Enhanced Bee Colony Algorithm for Efficient Load Balancing and Scheduling in Cloud

...
Author:  Remesh Babu K R

3929 downloads 9348 Views 466KB Size

Recommend Documents

Identity based encryption IBE is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important resea

This paper presents a Fuzzy Logic based approach to manage VM status and VM configuration within the cloud environment. The aim of the approach is to serve task requests efficiently with minimal use of resource and power. The proposed technique uses

Cloud computing is an online storage media where we access, store and manage the data. It stores the data on remote servers rather than a local server and that data can be accessed through the internet. For example Google Drive is personal cloud stor

Cloud computing is a distributed environment that encompasses thousands of computers that work in parallel to perform a task in lesser time than the traditional computing models. This parallelism enables the low cost virtualization of hardware resour

Vehicular Ad hoc networks are established between mobile vehicles equipped with wireless interfaces that could be either of heterogeneous or homogeneous nature. Vehicles and road side fixed equipment's both of them can be either private belonging to

Cloud computing is a large pool of system in which private or public networks are interconnected in order to provide the scalable infrastructure to application, data and file storage. It is considered as the computer archetype in which large amount o

Cloud computing is a large pool of system in which private or public networks are interconnected in order to provide the scalable infrastructure to application, data and file storage. It is considered as the computer archetype in which large amount o

Cloud computing is an interconnection between the networks such as in private or public networks through internet in order to provide access to the application, data and file storage. It not only decreases the computational cost, hosting application,

Wireless sensor networks have recently attracted much attention from research. This project reviews the medium access control MAC , which is a capable technology in wireless sensor networks called SMAC Sensor MAC . MAC protocols control how sensors r

Bubble and Bee SolutionsFull description

Multiprocessor interconnection network have become powerful parallel computing system for real time applications. Now a days the many researchers doing research on the dynamic load scheduling in multiprocessor system. Load balancing is the method of

genetic algorithm is used to schedule university time table

An aggrandized solution is designed for the vehicles to reduce the total cost of distribution by which it can supply the goods to the customers with its known capacity can be named as a vehicle routing problem. In variable neighborhood search method,

The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristi

Combining data from several information sources has become a significant research area in classification by several scientific applications. Many of the recent work make use of kernels or graphs in order to combine varied categories of features, whic

The SAS scheduling tools enable you to automate the scheduling and execution of SAS jobs across your enterprise computing environment. Scheduling requires four main components: