Clustering based Max-Min Scheduling in Cloud Environment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 9
Abstract
Cloud Computing ensures Service Level Agreement (SLA) by provisioning of resources to cloudlets. This provisioning can be achieved through scheduling algorithms that properly maps given tasks considering different heuristics such as execution time and completion time. This paper is built on the concept of max-min algorithm with and unique proposed modification. A novel idea of clustering based max-min scheduling algorithm is introduced to decrease overall make-span and better VM utilization for variable length of the tasks. Experimental analysis shows that due to clustering, it provides better result than the different variations of max-min as well as other heuristics algorithm in terms of effective utilization of faster VMs and proper scheduling of tasks considering all possible scheduling scenarios and picking up the best solution.
Authors and Affiliations
Zonayed Ahmed, Adnan Ferdous Ashrafi, Maliha Mahbub
A New Hybrid Network Sniffer Model Based on Pcap Language and Sockets (Pcapsocks)
Nowadays, the protection and the security of data transited within computer networks represent a real challenge for developers of computer applications and network administrators. The Intrusion Detection System and Intru...
Electronic Human Resource Management (e-HRM) of Hotel Business in Phuket
This research aims to study the pattern of the electronic human resources management (e-HRM) of the hotel business in Phuket. The study is conducted with the implementation of field data and in-depth interview of hotels’...
Towards Privacy Preserving Commutative Encryption-Based Matchmaking in Mobile Social Network
The last decade or so has witnessed a sharp rise in the growth of mobile devices. These mobile devices and wireless communication technologies enable people around the globe to instantaneously communicate with each other...
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
The transmission of the encryption voice over IP is challenging. The voice is recorded, eavesdropping, change and theft voice, etc. The voice over IP is encrypted by using Advance Encryption Standard (AES) Algorithm. AES...
Smart Building’s Elevator with Intelligent Control Algorithm based on Bayesian Networks
Implementation of the intelligent elevator control systems based on machine-learning algorithms should play an important role in our effort to improve the sustainability and convenience of multi-floor buildings. Traditio...