Analyzing Process Behavior to Predict Resource Allocation in Distributed Environment by Using Time Series and Online Predictive Approach Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract:A distributed system is a collection of different computers to handle large amount of data, the connected computers can share and coordinate their data on network. It is very difficult to for server to handle, analyze & process such a large amount of data, so that the performance of operations performed by these systems is reduced and they will produce inefficient data as a result. To handle this problem this paper has implemented the online predictive approach algorithm which uses time series to monitor process behavior, analyze it and predict the future observations to determine the resources required by the process in future.The resource prediction is used to optimize the data access operations like read, write, uploading and downloading the file to and from distributed system & which will improve the performance of distributed system. Time series is generated for every operation so that client will get performance chart.
Authors and Affiliations
Rucha Ravindra Galgali , Prof. S. G. Vaidya , Prof. S. M. Tidke
Vtalk: Secure Deployment of VoIP over LAN’S
Peer-to-peer VoIP (voice over IP) networks, exemplified by Skype, are becoming increasingly popular due to their significant cost advantage and richer call forwarding features than traditional public switched t...
Analysis of Development Factors for Asian Countries using DWM on Big Data
In today’s world, most of the developing countries are rising to become a developed country. There have been analysis of countries that experienced banking crisis in the past. However, the analysis included only data pre...
Study on Pagefile.sys in Windows System
Pagefile.sys is a file that is used by Microsoft Windows to store frames of memory that do not currently fit into physical memory. It means Windows uses a page file to store data that can’t be held by your computer’s ran...
Buffer Overflow Attack
- Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. In order to attack and get the remote root privilege, using buffer overflow and...
Face Recognition System under Varying Lighting Conditions
Making recognition more reliable under uncontrolled lighting conditions is one of the most important challenges for practical face recognition systems. Other recognition systems don’t nullify most of the lighting...