scholarly journals Scheduling Scientific Workflow Applications with Deadline and Budget Constraints Using Genetic Algorithms

2006 ◽  
Vol 14 (3-4) ◽  
pp. 217-230 ◽  
Author(s):  
Jia Yu ◽  
Rajkumar Buyya

Grid technologies have progressed towards a service-oriented paradigm that enables a new way of service provisioning based on utility computing models, which are capable of supporting diverse computing services. It facilitates scientific applications to take advantage of computing resources distributed world wide to enhance the capability and performance. Many scientific applications in areas such as bioinformatics and astronomy require workflow processing in which tasks are executed based on their control or data dependencies. Scheduling such interdependent tasks on utility Grid environments need to consider users' QoS requirements. In this paper, we present a genetic algorithm approach to address scheduling optimization problems in workflow applications, based on two QoS constraints, deadline and budget.

Author(s):  
V. Pouli ◽  
C. Marinos ◽  
M. Grammatikou ◽  
S. Papavassiliou ◽  
V. Maglaris

Traditionally, network Service Providers specify Service Level Agreements (SLAs) to guarantee service availability and performance to their customers. However, these SLAs are rather static and span a single provider domain. Thus, they are not applicable to a multi–domain environment. In this paper, the authors present a framework for automatic creation and management of SLAs in a multi-domain environment. The framework is based on Service Oriented Computing (SOC) and contains a collection of web service calls and modules that allow for the automatic creation, configuration, and delivery of an end-to-end SLA, created from the merging of the per-domain SLAs. This paper also presents a monitoring procedure to monitor the QoS guarantees stipulated in the SLA. The SLA establishment and monitoring procedures are tested through a Grid application scenario targeted to perform remote control and monitoring of instrument elements distributed across the Grid.


Author(s):  
V. Pouli ◽  
C. Marinos ◽  
M. Grammatikou ◽  
S. Papavassiliou ◽  
V. Maglaris

Traditionally, network Service Providers specify Service Level Agreements (SLAs) to guarantee service availability and performance to their customers. However, these SLAs are rather static and span a single provider domain. Thus, they are not applicable to a multi–domain environment. In this paper, the authors present a framework for automatic creation and management of SLAs in a multi-domain environment. The framework is based on Service Oriented Computing (SOC) and contains a collection of web service calls and modules that allow for the automatic creation, configuration, and delivery of an end-to-end SLA, created from the merging of the per-domain SLAs. This paper also presents a monitoring procedure to monitor the QoS guarantees stipulated in the SLA. The SLA establishment and monitoring procedures are tested through a Grid application scenario targeted to perform remote control and monitoring of instrument elements distributed across the Grid.


2020 ◽  
Vol 10 (24) ◽  
pp. 9148
Author(s):  
Germán Moltó ◽  
Diana M. Naranjo ◽  
J. Damian Segrelles

Cloud computing instruction requires hands-on experience with a myriad of distributed computing services from a public cloud provider. Tracking the progress of the students, especially for online courses, requires one to automatically gather evidence and produce learning analytics in order to further determine the behavior and performance of students. With this aim, this paper describes the experience from an online course in cloud computing with Amazon Web Services on the creation of an open-source data processing tool to systematically obtain learning analytics related to the hands-on activities carried out throughout the course. These data, combined with the data obtained from the learning management system, have allowed the better characterization of the behavior of students in the course. Insights from a population of more than 420 online students through three academic years have been assessed, the dataset has been released for increased reproducibility. The results corroborate that course length has an impact on online students dropout. In addition, a gender analysis pointed out that there are no statistically significant differences in the final marks between genders, but women show an increased degree of commitment with the activities planned in the course.


2014 ◽  
Vol 2014 ◽  
pp. 1-16 ◽  
Author(s):  
Md Whaiduzzaman ◽  
Mohammad Nazmul Haque ◽  
Md Rejaul Karim Chowdhury ◽  
Abdullah Gani

Cloud computing is currently emerging as an ever-changing, growing paradigm that models “everything-as-a-service.” Virtualised physical resources, infrastructure, and applications are supplied by service provisioning in the cloud. The evolution in the adoption of cloud computing is driven by clear and distinct promising features for both cloud users and cloud providers. However, the increasing number of cloud providers and the variety of service offerings have made it difficult for the customers to choose the best services. By employing successful service provisioning, the essential services required by customers, such as agility and availability, pricing, security and trust, and user metrics can be guaranteed by service provisioning. Hence, continuous service provisioning that satisfies the user requirements is a mandatory feature for the cloud user and vitally important in cloud computing service offerings. Therefore, we aim to review the state-of-the-art service provisioning objectives, essential services, topologies, user requirements, necessary metrics, and pricing mechanisms. We synthesize and summarize different provision techniques, approaches, and models through a comprehensive literature review. A thematic taxonomy of cloud service provisioning is presented after the systematic review. Finally, future research directions and open research issues are identified.


2015 ◽  
Vol 24 (05) ◽  
pp. 1550017 ◽  
Author(s):  
Aderemi Oluyinka Adewumi ◽  
Akugbe Martins Arasomwan

This paper presents an improved particle swarm optimization (PSO) technique for global optimization. Many variants of the technique have been proposed in literature. However, two major things characterize many of these variants namely, static search space and velocity limits, which bound their flexibilities in obtaining optimal solutions for many optimization problems. Furthermore, the problem of premature convergence persists in many variants despite the introduction of additional parameters such as inertia weight and extra computation ability. This paper proposes an improved PSO algorithm without inertia weight. The proposed algorithm dynamically adjusts the search space and velocity limits for the swarm in each iteration by picking the highest and lowest values among all the dimensions of the particles, calculates their absolute values and then uses the higher of the two values to define a new search range and velocity limits for next iteration. The efficiency and performance of the proposed algorithm was shown using popular benchmark global optimization problems with low and high dimensions. Results obtained demonstrate better convergence speed and precision, stability, robustness with better global search ability when compared with six recent variants of the original algorithm.


Author(s):  
Sudhakar Y. Reddy

Abstract This paper describes HIDER, a methodology that enables detailed simulation models to be used during the early stages of system design. HIDER uses a machine learning approach to form abstract models from the detailed models. The abstract models are used for multiple-objective optimization to obtain sets of non-dominated designs. The tradeoffs between design and performance attributes in the non-dominated sets are used to interactively refine the design space. A prototype design tool has been developed to assist the designer in easily forming abstract models, flexibly defining optimization problems, and interactively exploring and refining the design space. To demonstrate the practical applicability of this approach, the paper presents results from the application of HIDER to the system-level design of a wheel loader. In this demonstration, complex simulation models for cycle time evaluation and stability analysis are used together for early-stage exploration of design space.


2015 ◽  
Vol 5 (1) ◽  
pp. 157
Author(s):  
Bernard Oladosu Omisore ◽  
Oyende Adeleke A.

Performance of the Nigerian public service has been a major concern to policy makers and researchers alike. This is because despite all measures put in place to arrest the ugly trend, it seems, it has defied all approaches towards tackling the problem of inefficiency and capacity collapse. Work ethics, attitudes and values can be influenced by the organization, through interventions like training, motivation and coaching, etc. However, they cannot be changed forcibly because they are intrinsic. It is, therefore, of fundamental importance that public functionaries act justly and fairly to all, not only paying lip service to ethical conduct but also ensuring that these are manifestly and undoubtedly seen to be done. This paper discusses the challenges of work ethics, values, attitudes and performance in the Nigerian public service. The major causes of unethical conduct in the public service were identified and the institutional mechanisms established by the government to curb these unethical behaviours were examined. This paper adopted content analysis as a method of data gathering and analysis. It suggested viable options for effective and efficient service-oriented public service. 


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Yang Xu ◽  
Guojun Wang ◽  
Jidian Yang ◽  
Ju Ren ◽  
Yaoxue Zhang ◽  
...  

The emerging network computing technologies have significantly extended the abilities of the resource-constrained IoT devices through the network-based service sharing techniques. However, such a flexible and scalable service provisioning paradigm brings increased security risks to terminals due to the untrustworthy exogenous service codes loading from the open network. Many existing security approaches are unsuitable for IoT environments due to the high difficulty of maintenance or the dependencies upon extra resources like specific hardware. Fortunately, the rise of blockchain technology has facilitated the development of service sharing methods and, at the same time, it appears a viable solution to numerous security problems. In this paper, we propose a novel blockchain-based secure service provisioning mechanism for protecting lightweight clients from insecure services in network computing scenarios. We introduce the blockchain to maintain all the validity states of the off-chain services and edge service providers for the IoT terminals to help them get rid of untrusted or discarded services through provider identification and service verification. In addition, we take advantage of smart contracts which can be triggered by the lightweight clients to help them check the validities of service providers and service codes according to the on-chain transactions, thereby reducing the direct overhead on the IoT devices. Moreover, the adoptions of the consortium blockchain and the proof of authority consensus mechanism also help to achieve a high throughput. The theoretical security analysis and evaluation results show that our approach helps the lightweight clients get rid of untrusted edge service providers and insecure services effectively with acceptable latency and affordable costs.


Author(s):  
Pablo Pessolani

Nowadays, most Cloud applications are developed using Service Oriented Architecture (SOA) or MicroService Architecture (MSA). The scalability and performance of them is achieved by executing multiple instances of its components in different nodes of a virtualization cluster. Initially, they were deployed in Virtual Machines (VMs) but, they required enough computational, memory, network and storage resources to hold an Operating System (OS), a set of utilities, libraries, and the application component. By deploying hundreds of these application components, the resource requirements increase a lot. To minimize them, usually small footprint OS are used. Later, as management tools were improved, the application components began to be deployed in Containers which require even less resources than VMs. Another way to reduce the resource requirements is integrating the application components in a Unikernel. This article proposes a Unikernel called MUK, based on a multiserver OS, to be used as a tool to integrate Cloud application components. MUK was built to run in user-space inside a Container of a Distributed Virtualization System. Both technologies facilitate the scattering of application components in a virtualization cluster keeping the isolation properties and minimal attack surface of a Unikernel.


Sign in / Sign up

Export Citation Format

Share Document