SCHEDULING ALGORITHM BASED INTERACTIONS AND DATA TRANSFERS IN MULTI-AGENT SYSTEM
Journal Title: Elysium Journal of Engineering Research and Management - Year 2014, Vol 1, Issue 3
Abstract
The guarantee of Quality of service in the real time scheduling could be depends on the schedulers. The Internet has become a commercial entity that needs to provide its customers with QoS. The QoS can be in the form of delivery delay, capacity and reliability. Conventional real time scheduler’s focus on size of the packet which are less effective in satisfying the security requirements and does not guaranteed the QoS for data traffics. Real time audio and video streams have been congesting the network. In the existing system, real time scheduling algorithm is developed which is based on time constraint. Adaptive security aware scheduling system is developed which can be achieved by implementing multi agent system model. The proposed system is by using hierarchical algorithm we optimized the path to flow of data without any losses in the packets at destination. Functionality of this scheduling algorithm gives security enhancement even in edges of networks. The scheduling unit uses Differentiated Earliest deadline First (DIFF-EDF) scheduler. The security enhancement scheme adopts a congestion control mechanism. The proposed scheme reduces number of pending packets at destination. The QoS guaranteed and congestion is controlled by this proposed system.
Authors and Affiliations
Gayathri T, Vijayalakshmi P. R.
FiDoop: Parallel Mining of Frequent Item sets Using MapReduce
Due to the exponential increase of real-time data monitoring systems, the extraction of frequent item (Frequent item set mining) set from large uncertain database is the challenging task. The existing parallel mining alg...
Detecting intruders in the network using machine learning classifier
Rapid development in technology has raised the need for an effective intrusion detection system as the traditional intrusion detection method cannot compete against newly advanced intrusions. In the proposed work uses ma...
REDUCTION OF LOSS AND THERMAL DISTRIBUTION OF THE THREE LEVEL–NEUTRAL POINT CLAMPED CONVERTERS IN THE WIND POWER GENERATION
The proposed project in Northern Province inverter power loss and heat distribution is among semiconductors. The three-level neutral-point (3L - NPC) is a promising step in the use of converter t...
VIRTUAL MACHINE SECURITY SCHEME AGAINST CO-RESIDENT ATTACK IN CLOUD COMPUTING
Cloud computing provide users and enterprises with various capabilities to store and process their data. Cloud security refers to a broad set of policies, technologies and controls deploy to product data. H...
A Model for Trusted Cloud Computing with Remote Attestation
Enforcing an interactive pattern in any association will force it to behave in the predictable way thorough which it can be secured against any unauthorized access leading to a trusted atmosphere. Security declaration in...