0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Multi Objective & Trust-Based Workflow Scheduling Method In Cloud Computing Based On The MVO Algorithm
Authors :
Fatemeh Ebadifard
1
1- دانشگاه کاشان
Keywords :
cloud computing, workflow, scheduling, Trust
Abstract :
the problem of task scheduling on VMs is selecting appropriate resources for a task so that its associated tasks have already been executed. Since the workflow contains a set of tasks, the likelihood of failure increases with the failure of a task throughout the workflow. The allocation of tasks on virtual machines with higher reliability improves workflow-scheduling efficiency. Therefore, Trust relationship is an important factor of resource allocation and job scheduling, and in this paper, we have presented a good method to estimate the trust of virtual machines on which the workflow is run. In addition to the trust, which is an important factor in the workflow scheduling, there are other criteria for the satisfaction of service providers and customers. By increasing the number of requests and the diversity of virtual machines as well as the contradiction between objectives, finding the optimal Pareto front is more challenging. Therefore, multi-objective evolutionary algorithms face a large space of permutations to find an optimal tradeoff of objectives. In this paper, we present a multi-objective workflow-scheduling algorithm using MVO algorithm with the aim of increasing diversity and convergence, so that the proposed method can consider QoS requirements for service providers and customers simultaneously.
Papers List
List of archived papers
روشی برای تشخیص مرحله پیشرفت آلزایمر در تصاویرFMRI مبتنی بر شبکه های عصبی چگال
فرساد زمانی بروجنی - عباس بهره دار
A parallel approach to the fractional time delay model for predicting the spread of COVID-19
Mahdi Movahedian Moghaddam - Kourosh Parand
Classical-Quantum Multiple Access Wiretap Channel with Common Message: One-shot Rate Region
Hadi Aghaee - Dr Bahareh Akhbari
کشف برخط تقلب پیشنهاد ساختگی (Bid-Shielding) در مناقصه و مزایدههای الکترونیکی هلندی با رویکرد تحلیل شبکه اجتماعی
فاطمه الثلایا - دکتر سید علیرضا هاشمی گلپایگانی فاطمه الثلایا - سید علیرضا هاشمی گلپایگانی -
A Nano-based High-Speed QCA circuit for Information Security with Image Masking
Saeid Seyedi - Hatam Abdoli
Mode Selection and Resource Allocation in D2D-Enabled MC-NOMA using Matching Theory
Alireza Gholamrezaee - Hamid Farrokhi - Javad Zeraatkar Moghaddam
Exploring the Relationship Between Gameplay Log Data and Depression & Anxiety
Soroush Elyasi - Arya Varasteh Nezhad - Fattaneh Taghiyareh
Automatic identification and reconstruction of Tuberculosis in microscopic images using convolutional auto-encoder network
Ahmad Reza Nadafi - Farahnaz Mohanna
Silicon photonic microring resonators: A Novel optical router based on Negative-First routing algorithm
Negin Bagheri Renani - Elham Yaghoubi
Predicting Suicide Risk in Adolescents with Random Forest for Unbalanced Data Management
Fatemeh Rabbani - Dr Behrooz Masoumi - Dr Mohammad Reza Keyvanpour
more
Samin Hamayesh - Version 41.3.1