Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: Cloud computing is a new design structure for large, distributed data centers. Cloud computing system promises to offer end user “pay as go” model. To meet the expected quality requirements of users, cloud computing need to offer differentiated services to users. QoS differentiation is very important to satisfydifferent users with different QoS requirements. In this paper, various QoS based scheduling algorithms, scheduling parameters and the future scope of discussed algorithms have been studied. This paper summarizes various cloud scheduling algorithms, findings of algorithms, scheduling factors, type of scheduling andparameters considered.
Authors and Affiliations
Dhanmeet Singh Kalra , Mohit Pal Singh Birdi
Obtaining the Name aliases from the Web, using them to Cluster Text Documents with Cuckoo Algorithm and Comparing Results with K-Means Algorithm
Abstract: There is an increase in the searching where name aliases are concerned. Approximately 30 percent of searches are based on aliases; hence it becomes important to obtain correct aliases. Lexical pattern bas...
Privacy Security of Multiuser on Multilevel System using XOR
Abstract: Privacy security of multiuser on multilevel system is considered in this work. On communication there is a chance for the eavesdropper’s to secretly listen to the conversation. In order to confuse the eavesdrop...
Use of Artificial Neural Networks Type MLP for the Prediction of Phosphorus Level from the Physicochemical Parameters of Sediments
Abstract: The present work is a contribution on the development of mathematical models for predicting the phosphorus contents based on the physicochemical properties of the sediments of the reservoir of the water damSidi...
Soundness to Single Sign on Using OTP in Distributed Networks
In a distributed system, there are numerous service provider. The user must be authenticated to entrance the services provided by the service provider. It is challenging to recall all secret words for users. So to c...
CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...