Dependable and Efficient Scheduling Model with Fault Tolerance Service for Grid Applications
|
|
- Katrina Jenkins
- 5 years ago
- Views:
Transcription
1 Dependable and Efficient Scheduling Model with Fault Tolerance Service for Grid Applications C. Suhasini, B. DineshKumar Reddy, Sathyalakshmi and Roberts Masillamani Abstract Owing to uncertainty of the grid resource and service, rational grid resource scheduling has been becoming a difficult problem at all times. In this paper, grid resource scheduling problem is researched based on grid trust model and availability model. Moreover, a high dependability grid resource scheduling algorithm based on credibility and availability with Fault Tolerance is proposed. We use checkpoint mechanism for fault tolerance in this paper. The proposed approach effectively schedule the grid jobs with fault tolerant way. Also, it increases the percentage of jobs completed within specified deadline and making the grid trustworthy. Keywords Grid Resource, Credibility, Availability, Grid Job Scheduling, Checkpoint, Fault Tolerance. G I. INTRODUCTION RID computing or the use of a computational grid, is applying the resources of many computers in a network to a single problem at the same time usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data. Compared to other distributed environments, such as clusters, complexity of grid mainly originates from decentralized management and resource heterogeneity. These characteristics often lead to strong variations in availability, which in particular depends on resource and network failure rates, administrative policies, and fluctuations in system load. Apparently, runtime changes in system C.Suhasini, is with School of computer Science, Hindustan University Chennai, INDIA grhasini@gmail.com B.DineshKumar Reddy, is with School of computer Science, Hindustan University Chennai, INDIA bdineshd@gmail.com, Sathyalakshmi is with School of computer Science, Hindustan University Chennai, INDIA slakshmis@hindustanuniv.ac.in Roberts Masillamani is with School of computer Science, Hindustan University Chennai, INDIA deancs@hindustanuniv.ac.in availability can significantly affect job execution. Since for a large group of time-critical or time consuming jobs delay and loss are not acceptable, fault tolerance should be taken into account. Providing fault tolerance in a distributed environment, while optimizing resource utilization and job execution times, is a challenging task. The number of dynamic resources in the grid system increases continuously, so fault tolerance becomes a critical property for applications running on these resources. However, in traditional implementations, when a failure occurs, the whole application is shutdown and has to be restarted from the beginning. A technique to avoid restarting of the application from the beginning is rollback recovery which is based on the concept of checkpoint. Checkpoint mechanism is used to reduce the limitations imposed by the high volatility of resources.it periodically saves the application s state to stable storage. So, whenever a failure interrupts a volunteer computation, the application can be resumed from the last stable checkpoint. Some of the existing fault tolerance and recovery mechanisms like checkpointrecovery and over provisioning. Checkpoint-recovery techniques make it possible for the job to resume execution from the last checkpoint instead of restarting from the beginning, whenever a failure occurs. Over provisioning techniques replicate a job in more than one resource to increase the probability of successful execution. Although these techniques address the reliability challenges to some extent, no large-scale study has been done on how effective they are when coupled with scheduling. scheduling methods, the system can get better performance, as well as applications can avoid unnecessary delays. The emergence of grid computing further increases the importance of fault tolerance. Grid computing will impose a number of unique new conceptual and technical challenges to fault-tolerance researchers. 9
2 Some of the factors due to which the probability of faults in a grid environment is much higher than a traditional distributed system are lack of centralized environment, predominant execution of long jobs, highly dynamic resource availability, diverse geographical distribution of resources and heterogeneous nature of grid resources. Thus, fault tolerance related features must be incorporated in grid job scheduling to improve the performance of the grid system. The number of dynamic resources in the grid system increases continuously, so fault tolerance becomes a critical property for applications running on these resources. However, in traditional implementations, when a failure occurs, the whole application is shutdown and has to be restarted from the beginning. II. PROBLEM DEFINITION Suppose Q is a problem, all possible solutions are representing using a set A, set A is called the solution set of the problem. Considering A = (T,-T), where T represents a grid node to another grid node was not only credible but also available and -T represents a node set which a grid node to another grid node wasn t entirely credible and available, is a set of grid nodes i Grid computing has emerged as the nextgeneration parallel and distributed computing methodology that aggregates dispersed heterogeneous resources for solving various kinds of large-scale parallel applications in science, engineering and commerce [6]. A Grid enables sharing, selection, and aggregation of a wide variety of geographically distributed resources including supercomputers, storage systems, data sources and specialized devices owned by different organizations. Management of these resources is an important infrastructure in the grid computing environment. It becomes complex as the resources are geographically distributed, heterogeneous in nature, owned by different individual or organizations with their own policies, have different access models, and have dynamically varying loads and availability. To achieve the promising potentials of computational grids, an effective and efficient scheduling system is fundamentally important. A grid becomes useful and meaningful when it both encompasses a large set of resources and serves a sizable community. The different phases of grid scheduling process have been discussed [14]. In grid, the abilities of the computing resources vary, and jobs often arrive dynamically. Because of these, scheduling methods of parallel computing [4] may not be applicable in a grid. Through good in line with the requirements of Solutions. For example, a grid node has high credibility, but it is not available, or a node has high availability, but it isn t credible, such nodes do not meet the requirement nodes. For the credibility and availability of the grid nodes, we adopted an integrated scheduling function IS(i) to evaluate, this integrated scheduling function is evaluated via two functions of the credibility function R(i) and availability function U(i). IS(i) is defined as formula (1): Is(i)=λ R(i) + γ U(i) (1) The λ and γ are particularly the weights of credibility and availability, the sum of the λ and γ is 1, the size of λ and γ is determined by the extent of our requirements for the credibility and availability. If there is a low requirement level for credibility, then we can take the value of λ smaller; if higher requirement of the credibility is needed, then the value of λ will be set bigger, we could have a flexible set. Definition 1. The credibility is an integrity assessment of grid node status and behaviors characterized by the value of credibility. It is to make each other's satisfaction degree evaluation of the trusted status after interacting information between the nodes. We define a triple R(i)=( I(i), D(i), S(i) ) to indicate the credibility of the node. I(i), D(i), S(i) are respectively called the identity satisfaction degree, direct satisfaction degree and indirect satisfaction degree of the service request of the call node i to the node i. Definition 2.The identity satisfaction degree denotes the true identity, the owned authority, or the delegation of authority in line with the requirements of its own pre-set that the call node evaluates the objective nodes, and its value is 1 or 0, which means satisfied or dissatisfied. For example, there are data collection nodes, data analysis nodes, alarm aggregation nodes and there source scheduling nodes and so on in the grid intrusion detection system. If we want to conduct data analysis, we need to call data analysis node, if the called node isn t a data analysis node, it does not possess the required identification and authorization, then its value of identity satisfaction degree will be set to 0; if the identity is suitable, then its value of identity satisfaction degree will be set to 1. If the value of identity satisfaction degree is 0, we consider the node is not credible, the value of credibility function directly to beset to 0. If the value of identity 10
3 satisfaction degree is 1, then we consider its direct satisfaction degree and indirect satisfaction degree, and come to the credibility function R(I). R(i) is defined as formula (2): R(i) = α D(i) + β S(i) I(i)=1 (2) 0 I(i)=0 The α and β are the weights of direct satisfaction degree and indirect satisfaction degree, the sum of α and β is 1, the size of α and β is determined by our trust extent of direct satisfaction and indirect satisfaction. Generally speaking, we have higher confidence for direct satisfaction degree; therefore, we usually set the value of α larger, while the value of β smaller. Definition 3.Direct satisfaction degree is a direct evaluation of trusted status of the other node after interacting with each other, and comes from the historical interaction record; its value is the ratio of the satisfaction times of interactions and the total times of interactions. If the interaction each other is successful, then the satisfied times plus one. If it fails, then the dissatisfied times plus one. Suppose the interaction node set with node Pi is P=( Pj, j=1,2,3 m) in a certain fixed period of time recently, the total times of historical interaction are Sj between node Pi and node Pj, the satisfied times are Dsj, thus, we define direct satisfaction degree function D(i) of node Pi as formula (3): (3) Definition 4. Indirect satisfaction degree is an indirect evaluation of trusted status of the indirect interacting node to this node, and comes from the indirect historical interaction records, its value is the ratio of the satisfaction times and the total times of indirect evaluation. For any node Pi, Suppose the indirect evaluation node set with node Pi is P=(Pj, j=1,2,3 m) in acertain fixed period of time recently, The satisfied time of the node Pi evaluating node Pjis Dtj, the total time of evaluation is Tj, thus, we define indirect satisfaction degree function S(i) of node Pi as formula (4): (4) Definition 5. Through Rule, direct satisfaction degree function with the weights (3) and indirect satisfaction degree function (4) drag-in formula (2), and get the credibility function R(i) as formula (5): R(i)= α 1 0 I( i)=0 (5) Definition 6.Resource availability function U(i) is defined as the characteristics of resource performance and resource busy degree characterization. It is decided by resource performance P(i),resource busy degree B(i) and resource availability benchmarks Resource performance P(i) is defined as formula (6): (6) Among them, P(i) is the resource performance of the No. i grid node; Rijis the No. j resource attribute oft the No. i grid node, such as the size of the CPU frequency, memory size, hard disk size, etc. Aj is the weight of the No. j resource attribute, which shows the degree of the designer s emphasis on each attribute. Once the grid nodes are identified, P(i) generally does not need to change. The degree of resource busy is defined as the formula (7) B(i) ] W j (0,1) (6) Therein, B(i) is the busy degree of the No. i grid node, Uijis the usage of No. j category resource of the No. i grid node, such as CPU, memory usage, etc. Tijis the total amount of No. j category resource of theno. i grid node, W j represent the weight of resource usage of No. j category resource. B(i) is constantly changing over time, so the scheduling algorithm needs to periodically check the use of various resources of the grid nodes, which can be obtained by DCS (data collection system ) that developed through laboratory oneself. Therefore, the function of resources availability is defined as the formula (8): U(i)= 11
4 (7) Definition 7. The function of the credibility (5) and the function of the availability (8) drag-in formula (1)is integrated scheduling function III. GRID RESOURCE INTEGRATED SCHEDULING BASED ON CREDIBILITY AND AVAILABILITY WITH FAULT TOLERANCE In this paper, the basic ideas of high dependability grid resource integrated scheduling algorithm based on availability and reliability With fault tolerance are: there exists an integrated trust relationship between service requestor and service providers. The integrated trust relationship is determined by the availability function U and credibility function R. The availability function is determined by the performance of the grid resource and used to determine the strength of processing ability of grid resource. The credibility function is evaluated by a triad (identity satisfaction degree, direct satisfaction degree, indirect satisfaction degree) and used to determine the extent of grid resources trusted. High credibility shows that the average trust efficiency of the grid nodes is high and the failure rate of the task implementation is low, able to meet the security requirements of task executing. Thus, the bigger of integrated scheduling function value, the more stable of the service execution after scheduling, the more credible of the results of the execution. At the same time scheduling algorithm can guarantee not only demand i.e., during job/resource failure. For a Fig. 1 The basic structure of grid scheduling algorithm with fault tolerance 12
5 Particular job, the checkpoint server discards the result of the previous checkpoint when a new value of checkpoint result is received.fault tolerance manager is included to make the grid work more efficient. According to the integrated scheduling algorithm analysis, the overall objective of grid integrated scheduling algorithm is to make assignment optimization of service requests and grid nodes. It not only ensures the maximizing of the implementation of security operations but also takes into account the efficiency of the implementation. A. Checkpoint Manager It receives the scheduled job from the scheduler and sets checkpoint based on the failure rate of there source on which it is scheduled. Then it submits the job to the resource. Checkpoint manager receives job completion message or job failure message from the grid resource and responds to that accordingly. during execution, if job failure occurs, the job is rescheduled from the last checkpoint instead of running from the scratch. Checkpoint manager implements checkpoint setter algorithm to set job checkpoints. B. Checkpoint Server On each checkpoint set by the checkpoint manager, job status is reported to the checkpoint server. Checkpoint server save the job status and return it on C. Fault Tolerance Manager Fault Tolerance Manager maintains the fault index value of each resource which indicates the failure rate of there source. The fault index of a grid resource is incremented every time the resource does not complete the assigned job within the deadline and also on resource failure. The fault index of a resource is decremented whenever the resource completes the assigned job within the deadline. Fault index manager updates the fault index of a grid resource using fault index update algorithm. Algorithm: Integrated scheduling algorithm (Integrate) Input: service requests T, a set of the grid nodes G. Output: The corresponding table Map of service request and the assignment of the grid nodes. 1) Initialization. Set the service request set T, a set of the grid nodes G, the weight λ of the credibility, the weight γ of the availability, initialize the value of comprehensive scheduling list of R, etc. 2) Repeat. 3) For each request, it is to find out the host node element of the service, namely, to generate a mapping table of service request. 4) For all grid nodes Gj except for Gi. If the identity satisfaction degree of the node Gi to all nodes is 0 Then T-Ti // Task Ti can t assign the nodes, to the exclusion of the service request dispatching set. Else For all nodes, to calculate the integrated scheduling function value, if identity satisfaction degree of the node isn t 0, then it adds the value to the list of integrated scheduling. 5) To descending the value of the integrated scheduler generates grid nodes resource scheduling priority queue. 6) The Ti will be assigned to the head node of integrated scheduling priority queue. 7) T-Ti 8) Until the task queue T empty. Algorithm: Check point mechanism. 1. IF checkpoint manager receives the job completion result from resource THEN (i) IF resource fault index >= 1 THEN Send a message to fault tolerance manager to decrement the fault index of resource that completes the assigned job. Send details of the finished job to the scheduler. (ii) GOTO Step3 2. IF checkpoint manager receives the job failure message from resource THEN (i) Send a message to fault tolerance manager to increment the fault index of resource that fails to complete the assigned job. (ii) Send a message to checkpoint server, whether there is any checkpoint result of this job. (iii) IF checkpoint result of the job exists in checkpoint server THEN Submit the remaining part of job after last checkpoint received to the scheduler for rescheduling. GOTO Step 3. (iv) IF checkpoint result of the job does not exist in checkpoint server THEN Submit the job from start to the scheduler for rescheduling. GOTO Step EXIT IV. CONCLUSION Based the theory of resource credibility and availability with fault tolerance, this paper presents a high dependability grid resource integrated scheduling algorithm with fault tolerance suitable for grid environment, and describes and analysis the algorithm in detail in this paper. The algorithm can dynamically adjust scheduling policy according to the requirement of service requests for the credibility and availability of resources. It guarantees the performance requirements of resources, while taking into account the needs of the credibility of resources. The dependability of algorithm has greatly improved, thereby reduce the probability of 13
6 service requests implementing failure and deception, and ensure the security of the implementation of the task. This algorithm improved fault tolerance using check point mechanism. Next work will take into account a variety of service quality requirement of the user, mainly we are trying to simulate the mathematical model using Gridsim and Globus tool kit. REFERENCES [1] Benoit Anne, Cole Murray, Gilmore Stephen and ills ton Jane. (2005): Enhancing the effective utilization of Grid clusters by exploiting on-line performability analysis, IEEE International symposium on Cluster Computing and the Grid(CCGRID), pp [2] Buyya. R, Murshed. M, Abramson. D. (2002): A deadline and budget constrained cost-time optimization algorithm for scheduling task farming applications on global grids, In Proceedings of the international conference on parallel and distributed processing techniques and applications, Las Vegas, USA, pp [3] Elnozahy. E. N., AlvisiLorenzo, Wang Yi-min, Johnson. B. (2002): A survey of rollback recovery protocols in messagepassingsystems, ACM Computing Surveys, 34: [4] Feitelson D.G, Rudolph. L (1995): Parallel Job Scheduling: issues and Approaches. Springer Lecture Notes in Computer Science, 949: 1-18.ISSN: [5] Beaumont, L. Carter, J. Ferrante, A. Legrand, Y. ]onheterogeneours Platforms. In: Proc. of the Int l Parallel and Distributed Processing Symp, [6] R. Buyya, D. Abramson, J. Giddy. Nimrod/G: An Architecture for a Resource Management and Scheduling System in a Global Computational Grid. In: Proc. of th, [7] W.M. Zheng, B. Yang, W.J. Lin, Z.G. Li. An Improved Communication of Parallel Task Scheduling on SMP System. Science in China (Series E), 31(5): , [8] L.L. Yuan, G.S. Zeng, L.L Jiang. C.J. Jiang. Dynamic Level Scheduling Based on Trust Modeling in Grid. Chinese Journal of Computers, 29(7): ,
1 Gokuldev S, 2 Valarmathi M 1 Associate Professor, 2 PG Scholar
Fault Tolerant System for Computational and Service Grid 1 Gokuldev S, 2 Valarmathi M 1 Associate Professor, 2 PG Scholar Department of Computer Science and Engineering, SNS College of Engineering, Coimbatore,
More informationA New Checkpoint Approach for Fault Tolerance in Grid Computing
A New Checkpoint Approach for Fault Tolerance in Grid Computing 1 Gokuldev S, 2 Valarmathi M 102 1 Associate Professor, Department of Computer Science and Engineering SNS College of Engineering, Coimbatore,
More informationSurvey on Incremental MapReduce for Data Mining
Survey on Incremental MapReduce for Data Mining Trupti M. Shinde 1, Prof.S.V.Chobe 2 1 Research Scholar, Computer Engineering Dept., Dr. D. Y. Patil Institute of Engineering &Technology, 2 Associate Professor,
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More informationModified Hierarchical Load Balancing Algorithm for Scheduling in Grid Computing
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 04 September 2016 ISSN (online): 2349-6010 Modified Hierarchical Load Balancing Algorithm for Scheduling in Grid
More informationA PRO-ACTIVE FAULT TOLERANT DEADLINE HIT COUNT BASED SCHEDULING IN COMPUTATIONAL GRID
A PRO-ACTIVE FAULT TOLERANT DEADLINE HIT COUNT BASED SCHEDULING IN COMPUTATIONAL GRID S. Gokuldev 1, C. Sowntharya 2 and S. Manishankar 1 1 Department of Computer Science, Amrita Vishwa Vidyapeetham, Mysore
More informationEffective Load Balancing in Grid Environment
Effective Load Balancing in Grid Environment 1 Mr. D. S. Gawande, 2 Mr. S. B. Lanjewar, 3 Mr. P. A. Khaire, 4 Mr. S. V. Ugale 1,2,3 Lecturer, CSE Dept, DBACER, Nagpur, India 4 Lecturer, CSE Dept, GWCET,
More informationEvaluating the Performance of Skeleton-Based High Level Parallel Programs
Evaluating the Performance of Skeleton-Based High Level Parallel Programs Anne Benoit, Murray Cole, Stephen Gilmore, and Jane Hillston School of Informatics, The University of Edinburgh, James Clerk Maxwell
More informationResolving Load Balancing Issue of Grid Computing through Dynamic Approach
Resolving Load Balancing Issue of Grid Computing through Dynamic Er. Roma Soni M-Tech Student Dr. Kamal Sharma Prof. & Director of E.C.E. Deptt. EMGOI, Badhauli. Er. Sharad Chauhan Asst. Prof. in C.S.E.
More informationNovel Log Management for Sender-based Message Logging
Novel Log Management for Sender-based Message Logging JINHO AHN College of Natural Sciences, Kyonggi University Department of Computer Science San 94-6 Yiuidong, Yeongtonggu, Suwonsi Gyeonggido 443-760
More informationGRID SIMULATION FOR DYNAMIC LOAD BALANCING
GRID SIMULATION FOR DYNAMIC LOAD BALANCING Kapil B. Morey 1, Prof. A. S. Kapse 2, Prof. Y. B. Jadhao 3 1 Research Scholar, Computer Engineering Dept., Padm. Dr. V. B. Kolte College of Engineering, Malkapur,
More informationNowadays data-intensive applications play a
Journal of Advances in Computer Engineering and Technology, 3(2) 2017 Data Replication-Based Scheduling in Cloud Computing Environment Bahareh Rahmati 1, Amir Masoud Rahmani 2 Received (2016-02-02) Accepted
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationA priority based dynamic bandwidth scheduling in SDN networks 1
Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems
More informationFault Tolerance Techniques in Grid Computing Systems
Fault Tolerance Techniques in Grid Computing Systems T. Altameem Dept. of Computer Science, RCC, King Saud University, P.O. Box: 28095 11437 Riyadh-Saudi Arabia. Abstract- In grid computing, resources
More informationCHAPTER 7 CONCLUSION AND FUTURE SCOPE
121 CHAPTER 7 CONCLUSION AND FUTURE SCOPE This research has addressed the issues of grid scheduling, load balancing and fault tolerance for large scale computational grids. To investigate the solution
More informationA Review on Reliability Issues in Cloud Service
A Review on Reliability Issues in Cloud Service Gurpreet Kaur Department of CSE, Bhai Gurdas Institute of Engineering and Technology, India Rajesh Kumar, Assistant Professor Department of CSE, Bhai Gurdas
More informationA New Distance Independent Localization Algorithm in Wireless Sensor Network
A New Distance Independent Localization Algorithm in Wireless Sensor Network Siwei Peng 1, Jihui Li 2, Hui Liu 3 1 School of Information Science and Engineering, Yanshan University, Qinhuangdao 2 The Key
More informationA PMU-Based Three-Step Controlled Separation with Transient Stability Considerations
Title A PMU-Based Three-Step Controlled Separation with Transient Stability Considerations Author(s) Wang, C; Hou, Y Citation The IEEE Power and Energy Society (PES) General Meeting, Washington, USA, 27-31
More informationBNTM: Bayesian network based trust model for grid computing
International Research Journal of Engineering and Technology (IRJET) e-issn: 95-56 Volume: 4 Issue: Dec-7 www.irjet.net p-issn: 95-7 BNTM: Bayesian network based trust model for grid computing Roya Ghahramani,
More informationTrust4All: a Trustworthy Middleware Platform for Component Software
Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software
More informationLoad Balancing Algorithms in Cloud Computing: A Comparative Study
Load Balancing Algorithms in Cloud Computing: A Comparative Study T. Deepa Dr. Dhanaraj Cheelu Ravindra College of Engineering for Women G. Pullaiah College of Engineering and Technology Kurnool Kurnool
More informationA Load Balancing Fault-Tolerant Algorithm for Heterogeneous Cluster Environments
1 A Load Balancing Fault-Tolerant Algorithm for Heterogeneous Cluster Environments E. M. Karanikolaou and M. P. Bekakos Laboratory of Digital Systems, Department of Electrical and Computer Engineering,
More informationA Data-Aware Resource Broker for Data Grids
A Data-Aware Resource Broker for Data Grids Huy Le, Paul Coddington, and Andrew L. Wendelborn School of Computer Science, University of Adelaide Adelaide, SA 5005, Australia {paulc,andrew}@cs.adelaide.edu.au
More informationScheduling Large Parametric Modelling Experiments on a Distributed Meta-computer
Scheduling Large Parametric Modelling Experiments on a Distributed Meta-computer David Abramson and Jon Giddy Department of Digital Systems, CRC for Distributed Systems Technology Monash University, Gehrmann
More informationDouble Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 1 January 2015, Page No. 9966-9970 Double Threshold Based Load Balancing Approach by Using VM Migration
More informationII. NEEDLEMAN AND WUNSCH'S ALGORITHM FOR GLOBAL SEQUENCE ALIGNMENT
Development of Parallel Processing Application For Cluster Computing Using Artificial Neural Network Approach Minal Dhoke 1, Prof. Rajesh Dharmik 2 1 IT Department, Yeshwantrao Chavan College of Engineering,
More informationIntegrated IoT and Cloud Environment for Fingerprint Recognition
Integrated IoT and Cloud Environment for Fingerprint Recognition Ehsan Nadjaran Toosi 1, Adel Nadjaran Toosi 1, Reza Godaz 2, and Rajkumar Buyya 1 1 Cloud Computing and Distributed Systems (CLOUDS) Laboratory
More informationQuality Assessment of Power Dispatching Data Based on Improved Cloud Model
Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationA QoS Load Balancing Scheduling Algorithm in Cloud Environment
A QoS Load Balancing Scheduling Algorithm in Cloud Environment Sana J. Shaikh *1, Prof. S.B.Rathod #2 * Master in Computer Engineering, Computer Department, SAE, Pune University, Pune, India # Master in
More informationAn Optimization Algorithm of Selecting Initial Clustering Center in K means
2nd International Conference on Machinery, Electronics and Control Simulation (MECS 2017) An Optimization Algorithm of Selecting Initial Clustering Center in K means Tianhan Gao1, a, Xue Kong2, b,* 1 School
More informationA Fault Tolerant Scheduler with Dynamic Replication in Desktop Grid Environment
A Fault Tolerant Scheduler with Dynamic Replication in Desktop Grid Environment Jyoti Bansal 1, Dr. Shaveta Rani 2, Dr. Paramjit Singh 3 1 Research Scholar,PTU, Kapurthala 2,3 Punjab Technical University
More informationAssociate Professor, Aditya Engineering College, Surampalem, India 3, 4. Department of CSE, Adikavi Nannaya University, Rajahmundry, India
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Scheduling
More informationA Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation
, pp.162-167 http://dx.doi.org/10.14257/astl.2016.138.33 A Novel Image Super-resolution Reconstruction Algorithm based on Modified Sparse Representation Liqiang Hu, Chaofeng He Shijiazhuang Tiedao University,
More informationEnhanced N+1 Parity Scheme combined with Message Logging
IMECS 008, 19-1 March, 008, Hong Kong Enhanced N+1 Parity Scheme combined with Message Logging Ch.D.V. Subba Rao and M.M. Naidu Abstract Checkpointing schemes facilitate fault recovery in distributed systems.
More informationMitigating Data Skew Using Map Reduce Application
Ms. Archana P.M Mitigating Data Skew Using Map Reduce Application Mr. Malathesh S.H 4 th sem, M.Tech (C.S.E) Associate Professor C.S.E Dept. M.S.E.C, V.T.U Bangalore, India archanaanil062@gmail.com M.S.E.C,
More informationAn Efficient Approach to Energy Saving in Microcontrollers
An Efficient Approach to Energy Saving in Microcontrollers Wenhong Zhao 1 and Feng Xia 2 1 Precision Engineering Laboratory, Zhejiang University of Technology, Hangzhou 310014, China wenhongzhao@gmail.com
More informationResource Load Balancing Based on Multi-agent in ServiceBSP Model*
Resource Load Balancing Based on Multi-agent in ServiceBSP Model* Yan Jiang 1, Weiqin Tong 1, and Wentao Zhao 2 1 School of Computer Engineering and Science, Shanghai University 2 Image Processing and
More informationA Heuristic Based Load Balancing Algorithm
International Journal of Computational Engineering & Management, Vol. 15 Issue 6, November 2012 www..org 56 A Heuristic Based Load Balancing Algorithm 1 Harish Rohil, 2 Sanjna Kalyan 1,2 Department of
More informationDesign of High Performance Distributed Snapshot/Recovery Algorithms for Ring Networks
Southern Illinois University Carbondale OpenSIUC Publications Department of Computer Science 2008 Design of High Performance Distributed Snapshot/Recovery Algorithms for Ring Networks Bidyut Gupta Southern
More informationA New Intelligent Method in Brokers to Improve Resource Recovery Methods in Grid Computing Network
2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com A New Intelligent Method in Brokers to Improve Resource Recovery Methods in Grid Computing Network
More informationGrid Resources Search Engine based on Ontology
based on Ontology 12 E-mail: emiao_beyond@163.com Yang Li 3 E-mail: miipl606@163.com Weiguang Xu E-mail: miipl606@163.com Jiabao Wang E-mail: miipl606@163.com Lei Song E-mail: songlei@nudt.edu.cn Jiang
More informationA Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme
A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,
More informationThe Improvement and Implementation of the High Concurrency Web Server Based on Nginx Baiqi Wang1, a, Jiayue Liu2,b and Zhiyi Fang 3,*
Computing, Performance and Communication systems (2016) 1: 1-7 Clausius Scientific Press, Canada The Improvement and Implementation of the High Concurrency Web Server Based on Nginx Baiqi Wang1, a, Jiayue
More informationQADR with Energy Consumption for DIA in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationScheduling in Multiprocessor System Using Genetic Algorithms
Scheduling in Multiprocessor System Using Genetic Algorithms Keshav Dahal 1, Alamgir Hossain 1, Benzy Varghese 1, Ajith Abraham 2, Fatos Xhafa 3, Atanasi Daradoumis 4 1 University of Bradford, UK, {k.p.dahal;
More informationAn Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid
An Application of Genetic Algorithm for Auto-body Panel Die-design Case Library Based on Grid Demin Wang 2, Hong Zhu 1, and Xin Liu 2 1 College of Computer Science and Technology, Jilin University, Changchun
More informationEnhanced Round Robin Technique with Variant Time Quantum for Task Scheduling In Grid Computing
International Journal of Emerging Trends in Science and Technology IC Value: 76.89 (Index Copernicus) Impact Factor: 4.219 DOI: https://dx.doi.org/10.18535/ijetst/v4i9.23 Enhanced Round Robin Technique
More informationDYNAMIC SCHEDULING AND RESCHEDULING WITH FAULT TOLERANCE STRATEGY IN GRID COMPUTING
DYNAMIC SCHEDULING AND RESCHEDULING WITH FAULT TOLERANCE STRATEGY IN GRID COMPUTING Ms. P. Kiruthika Computer Science & Engineering, SNS College of Engineering, Coimbatore, Tamilnadu, India. Abstract Grid
More informationA new efficient Virtual Machine load balancing Algorithm for a cloud computing environment
Volume 02 - Issue 12 December 2016 PP. 69-75 A new efficient Virtual Machine load balancing Algorithm for a cloud computing environment Miss. Rajeshwari Nema MTECH Student Department of Computer Science
More informationCredit Determination of Fibre Channel in Avionics Environment
Chinese Journal of Aeronautics 20(2007) 247-252 Chinese Journal of Aeronautics www.elsevier.com/locate/cja Credit Determination of Fibre Channel in Avionics Environment LIN Qiang*, XIONG Hua-gang, ZHANG
More informationThe Design and Implementation of Disaster Recovery in Dual-active Cloud Center
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang
More informationUtilizing Restricted Direction Strategy and Binary Heap Technology to Optimize Dijkstra Algorithm in WebGIS
Key Engineering Materials Online: 2009-10-08 ISSN: 1662-9795, Vols. 419-420, pp 557-560 doi:10.4028/www.scientific.net/kem.419-420.557 2010 Trans Tech Publications, Switzerland Utilizing Restricted Direction
More informationAPPLICATION OF VARIABLE-FIDELITY MODELS TO AERODYNAMIC OPTIMIZATION
Applied Mathematics and Mechanics (English Edition), 2006, 27(8):1089 1095 c Editorial Committee of Appl. Math. Mech., ISSN 0253-4827 APPLICATION OF VARIABLE-FIDELITY MODELS TO AERODYNAMIC OPTIMIZATION
More informationOptimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-2, Issue-8 E-ISSN: 2347-2693 Optimization of Multi-server Configuration for Profit Maximization using M/M/m
More informationSERVICE ORIENTED REAL-TIME BUFFER MANAGEMENT FOR QOS ON ADAPTIVE ROUTERS
SERVICE ORIENTED REAL-TIME BUFFER MANAGEMENT FOR QOS ON ADAPTIVE ROUTERS 1 SARAVANAN.K, 2 R.M.SURESH 1 Asst.Professor,Department of Information Technology, Velammal Engineering College, Chennai, Tamilnadu,
More informationA STUDY OF BNP PARALLEL TASK SCHEDULING ALGORITHMS METRIC S FOR DISTRIBUTED DATABASE SYSTEM Manik Sharma 1, Dr. Gurdev Singh 2 and Harsimran Kaur 3
A STUDY OF BNP PARALLEL TASK SCHEDULING ALGORITHMS METRIC S FOR DISTRIBUTED DATABASE SYSTEM Manik Sharma 1, Dr. Gurdev Singh 2 and Harsimran Kaur 3 1 Assistant Professor & Head, Department of Computer
More informationQoS Guided Min-Mean Task Scheduling Algorithm for Scheduling Dr.G.K.Kamalam
International Journal of Computer Communication and Information System(IJJCCIS) Vol 7. No.1 215 Pp. 1-7 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 976 1349 ---------------------------------------------------------------------------------------------------------------------
More informationExploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things
Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things Zheng Yue-zhai and Chen Xiao-ying Abstract With the development of network and communication technology, this article
More informationEnhanced Live Migration of Virtual Machine Using Comparison of Modified and Unmodified Pages
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationRemotely Sensed Image Processing Service Automatic Composition
Remotely Sensed Image Processing Service Automatic Composition Xiaoxia Yang Supervised by Qing Zhu State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University
More informationMESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS
MESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS Ruchi Tuli 1 & Parveen Kumar 2 1 Research Scholar, Singhania University, Pacheri Bari (Rajasthan) India 2 Professor, Meerut Institute
More informationIn cloud computing, IaaS approach is to
Journal of Advances in Computer Engineering and Technology, 1(3) 2015 Optimization Task Scheduling Algorithm in Cloud Computing Somayeh Taherian Dehkordi 1, Vahid Khatibi Bardsiri 2 Received (2015-06-27)
More informationFuzzy Trust Integration for Security Enforcement in Grid Computing*
Fuzzy Trust Integration for Security Enforcement in Grid Computing* Shanshan Song, Kai Hwang, and Mikin Macwan Internet and Grid Computing Laboratory University of Southern California, Los Angeles, CA.
More informationAdvanced School in High Performance and GRID Computing November Introduction to Grid computing.
1967-14 Advanced School in High Performance and GRID Computing 3-14 November 2008 Introduction to Grid computing. TAFFONI Giuliano Osservatorio Astronomico di Trieste/INAF Via G.B. Tiepolo 11 34131 Trieste
More informationAN EFFICIENT ALGORITHM IN FAULT TOLERANCE FOR ELECTING COORDINATOR IN DISTRIBUTED SYSTEMS
International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 11, Nov 2015, pp. 46-53, Article ID: IJCET_06_11_005 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=6&itype=11
More informationProffering a new Method for Grid Computing Resource Discovery based on Economic Criteria using Ant Colony Algorithm
Volume 3 No., September 2 Proffering a new Method for Grid Computing Resource Discovery based on Economic Criteria using Ant Colony Algorithm Ali Sarhadi Department of Computer Engineering, Toyserkan Branch,
More informationIntroduction to Grid Computing
Milestone 2 Include the names of the papers You only have a page be selective about what you include Be specific; summarize the authors contributions, not just what the paper is about. You might be able
More informationPROFILING BASED REDUCE MEMORY PROVISIONING FOR IMPROVING THE PERFORMANCE IN HADOOP
ISSN: 0976-2876 (Print) ISSN: 2250-0138 (Online) PROFILING BASED REDUCE MEMORY PROVISIONING FOR IMPROVING THE PERFORMANCE IN HADOOP T. S. NISHA a1 AND K. SATYANARAYAN REDDY b a Department of CSE, Cambridge
More informationA Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme
A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme Yue Zhang, Yunxia Pei To cite this version: Yue Zhang, Yunxia Pei. A Resource Discovery Algorithm in Mobile Grid Computing
More informationCHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT
CHAPTER 6 ENERGY AWARE SCHEDULING ALGORITHMS IN CLOUD ENVIRONMENT This chapter discusses software based scheduling and testing. DVFS (Dynamic Voltage and Frequency Scaling) [42] based experiments have
More informationAn Adaptive Threshold LBP Algorithm for Face Recognition
An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent
More informationResearch on Design and Application of Computer Database Quality Evaluation Model
Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the
More informationA Partial Critical Path Based Approach for Grid Workflow Scheduling
A Partial Critical Path Based Approach for Grid Workflow Scheduling Anagha Sharaf 1, Suguna.M 2 PG Scholar, Department of IT, S.N.S College of Technology, Coimbatore, Tamilnadu, India 1 Associate Professor,
More informationA Simulation Model for Large Scale Distributed Systems
A Simulation Model for Large Scale Distributed Systems Ciprian M. Dobre and Valentin Cristea Politechnica University ofbucharest, Romania, e-mail. **Politechnica University ofbucharest, Romania, e-mail.
More informationAustralian Journal of Basic and Applied Sciences. Resource Fitness Task Scheduling Algorithm for Scheduling Tasks on Heterogeneous Grid Environment
AENSI Journals Australian Journal of Basic and Applied Sciences ISSN:1991-8178 Journal home page: www.ajbasweb.com Resource Fitness Task Scheduling Algorithm for Scheduling Tasks on Heterogeneous Grid
More informationA Survey on Resource Allocation policies in Mobile ad-hoc Computational Network
A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,
More informationCPU Scheduling (1) CPU Scheduling (Topic 3) CPU Scheduling (2) CPU Scheduling (3) Resources fall into two classes:
CPU Scheduling (Topic 3) 홍성수 서울대학교공과대학전기공학부 Real-Time Operating Systems Laboratory CPU Scheduling (1) Resources fall into two classes: Preemptible: Can take resource away, use it for something else, then
More informationGRB. Grid-JQA : Grid Java based Quality of service management by Active database. L. Mohammad Khanli M. Analoui. Abstract.
Grid-JQA : Grid Java based Quality of service management by Active database L. Mohammad Khanli M. Analoui Ph.D. student C.E. Dept. IUST Tehran, Iran Khanli@iust.ac.ir Assistant professor C.E. Dept. IUST
More informationOrganization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology
, pp.49-54 http://dx.doi.org/10.14257/astl.2014.45.10 Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology Ying Xia, Shiyan Luo, Xu Zhang, Hae Yong Bae Research
More informationOPERATING SYSTEMS. Deadlocks
OPERATING SYSTEMS CS3502 Spring 2018 Deadlocks Chapter 7 Resource Allocation and Deallocation When a process needs resources, it will normally follow the sequence: 1. Request a number of instances of one
More informationGrid Computing Systems: A Survey and Taxonomy
Grid Computing Systems: A Survey and Taxonomy Material for this lecture from: A Survey and Taxonomy of Resource Management Systems for Grid Computing Systems, K. Krauter, R. Buyya, M. Maheswaran, CS Technical
More informationAn Efficient Storage Mechanism to Distribute Disk Load in a VoD Server
An Efficient Storage Mechanism to Distribute Disk Load in a VoD Server D.N. Sujatha 1, K. Girish 1, K.R. Venugopal 1,andL.M.Patnaik 2 1 Department of Computer Science and Engineering University Visvesvaraya
More informationHandling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization
Handling Multi Objectives of with Multi Objective Dynamic Particle Swarm Optimization Richa Agnihotri #1, Dr. Shikha Agrawal #1, Dr. Rajeev Pandey #1 # Department of Computer Science Engineering, UIT,
More informationM. Roehrig, Sandia National Laboratories. Philipp Wieder, Research Centre Jülich Nov 2002
Category: INFORMATIONAL Grid Scheduling Dictionary WG (SD-WG) M. Roehrig, Sandia National Laboratories Wolfgang Ziegler, Fraunhofer-Institute for Algorithms and Scientific Computing Philipp Wieder, Research
More informationThe Study of Genetic Algorithm-based Task Scheduling for Cloud Computing
The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing Sung Ho Jang, Tae Young Kim, Jae Kwon Kim and Jong Sik Lee School of Information Engineering Inha University #253, YongHyun-Dong,
More informationCS450/550 Operating Systems
CS450/550 Operating Systems Lecture 3 Deadlocks Dr. Xiaobo Zhou Department of Computer Science CS450/550 Deadlocks.1 Review: Summary of Chapter 2 Sequential process model Multi-threading: user-space vs.
More informationAn Optimized Virtual Machine Migration Algorithm for Energy Efficient Data Centers
International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 8 Issue 01 Ver. II Jan 2019 PP 38-45 An Optimized Virtual Machine Migration Algorithm
More informationAn Efficient Clustering Method for k-anonymization
An Efficient Clustering Method for -Anonymization Jun-Lin Lin Department of Information Management Yuan Ze University Chung-Li, Taiwan jun@saturn.yzu.edu.tw Meng-Cheng Wei Department of Information Management
More informationE-SCIENCE WORKFLOW ON THE GRID
E-SCIENCE WORKFLOW ON THE GRID Yaohang Li Department of Computer Science North Carolina A&T State University, Greensboro, NC 27411, USA yaohang@ncat.edu Michael Mascagni Department of Computer Science
More informationDynamic load-balancing algorithm for a decentralized gpu-cpu cluster
Dynamic load-balancing algorithm for a decentralized gpu-cpu cluster Mert Değirmenci Department of Computer Engineering, Middle East Technical University Related work http://www2.computer.org/portal/web/csdl/doi/10.1109/icpads.2004.13161144
More informationBio-Inspired Techniques for the Efficient Migration of Virtual Machine for Load Balancing In Cloud Computing
Volume 118 No. 24 2018 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Bio-Inspired Techniques for the Efficient Migration of Virtual Machine for Load Balancing
More informationAdaptive replica consistency policy for Kafka
Adaptive replica consistency policy for Kafka Zonghuai Guo 1,2,*, Shiwang Ding 1,2 1 Chongqing University of Posts and Telecommunications, 400065, Nan'an District, Chongqing, P.R.China 2 Chongqing Mobile
More informationAccuracy of Matching between Probe-Vehicle and GIS Map
Proceedings of the 8th International Symposium on Spatial Accuracy Assessment in Natural Resources and Environmental Sciences Shanghai, P. R. China, June 25-27, 2008, pp. 59-64 Accuracy of Matching between
More informationConsistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax:
Consistent Logical Checkpointing Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3112 hone: 409-845-0512 Fax: 409-847-8578 E-mail: vaidya@cs.tamu.edu Technical
More informationMapping a group of jobs in the error recovery of the Grid-based workflow within SLA context
Mapping a group of jobs in the error recovery of the Grid-based workflow within SLA context Dang Minh Quan International University in Germany School of Information Technology Bruchsal 76646, Germany quandm@upb.de
More informationprocesses based on Message Passing Interface
Checkpointing and Migration of parallel processes based on Message Passing Interface Zhang Youhui, Wang Dongsheng, Zheng Weimin Department of Computer Science, Tsinghua University, China. Abstract This
More informationA CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS
A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department
More informationThe Affinity Effects of Parallelized Libraries in Concurrent Environments. Abstract
The Affinity Effects of Parallelized Libraries in Concurrent Environments FABIO LICHT, BRUNO SCHULZE, LUIS E. BONA, AND ANTONIO R. MURY 1 Federal University of Parana (UFPR) licht@lncc.br Abstract The
More information