A Survey on QoS Based Task Scheduling Approach in Grid Computing
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 8, Issue 7
Abstract
Science and engineering are the fields which deal with the complex computational problems. So, dealing with these problems requires a very robust platform and Grid Computing provides the required functionality. Geographically distributed heterogeneous resources define the Grid computing scenario. The major problem which arises in the area of Grid Computing is the task scheduling which tends to select the best resource for a given job. There are many scheduling heuristics (online and batch mode) are available but they are not able to achieve the maximum objectives. So, Quality of Service (QoS) based approach is required to achieve the maximum objectives. The QoS based approach keeps into account the QoS based characteristics for both the tasks and the resources. In this paper we study the different heuristics techniques for resource selection in Grid Computing and also we go through the need and significance of this QoS based approach in Grid Computing.
Authors and Affiliations
Mr. Jujhar Singh , Mr. Gaurav Sharma
Fuzzy Logic based user friendly Pico-Hydro Power generation for decentralized rural electrification
Pico-Hydro Power Plant (PHPP) is becoming one of the most important renewable energy sources in the world for remote or rural locations day by day. It does not encounter the problem of population displacement and i...
Design and Analysis of Leaf Spring with Different Arrangements of Composite Leaves with Steel Leaves
In this paper work is carried out on a multi leaf spring having eight leaves used by a commercial vehicle. In order to reduce the cost and weight of leaf spring, the Automobile sector is replacing steel leaf spring with...
An Edge Detection Algorithm based on Fuzzy Logic
Edges characterize boundaries and are therefore considered for prime importance in image processing. Edge detection filters out useless data, noise and frequencies while preserving the important structural pro...
An Enhanced Text to Image Encryption Technique using RGB Substitution and AES
In network security applications, before transmitting data to a remote machine it is encrypted at the sender side using any standard encryption algorithm. Most of the encryption algorithms make use of secret key wi...
A Review: CEST Method Based Analysis for the Detection of Damaged Buildings in Crisis Areas
This paper describes new combined method that consists of a cooperative approach of several different algorithms for automated change detection. Remote sensing data are primary sources extensively used for change d...