HTSCC A Hybrid Task Scheduling Algorithm in Cloud Computing Environment
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2018, Vol 17, Issue 2
Abstract
Nowadays, cloud computing makes it possible for users to use the computing resources like application, software, and hardware, etc., on pay as use model via the internet. One of the core and challenging issue in cloud computing is the task scheduling. Task scheduling problem is an NP-hard problem and is responsible for mapping the tasks to resources in a way to spread the load evenly. The appropriate mapping between resources and tasks reduces makespan and maximizes resource utilization. In this paper, we present and implement an independent task scheduling algorithm that assigns the users' tasks to multiple computing resources. The proposed algorithm is a hybrid algorithm for task scheduling in cloud computing based on a genetic algorithm (GA) and particle swarm optimization (PSO). The algorithm is implemented and simulated using CloudSim simulator. The simulation results show that our proposed algorithm outperforms the GA and PSO algorithms by decreasing the makespan and increasing the resource utilization.
Authors and Affiliations
Rasha Ali Al-Arasi, Anwar Saif
Imprementation of Sochastic Searching for Complex Processes Identification
This paper presents implementation of stochastic searching method for complex technological process identification. As the first step of control systems design is identification of a process mathematcal model. The author...
AFDroid: Anti-Forensics Device To Protect Android System
Mobile devices are among the most common new technologies of the year, gaining even more spread over and success in the day-to-day life of wide range of people. Unfortunately, while the number of mobile devices are used...
History Aware Anomaly Based IDS for Cloud IaaS
Cloud Computing provides different types of services such as SaaS, PaaS, IaaS. Each of them have their own security challenges, but IaaS undertakes all types of challenges viz., network attack ,behaviour based attack,...
Memory Transfer Language: an absolute learner-driven visualizer
This article discusses visualization as a technique to enhance programming comprehension. It points out that current animation approach, being machine-based technique, is inadequate due to the fact that machine-based ani...
Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution
Mobile ad hoc networks (MANETs) are one of the best ever growing areas of research. By providing communications in the absence of fixed infrastructure MANETs are an attractive technology. However this edibility introduce...