SlideShare a Scribd company logo
1 of 13
Download to read offline
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
DOI : 10.5121/ijsea.2013.4403 27
A FUZZY MATHEMATICAL MODEL FOR
PEFORMANCE TESTING IN CLOUD
COMPUTING USING USER DEFINED
PARAMETERS
A.Vanitha Katherine(1)
and K.Alagarsamy(2)
1
Department of Master of Computer Applications, PSNA College of
Engineering and Technology, Dindigul.
Email: avanitha@yahoo.com
2
Computer Centre, Madurai Kamaraj University, Madurai.
Email: alagarsamymku@gmail.com
ABSTRACT
Software product development life cycle has software testing as an integral part. Conventional testing
requires dedicated infrastructure and resources that are expensive and only used sporadically. In the
growing complexity of business applications it is harder to build in-house testing facilities and also to
maintain that mimic real-time environments. By nature, cloud computing provides resources which are
unlimited in nature along with flexibility, scalability and availability of distributed testing environment,
thus it has opened up new opportunities for software testing. It leads to cost-effective solutions by reducing
the execution time of large application testing. As a part of infrastructure resource, cloud testing can attain
its efficiency by taking care of the parameters like network traffic, Disk Storage and RAM speed. In this
paper we propose a new fuzzy mathematical model to attain better scope for the above parameters.
KEYWORDS:
Cloud, disk storage, Fuzzy, Network Traffic, RAM.
1. INTRODUCTION
In Software product development software testing has become an integral part. To improve
performance, consistency and other important factors testing is important in life cycle of software
development. Software bugs could be dangerous and expensive, thus testing is important.
Resources and dedicated infrastructure is expensive in testing thus scrutinizing the application’s
speed, reliability, performance, functionality and security[1] were used sporadically. Testing
opportunity’s new vistas is opened by cloud computing. A combination of pay peruse, lower cost
and upfront capital expenditure elimination[2] is offered by cloud testing than that of
conventional test environment. At the same time, new set of challenges are introduced by cloud
testing especially in public cloud which includes lack of standards and data security [8]. A
traditional test environment restricts Time-to-market[3] since it can be delay prone and time
consuming. Single application can take weeks or months which leads to delay release. Forward
thinking companies due to on-demand provisioning starts the process[18], since cloud can
provide instantaneously time-to-market demands. The test environment is scaled up in minutes so
that the testers utilize the virtualized infrastructure to run existing applications and virtual
machines with no or minimal rewriting. The performance of testing in cloud [10] depends on the
efficiency of computing in the cloud which includes factors like network traffic, Disk storage and
RAM. When the network traffic is low the performance of testing is high, similarly when the disk
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
28
storage and RAM is high the performance increases [11]. Thus the goal is to use a mathematical
fuzzy model to increase the performance of testing in cloud by handling the user defined
parameters network traffic, disk storage and RAM in the cloud server.
Rest of the paper is organized as follows Section 2 presents an algorithm in fuzzy model. Section
3 depicts the application of the model and Section 4 provides a structural view of the results
generated. The major contribution of this paper is to produce a fuzzy mathematical model for
improving performance of cloud testing.
2. FUZZY MATHEMATICAL MODEL
Fuzzy logic depends upon the context that cannot be defined precisely and is a form of
knowledge representation suitable for notions. It is a Problem-solving control system
methodology. We move to fuzzy due to the following reasons. Conceptually fuzzy logic is easy to
understand[22], Fuzzy reasoning mathematical concepts are simple. Fuzzy logic does not need
any far-reaching approach, it in an intuitive approach. It need not start any thing from scratch and
flexible with any system and easily layer on more functionality. Even on careful inspection most
things are imprecise when looked closely but fuzzy logic tolerates on imprecise data[23]. Rather
than tacking it onto the end fuzzy reasoning builds this understanding into the process. Fuzzy
system can be created to match any set of input-output data, nonlinear functions of arbitrary
complexity can be modeled in fuzzy logic. Fuzzy logic toolbox software[24] has a technique like
Adaptive Neuro-Fuzzy Inference Systems(ANFIS), which is an adaptive technique which ease
the above process. Neural networks is in direct contrast with fuzzy logic which generates opaque
data taking training data as input with impenetrable models, fuzzy logic rely on the experience of
people who already understand the system thus built on top of the experienced experts. A fuzzy
system does not replace conventional control methods in turn blend with the conventional control
techniques. It simplifies their implementation and augments them in many cases. Fuzzy logic is
the basis for human communication thus based on natural language[23]. Many other statements
about fuzzy logic are underpinned by this observation, because it is easy to use and built on the
structures of qualitative description used in everyday language. A fuzzy logic system (FLS) is
defined as the nonlinear mapping of an input data set to a scalar output data[4]. A FLS as in
figure 2.1 consists of four main parts: fuzzifer, rules, inference engine, and defuzzfier.
Figure 2.1 - A Fuzzy Logic System
To capture expert knowledge mamdani fuzzy additive rule model is used. It allows us to describe
the expertise in more human-like and intuitive manner. However, Mamdani-type fuzzy inference
entails a substantial computational burden[5]. Figure 2.2 is a model pattern for mamdani.
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
29
Figure 2.2 – Mamdani pattern
Fuzzy logic algorithm
1. Define the linguistic variables and terms (initialization)
2. Construct the membership functions (initialization)
3. Construct the rule base (initialization)
4. Using the membership functions convert crisp input data to fuzzy values.(fuzzification)
5. Using rule base evaluate the rules.(inference)
6. Combine the results of each rule (inference)
7. The output data should be converted to non-fuzzy values (defuzzification)
3. FUZZY MODEL FOR CLOUD TESTING
One of the major advantages of cloud testing towards conventional testing is that the performance
can be improved due to the availability of resources in the cloud. Performance in cloud can be
improved by taking care of parameters network traffic, disk storage [9] and RAM. The above is
taken as data for fuzzy model, When network traffic is low then the performance of the system
will be high[12], when the disk storage and RAM is also high the performance will be improve.
3.1 – PERFORMANCE BASED ON NETWORK TRAFFIC
Performance issues in cloud computing mainly depends on the overall traffic patterns and peaks
in the system[25]. Network traffic plays major role in performance of cloud computing. When
network traffic in high the performance is low and when the network traffic is low the
performance is high. Table 3.1 show the performance range of network traffic.
Table 3.1 Performance Range of Network traffic
Performance Network Traffic
High <200MB
Average 200MB
Low >200MB
Linguistic Variables
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
30
A set of linguistic terms that are decomposed are called linguistic variables. They are the input or
output variables of the system whose values are not numerical values but words or sentences from
a natural language [6].
INPUT : Network Traffic NT, range[0-100] MB
OUTPUT: Performance P, range [0-1]
Membership Functions
A membership function is used to quantify a linguistic term[24], which are used in the
fuzzification and defuzzification steps of a FLS, to map the non-fuzzy input values to fuzzy
linguistic terms and vice versa. With a condition and a conclusion a fuzzy rule is a simple IF-
THEN rule. Figure 3.1 shows that if the When network traffic in high the performance is low and
when the network traffic is low the performance is high. Membership function is constructed to
control the output variable based on rule.
Network Traffic NT: Low, Average, High
Performance : Low, Average, High
Figure 3.1 Membership function editor for network traffic
Fuzzy Set Operations
Fuzzy set operations perform evaluation of the fuzzy rules and combine the results of the
individual rules. The non-fuzzy sets and fuzzy set operations are different. The final result is
obtained by combining the result of each rule after evaluation. This process is called inference.
The results are combined in different ways for individual rules. Table 3.2 shows the fuzzy rules
for network traffic and figure 3.2 shows the corresponding fuzzy rule editor.
Table 3.2 – Fuzzy rules for network traffic
1. IF (Network traffic is LOW) then (performance is HIGH)
2. IF (Network traffic is AVERAGE) then (performance is AVERAGE)
3. IF (Network traffic is HIGH) then (performance is LOW)
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
31
Figure 3.2 – Fuzzy Rule Editor
Here the results are ranged between [0-1] as shown in table 3.3
Table 3.3 Result Ranges
Result Ranges
Low 0.0 - 0.5
Average 0.5
High 0.5 – 1.0
Based on the fuzzy rules in table 3.2 combined with the table 3.3 the final result surface viewer
figure 3.3 is got which depicts that when network traffic(x-axis) is low (i.e) 0 the performance(y-
axis) is high (i.e) between 8 and 9.
Figure 3.3 – Surface viewer of the results
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
32
Defuzzification
Overall result is a fuzzy value which is got after inference step. Final crisp output is got after the
defuzzification of the result. This is the purpose of defuzzier component of a FLS. According to
the membership function of the output variable defuzzification is performed. Figure 3.4 shows the
rule viewer of the results obtained for three rules as in table 3.2. Here the left most triangles show
low value, middle triangle for average value and right most triangles for high value. The yellow
part is the input; network traffic which ranges from 0 to 200 and blue is for output, the
performance ranges from 0 to 1. The red line shows the final result.
Figure 3.4 – Rule viewer for network traffic
3.2 PERFORMANCE BASED ON NETWORK TRAFFIC AND DISK STORAGE
New rule with two inputs as in figure 3.5 can be framed to improve the performance. Along with
network traffic, disk storage is also considered. When disk storage space is high then performance
of system is also high. Combining this with network traffic based on AND rule new rules can be
framed. Though we might frame nine rules we can consider a few for result satisfactory[26].
Table 3.4 show the performance range of disk storage.
Figure 3.5 Pattern with two inputs network traffic and disk storage.
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
33
Table 3.4 Performance Range of Disk storage in cloud
Performance Disk storage
Low <1TB
Average 10TB
High >10TB
The input and output variable of the system now are
INPUT : Network Traffic NT, range[0-200]MB AND Disk storage, range[0-10]TB
OUTPUT: Performance P, range [0-1]
The fuzzy rules with AND logic are shown in table 3.5
Table 3.5 Fuzzy rules for AND logic for two inputs
1. IF (Network traffic is LOW) AND (Disk Storage is HIGH) then (performance is HIGH)
2. IF (Network traffic is AVERAGE) AND (Disk Storage is AVERAGE) then
(performance is AVERAGE)
3. IF (Network traffic is HIGH) AND (Disk Storage is LOW) then (performance is LOW)
The membership function, rule viewer and surface viewer for these two inputs are shown in
figure 3.6, 3.7 and 3.8 respectively.
Figure 3.6 – Membership function editor for disk storage
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
34
Figure 3.7 – AND logic Rule viewer for network traffic and disk storage
Figure 3.8 – AND logic Surface viewer for network traffic and disk storage
3.2 Performance Based On Network Traffic,Disk Storage And Ram
To look into a better performance one more input RAM is considered along with network traffic
and disk storage. Figure 3.9 depicts the pattern. When RAM speed is high then performance of
system is also high. Combining this with network traffic, disk storage based on AND rule new
rules can be framed. Table 3.6 show the performance range of disk storage.
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
35
Figure 3.9 – Pattern with three inputs network traffic, disk storage and RAM
Table 3.6 Performance Range of RAM speed in cloud
Performance RAM speed
Low <400GB
Average 400GB
High >400GB
The input and output variable of the system now are
INPUT : Network Traffic NT, range[0-200]MB AND Disk storage, range[0-10]TB
AND RAM speed, range[0-40]GB
OUTPUT: Performance P, range [0-1]
The fuzzy rules with AND logic are shown in table 3.7
Table 3.5 Fuzzy rules for AND logic for two inputs
1. IF (Network traffic is LOW) AND (Disk Storage is HIGH) AND (RAM is HIGH) then
(performance is HIGH)
2. IF (Network traffic is AVERAGE) AND (Disk Storage is AVERAGE) AND (RAM is
AVERAGE)then (performance is AVERAGE)
3. IF (Network traffic is HIGH) AND (Disk Storage is LOW) AND (RAM is LOW) then
(performance is LOW)
The rule viewer and surface viewer for these three inputs are shown in figure 3.10 and 3.11
respectively.
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
36
Figure 3.10 – AND logic Rule Viewer for network traffic, disk storage and RAM
Figure 3.11 – AND logic Surface Viewer for network traffic, disk storage and RAM
4. RESULTS AND DISCUSSION
Thus from the previous session we conclude that though the disk storage and RAM plays an
important role in the increase of performance, network traffic contributes more in that. Even
though the disk storage and RAM are more since network traffic is high the overall performance
is only average (0.5) by figure 3.10.
In addition to AND logic OR logic is also used to test the performance. By surface rule viewer
figure 4.1 and surface viewer 4.2 it is proved that the performance is low (0.3) in OR rules than
that of and RULES.
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
37
Figure 4.1 – Rule viewer for OR rule
Figure 4.2 – Surface viewer for OR rule
Table 4.1 shows that when the network traffic is high even when disk storage and RAM are
high/medium the final performance is low/medium. When the network traffic is low in spite of
disk storage and RAM low/medium the performance is high/medium. Thus network traffic plays
major role in the performance of cloud testing. Figure 4.3 depicts the rule viewer of in which
performance is high (0.868) when network traffic ,disk storage and RAM are high.
Table 4.1 – Performance based on all rules
Network Traffic Disk Storage RAM
Performance of
cloud
Low High High high(0.868)
Low Low Low Medium(0.504)
Low Low High Medium(0.541)
Low High Low Medium(0.519)
Low Medium High Medium(0.612)
Low Medium Medium Medium(0.612)
high High Low Medium(0.5)
high Medium Low Low(0.391)
high Low Low Low(0.134)
high Medium Medium Low(0.393)
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
38
Figure 4.3 – Rule viewer
5. CONCLUSION
New fuzzy mathematical model which provides unlimited resources with scalability[13],
flexibility and availability of distributed testing environment is created for cloud computing
which opens new opportunities for software testing. Software testing performance can be
increased in cloud by increasing the working of cloud parameters namely network traffic, disk
storage and RAM. New fuzzy mathematical model is created using these parameters. The model
is analysed using AND logic fuzzy rules and OR logic logic fuzzy rules. Mamdani fuzzy additive
rule model is used for the same. We found by results and discussion that AND logic rules provide
better than that of OR logic rules. Thus inspite of challenges faced in cloud for software testing
the performance can be increased by improving the performance of the parameters network traffic,
disk storage and RAM in cloud[14]. As a future work XOR logic can analysed..
REFERENCES
[1] A Vanitha Katherine, K Alagarsamy,”Software Testing in Cloud Platform: A Survey”, IJCA,
Volume 46– No.6, May 2012
[2] http://www.cognizant.com/insights/perspectives /taking- testing-to-the-cloud
[3] Mrs.A.Vanitha Katherine, Dr. K. Alagarsamy, “Conventional software testing Vs cloud testing”,
International Journal Of Scientific & Engineering Research, Volume 3, Issue 3, March-2012 1 ISSN
2229-5518
[4] J. Mendel. Fuzzy logic systems for engineering: a tutorial. Proceedings of the IEEE, 83(3):345{377,
Mar 1995.
[5] Aleksandar Rakić, Introduction 3 Fuzzy Inference
[6] Fuzzy control programming. Technical report, International ElectrotechnicalCommision, 1997.
[7] J. Mendel. Fuzzy logic systems for engineering: a tutorial. Proceedings of the IEEE, 83(3):345{377,
Mar 1995.
[8] Jerry Gao, Xiaoying Bai, and Wei-Tek Tsai, ―Cloud Testing- Issues, Challenges, Needs and
Practice‖, SEIJ, Vol. 1, No. 1, Sept 2011.
[9] www.clouddrive.com.au-InstallationManual.pdf
[10] Vinod Venkataraman, Ankit Shah, Yin Zhang, “Network-based Measurements on Cloud Computing
Services”,http://www.cs.utexas.edu/~vinodv/files/cc-measure.pdf.
[11] Zach Hill, Marty Humphrey, “A Quantitative Analysis of High Performance Computing with
Amazon’s EC2 Infrastructure: The Death of the Local Cluster?”, the 10th IEEE/ ACM International
Conference on Grid Computing (Grid 2009). Oct 13-15 2009.
International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013
39
[12] Dominique A. Heger, “A Performance Centric Introduction to Cloud
Computing”,http://www.dhtusa.com/media/CldPerf.pdf.
[13] Raj Jain, “The Art of Computer Systems Performance Analysis: Techniques for Experimental Design,
Measurement, Simulation, and Modeling”, Wiley, 1991,pp 203-220,pp 381-389.
[14] “Cloud computing – Wikipedia, the free encyclopedia”,http://en.wikipedia.or 5.
g/wiki/Cloud_computing.
[15] “httperf – Wikipedia, the free encyclopedia”,http://en.wikipedia.org/wiki/Httperf.
[16] “Planetlab testbed”,http://www.planet-lab.org.
[17] Kaiqi Xiong, Harry Perro, “Service Performance and Analysis in Cloud
Computing”http://www4.ncsu.edu/~hp/Kaiqi10.pdf.
[18] Daniel A. Menasce, Paul Ngo, “Understanding Cloud Computing: Experimentation and Capacity
Planning”, Proc. 2009 Computer Measurement Group Conf, Dec.7-11, 2009.
[19] Novák, V., I. Perfilieva, and J. Močkoř, Mathematical Principles of Fuzzy Logic, Kluwer Academic,
Dodrecht, 1999.
[20] Pedrycz, W., Fuzzy Control and Fuzzy Systems, John Wiley & Sons, 1993.
[21] Peter, B., N. Stephan, and W. Roman, A Brief Course in Fuzzy Logic and Fuzzy Control, Department
of Knowledge-based Mathematical Systems, 1996 available at
http://www.esru.strath.ac.uk/Reference/concepts/fuzzy/fuzzy.htm.
[22] Rajashekaran, S., and G.A. Vijayalksmi, Neural Network, Fuzzy Logic and Genetic Algorithms,
Prentice Hall, 2003.
[23]Srivastava, P., S. Saggar, A.P. Singh, and G. Raghurama, Optimization of software testing effort using
fuzzy logic, International Journal of Computer Sciences and Engineering Systems, vol.3, no.3,
pp.179–184, 2009.
[24] Zadeh, L.A., Fuzzy sets, Information and Control, vol.8, pp.338–353, 1965.
[25] http://cloud.libero.it/it/wp-content/uploads/2013/05/Joyent-Performance-and-Scale-in-Cloud-
Computing-White-Paper.pdf
[26] https://dspace.ist.utl.pt/bitstream/2295/198492/1/CDI_PL_Fuzzy_Toolbox.pdf

More Related Content

What's hot

Overlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofOverlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofIAEME Publication
 
RSDC (Reliable Scheduling Distributed in Cloud Computing)
RSDC (Reliable Scheduling Distributed in Cloud Computing)RSDC (Reliable Scheduling Distributed in Cloud Computing)
RSDC (Reliable Scheduling Distributed in Cloud Computing)IJCSEA Journal
 
Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmeSAT Journals
 
A GUI-driven prototype for synthesizing self-adaptation decision
A GUI-driven prototype for synthesizing self-adaptation decisionA GUI-driven prototype for synthesizing self-adaptation decision
A GUI-driven prototype for synthesizing self-adaptation decisionjournalBEEI
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...Mina Khidhir
 
Maintenance of Network Connectivity Across Process Migration
Maintenance of Network Connectivity Across Process MigrationMaintenance of Network Connectivity Across Process Migration
Maintenance of Network Connectivity Across Process MigrationCSCJournals
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveywww.pixelsolutionbd.com
 
Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Differentiating Algorithms of Cloud Task Scheduling Based on various ParametersDifferentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Differentiating Algorithms of Cloud Task Scheduling Based on various Parametersiosrjce
 
Bounded ant colony algorithm for task Allocation on a network of homogeneous ...
Bounded ant colony algorithm for task Allocation on a network of homogeneous ...Bounded ant colony algorithm for task Allocation on a network of homogeneous ...
Bounded ant colony algorithm for task Allocation on a network of homogeneous ...ijcsit
 
Error performance of jpeg and watermark
Error performance of jpeg and watermarkError performance of jpeg and watermark
Error performance of jpeg and watermarkijsptm
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
A comparative analysis of minimum process coordinated checkpointing algorithm...
A comparative analysis of minimum process coordinated checkpointing algorithm...A comparative analysis of minimum process coordinated checkpointing algorithm...
A comparative analysis of minimum process coordinated checkpointing algorithm...IAEME Publication
 

What's hot (17)

Overlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability ofOverlapped clustering approach for maximizing the service reliability of
Overlapped clustering approach for maximizing the service reliability of
 
RSDC (Reliable Scheduling Distributed in Cloud Computing)
RSDC (Reliable Scheduling Distributed in Cloud Computing)RSDC (Reliable Scheduling Distributed in Cloud Computing)
RSDC (Reliable Scheduling Distributed in Cloud Computing)
 
Load balancing
Load balancingLoad balancing
Load balancing
 
Test case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithmTest case optimization in configuration testing using ripper algorithm
Test case optimization in configuration testing using ripper algorithm
 
A GUI-driven prototype for synthesizing self-adaptation decision
A GUI-driven prototype for synthesizing self-adaptation decisionA GUI-driven prototype for synthesizing self-adaptation decision
A GUI-driven prototype for synthesizing self-adaptation decision
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
 
DTAP
DTAPDTAP
DTAP
 
Maintenance of Network Connectivity Across Process Migration
Maintenance of Network Connectivity Across Process MigrationMaintenance of Network Connectivity Across Process Migration
Maintenance of Network Connectivity Across Process Migration
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud survey
 
035
035035
035
 
Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Differentiating Algorithms of Cloud Task Scheduling Based on various ParametersDifferentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
 
Bounded ant colony algorithm for task Allocation on a network of homogeneous ...
Bounded ant colony algorithm for task Allocation on a network of homogeneous ...Bounded ant colony algorithm for task Allocation on a network of homogeneous ...
Bounded ant colony algorithm for task Allocation on a network of homogeneous ...
 
Ie3514301434
Ie3514301434Ie3514301434
Ie3514301434
 
Error performance of jpeg and watermark
Error performance of jpeg and watermarkError performance of jpeg and watermark
Error performance of jpeg and watermark
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
A comparative analysis of minimum process coordinated checkpointing algorithm...
A comparative analysis of minimum process coordinated checkpointing algorithm...A comparative analysis of minimum process coordinated checkpointing algorithm...
A comparative analysis of minimum process coordinated checkpointing algorithm...
 

Viewers also liked

E government maturity models a comparative study
E government maturity models a comparative studyE government maturity models a comparative study
E government maturity models a comparative studyijseajournal
 
EA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONS
EA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONSEA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONS
EA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONSijseajournal
 
Some practical considerations and a
Some practical considerations and aSome practical considerations and a
Some practical considerations and aijseajournal
 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationijseajournal
 
STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILIT...
STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILIT...STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILIT...
STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILIT...ijseajournal
 
Design and develop of en e learning content based on multimedia game
Design and develop of en e learning content based on multimedia gameDesign and develop of en e learning content based on multimedia game
Design and develop of en e learning content based on multimedia gameijseajournal
 

Viewers also liked (9)

4213ijsea07
4213ijsea074213ijsea07
4213ijsea07
 
E government maturity models a comparative study
E government maturity models a comparative studyE government maturity models a comparative study
E government maturity models a comparative study
 
4213ijsea05
4213ijsea054213ijsea05
4213ijsea05
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
 
EA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONS
EA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONSEA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONS
EA-MDA MODEL TO RESOLVE IS CHARACTERISTIC PROBLEMS IN EDUCATIONAL INSTITUTIONS
 
Some practical considerations and a
Some practical considerations and aSome practical considerations and a
Some practical considerations and a
 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritization
 
STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILIT...
STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILIT...STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILIT...
STABLENESSMEASUREMENTMODEL: A MATHEMATICAL APPROACH FORMEASURING THE STABILIT...
 
Design and develop of en e learning content based on multimedia game
Design and develop of en e learning content based on multimedia gameDesign and develop of en e learning content based on multimedia game
Design and develop of en e learning content based on multimedia game
 

Similar to A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS

A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
Intrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTEIntrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTEIRJET Journal
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmIRJET Journal
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTpharmaindexing
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
A survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmentA survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmenteSAT Journals
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingIRJET Journal
 
An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computingijtsrd
 
Cost Optimization in Multi Cloud Platforms using Priority Assignment
Cost Optimization in Multi Cloud Platforms using Priority AssignmentCost Optimization in Multi Cloud Platforms using Priority Assignment
Cost Optimization in Multi Cloud Platforms using Priority Assignmentijceronline
 
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...IRJET Journal
 
Final Year Project Report Example
Final Year Project Report ExampleFinal Year Project Report Example
Final Year Project Report ExampleMuhd Mu'izuddin
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...ijdpsjournal
 

Similar to A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS (20)

A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
Intrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTEIntrusion Detection System using K-Means Clustering and SMOTE
Intrusion Detection System using K-Means Clustering and SMOTE
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENTA STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
A STUDY ON JOB SCHEDULING IN CLOUD ENVIRONMENT
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
B1802030511
B1802030511B1802030511
B1802030511
 
A survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environmentA survey of various scheduling algorithm in cloud computing environment
A survey of various scheduling algorithm in cloud computing environment
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
 
An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computing
 
Cost Optimization in Multi Cloud Platforms using Priority Assignment
Cost Optimization in Multi Cloud Platforms using Priority AssignmentCost Optimization in Multi Cloud Platforms using Priority Assignment
Cost Optimization in Multi Cloud Platforms using Priority Assignment
 
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
IRJET- Enhance Dynamic Heterogeneous Shortest Job first (DHSJF): A Task Schedu...
 
Fe24972976
Fe24972976Fe24972976
Fe24972976
 
Final Year Project Report Example
Final Year Project Report ExampleFinal Year Project Report Example
Final Year Project Report Example
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 

A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS

  • 1. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 DOI : 10.5121/ijsea.2013.4403 27 A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING USER DEFINED PARAMETERS A.Vanitha Katherine(1) and K.Alagarsamy(2) 1 Department of Master of Computer Applications, PSNA College of Engineering and Technology, Dindigul. Email: avanitha@yahoo.com 2 Computer Centre, Madurai Kamaraj University, Madurai. Email: alagarsamymku@gmail.com ABSTRACT Software product development life cycle has software testing as an integral part. Conventional testing requires dedicated infrastructure and resources that are expensive and only used sporadically. In the growing complexity of business applications it is harder to build in-house testing facilities and also to maintain that mimic real-time environments. By nature, cloud computing provides resources which are unlimited in nature along with flexibility, scalability and availability of distributed testing environment, thus it has opened up new opportunities for software testing. It leads to cost-effective solutions by reducing the execution time of large application testing. As a part of infrastructure resource, cloud testing can attain its efficiency by taking care of the parameters like network traffic, Disk Storage and RAM speed. In this paper we propose a new fuzzy mathematical model to attain better scope for the above parameters. KEYWORDS: Cloud, disk storage, Fuzzy, Network Traffic, RAM. 1. INTRODUCTION In Software product development software testing has become an integral part. To improve performance, consistency and other important factors testing is important in life cycle of software development. Software bugs could be dangerous and expensive, thus testing is important. Resources and dedicated infrastructure is expensive in testing thus scrutinizing the application’s speed, reliability, performance, functionality and security[1] were used sporadically. Testing opportunity’s new vistas is opened by cloud computing. A combination of pay peruse, lower cost and upfront capital expenditure elimination[2] is offered by cloud testing than that of conventional test environment. At the same time, new set of challenges are introduced by cloud testing especially in public cloud which includes lack of standards and data security [8]. A traditional test environment restricts Time-to-market[3] since it can be delay prone and time consuming. Single application can take weeks or months which leads to delay release. Forward thinking companies due to on-demand provisioning starts the process[18], since cloud can provide instantaneously time-to-market demands. The test environment is scaled up in minutes so that the testers utilize the virtualized infrastructure to run existing applications and virtual machines with no or minimal rewriting. The performance of testing in cloud [10] depends on the efficiency of computing in the cloud which includes factors like network traffic, Disk storage and RAM. When the network traffic is low the performance of testing is high, similarly when the disk
  • 2. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 28 storage and RAM is high the performance increases [11]. Thus the goal is to use a mathematical fuzzy model to increase the performance of testing in cloud by handling the user defined parameters network traffic, disk storage and RAM in the cloud server. Rest of the paper is organized as follows Section 2 presents an algorithm in fuzzy model. Section 3 depicts the application of the model and Section 4 provides a structural view of the results generated. The major contribution of this paper is to produce a fuzzy mathematical model for improving performance of cloud testing. 2. FUZZY MATHEMATICAL MODEL Fuzzy logic depends upon the context that cannot be defined precisely and is a form of knowledge representation suitable for notions. It is a Problem-solving control system methodology. We move to fuzzy due to the following reasons. Conceptually fuzzy logic is easy to understand[22], Fuzzy reasoning mathematical concepts are simple. Fuzzy logic does not need any far-reaching approach, it in an intuitive approach. It need not start any thing from scratch and flexible with any system and easily layer on more functionality. Even on careful inspection most things are imprecise when looked closely but fuzzy logic tolerates on imprecise data[23]. Rather than tacking it onto the end fuzzy reasoning builds this understanding into the process. Fuzzy system can be created to match any set of input-output data, nonlinear functions of arbitrary complexity can be modeled in fuzzy logic. Fuzzy logic toolbox software[24] has a technique like Adaptive Neuro-Fuzzy Inference Systems(ANFIS), which is an adaptive technique which ease the above process. Neural networks is in direct contrast with fuzzy logic which generates opaque data taking training data as input with impenetrable models, fuzzy logic rely on the experience of people who already understand the system thus built on top of the experienced experts. A fuzzy system does not replace conventional control methods in turn blend with the conventional control techniques. It simplifies their implementation and augments them in many cases. Fuzzy logic is the basis for human communication thus based on natural language[23]. Many other statements about fuzzy logic are underpinned by this observation, because it is easy to use and built on the structures of qualitative description used in everyday language. A fuzzy logic system (FLS) is defined as the nonlinear mapping of an input data set to a scalar output data[4]. A FLS as in figure 2.1 consists of four main parts: fuzzifer, rules, inference engine, and defuzzfier. Figure 2.1 - A Fuzzy Logic System To capture expert knowledge mamdani fuzzy additive rule model is used. It allows us to describe the expertise in more human-like and intuitive manner. However, Mamdani-type fuzzy inference entails a substantial computational burden[5]. Figure 2.2 is a model pattern for mamdani.
  • 3. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 29 Figure 2.2 – Mamdani pattern Fuzzy logic algorithm 1. Define the linguistic variables and terms (initialization) 2. Construct the membership functions (initialization) 3. Construct the rule base (initialization) 4. Using the membership functions convert crisp input data to fuzzy values.(fuzzification) 5. Using rule base evaluate the rules.(inference) 6. Combine the results of each rule (inference) 7. The output data should be converted to non-fuzzy values (defuzzification) 3. FUZZY MODEL FOR CLOUD TESTING One of the major advantages of cloud testing towards conventional testing is that the performance can be improved due to the availability of resources in the cloud. Performance in cloud can be improved by taking care of parameters network traffic, disk storage [9] and RAM. The above is taken as data for fuzzy model, When network traffic is low then the performance of the system will be high[12], when the disk storage and RAM is also high the performance will be improve. 3.1 – PERFORMANCE BASED ON NETWORK TRAFFIC Performance issues in cloud computing mainly depends on the overall traffic patterns and peaks in the system[25]. Network traffic plays major role in performance of cloud computing. When network traffic in high the performance is low and when the network traffic is low the performance is high. Table 3.1 show the performance range of network traffic. Table 3.1 Performance Range of Network traffic Performance Network Traffic High <200MB Average 200MB Low >200MB Linguistic Variables
  • 4. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 30 A set of linguistic terms that are decomposed are called linguistic variables. They are the input or output variables of the system whose values are not numerical values but words or sentences from a natural language [6]. INPUT : Network Traffic NT, range[0-100] MB OUTPUT: Performance P, range [0-1] Membership Functions A membership function is used to quantify a linguistic term[24], which are used in the fuzzification and defuzzification steps of a FLS, to map the non-fuzzy input values to fuzzy linguistic terms and vice versa. With a condition and a conclusion a fuzzy rule is a simple IF- THEN rule. Figure 3.1 shows that if the When network traffic in high the performance is low and when the network traffic is low the performance is high. Membership function is constructed to control the output variable based on rule. Network Traffic NT: Low, Average, High Performance : Low, Average, High Figure 3.1 Membership function editor for network traffic Fuzzy Set Operations Fuzzy set operations perform evaluation of the fuzzy rules and combine the results of the individual rules. The non-fuzzy sets and fuzzy set operations are different. The final result is obtained by combining the result of each rule after evaluation. This process is called inference. The results are combined in different ways for individual rules. Table 3.2 shows the fuzzy rules for network traffic and figure 3.2 shows the corresponding fuzzy rule editor. Table 3.2 – Fuzzy rules for network traffic 1. IF (Network traffic is LOW) then (performance is HIGH) 2. IF (Network traffic is AVERAGE) then (performance is AVERAGE) 3. IF (Network traffic is HIGH) then (performance is LOW)
  • 5. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 31 Figure 3.2 – Fuzzy Rule Editor Here the results are ranged between [0-1] as shown in table 3.3 Table 3.3 Result Ranges Result Ranges Low 0.0 - 0.5 Average 0.5 High 0.5 – 1.0 Based on the fuzzy rules in table 3.2 combined with the table 3.3 the final result surface viewer figure 3.3 is got which depicts that when network traffic(x-axis) is low (i.e) 0 the performance(y- axis) is high (i.e) between 8 and 9. Figure 3.3 – Surface viewer of the results
  • 6. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 32 Defuzzification Overall result is a fuzzy value which is got after inference step. Final crisp output is got after the defuzzification of the result. This is the purpose of defuzzier component of a FLS. According to the membership function of the output variable defuzzification is performed. Figure 3.4 shows the rule viewer of the results obtained for three rules as in table 3.2. Here the left most triangles show low value, middle triangle for average value and right most triangles for high value. The yellow part is the input; network traffic which ranges from 0 to 200 and blue is for output, the performance ranges from 0 to 1. The red line shows the final result. Figure 3.4 – Rule viewer for network traffic 3.2 PERFORMANCE BASED ON NETWORK TRAFFIC AND DISK STORAGE New rule with two inputs as in figure 3.5 can be framed to improve the performance. Along with network traffic, disk storage is also considered. When disk storage space is high then performance of system is also high. Combining this with network traffic based on AND rule new rules can be framed. Though we might frame nine rules we can consider a few for result satisfactory[26]. Table 3.4 show the performance range of disk storage. Figure 3.5 Pattern with two inputs network traffic and disk storage.
  • 7. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 33 Table 3.4 Performance Range of Disk storage in cloud Performance Disk storage Low <1TB Average 10TB High >10TB The input and output variable of the system now are INPUT : Network Traffic NT, range[0-200]MB AND Disk storage, range[0-10]TB OUTPUT: Performance P, range [0-1] The fuzzy rules with AND logic are shown in table 3.5 Table 3.5 Fuzzy rules for AND logic for two inputs 1. IF (Network traffic is LOW) AND (Disk Storage is HIGH) then (performance is HIGH) 2. IF (Network traffic is AVERAGE) AND (Disk Storage is AVERAGE) then (performance is AVERAGE) 3. IF (Network traffic is HIGH) AND (Disk Storage is LOW) then (performance is LOW) The membership function, rule viewer and surface viewer for these two inputs are shown in figure 3.6, 3.7 and 3.8 respectively. Figure 3.6 – Membership function editor for disk storage
  • 8. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 34 Figure 3.7 – AND logic Rule viewer for network traffic and disk storage Figure 3.8 – AND logic Surface viewer for network traffic and disk storage 3.2 Performance Based On Network Traffic,Disk Storage And Ram To look into a better performance one more input RAM is considered along with network traffic and disk storage. Figure 3.9 depicts the pattern. When RAM speed is high then performance of system is also high. Combining this with network traffic, disk storage based on AND rule new rules can be framed. Table 3.6 show the performance range of disk storage.
  • 9. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 35 Figure 3.9 – Pattern with three inputs network traffic, disk storage and RAM Table 3.6 Performance Range of RAM speed in cloud Performance RAM speed Low <400GB Average 400GB High >400GB The input and output variable of the system now are INPUT : Network Traffic NT, range[0-200]MB AND Disk storage, range[0-10]TB AND RAM speed, range[0-40]GB OUTPUT: Performance P, range [0-1] The fuzzy rules with AND logic are shown in table 3.7 Table 3.5 Fuzzy rules for AND logic for two inputs 1. IF (Network traffic is LOW) AND (Disk Storage is HIGH) AND (RAM is HIGH) then (performance is HIGH) 2. IF (Network traffic is AVERAGE) AND (Disk Storage is AVERAGE) AND (RAM is AVERAGE)then (performance is AVERAGE) 3. IF (Network traffic is HIGH) AND (Disk Storage is LOW) AND (RAM is LOW) then (performance is LOW) The rule viewer and surface viewer for these three inputs are shown in figure 3.10 and 3.11 respectively.
  • 10. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 36 Figure 3.10 – AND logic Rule Viewer for network traffic, disk storage and RAM Figure 3.11 – AND logic Surface Viewer for network traffic, disk storage and RAM 4. RESULTS AND DISCUSSION Thus from the previous session we conclude that though the disk storage and RAM plays an important role in the increase of performance, network traffic contributes more in that. Even though the disk storage and RAM are more since network traffic is high the overall performance is only average (0.5) by figure 3.10. In addition to AND logic OR logic is also used to test the performance. By surface rule viewer figure 4.1 and surface viewer 4.2 it is proved that the performance is low (0.3) in OR rules than that of and RULES.
  • 11. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 37 Figure 4.1 – Rule viewer for OR rule Figure 4.2 – Surface viewer for OR rule Table 4.1 shows that when the network traffic is high even when disk storage and RAM are high/medium the final performance is low/medium. When the network traffic is low in spite of disk storage and RAM low/medium the performance is high/medium. Thus network traffic plays major role in the performance of cloud testing. Figure 4.3 depicts the rule viewer of in which performance is high (0.868) when network traffic ,disk storage and RAM are high. Table 4.1 – Performance based on all rules Network Traffic Disk Storage RAM Performance of cloud Low High High high(0.868) Low Low Low Medium(0.504) Low Low High Medium(0.541) Low High Low Medium(0.519) Low Medium High Medium(0.612) Low Medium Medium Medium(0.612) high High Low Medium(0.5) high Medium Low Low(0.391) high Low Low Low(0.134) high Medium Medium Low(0.393)
  • 12. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 38 Figure 4.3 – Rule viewer 5. CONCLUSION New fuzzy mathematical model which provides unlimited resources with scalability[13], flexibility and availability of distributed testing environment is created for cloud computing which opens new opportunities for software testing. Software testing performance can be increased in cloud by increasing the working of cloud parameters namely network traffic, disk storage and RAM. New fuzzy mathematical model is created using these parameters. The model is analysed using AND logic fuzzy rules and OR logic logic fuzzy rules. Mamdani fuzzy additive rule model is used for the same. We found by results and discussion that AND logic rules provide better than that of OR logic rules. Thus inspite of challenges faced in cloud for software testing the performance can be increased by improving the performance of the parameters network traffic, disk storage and RAM in cloud[14]. As a future work XOR logic can analysed.. REFERENCES [1] A Vanitha Katherine, K Alagarsamy,”Software Testing in Cloud Platform: A Survey”, IJCA, Volume 46– No.6, May 2012 [2] http://www.cognizant.com/insights/perspectives /taking- testing-to-the-cloud [3] Mrs.A.Vanitha Katherine, Dr. K. Alagarsamy, “Conventional software testing Vs cloud testing”, International Journal Of Scientific & Engineering Research, Volume 3, Issue 3, March-2012 1 ISSN 2229-5518 [4] J. Mendel. Fuzzy logic systems for engineering: a tutorial. Proceedings of the IEEE, 83(3):345{377, Mar 1995. [5] Aleksandar Rakić, Introduction 3 Fuzzy Inference [6] Fuzzy control programming. Technical report, International ElectrotechnicalCommision, 1997. [7] J. Mendel. Fuzzy logic systems for engineering: a tutorial. Proceedings of the IEEE, 83(3):345{377, Mar 1995. [8] Jerry Gao, Xiaoying Bai, and Wei-Tek Tsai, ―Cloud Testing- Issues, Challenges, Needs and Practice‖, SEIJ, Vol. 1, No. 1, Sept 2011. [9] www.clouddrive.com.au-InstallationManual.pdf [10] Vinod Venkataraman, Ankit Shah, Yin Zhang, “Network-based Measurements on Cloud Computing Services”,http://www.cs.utexas.edu/~vinodv/files/cc-measure.pdf. [11] Zach Hill, Marty Humphrey, “A Quantitative Analysis of High Performance Computing with Amazon’s EC2 Infrastructure: The Death of the Local Cluster?”, the 10th IEEE/ ACM International Conference on Grid Computing (Grid 2009). Oct 13-15 2009.
  • 13. International Journal of Software Engineering & Applications (IJSEA), Vol.4, No.4, July 2013 39 [12] Dominique A. Heger, “A Performance Centric Introduction to Cloud Computing”,http://www.dhtusa.com/media/CldPerf.pdf. [13] Raj Jain, “The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling”, Wiley, 1991,pp 203-220,pp 381-389. [14] “Cloud computing – Wikipedia, the free encyclopedia”,http://en.wikipedia.or 5. g/wiki/Cloud_computing. [15] “httperf – Wikipedia, the free encyclopedia”,http://en.wikipedia.org/wiki/Httperf. [16] “Planetlab testbed”,http://www.planet-lab.org. [17] Kaiqi Xiong, Harry Perro, “Service Performance and Analysis in Cloud Computing”http://www4.ncsu.edu/~hp/Kaiqi10.pdf. [18] Daniel A. Menasce, Paul Ngo, “Understanding Cloud Computing: Experimentation and Capacity Planning”, Proc. 2009 Computer Measurement Group Conf, Dec.7-11, 2009. [19] Novák, V., I. Perfilieva, and J. Močkoř, Mathematical Principles of Fuzzy Logic, Kluwer Academic, Dodrecht, 1999. [20] Pedrycz, W., Fuzzy Control and Fuzzy Systems, John Wiley & Sons, 1993. [21] Peter, B., N. Stephan, and W. Roman, A Brief Course in Fuzzy Logic and Fuzzy Control, Department of Knowledge-based Mathematical Systems, 1996 available at http://www.esru.strath.ac.uk/Reference/concepts/fuzzy/fuzzy.htm. [22] Rajashekaran, S., and G.A. Vijayalksmi, Neural Network, Fuzzy Logic and Genetic Algorithms, Prentice Hall, 2003. [23]Srivastava, P., S. Saggar, A.P. Singh, and G. Raghurama, Optimization of software testing effort using fuzzy logic, International Journal of Computer Sciences and Engineering Systems, vol.3, no.3, pp.179–184, 2009. [24] Zadeh, L.A., Fuzzy sets, Information and Control, vol.8, pp.338–353, 1965. [25] http://cloud.libero.it/it/wp-content/uploads/2013/05/Joyent-Performance-and-Scale-in-Cloud- Computing-White-Paper.pdf [26] https://dspace.ist.utl.pt/bitstream/2295/198492/1/CDI_PL_Fuzzy_Toolbox.pdf