
 
Top 10 Blacks
Top 10 BlacksTop 10 Blacks
Top 10 Blacksjaloisi
 
Playing With Spanish Words
Playing With Spanish WordsPlaying With Spanish Words
Playing With Spanish Wordsteachersite
 

Viewers also liked (20)

Step up to serve: presentation to CCCW, Dec 2014
Step up to serve: presentation to CCCW, Dec 2014Step up to serve: presentation to CCCW, Dec 2014
Step up to serve: presentation to CCCW, Dec 2014
 
Rede Mulher Empreendedora
Rede Mulher Empreendedora Rede Mulher Empreendedora
Rede Mulher Empreendedora
 
XING & Karriere-Entwicklung
XING & Karriere-Entwicklung XING & Karriere-Entwicklung
XING & Karriere-Entwicklung
 
Resource Efficient Wales (REW)
Resource Efficient Wales (REW)Resource Efficient Wales (REW)
Resource Efficient Wales (REW)
 
Ctm verso altrobilancio-2010
Ctm verso altrobilancio-2010Ctm verso altrobilancio-2010
Ctm verso altrobilancio-2010
 
Planejamento de Marketing para PMES -FGV Maio de 2014
Planejamento de Marketing para PMES -FGV Maio de 2014 Planejamento de Marketing para PMES -FGV Maio de 2014
Planejamento de Marketing para PMES -FGV Maio de 2014
 
Viretori Main Pres 090909/ Workshop 1/Arne van Osterom
Viretori Main Pres 090909/ Workshop 1/Arne van OsteromViretori Main Pres 090909/ Workshop 1/Arne van Osterom
Viretori Main Pres 090909/ Workshop 1/Arne van Osterom
 
Amazing optical illusion photography Part-4
Amazing optical illusion photography Part-4Amazing optical illusion photography Part-4
Amazing optical illusion photography Part-4
 
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
Encontro Alumni FGV 10 mil mulheres - Redes Sociais Junho -ANA FONTES
 
5 semestre integrada gabarito
5 semestre integrada gabarito5 semestre integrada gabarito
5 semestre integrada gabarito
 
体验的历程 Afooli
体验的历程 Afooli体验的历程 Afooli
体验的历程 Afooli
 
Mobile apps for your sale
Mobile apps for your saleMobile apps for your sale
Mobile apps for your sale
 
性權:台鐵 火車趴報告
性權:台鐵 火車趴報告性權:台鐵 火車趴報告
性權:台鐵 火車趴報告
 
WikiVermo
WikiVermoWikiVermo
WikiVermo
 
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
Welfare Tech Innovationsnetværk for Sundhed og Velfærdsteknologi eksport til ...
 
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.082016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
2016 - Pictures of the month_APRIL- Apr. 01 - Apr.08
 
Pozvánka
PozvánkaPozvánka
Pozvánka
 
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)ICDC2012 -  我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
ICDC2012 - 我要征服臺南牛肉湯計畫介紹 (開幕Special issue)
 
Top 10 Blacks
Top 10 BlacksTop 10 Blacks
Top 10 Blacks
 
Playing With Spanish Words
Playing With Spanish WordsPlaying With Spanish Words
Playing With Spanish Words
 

Similar to Review and comparison of tasks scheduling in cloud computing

Review and Comparison of Tasks Scheduling in Cloud Computing
Review and Comparison of Tasks Scheduling in Cloud Computing   Review and Comparison of Tasks Scheduling in Cloud Computing
Review and Comparison of Tasks Scheduling in Cloud Computing ijfcstjournal
 
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...IJEACS
 
Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...ijccsa
 
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...IJCNCJournal
 
Cloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyCloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyINFOGAIN PUBLICATION
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingIRJET Journal
 
Resource provisioning for video on demand in saas
Resource provisioning for video on demand in saasResource provisioning for video on demand in saas
Resource provisioning for video on demand in saasIAEME Publication
 
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIMELOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIMEijccsa
 
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTINGLOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTINGijccsa
 
Load Balancing Algorithm to Improve Response Time on Cloud Computing
Load Balancing Algorithm to Improve Response Time on Cloud ComputingLoad Balancing Algorithm to Improve Response Time on Cloud Computing
Load Balancing Algorithm to Improve Response Time on Cloud Computingneirew J
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingIOSRjournaljce
 
A load balancing strategy for reducing data loss risk on cloud using remodif...
A load balancing strategy for reducing data loss risk on cloud  using remodif...A load balancing strategy for reducing data loss risk on cloud  using remodif...
A load balancing strategy for reducing data loss risk on cloud using remodif...IJECEIAES
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...ijgca
 
A hybrid approach for scheduling applications in cloud computing environment
A hybrid approach for scheduling applications in cloud computing environment A hybrid approach for scheduling applications in cloud computing environment
A hybrid approach for scheduling applications in cloud computing environment IJECEIAES
 
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENTVIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENTijmpict
 
An Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentAn Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentIRJET Journal
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGIJCNCJournal
 

Similar to Review and comparison of tasks scheduling in cloud computing (20)

Review and Comparison of Tasks Scheduling in Cloud Computing
Review and Comparison of Tasks Scheduling in Cloud Computing   Review and Comparison of Tasks Scheduling in Cloud Computing
Review and Comparison of Tasks Scheduling in Cloud Computing
 
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
DCHEFT approach-for-task-scheduling-to-efficient-resource-allocation-in-cloud...
 
Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...
 
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
PROPOSED LOAD BALANCING ALGORITHM TO REDUCE RESPONSE TIME AND PROCESSING TIME...
 
Cloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based SurveyCloud Computing Load Balancing Algorithms Comparison Based Survey
Cloud Computing Load Balancing Algorithms Comparison Based Survey
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
 
Resource provisioning for video on demand in saas
Resource provisioning for video on demand in saasResource provisioning for video on demand in saas
Resource provisioning for video on demand in saas
 
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIMELOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
LOAD BALANCING ALGORITHM ON CLOUD COMPUTING FOR OPTIMIZE RESPONE TIME
 
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTINGLOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
LOAD BALANCING ALGORITHM TO IMPROVE RESPONSE TIME ON CLOUD COMPUTING
 
Load Balancing Algorithm to Improve Response Time on Cloud Computing
Load Balancing Algorithm to Improve Response Time on Cloud ComputingLoad Balancing Algorithm to Improve Response Time on Cloud Computing
Load Balancing Algorithm to Improve Response Time on Cloud Computing
 
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud ComputingEnergy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
Energy Efficient Heuristic Base Job Scheduling Algorithms in Cloud Computing
 
A load balancing strategy for reducing data loss risk on cloud using remodif...
A load balancing strategy for reducing data loss risk on cloud  using remodif...A load balancing strategy for reducing data loss risk on cloud  using remodif...
A load balancing strategy for reducing data loss risk on cloud using remodif...
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
 
D04573033
D04573033D04573033
D04573033
 
I018215561
I018215561I018215561
I018215561
 
A hybrid approach for scheduling applications in cloud computing environment
A hybrid approach for scheduling applications in cloud computing environment A hybrid approach for scheduling applications in cloud computing environment
A hybrid approach for scheduling applications in cloud computing environment
 
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENTVIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
VIRTUAL MACHINE SCHEDULING IN CLOUD COMPUTING ENVIRONMENT
 
An Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentAn Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud Environment
 
G216063
G216063G216063
G216063
 
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGSTUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTING
 

More from ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 

More from ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 

Review and comparison of tasks scheduling in cloud computing

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 DOI:10.5121/ijfcst.2016.6107 87 REVIEW AND COMPARISON OF TASKS SCHEDULING IN CLOUD COMPUTING Yousef Tohidirad1 , Zahed Soltani aliabadi2 , Abdolsalam Azizi3 , Siamak Abdezadeh4 and Mohammad Moradi5 1 Department of Computer Engineering, Electronic Branch, Islamic Azad University, Tehran, Iran 2,3 Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran 4 Department of Computer, Boukan Branch, Islamic Azad University, Boukan, Iran 5 Department of Computer, Baneh Branch, Islamic Azad University, Baneh, Iran ABSTRACT Recently, there has been a dramatic increase in the popularity of cloud computing systems that rent computing resources on-demand, bill on a pay-as-you-go basis, and multiplex many users on the same physical infrastructure. It is a virtual pool of resources which are provided to users via Internet. It gives users virtually unlimited pay-per-use computing resources without the burden of managing the underlying infrastructure. One of the goals is to use the resources efficiently and gain maximum profit. Scheduling is a critical problem in Cloud computing, because a cloud provider has to serve many users in Cloud computing system. So scheduling is the major issue in establishing Cloud computing systems. The scheduling algorithms should order the jobs in a way where balance between improving the performance and quality of service and at the same time maintaining the efficiency and fairness among the jobs. This paper introduces and explores some of the methods provided for in cloud computing has been scheduled. Finally the waiting time and time to implement some of the proposed algorithm is evaluated. KEYWORDS Cloud Computing, scheduling algorithms, Scheduling Management, Virtual Machine (VM), CloudSim. 1. INTRODUCTION Modern communication has been termed as ‘viral exchange of information’. This follows to the effect that the contemporary world is subject to internet communication, which sees people share information in a ‘ghostly’ manner. In the actual sense, the ‘people’ who communicate during this process are the machines involved, mostly the computers and servers [1]. Users of the internet have seen continuous manipulation of data that they share. This aspect is controlled by the fact that users are many, thereby making the computers to be subject to heavy task scheduling protocols. This aims to have many people access the internet with ease and in the required bandwidth. The interconnection of these processes, despite the difference in the computer processors, is termed as Cloud Computing. Cloud computing is a technique that uses the most elemental issues of information sharing. In this manner, there is a rightly developed infrastructure as well as the interrelating services. Different relating concepts are described within the aspects of the process. A number of computers are always connected in the network in real-time [2]. Users have the ability to reach the GUI features without knowing the applied expertise on the same. This is well laid under the principle of
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 88 visualization. Visualization is the main intention of the technology with the intention of running numerous VMs on a single machine with the required specifications of load balancing. In this way, a good task scheme is used to expand the ability for the load balancing under task scheduling within the specified distribution system. There is an ABC presence inspired by the life of the honeybee. To improve the performance of the process, there are created set of behaviours and techniques designed by the required personnel to utilize the given designs under the designs of the ABC algorithm [3]. 2. MATERIALS AND METHODS 2.1. Basics of ABC As a concern of VM scheduling, ABC algorithm has stood as the ideal measure for its success for most special implementations [4].While being used from time to time, the algorithm has been effective for the establishment of the right value. While working under the principle of the honeybees, information sharing on machines is based on source details, destination, network quality, player of the network, threats and design tricks of the network. This can be describes by the ABC pseudo code shown in Figure 1 [1]. Figure 1. ABC pseudo code/ basic algorithm of ABC aimed at having tasks scheduled [1] 2.2. ABC in application The major intention of Cloud Computing is the existence of self-motivated a pool of VM resources [5]. The VM requirements are defined according to the system’s users. This is done in accordance with the expected design specifications. Using the acceptable Cloud Management policies, possibility for routing specifications is established. This aspect is done within the limits of the available servers while looking at the cloud management. Under the same specifications, it is possible have different degrees of scheduling management while considering the load levels within VMs. The balancing along this line should leave the best room for the reduction of maskespan and response time.
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 89 Since the machines have the general outlook of virtual presence, it is good to represent them under a set of numbers for the resultant or overall virtuosity as shown in the equation (1) [1]. VM = {VM1, VM2, VM3,… ,VMN} (1) These machines are subject to individual tasks that result into an overall system task as shown in the equation (2) [1]. Tack = {tack1, tack2, tack3,… ,tackK} (2) The machines work in tandem (parallel) using different processors. In this way, the scheduling ability is non-preventive. As a result, figure 2 shows the diagram a flowchart of the task scheduling under the ABC instructions [1]. Figure 2. ABC instruction and the scheduling modality [1]
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 90 In the second process, evaluation of the population’s fitness is a calculation based on the formula (3) [1]. j n i ij ij VMofcapacitytheofevalution lengthtask fit ∑= = 1 _ (3) In this case, the fitness of the process numbers are shown by fit within the capacity of VM within the tasks of descriptions task length. To obtain the overall capacity, equation (4) is applicable [1]. jjj bwvmmipspenumpecapacityj __*_ += (4) In this case, the number of processors in the system is indicated by _ within the instruction limits shown by _ in the required bandwidth of _ as per the ability of the virtual machines. The identification and the allocation of these elements lead to the fitness selection of the required neighbourhood VMs. When the process recruitment reaches, the bounding element is definable by the formula (5) [1]. j n i i ij VMofcapacitytheofevalution lengthinputfilelengthtask fit ∑= + = 1 __ (5) In this case, the input File length becomes the size of the task with pending execution details. Once this is done, the overshadowing fitness is chosen in line with the assign task VM. This allows the calculation of load balance within the workload VMs as per the information obtained from the datacentre [6]. It becomes easier to get the standard deviation with respect to the actual load VMs as formula (6) [1]. 2^)( 1 .. 0 ∑= −= n j j XX n DS (6) Any VM now has a processing time indicated by the equation (7) [1]. j k i i j capacity lengthtask X ∑= = 1 _ (7) The mean processing time for all the VMs is also indicated as formula (8) [1]. n X X n j j∑= = 1 (8) From the above conclusive equations, it can be stated that whenever S.D. of the full VM becomes less or equal to mean, a balanced state of the system is experienced. In case S.D. is higher than the mean, the imbalance state prevails [7].
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 91 2.3. Results and discussion By the use of a CloudSim tool (any version from 3.0.1); the simulation platform is subject to the table 1 [1]. TABLE 1. Parameters for the CloudSim setting [1] For setting the ABC algorithm, the parameters are shown in TABLE 2 [1]. TABLE 2. Parameters for improved ABC setting [1]
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 92 As possible to establish, the assessment of the procedure is describable under three algorithmic instructions. There is the presence of First Come First Served (FCFS) that works on the chronological reach of the given task. There is the Shortest Job First (SJF) that considers the sequencing by making the selection of the first job in short terms stated [8]. The Longest Job First (LJF) ensures that the heavy job is selected first. The results of the first and the second experiments are shown in Figures 3 and 4[1, 5]. Figure 3. Comparison of makespan and the tasks Figure 4. Comparison of makespan and the number of VMs
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST) Vol.6, No.1, January 2016 93 As shown in figure 3, there are a number of increasing requests. As a result, the average numbers of requests being made are progressing under the same design specifications [9, 10, 11, and 12]. Consequently, ABC_LJF can be said to be effective within the required scheduling on the full system [12, 13]. As for the second experiment, there is an exponential decay of makespan with the number of VMs. In the same design show, the previous conclusion still prevails. 3. CONCLUSION As the paper indicates, ABC controlled algorithm is seen to be suitable for solutions surrounding VM scheduling management so that the tasks are scheduled in the right manner and needs. This goes under the adjustable features in Cloud Computing. As these parameters are optimized, the stability of the system still prevails. This allows the system to operate with optimum utility. It is then imperative to state that ABC algorithm is good for Cloud Computing and its environment under the utility of the required parameters in a manner that the tasks are handled with utmost utility. This stability makes the system to works without crashing in the manners of ABC_LJF needs and designs. REFERENCES [1] B. Kruekaew, W. Kimpan, “Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony”, Proceedings of the International MultiConference of Engineers and Computer Scientists, pp.978-988, 2014. [2] D.H. Khan, D. Kapgate, P.S. Prasad, “A Review on Virtual Machine Management Techniques and Scheduling in Cloud Computing” International Journal of Advanced Research in Computer Science and Software Engineering, 3(12), pp.838-845, 2013. [3] S. Hadi, “Advantages, Challenges and Optimizations of Virtual Machine Scheduling in Cloud Computing Environments”, International Journal of Computer Theory and Engineering, 4(2), 2012. [4] G. TARUN, “Host Scheduling Algorithm Using Genetic Algorithm In Cloud Computing Environment”, International Journal of Research in Engineering & Technology, 1(1), 2013. [5] K. Kiran, “An Adaptive Algorithm For Dynamic Priority Based Virtual Machine Scheduling In Cloud”, International Journal of Computer Science Issues, 9(6), 2012. [6] I. Moschakis, H. Karatza, “Performance and Cost evaluation of Gang Scheduling in a Cloud Computing System with Job Migrations and Starvation Handling”, Thessaloniki: Aristotle University of Thessaloniki, 2013 [7] N. Ramkumar, “Efficient Resource Utilization Algorithm (ERUA) for Service Request Scheduling in Cloud”, International Journal of Engineering and Technology, 5(2), 2013. [8] V. Vignesh, K.K. Sendhil, N. Jaisankar, “Resource management and scheduling in cloud environment”, International Journal of Scientific and Research Publications, 3(6), 2013. [9] K. Rasmi, V. Vive, “Resource Management Techniques in Cloud Environment - A Brief Survey”, International Journal of Innovation and Applied Studies, 2(4), 2013. [10] S.P. Abirami, R. Shalini, “Linear Scheduling Strategy for Resource allocation in Cloud Environment”, International Journal on Cloud Computing and Architecture, 2(1), 2012. [11] S. Paulus, U. Riemann, “An Approach for a Business-driven Cloud-compliance Analysis Covering Public Sector Process Improvement Requirements”, International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT), Vol. 4, No. 3, pp. 1-13, 2013. [12] R. Saini, Indu, “EFFICIENT JOB SCHEDULING OF VIRTUAL MACHINES IN CLOUD COMPUTING”, International Journal of Advanced Research in Computer and Communication Engineering, pp.3349-3354, 2013. [13] S. Hashemi, “Cloud computing technology for E-government architecture”, International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, pp. 15-23, 2013.