A Survey on Scheduling Algorithms in Cloud Computing
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Cloud Computing is every Where .Cloud Computing gets its name as metaphor for the Internet and it has changed the model of storing and managing data for scalable, real time ,internet based applications and Resources satisfying end users needs. Cloud computing services are usually backed by large-scale data centers are built to serve many users and many disparate Applications, for this we are considering Virtualization a s a perfect match. Resource Scheduling is a complicated task in cloud computing environment because there are many alternative computers with varying capacities. in this paper a review was performed on the Existing Scheduling Algorithms. limitations with existing Systems was list out. As a future enhancement a new Algorithm will develop.
Authors and Affiliations
Mrs. M. Padmavathi , Shaik. Mahabbob Basha, Professor , Mr. Srinivas Pothapragada, CEO of Ostilio
Creating a Vehicle Proportion, Form, and Color Matching Model
Abstract: Product design in the manufacturing industry is one of the most critical elements influencing consumer purchase behavior. As consumer values become increasingly diverse, design is becoming animportant element...
Scalable Image Classification Using Compression
The increasing rate of data growth has led to finding techniques for faster processing of data. Big Data analytics has recently emerged as a promising field for examining huge volume of datasets containing differen...
Adaptive Discrimination Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient with Collective Feedback
A Distributed denial of service (DDoS) attack is a most popular and crucial attack in the internet. Its motive is to make a network resource unavailable to the legitimate users. Botnets are commonly the engine...
Digital Image Forgery Detection by Contrast Enhancement
Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightfor...
A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing
Abstract: The key concept of my redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime...