Version-1 (May-June 2018)
- Citation
- Abstract
- Reference
- Full PDF
Abstract:CPU scheduling is a process which allows one process to use the CPU while the execution of another process is on hold(in waiting state) due to unavailability of any resource like I/O etc, thereby making full use of CPU. The aim of CPU scheduling is to make the system efficient, fast and fair.The Objective of this paper is to improve the existing Round Robin Scheduling by reducing the individual process waiting time and also reduces average waiting time and turnaround time. In this paper we also compare the existing round robin scheduling algorithm with the proposed algorithm with the help of Gantt charts.
Keywords– CPU Scheduling, Round Robin Scheduling, Improvised Round Robin Scheduling, Waiting Time, Turnaround time.
[1]. A. Silberschatz, P. B. Galvin, and G. Gagne, "Operating System Concepts", 7th Edn., John Wiley and Sons Inc, 2005, ISBN 0-471- 69466-5.
[2]. AbrahamSilberschatz,PeterB.Galvin,GregGagne,"OperatingSystemConcepts",SixthEdition,JohnWiley&SonsInc.,2003. [3]. Andrew S. Tanenbaum, Herbert Bos, "Modern Operating Systems", Fourth Edition, Pearson Education,2014.
[4]. Gary Nutt, "Operating Systems", Third Edition, Pearson Education,2009.
[5]. William Stallings, "Operating Systems: Internals and Design Principles", Seventh Edition, Pearson, 2012Wikipedia
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Job scheduling is an important process in cloud environment to schedule the tasks and to minimize resource utilization. Recently, a lot of research works have been designed for job scheduling using different data mining techniques. The efficiency of existing job scheduling techniques was lower due to misclassification results. In order to solve this limitation, Softmax Bootstrap Ensembled Multiclass Scheduling (SBEMS) Technique is proposed. The SBEMS Technique employs multiple learning algorithms to obtain better predictive performance for job scheduling in cloud environment. The SBEMS Technique is developed by combining Sofmax regression tree classification with boostrap aggregative ensemble method. The SBEMS Technique creates '𝑀' number of Softmax Regression Tree........
Keywords– Boostrap Aggregative Ensemble Method, Job Scheduling, Resource Utilization, Softmax Regression Tree, Strong Learner, Weak Learners
[1]. Yi Yao, Jianzhe Tai, Bo Sheng, and Ningfang Mi, "LsPS: A Job Size-Based Scheduler for Efficient Task Assignments in Hadoop", IEEE Transactions on Cloud Computing, Volume 3, Issue 4, Pages 411-424, 2015
[2]. Zhuoyao Wang, Majeed M. Hayat, Nasir Ghani, Khaled B. Shaban, "Optimizing Cloud-Service Performance: Efficient Resource Provisioning via Optimal Workload Allocation", IEEE Transactions on Parallel and Distributed Systems, Volume 28, Issue 6, Pages 1689 – 1702, 2017
[3]. N.Moganarangan, R.G.Babukarthik, S.Bhuvaneswari, M.S.Saleem Basha, P.Dhavachelvan, "A novel algorithm for reducing energy-consumption in cloud computing environment: Web service computing approach", Journal of King Saud University-Computer and Information Sciences, Elsevier, Volume 28, Issue 1, Pages 55-67, January 2016
[4]. Mohammad Mehedi, HassanAtifAlamri, "Virtual Machine Resource Allocation for Multimedia Cloud: A Nash Bargaining Approach", Procedia Computer Science, Elsevier, Volume 34, Pages 571-576, 2014
[5]. Ziqian Dong, Ning Liu and Roberto Rojas-Cessa, "Greedy scheduling of tasks with time constraints for energy-efficient cloud-computing data centers", Journal of Cloud Computing: Advances, Systems, Springer, Volume 4, Issue 5, 2015
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Delineation of Trivial PGP Security |
| Country | : | India |
| Authors | : | Mr. Nikhil Joshi || Mr. Gaurav Kumar || Prof. Divya Premchandran |
| : | 10.9790/0661-2003011723 ![]() |
Abstract: The enhanced PGP Security that we are proposing is based only for digital signatures & encryption/decryption of the messages. The algorithm that is used here consists of asymmetric algorithm as RSA 4096 & the symmetric algorithm used is AES-256(Advance Encryption standard). Also we require hashing function in order to secure the digital signature as well as messages. Hence we use Whirlpool hashing function which is open source & is based on 512 block cipher that makes the application more powerful than the previously used.
Keywords– Asymmetry algorithm, AES-256, Digital Signature, Hash Function, OpenPGP , PGP, RSA 4096, Rijndael Cipher, SHA-256, Symmetric algorithm, Whirlpool.
[1]. Rijmen, V. with Willia Stallings. Private communication September 9th, 2005.
[2]. Barreto, P. and V. Rijmen. 2003. The Whirlpool Hashing Function. Submitted to NESSIE, May.
[3]. P. Kitsos, O. Koufopavlou: "Efficient Architecture and Hardware Implementation of the Whirlpool Hash Function". IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, Feb. 2004
[4]. Zimmermann, "An Introduction to Cryptography", PGP v 6.0 documentation, 1998.
[5]. Alex Biryukov and Dmitry Khovratovich, Related-key Cryptanalysis of the Full AES-192 and AES-256, ".
