SURVEY ON HEURISTICS BASED RESOURCE SCHEDULING IN GRID COMPUTING
Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 1
Abstract
The most important goal of the Resource Scheduling in Grid Computing is to efficiently map the jobs to resources. Resource Scheduling in Grid computing is a complex task because of the heterogeneous environment. Grid Scheduling is the core of the Grid resource management systems. Many researchers have proposed various techniques to schedule resources in an efficient manner in Grid computing. This paper describes a survey on Heuristics based Resource scheduling schemes in Grid computing. We have classified these schemes into two main categories namely Meta-heuristics and Hyper-heuristics. We made the comparison of each schemes with different constraints.
Authors and Affiliations
Elwyn Betzar , Arul Xavier . V. M
Optimal Spectral Analysis for detection of sinusitis using Near-Infrared Spectroscopy (NIRS)
Optical recording technique overtakes neural recording technique for simplicity, non-ionization, portability, non-invasiveness and cost effectiveness. Many optical techniques like FMRI, DOT, SPR, ERP and PPG are in use n...
FlyPS – A PRICING AND QOS MODEL FOR PERVASIVE COMPUTING WITH AN AIRPORT ILLUSTRATION
Pervasive Computing is the future technology for every living being that enables all time computing without his/her interaction. i.e any time, any where. Customer Assistance and Passenger Support are the prime factors fo...
ENSURING SECURITY PROOF IN CLOUD NETWORK
Cloud Computing is developed and used by all enterprise in world to outsource their data. To maintain confidentiality of shared data against entrusted party encryption of data is important. Many scheme is introduced to a...
PERFORMANCE ANALYSIS OF SOFT COMPUTING TECHNIQUES FOR CLASSIFYING CARDIAC ARRHYTHMIA
Cardiovascular diseases kill more people than other diseases. Arrhythmia is a common term used for cardiac rhythm deviating from normal sinus rhythm. Many heart diseases are detected through electrocardiograms (ECG) anal...
Three Party Authentication Key Distributed Protocols Using Implicit and Explicit Quantum Cryptography
Cryptography is the science of information security. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. The combination of Implicit quantum key distribution protocol (3AQKDP) and...