Improved Honey Bee inspired load balancing of tasks with position updation
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Load balancing is an important aspect of cloud computing. To achieve optimal machine utilization, tasks from overloaded virtual machines should be transferred to under loaded virtual machines. In this paper, the honey bee foraging technique is improved by updating the position of bees. This algorithm mainly looks for better solutions by applying the knowledge of previous solutions. The search process is changed by introducing inertia weight and acceleration coefficients. The evaluation of performance is done by using clouds. Simulation results shows that the modified artificial bee colony algorithm with position updation reduces the make span as well as response time of the Virtual machine and hence it is significantly better than the original honey bee foraging technique.
Authors and Affiliations
Ms. Anna Baby
Design & Implementation Of On Chip Permutation Network for MPSOC on FPGA
This paper presents the silicon-proven design of a novel on-chip network to support guaranteed traffic permutation in multiprocessor system-on-chip applications. The proposed network employs a pipelined circuit-switchin...
slugA Study of Population Density Distribution Pattern of Karachi City Using Spatial-Interaction Gravity Models (Sigms)
Administratively, before the year 2000 Karachi was distributed in five districts. Afterwards, it was divided into eighteen towns. It gave rise to a great controversy that whether the 5-district system is administrativel...
A Survey of QoS for IEEE 802.22 WRAN Technologies
We Survey theory and applications of Wireless Regional Area Networks, Today Quality of Service are the main key problem of wireless network in RAN. Due to explosion of wireless network, internet is becoming backbone and...
An Efficient Approach for Secure Hash Algorithm
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic schemes and in security protocols. A famous secure hash algorithm given by the National Institu...
Design of 12-Bit DAC Using CMOS Technology
Digital-to-Analog Converter (DAC) is used to convert a digital form of input into an analog form of output. In this paper, a digital-to-analog converter which is based on the R-2R ladder is analyzed for low power consum...