Resource Utilization in Cloud Computing as an Optimization Problem
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
In this paper, an algorithm for resource utilization problem in cloud computing based on greedy method is presented. A privately-owned cloud that provides services to a huge number of users is assumed. For a given resource, hundreds or thousands of requests accumulate over time to use that resource by different users worldwide via the Internet. A prior knowledge of the requests to use that resource is also assumed. The main concern is to find the best utilization schedule for a given resource in terms of profit obtained by utilizing that resource, and the number of time slices during which the resource will be utilized. The problem is proved to be an NP-Complete problem. A greedy algorithm is proposed and analyzed in terms of its runtime complexity. The proposed solution is based on a combination of the 0/1 Knapsack problem and the activity-selection problem. The algorithm is implemented using Java. Results show good performance with a runtime complexity O((F-S)nLogn).
Authors and Affiliations
Ala'a Al-Shaikh, Hebatallah Khattab, Ahmad Sharieh, Azzam Sleit
Improving Classification Accuracy of Heart Sound Signals Using Hierarchical MLP Network
Classification of heart sound signals to normal or their classes of disease are very important in screening and diagnosis system since various applications and devices that fulfilling this purpose are rapidly design and...
Zynq FPGA based and Optimized Design of Points of Interest Detection and Tracking in Moving Images for Mobility System
In this paper, an FPGA based mobile feature detection and tracking solution is proposed for complex video processing systems. Presented algorithms include feature (corner) detection and robust memory allocation solution...
An Investigation on Information Communication Technology Awareness and Use in Improving Livestock Farming in Southern District, Botswana
This paper investigated the extent of Information Communication Technology (ICT) usage by livestock keepers and limitations encountered. The study was conducted with the objective of coming up with findings that will con...
A New Strategy in Trust-Based Recommender System using K-Means Clustering
Recommender systems are among the most important parts of online systems, including online stores such as Amazon, Netflix that have become very popular in the recent years. These systems lead users to finding desired inf...
Multifinger Feature Level Fusion Based Fingerprint Identification
Fingerprint based authentication systems are one of the cost-effective biometric authentication techniques employed for personal identification. As the data base population increases, fast identification/recognition algo...