BEYOND SIMULATED ANNEALING IN GRID SCHEDULING
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
In Grid Environment the number of resources and tasks to be scheduled is usually variable and dynamic in nature. This characteristic emphasizes the scheduling approach as a complex optimization problem. Scheduling is a key issue which must be solved in grid computing study and a better scheduling scheme can greatly improve the efficiency.The objective of this paper is to explore and investigate Simulated Annealing with limited iterations to promote compute intensive grid applications to maximize the Job Completion Ratio based on the comprehensive understanding of the challenges and the state of the art of current research. Experimental results demonstrate the effectiveness and robustness of the proposed algorithm. Further the comparative evaluation with other scheduling algorithms such as First Come First Serve (FCFS), Earliest Deadline First (EDF) is plotted.
Authors and Affiliations
R. Joshua Samuel Raj , Dr. V. Vasudevan
Artificial Neural Network Employed To Design Annular Ring Microstrip Antenna
Neural network computational modules have recently gained as an unconventional and useful tool for RF and microwave modeling and design. Neural network is trained to learn the behavior of Annular Ring Microstrip Antenna’...
Flood Frequency Analysis Using the Gumbel Distribution
This paper presents results of a study carried in Zimbabwe aimed at analysing the frequency of Nyanyadzi River floods using the Gumbel distribution. Extreme floods over recent years had washed away fields, destroyed infr...
COMPARISON OF MULTICAST ROUTING PROTOCOLS IN AD-HOC WIRELESS NETWORKS
The majority of applications are in the areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue si...
SECURITY MEASURES OF RANDVUL KEYBOARD
Phishing is a “con trick” by which consumers are sent email urporting to originate from legitimate services like banks or ther financial institutions. Phishing can be thought of as the marriage of social gineering an...
ESAC Based Channel Aware Routing Using Route Handoff
An ad hoc network is a collection of mobile stations forming a temporary network without the aid of any centralized coordinator. Internal threats due to changes in the node behavior that target the routing discovery or m...