SlideShare a Scribd company logo
1 of 13
Download to read offline
INTERNATIONALComputer EngineeringCOMPUTER(IJCET), ISSN 0976 – &
 International Journal of JOURNAL OF and Technology ENGINEERING
 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME
                              TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 3, Issue 3, October - December (2012), pp. 200-212
                                                                            IJCET
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2012): 3.9580 (Calculated by GISI)                ©IAEME
www.jifactor.com




      GLOBAL SEEK OPTIMIZATION IN REAL-TIME DATABASE
              TRANSACTIONS: A NEW APPROACH
                                    1
                                    SALIM Y. AMDANI
            Assoc. Professor and Head, Dept. of CSE, B. N. C. O. E, Pusad (India)
                                 salimamdani@yahoo.com
                                       2
                                         DR. M. S. ALI
                   Prof. & Principal, P. R. M. C. E. & M, Badnera (India)
                                     softalis@gmail.com
                                 3
                                   ANUPAMA C. GIRAM
                  M.E. Student, Dept. of CSE, B. N. C. O. E, Pusad (India)
                                  anu26giram@gmail.com

 ABSTRACT

         Real time database transactions must satisfy database consistency as well as timing
 constraints. Timing constraints are defined in terms of deadline. Numbers of algorithms are
 proposed to schedule real time database transactions in order to increase the overall
 performance of the disk. In this paper, we have proposed a new approach based on Two-way
 scan algorithm which gives better result than Two-way scan. In our new approach, Shortest
 Seek Time (SST) groups are formed like Two-way scan and then priority is assign to each
 transaction. Transaction having lowest priority value is served first. Consecutive groups are
 served one after the other. Transactions are served only if they are feasible.

 KEYWORDS: EDF, DM-SCAN, Two-way Scan, Deadline, Real-Time, Transactions.

 1.     INTRODUCTION

         Database Management systems have entered the Internet Age. When multiple users
 want to access information, then the system performance is degraded. This may cause delay
 and trouble for particular end user. Accessing information in easy way and within certain
 time constraints, by assessing user’s requirements and then providing them information in
 time limit is important aspect. In real-time database systems, the correctness of database
 transaction depends not only on its consistency constraints and to produce correct results but
 also on the time limit at which a transaction is completed [1].



                                              200
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

        The disk scheduling problem involves reordering the disk requests in the disk queue
so that the disk requests will be serviced with the minimum mechanical motion by employing
seek optimization and latency optimization. In the disk scheduling problem we have to
consider these parameters. Release time the earliest time at which the task can be started.
Deadline the latest time by which the transaction must be completed. Start-time the time at
which the transaction is actually started. Fulfill-time the time at which the transaction is
actually completed [1][2].

        One of the well-known conventional algorithm is SCAN, which scans disk surface
back and forth to retrieve the data under disk head until there are no requests. This algorithm
has been proved as the best algorithm for maximizing disk throughput, but output result may
not meet timing constraint. Secondly, if request arrive to the one end of the disk and just miss
arm scan then it may have to wait for a long time before arm scans back. One of the best-
known algorithms for scheduling real-time transactions, which serves the transaction in the
increasing order of their deadline, is Earliest-Deadline-First (EDF). But EDF results poor
performance under overloaded condition and incurs excessive seek-time costs [3][4].

         Many algorithms were proposed which combines the features of SCAN type of seek-
optimizing algorithms with EDF type of real-time scheduling algorithms. In 1993, Reddy and
Wyllie proposed the SCAN-EDF method that first sorts input transactions by the EDF order
and, then reschedules transactions with the same deadlines by SCAN. This algorithm resolves
only the scan direction for the transactions that have the same deadline. To increase the
probability of employing SCAN to reschedule transactions, locally seek-optimizing scheme;
i.e., transactions can only be rescheduled by SCAN within a local group DM-SCAN
(deadline-modification-SCAN) is proposed to select automatically contiguous transactions
that can be rescheduled by SCAN. But in DM-SCAN, transaction cannot be rescheduled to a
different group once it belongs to a particular group, even though such a rescheduling derives
a better performance [5] [6].

       To resolve the drawback of previous approaches, globally seek-optimizing scheduling
approach: Two-Way Scan was introduced where local groups are merged depending upon
block locations of transactions in consecutive scan groups. We extent Two-Way Scan by
assigning priority value to the transactions depending upon seek time to minimize response
time. Transactions are served only if they are feasible. Experimental results show that our
new approach gives better results than Two-Way Scan algorithm [7].

       To illustrate the performance of EDF, DM-SCAN, Two-Way SCAN and our new
approach SST following tables 1.1 Parameter Calculations and 1.2 Service Table are used.

       Initial disk head location is block 5.




                                                201
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

                     Tid At         Tp Bs Sb Eb AET                             Dl     Tt
                     T0     0       R       2       10       11        3         6     1.2
                     T1     2       W       2       17       18        3         8     1.2
                     T2     1       W       3       12       14       4.5       10     1.8
                     T3     3       R       3       6        8        4.5       12     1.8
                     T4     2       R       4       4        7         6        14     2.4
                     T5     1       W       4       15       18        6        13     2.4
                     T6     6       R       3       13       15       4.5       15     1.8
                     T7   2.5       R       5       11       15       7.5       17.5   3
                     T8     9       W       5       16       20       7.5       24     3
                     T9     4       R       7       9        15       10.5      25     4.2

                                TABLE 1.1 Parameter Calculations


               Cji     T0 T1 T2 T3 T4 T5 T6 T7 T8 T9
               T0      0  3 2.1 3.3 4.5 3.6 2.4 3 4.5 4.8
               T1     3.6       0    3.6 5.4 6.6 3.9 3.3 5.1 3.6 6.9
               T2     2.4 2.1           0       4.2 5.4 2.7 2.1 3.9 3.6 5.7
               T3     1.8 4.5           3       0        3.6 4.5 3.3 3.9 5.4 4.5
               T4     2.1 4.2 3.3 2.1                    0        4.8 3.6 4.2 5.7 4.8
               T5     3.6 1.5 3.6 5.4 6.6                         0        3.3 5.1 3.6 6.9
               T6     2.7 1.8 2.7 4.5 5.7 2.4                               0    3     3.3   6
               T7     2.7 1.8 2.7 4.5 5.7 2.4 2.4                                0     3.3   6
               T8     4.2 2.1 4.2               6        7.2 3.9 3.9 5.7               0     7.5
               T9     2.7 1.8 2.7 4.5 5.7 2.4 2.4 4.2 3.3                                    0

                                        TABLE 1.2 Service Table
2.     RELATED WORK

2.1    EDF

        In 1973 Liu and Layland [3] suggested the most popular real time disk scheduling
algorithm Earliest Deadline First EDF is an analog of FCFS. In EDF transactions are ordered
according to deadline and the request with earliest deadline is serviced first. The EDF
algorithm is good when the system is lightly loaded, but it degenerates as soon as load
increases. Critical task may not get priority over non-critical tasks because the closeness of

                                                          202
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

deadline is only deciding factor. Under heavy loads, a fundamental weakness of the Earliest
Deadline priority policy is that it assigns the highest priority to transactions that are close to
missing their deadlines, thus delaying other transactions that might still be able to meet their
deadlines. Gaining high priority at this late stage may not leave sufficient time for
transactions to complete before their deadlines[7].

2.1.1 Example to illustrate the performance of EDF

EDF arranges the transactions in the increasing order of their deadlines.

Using Table 1.1 EDF schedule for our example is shown below

                    T0 T1 T2 T3 T5 T4 T6 T7 T8 T9

                    6 8 10 12 13 14 15 17.5 24 25 -------> Deadlines

       Using Table 1.2 timing diagram for the above EDF schedule is


                                                                                                                     Deadlines


          6         8          10         12           13         14           15          17.5          24          25

         T0         T1         T2         T3            T5             T4           T6        T7              T8          T9




              2.7        5.7        9.3         13.5         18         24.6        28.2          31.2        34.5        42

                                                                                                                      Fulfill Time


                                      HIT = 3                                                            MISS = 7



                               Figure 2.1 Timing Diagram for EDF Schedule

2.2    DM-SCAN

        In 1998 [5] R. 1.Chang, W K. Shih, and R. C. Chang proposed Deadline-
Modification-SCAN (DM-SCAN) that suggests the use of maximum-scannable-groups
compute the suitable request group for seek-optimizing with guaranteed real-time
requirements for rescheduling. The DM-SCAN identifies and reschedules the maximum-
scanable-group repeatedly. In this algorithm, request deadlines are reduced several times
during the process of rescheduling to preserve EDF schedule.

        To increase the probability of employing the SCAN scheme to reschedule input
transactions, DM-SCAN proposed the concept of maximum-scannable-group (MSG). Given
an EDF schedule, consecutive transactions that can be rescheduled by SCAN without missing
their respective timing constraints can be directly derived by the concept of MSG. Given a set
of real-time disk transactions with EDF-ordered T = T1T2. . .Tn, the MSG Gi starting from Ti
is defined as the sequential transactions Gi = TiTi+1Ti+2. . .Ti+m with each task Tk for k = i

                                                                            203
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

to i + m satisfies fk <= di and rk <= si. However, DM-SCAN requires that the input
transactions must be EDF-ordered. Therefore, they proposed a deadline modification scheme
that transfers a non-EDF schedule into an EDF order by modifying transactions deadlines [4].

        A MSG group is said to be a scanned MSG (S_MSG) if the requests in this group are
seek-optimized. Otherwise, it is called an un-scanned MSG (U_MSG). Notably, only
U_MSG is necessary to be rescheduled by SCAN. Note that these U_MSG groups are not
mutually exclusive in nature. For example, we may have Gi = TiTi+1... TjTj+1...Ti+p and Gj
= TjTj+1...Ti+p...Ti+q. It is easy to show that these two MSG groups are not mutually
exclusive (Gi ∩ Gj = {Tj,Tj+1, ..., Ti+p} ≠ ∅) and cannot be rescheduled at the same time. In
this approach, a procedure based on the first-come-first-serve (FCFS) policy is applied to
select a set of mutually-exclusive U_MSG (MU_MSG, for short) groups for rescheduling
[5][6].

       For DM-SCAN the input schedule should be in EDF order. If the input schedule is not
in EDF order modify the deadlines and make them in EDF order. In our example the
following schedule is not in EDF order.

              T0 T1 T2 T3 T4 T5 T6 T7 T8 T9        EDF Schedule

              6 8 10 12 14 13 15 17.5 24 25         Deadline

   Modify the above schedule in EDF order using DM-SCAN algorithm as follows:




                    Figure 2.2: Deadline Modification of EDF schedule

      As shown in the Figure 2.2 deadline of T4 is 14 and deadline of T3 is 13, using above
method deadline of T4 is modified to 13.

       After modifying the deadlines apply MSG algorithm to form MSG groups. Groups
formed after applying MSG algorithm are:


                                            204
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

          G0 = {T0}
          G1 = {T1}
          G2 = {T3, T2}
          G4 = {T4, T3, T2}
          G5 = {T5, T4, T3, T2}
          G6 = {T6, T5, T4, T3}
          G7 = {T7, T6, T5, T4}
          G8 = {T8, T7, T6, T5}
          G9 = {T9, T8, T7, T6, T5}
After applying MU_MSG algorithm on the above groups the final groups form are:
          G0 = {T0}
          G1 = {T1}
          G4 = {T4, T3, T2}
          G9 = {T9, T8, T7, T6, T5}
          Apply SCAN algorithm on each group as shown in the following Figure 2.3.
                   T4                   T3                           T9      T0        T7       T2            T6                 T5        T8   T1

      1   2   3    4          5         6          7        8        9       10        11         12          13      14         15        16   17   18


                   Current Head Location                                                                 Block Locations

                   Figure 2.3: SCAN Algorithm on MU_MSG Groups

Final schedule for DM-SCAN is: T0 T1 T2 T3 T4 T9 T7 T6 T9 T8

Using Table 1.2 Timing Diagram for DM-SCAN schedule is:

                                                                                                                           Deadlines

              6          8              10         12           13          25           17.5            15          14          24

              T0             T1         T2             T3        T4              T9          T7           T6              T5          T8




                   2.7            5.7        9.3            13.5          17.1        21.9        26.1        28.5        30.9        34.5

                                                                                                                            Fulfill Time


                                             HIT = 4                                                           MISS = 6



                              Figure 2.4: Timing Diagram for DM-SCAN schedule

2.3       Two-Way-Scan

       To resolve the drawback of local groups, globally seek-optimizing scheduling
approach: Two-Way Scan was proposed in 2009 by Myung Sub Lee where local groups are
merged depending upon block location of transactions in consecutive scan groups. Two way
scan composed of three steps [6][7]:


                                                                                 205
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

       1) Insertion technique that can insert inconsecutive requests into proper scan groups
          called as maximum scanable groups(MSG) when deciding scan groups. Here also
          we formed MU-MSGs using MU-MSG algorithm. These MSGs and MU-MSGs
          are formed using same technique as DM-SCAN algorithm.

       2) Scan group merge technique that can merge consecutive scan groups. If block
          location of first transaction in next group is less than block location of last
          transaction in previous group then these two groups are merged to form a new
          group.

       3) Two-way scan technique that can decide the direction of scan in an effective
          way.

2.3.1 Example to illustrate the performance of two-way Scan

          Step I: Insertion Technique
             Schedule of our example is T0 T1 T2 T3 T4 T5 T6 T7 T8 T9

    Apply MSG and MU_MSG algorithms on our example schedule to form MSGs and
MU_MSGs.

       MSG                                         MU_MSG
       G0 = {T0}                                   G0 = {T0}
       G1 = {T1}                                   G1 = {T1}
       G2 = {T3, T2}                               G4 = {T4, T3, T2}
       G4 = {T4, T3, T2}                           G9 = {T9, T8, T7, T6, T5}
       G5 = {T5, T4, T3, T2}
       G6 = {T6, T5, T4, T3}
       G7 = {T7, T6, T5, T4}
       G8 = {T8, T7, T6, T5}
       G9 = {T9, T8, T7, T6, T5}

          Step II: Scan Group Merge Technique

       Consecutive Scan Groups are merged by using the following condition

      Block location of first                   Block location of last
   transaction in next group
                                   <       transaction in previous group

After merging consecutive scan groups final groups formed are:

       G0 = {T0} and Gnew2 = {T1, T4, T3, T2, T9, T8, T7, T6, T5}

          Step III: Two-Way Scan Technique.

        Using Figure 5.11 after applying Two-way Scan technique on G0 and Gnew2 we get
the final schedule as follows:


                                            206
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

                                       T0 T7 T2 T6 T5 T8 T1 T9 T3 T4

       Using Table 1.2 Timing Diagram for Two-way Scan Schedule is:

                                                                                                              Deadlines


                 6         17.5       10         15      14          24               8          25          12          13
                T0         T7         T2          T6          T5          T8              T1          T9           T3         T4




                     2.7        5.7        8.4         10.5        12.9        16.5       18.6        25.5         30      33.6

                                                                                                                  Fulfill Time


                                           HIT = 6                                               MISS = 4



                     Figure 2.5: Timing Diagram for Two-way Scan schedule

3.     PROPOSED APPROACH

       Many approaches were proposed which combines the features of SCAN type of seek-
optimizing algorithms with EDF type of real-time scheduling algorithms like SCAN-EDF
and DM-SCAN. In SCAN-EDF, group is made up of transactions having the same deadline.
Similarly DM-SCAN automatically selects groups of consecutive transactions and these
groups are named as MSGs. However in SCAN-EDF and DM-SCAN once a transaction
belongs to a certain group, it cannot be rescheduled to a different group. This type of
scheduling is called locally seek-optimizing schemes i.e. transactions can be reschedule by
SCAN within a local group.

        To resolve the drawback of previous approaches, globally seek-optimizing scheduling
approach: Two-Way Scan was introduced where local groups are merged depending upon
block locations of transactions in consecutive scan groups.

       In our approach after finding MSG and MU_MSG scan group merge technique is
applied to merge the groups. We then assign priority to each transaction and transaction
having lowest priority value is served first. Consecutive groups are served one after the other.
Transactions are served only if they are feasible.

There are three steps in our approach:

Step I: Insertion technique that can insert inconsecutive requests into proper scan groups
called as maximum scanable groups(MSG) when deciding scan groups. MU-MSGs are
formed using MU-MSG algorithm. These MSGs and MU-MSGs are formed using same
technique as DM-SCAN algorithm.

Step II: Scan group merge technique that can merge consecutive scan groups. Same as
Two-Way Scan approach.

                                                                   207
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

Step III: Shortest Seek Time approach here priorities is assign to each transaction in each
group and serve the transactions according to their priority value. Transactions are served
only if they are feasible.

Following steps are used to assign priorities to the transactions [9]:

       1) Assign weight to each transaction (Ti) using the following equation

               Wi = βi-1                              where β ≥ 1

               We assume β = 2,

       2) Find the distance ‘di’ from current disk location for each transaction in a group
          using the following equation. Here we calculate distance ‘di’ in terms of seek
          time.

           Seek Time = abs(current disk head – start block of Ti) * 0.3

       3) Calculate priority value P.V.

            P.V. = Wi*di

      Now, serve the transactions according to their priority values. The transaction having
minimum priority value will be served first [8].

      If two transactions have same priority value then transactions having less Release
Time will be served first. Transactions are served only if they are feasible.

3.1    Example to illustrate the performance of our new approach (SST)

Step I: Insertion technique

    Apply MSG and MU_MSG algorithms on our example schedule to form MSGs and
MU_MSGs.

       MSG                                         MU_MSG
       G0 = {T0}                                   G0 = {T0}
       G1 = {T1}                                   G1 = {T1}
       G2 = {T3, T2}                               G4 = {T4, T3, T2}
       G4 = {T4, T3, T2}                           G9 = {T9, T8, T7, T6, T5}
       G5 = {T5, T4, T3, T2}
       G6 = {T6, T5, T4, T3}
       G7 = {T7, T6, T5, T4}
       G8 = {T8, T7, T6, T5}
       G9 = {T9, T8, T7, T6, T5}
Step II: Scan Group Merge Technique
       This step is same as Two-Way Scan algorithm. Group forms after merging are:
G0     = {T0}
Gnew2          = {T1, T4, T3, T2, T9, T8, T7, T6, T5}
                                               208
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME


Step III: Shortest Seek Time approach
Assign weight Wi to each transaction (Ti)
       T0     W0 = β0-1 = 2-1 = 0.5
       T1     W1 = β1-1 = 20 = 1
       T2     W2 = β2-1 = 21 = 2
       T3     W3 = β3-1 = 22 = 4
       T4     W4 = β4-1 = 23 = 8
       T5     W5 = β5-1 = 24 = 16
       T6     W6 = β6-1 = 25 = 32
       T7     W7 = β7-1 = 26 = 64
       T8     W8 = β8-1 = 27 = 128
       T9     W9 = β9-1 = 28 = 256



   1) Find the distance ‘di’ from current disk head position for each transaction in a group
      For Group G0       There is only one transaction T0. After servicing T0
      T0     d0 = 1.5
      Current head position = End block of T0 = 11
      For Group Gnew2
      T1     d1 = (11 - 17) * 0.3 = 1.8
      T2     d2 = (11 - 12) * 0.3 = 0.3
      T3     d3 = (11 – 6) * 0.3 = 1.5
      T4     d4 = (11 – 4) * 0.3 = 2.1
      T5     d5 = (11 – 15) * 0.3 = 1.2
      T6     d6 = (11 – 13) * 0.3 = 0.6
      T7     d7 = (11 – 11) * 0.3 = 0
      T8     d8 = (11 – 6) * 0.3 = 1.5
      T9     d9 = (11 – 9) * 0.3 = 0.6


   2) Calculate priority value P.V. for each transactions
             P.V. = Wi*di
      T1     W1*d1 = 1.8
      T2     W2*d2 = 0.6
      T3     W3*d3 = 6.0
      T4     W4*d4 = 16.8
      T5     W5*d5 = 19.2
      T6     W6*d6 = 19.2
      T7     W7*d7 = 0
      T8     W8*d8 = 192
      T9     W9*d9 = 153.6



                                            209
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

      Serve the transactions according to their priority value. The transaction having
minimum priority value will be served first.

        If two transactions have priority values then check their Release Time. The
transaction having less Release Time will be served first. In our example transactions T5 and
T6 are having same priority value but, the release of T5 is 1 and T6 is 6. So the final schedule
will be

                T0 T7 T2 T1 T3 T4 T5 T6 T9 T8

       Now check the feasibility of all the transactions in the schedule using following
procedure.

       Access(n) = Total Transmission Time
       If (current time + Access(n)) ≤ Deadline )
               then Feasible
       else
               Not Feasible
Feasible Transactions are: T0 T7 T2 T5 T6 T9 T8
Not Feasible Transactions are: T1 T3 T4
Using Table 1.2 Timing Diagram for Shortest Seek Time Schedule is:

                                                                                                        Deadlines


           6          17.5       10         8      12              14          13          15          25           24
           T0         T7         T2         T1          T3              T4          T5          T6          T9           T8




                2.7        5.7        8.4        8.4         8.4         8.4        11.1        14.1         20.4        23.7

                                                                                                            Fulfill Time



                                      HIT = 7                                               Not Feasible = 3




                  Figure 2.6: Timing Diagram for Shortest Seek Time schedule

3.2    Performance Graph

       The following performance graph for the above example shows that in our proposed
approach number of hit transactions is more than other approaches.




                                                                        210
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October December (2012), © IAEME
                                                         October-December

        8
        7
        6
        5
                                                                              Hit
        4                                                                     Miss
        3
        2
        1
        0
                  EDF            DM-SCAN           Two-Way SCAN         SST


       Figure 2.7: Performance graph for EDF, DM-SCAN, Two-Way Scan and SST
                 :                            DM           Way

4.     CONCLUSION

       Seek time is the time for the disk are to move the heads to the cylinder containing the
desired sector. Rotational latency is the additional time waiting for the disk to rotate the
desired sector to the disk head. Transmission time is the time the disk page must be made to
spin by the disk head. Lot of research is going on to minimize seek time.

        In this paper, various seek optimizing real time disk scheduling algorithms were
                        arious
investigated and algorithms like Earliest Deadline First (EDF), Deadline-Modification Scan
                                                                  Deadline Modification
(DM-SCAN) and Two-way scan were simulated. A new approach is proposed where after
                        way
merging the groups the priority value is assign depending upon seek time to all the
transactions in each group and transactions are arranged as per priority values in each group.
Transactions are served only if they are feasible. Experimental results after simulation shows
that our new approach performs better than previous approaches under different work load
                                                                    under
conditions.

REFERENCES

[1] Ben Kao and Hector Garcia
                         Garcia-Molina “An Overview of Real-Time Database Systems”, in
                                                            Time
    proceedings of NATO Advanced Study Institute on Real-Time Computing. St. Maarten,
                                                    Real Time
    Netherlands Antilles, Springer-Verlag, 1993.
                          Springer

[2] Saud A. Aldarmi Department of Computer Science The University of York, “Real
                                                                           “Real-Time
    Database Systems: Concepts and Design”, Book chapter, April 1998”.

[3] C. L. Liu and James W. Layland “Scheduling Algorithms for Multiprogramming in
    a Hard-Real-Time Environment” Journal of the Association for Computing Machinery,
                Time
    Vol 20, No. 1, pp. 46-61, 1973.
                          61,

[4] Field Cady, Yi Zhuang, and Mor Harchol Balter, “A Stochastic Analysis of Hard Disk
                                    Harchol-Balter,
    Drives”, Hindawi Publishing Corporation International Journal of Stochastic Analysis
                                                          Journal
    Volume 2011, Article ID 390548, 2011.

                                             211
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

[5] Ray. I. Chang, W K. Shih, and R. C. Chang, "Deadline-modification-scan with
    maximum scannable-groups for multimedia real-time disk scheduling," in Proceedings
    of the 19th IEEE Real-Time Systems Symposium, pp. 40-49, 1998.

[6] H.P. Chang, R.I. Chang, W.K. Shih, and R.C. Chang, "GSR: A global seek-optimizing
    real-time disk-scheduling algorithm," The Journal of Systems and Software, vol. 80, no.
    2, pp. 198-215, 2007

[7] Myung-Sub Lee, Kwang-Jung Kim and Chang-Hyeon Park, “Real Time Disk
    Scheduling Algorithms based on two-way scan Techniques”, Eight International
    Conference on Scalable Computing and Communications, 2009.

[8] Yifeng Zhu “Evaluation of Scheduling Algorithms for Real-Time Disk I/O”, Technical
    Report, May 3, 2002.

[9]     Shenze Chen, John A. Stankovic, James Kurose and Don Towsley “Performance
      Evaluation of Two New Disk Scheduling Algorithms”, The Journal of Real-Time
      Systems, 1990




                                           212

More Related Content

Similar to Global seek optimization in real time database

Comparative Study of Delay Line Based Time to Digital Converter using FPGA
Comparative Study of Delay Line Based Time to Digital Converter using FPGAComparative Study of Delay Line Based Time to Digital Converter using FPGA
Comparative Study of Delay Line Based Time to Digital Converter using FPGAIRJET Journal
 
Hailey_Database_Performance_Made_Easy_through_Graphics.pdf
Hailey_Database_Performance_Made_Easy_through_Graphics.pdfHailey_Database_Performance_Made_Easy_through_Graphics.pdf
Hailey_Database_Performance_Made_Easy_through_Graphics.pdfcookie1969
 
Experimental Analysis and Optimization of Process Parameters in Plasma Arc C...
Experimental Analysis and Optimization of Process Parameters  in Plasma Arc C...Experimental Analysis and Optimization of Process Parameters  in Plasma Arc C...
Experimental Analysis and Optimization of Process Parameters in Plasma Arc C...vivatechijri
 
Priority based round robin (PBRR) CPU scheduling algorithm
Priority based round robin (PBRR) CPU scheduling algorithmPriority based round robin (PBRR) CPU scheduling algorithm
Priority based round robin (PBRR) CPU scheduling algorithmIJECEIAES
 
Airfoil Design and Dynamic Investigations on Turbine
Airfoil Design and Dynamic Investigations on TurbineAirfoil Design and Dynamic Investigations on Turbine
Airfoil Design and Dynamic Investigations on TurbineVijaiKaarthiV2
 
Reliability Prediction using the Fussel Algorithm
Reliability Prediction using the Fussel AlgorithmReliability Prediction using the Fussel Algorithm
Reliability Prediction using the Fussel AlgorithmIRJET Journal
 
Clock driven scheduling
Clock driven schedulingClock driven scheduling
Clock driven schedulingKamal Acharya
 
Time-value curves to provide dynamic QoS for time sensitive file transfer
Time-value curves to provide dynamic QoS for time sensitive file transferTime-value curves to provide dynamic QoS for time sensitive file transfer
Time-value curves to provide dynamic QoS for time sensitive file transferTal Lavian Ph.D.
 
Comparison between training function trainbfg and trainbr in modeling of neur...
Comparison between training function trainbfg and trainbr in modeling of neur...Comparison between training function trainbfg and trainbr in modeling of neur...
Comparison between training function trainbfg and trainbr in modeling of neur...iaemedu
 
Comparison between training function trainbfg and trainbr in modeling of neur...
Comparison between training function trainbfg and trainbr in modeling of neur...Comparison between training function trainbfg and trainbr in modeling of neur...
Comparison between training function trainbfg and trainbr in modeling of neur...iaemedu
 
GROTESQUE - ANS 2012
GROTESQUE - ANS 2012GROTESQUE - ANS 2012
GROTESQUE - ANS 2012jdbess
 
Đề tài: Hoàn thiện công tác đào tạo nguồn nhân lực công ty xi măng, HAY
Đề tài: Hoàn thiện công tác đào tạo nguồn nhân lực công ty xi măng, HAYĐề tài: Hoàn thiện công tác đào tạo nguồn nhân lực công ty xi măng, HAY
Đề tài: Hoàn thiện công tác đào tạo nguồn nhân lực công ty xi măng, HAYViết thuê trọn gói ZALO 0934573149
 
A Comparative Reliability Analysis of Bulldozers arriving at workshop in East...
A Comparative Reliability Analysis of Bulldozers arriving at workshop in East...A Comparative Reliability Analysis of Bulldozers arriving at workshop in East...
A Comparative Reliability Analysis of Bulldozers arriving at workshop in East...IOSR Journals
 
DESIGNING FRAMED STRUCTURE IN ETABS AND STAAD PRO
DESIGNING FRAMED STRUCTURE IN ETABS AND STAAD PRODESIGNING FRAMED STRUCTURE IN ETABS AND STAAD PRO
DESIGNING FRAMED STRUCTURE IN ETABS AND STAAD PROIRJET Journal
 
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET Journal
 
Implementation and evaluation of novel scheduler of UC/OS (RTOS)
Implementation and evaluation of novel scheduler of UC/OS (RTOS)Implementation and evaluation of novel scheduler of UC/OS (RTOS)
Implementation and evaluation of novel scheduler of UC/OS (RTOS)Editor Jacotech
 
Giancarlo_Lombardi-TFAWS2015_DetailedvReduced
Giancarlo_Lombardi-TFAWS2015_DetailedvReducedGiancarlo_Lombardi-TFAWS2015_DetailedvReduced
Giancarlo_Lombardi-TFAWS2015_DetailedvReducedGiancarlo Lombardi
 
Adaptive Laser Cladding System with Variable Spot Sizes
Adaptive Laser Cladding System with Variable Spot SizesAdaptive Laser Cladding System with Variable Spot Sizes
Adaptive Laser Cladding System with Variable Spot SizesJorge Rodríguez Araújo
 
DELAY ERROR WITH META-STABILITY DETECTION AND CORRECTION USING CMOS TRANSMISS...
DELAY ERROR WITH META-STABILITY DETECTION AND CORRECTION USING CMOS TRANSMISS...DELAY ERROR WITH META-STABILITY DETECTION AND CORRECTION USING CMOS TRANSMISS...
DELAY ERROR WITH META-STABILITY DETECTION AND CORRECTION USING CMOS TRANSMISS...VLSICS Design
 

Similar to Global seek optimization in real time database (20)

Comparative Study of Delay Line Based Time to Digital Converter using FPGA
Comparative Study of Delay Line Based Time to Digital Converter using FPGAComparative Study of Delay Line Based Time to Digital Converter using FPGA
Comparative Study of Delay Line Based Time to Digital Converter using FPGA
 
A STUDY ON QUEUING MODEL TO REDUCE THE WAITING TIME IN FUEL STATIONS
A STUDY ON QUEUING MODEL TO REDUCE THE WAITING TIME IN FUEL STATIONS A STUDY ON QUEUING MODEL TO REDUCE THE WAITING TIME IN FUEL STATIONS
A STUDY ON QUEUING MODEL TO REDUCE THE WAITING TIME IN FUEL STATIONS
 
Hailey_Database_Performance_Made_Easy_through_Graphics.pdf
Hailey_Database_Performance_Made_Easy_through_Graphics.pdfHailey_Database_Performance_Made_Easy_through_Graphics.pdf
Hailey_Database_Performance_Made_Easy_through_Graphics.pdf
 
Experimental Analysis and Optimization of Process Parameters in Plasma Arc C...
Experimental Analysis and Optimization of Process Parameters  in Plasma Arc C...Experimental Analysis and Optimization of Process Parameters  in Plasma Arc C...
Experimental Analysis and Optimization of Process Parameters in Plasma Arc C...
 
Priority based round robin (PBRR) CPU scheduling algorithm
Priority based round robin (PBRR) CPU scheduling algorithmPriority based round robin (PBRR) CPU scheduling algorithm
Priority based round robin (PBRR) CPU scheduling algorithm
 
Airfoil Design and Dynamic Investigations on Turbine
Airfoil Design and Dynamic Investigations on TurbineAirfoil Design and Dynamic Investigations on Turbine
Airfoil Design and Dynamic Investigations on Turbine
 
Reliability Prediction using the Fussel Algorithm
Reliability Prediction using the Fussel AlgorithmReliability Prediction using the Fussel Algorithm
Reliability Prediction using the Fussel Algorithm
 
Clock driven scheduling
Clock driven schedulingClock driven scheduling
Clock driven scheduling
 
Time-value curves to provide dynamic QoS for time sensitive file transfer
Time-value curves to provide dynamic QoS for time sensitive file transferTime-value curves to provide dynamic QoS for time sensitive file transfer
Time-value curves to provide dynamic QoS for time sensitive file transfer
 
Comparison between training function trainbfg and trainbr in modeling of neur...
Comparison between training function trainbfg and trainbr in modeling of neur...Comparison between training function trainbfg and trainbr in modeling of neur...
Comparison between training function trainbfg and trainbr in modeling of neur...
 
Comparison between training function trainbfg and trainbr in modeling of neur...
Comparison between training function trainbfg and trainbr in modeling of neur...Comparison between training function trainbfg and trainbr in modeling of neur...
Comparison between training function trainbfg and trainbr in modeling of neur...
 
GROTESQUE - ANS 2012
GROTESQUE - ANS 2012GROTESQUE - ANS 2012
GROTESQUE - ANS 2012
 
Đề tài: Hoàn thiện công tác đào tạo nguồn nhân lực công ty xi măng, HAY
Đề tài: Hoàn thiện công tác đào tạo nguồn nhân lực công ty xi măng, HAYĐề tài: Hoàn thiện công tác đào tạo nguồn nhân lực công ty xi măng, HAY
Đề tài: Hoàn thiện công tác đào tạo nguồn nhân lực công ty xi măng, HAY
 
A Comparative Reliability Analysis of Bulldozers arriving at workshop in East...
A Comparative Reliability Analysis of Bulldozers arriving at workshop in East...A Comparative Reliability Analysis of Bulldozers arriving at workshop in East...
A Comparative Reliability Analysis of Bulldozers arriving at workshop in East...
 
DESIGNING FRAMED STRUCTURE IN ETABS AND STAAD PRO
DESIGNING FRAMED STRUCTURE IN ETABS AND STAAD PRODESIGNING FRAMED STRUCTURE IN ETABS AND STAAD PRO
DESIGNING FRAMED STRUCTURE IN ETABS AND STAAD PRO
 
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
IRJET - Predicting the Maximum Computational Power of Microprocessors using M...
 
Implementation and evaluation of novel scheduler of UC/OS (RTOS)
Implementation and evaluation of novel scheduler of UC/OS (RTOS)Implementation and evaluation of novel scheduler of UC/OS (RTOS)
Implementation and evaluation of novel scheduler of UC/OS (RTOS)
 
Giancarlo_Lombardi-TFAWS2015_DetailedvReduced
Giancarlo_Lombardi-TFAWS2015_DetailedvReducedGiancarlo_Lombardi-TFAWS2015_DetailedvReduced
Giancarlo_Lombardi-TFAWS2015_DetailedvReduced
 
Adaptive Laser Cladding System with Variable Spot Sizes
Adaptive Laser Cladding System with Variable Spot SizesAdaptive Laser Cladding System with Variable Spot Sizes
Adaptive Laser Cladding System with Variable Spot Sizes
 
DELAY ERROR WITH META-STABILITY DETECTION AND CORRECTION USING CMOS TRANSMISS...
DELAY ERROR WITH META-STABILITY DETECTION AND CORRECTION USING CMOS TRANSMISS...DELAY ERROR WITH META-STABILITY DETECTION AND CORRECTION USING CMOS TRANSMISS...
DELAY ERROR WITH META-STABILITY DETECTION AND CORRECTION USING CMOS TRANSMISS...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Global seek optimization in real time database

  • 1. INTERNATIONALComputer EngineeringCOMPUTER(IJCET), ISSN 0976 – & International Journal of JOURNAL OF and Technology ENGINEERING 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 3, Issue 3, October - December (2012), pp. 200-212 IJCET © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2012): 3.9580 (Calculated by GISI) ©IAEME www.jifactor.com GLOBAL SEEK OPTIMIZATION IN REAL-TIME DATABASE TRANSACTIONS: A NEW APPROACH 1 SALIM Y. AMDANI Assoc. Professor and Head, Dept. of CSE, B. N. C. O. E, Pusad (India) salimamdani@yahoo.com 2 DR. M. S. ALI Prof. & Principal, P. R. M. C. E. & M, Badnera (India) softalis@gmail.com 3 ANUPAMA C. GIRAM M.E. Student, Dept. of CSE, B. N. C. O. E, Pusad (India) anu26giram@gmail.com ABSTRACT Real time database transactions must satisfy database consistency as well as timing constraints. Timing constraints are defined in terms of deadline. Numbers of algorithms are proposed to schedule real time database transactions in order to increase the overall performance of the disk. In this paper, we have proposed a new approach based on Two-way scan algorithm which gives better result than Two-way scan. In our new approach, Shortest Seek Time (SST) groups are formed like Two-way scan and then priority is assign to each transaction. Transaction having lowest priority value is served first. Consecutive groups are served one after the other. Transactions are served only if they are feasible. KEYWORDS: EDF, DM-SCAN, Two-way Scan, Deadline, Real-Time, Transactions. 1. INTRODUCTION Database Management systems have entered the Internet Age. When multiple users want to access information, then the system performance is degraded. This may cause delay and trouble for particular end user. Accessing information in easy way and within certain time constraints, by assessing user’s requirements and then providing them information in time limit is important aspect. In real-time database systems, the correctness of database transaction depends not only on its consistency constraints and to produce correct results but also on the time limit at which a transaction is completed [1]. 200
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME The disk scheduling problem involves reordering the disk requests in the disk queue so that the disk requests will be serviced with the minimum mechanical motion by employing seek optimization and latency optimization. In the disk scheduling problem we have to consider these parameters. Release time the earliest time at which the task can be started. Deadline the latest time by which the transaction must be completed. Start-time the time at which the transaction is actually started. Fulfill-time the time at which the transaction is actually completed [1][2]. One of the well-known conventional algorithm is SCAN, which scans disk surface back and forth to retrieve the data under disk head until there are no requests. This algorithm has been proved as the best algorithm for maximizing disk throughput, but output result may not meet timing constraint. Secondly, if request arrive to the one end of the disk and just miss arm scan then it may have to wait for a long time before arm scans back. One of the best- known algorithms for scheduling real-time transactions, which serves the transaction in the increasing order of their deadline, is Earliest-Deadline-First (EDF). But EDF results poor performance under overloaded condition and incurs excessive seek-time costs [3][4]. Many algorithms were proposed which combines the features of SCAN type of seek- optimizing algorithms with EDF type of real-time scheduling algorithms. In 1993, Reddy and Wyllie proposed the SCAN-EDF method that first sorts input transactions by the EDF order and, then reschedules transactions with the same deadlines by SCAN. This algorithm resolves only the scan direction for the transactions that have the same deadline. To increase the probability of employing SCAN to reschedule transactions, locally seek-optimizing scheme; i.e., transactions can only be rescheduled by SCAN within a local group DM-SCAN (deadline-modification-SCAN) is proposed to select automatically contiguous transactions that can be rescheduled by SCAN. But in DM-SCAN, transaction cannot be rescheduled to a different group once it belongs to a particular group, even though such a rescheduling derives a better performance [5] [6]. To resolve the drawback of previous approaches, globally seek-optimizing scheduling approach: Two-Way Scan was introduced where local groups are merged depending upon block locations of transactions in consecutive scan groups. We extent Two-Way Scan by assigning priority value to the transactions depending upon seek time to minimize response time. Transactions are served only if they are feasible. Experimental results show that our new approach gives better results than Two-Way Scan algorithm [7]. To illustrate the performance of EDF, DM-SCAN, Two-Way SCAN and our new approach SST following tables 1.1 Parameter Calculations and 1.2 Service Table are used. Initial disk head location is block 5. 201
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Tid At Tp Bs Sb Eb AET Dl Tt T0 0 R 2 10 11 3 6 1.2 T1 2 W 2 17 18 3 8 1.2 T2 1 W 3 12 14 4.5 10 1.8 T3 3 R 3 6 8 4.5 12 1.8 T4 2 R 4 4 7 6 14 2.4 T5 1 W 4 15 18 6 13 2.4 T6 6 R 3 13 15 4.5 15 1.8 T7 2.5 R 5 11 15 7.5 17.5 3 T8 9 W 5 16 20 7.5 24 3 T9 4 R 7 9 15 10.5 25 4.2 TABLE 1.1 Parameter Calculations Cji T0 T1 T2 T3 T4 T5 T6 T7 T8 T9 T0 0 3 2.1 3.3 4.5 3.6 2.4 3 4.5 4.8 T1 3.6 0 3.6 5.4 6.6 3.9 3.3 5.1 3.6 6.9 T2 2.4 2.1 0 4.2 5.4 2.7 2.1 3.9 3.6 5.7 T3 1.8 4.5 3 0 3.6 4.5 3.3 3.9 5.4 4.5 T4 2.1 4.2 3.3 2.1 0 4.8 3.6 4.2 5.7 4.8 T5 3.6 1.5 3.6 5.4 6.6 0 3.3 5.1 3.6 6.9 T6 2.7 1.8 2.7 4.5 5.7 2.4 0 3 3.3 6 T7 2.7 1.8 2.7 4.5 5.7 2.4 2.4 0 3.3 6 T8 4.2 2.1 4.2 6 7.2 3.9 3.9 5.7 0 7.5 T9 2.7 1.8 2.7 4.5 5.7 2.4 2.4 4.2 3.3 0 TABLE 1.2 Service Table 2. RELATED WORK 2.1 EDF In 1973 Liu and Layland [3] suggested the most popular real time disk scheduling algorithm Earliest Deadline First EDF is an analog of FCFS. In EDF transactions are ordered according to deadline and the request with earliest deadline is serviced first. The EDF algorithm is good when the system is lightly loaded, but it degenerates as soon as load increases. Critical task may not get priority over non-critical tasks because the closeness of 202
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME deadline is only deciding factor. Under heavy loads, a fundamental weakness of the Earliest Deadline priority policy is that it assigns the highest priority to transactions that are close to missing their deadlines, thus delaying other transactions that might still be able to meet their deadlines. Gaining high priority at this late stage may not leave sufficient time for transactions to complete before their deadlines[7]. 2.1.1 Example to illustrate the performance of EDF EDF arranges the transactions in the increasing order of their deadlines. Using Table 1.1 EDF schedule for our example is shown below T0 T1 T2 T3 T5 T4 T6 T7 T8 T9 6 8 10 12 13 14 15 17.5 24 25 -------> Deadlines Using Table 1.2 timing diagram for the above EDF schedule is Deadlines 6 8 10 12 13 14 15 17.5 24 25 T0 T1 T2 T3 T5 T4 T6 T7 T8 T9 2.7 5.7 9.3 13.5 18 24.6 28.2 31.2 34.5 42 Fulfill Time HIT = 3 MISS = 7 Figure 2.1 Timing Diagram for EDF Schedule 2.2 DM-SCAN In 1998 [5] R. 1.Chang, W K. Shih, and R. C. Chang proposed Deadline- Modification-SCAN (DM-SCAN) that suggests the use of maximum-scannable-groups compute the suitable request group for seek-optimizing with guaranteed real-time requirements for rescheduling. The DM-SCAN identifies and reschedules the maximum- scanable-group repeatedly. In this algorithm, request deadlines are reduced several times during the process of rescheduling to preserve EDF schedule. To increase the probability of employing the SCAN scheme to reschedule input transactions, DM-SCAN proposed the concept of maximum-scannable-group (MSG). Given an EDF schedule, consecutive transactions that can be rescheduled by SCAN without missing their respective timing constraints can be directly derived by the concept of MSG. Given a set of real-time disk transactions with EDF-ordered T = T1T2. . .Tn, the MSG Gi starting from Ti is defined as the sequential transactions Gi = TiTi+1Ti+2. . .Ti+m with each task Tk for k = i 203
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME to i + m satisfies fk <= di and rk <= si. However, DM-SCAN requires that the input transactions must be EDF-ordered. Therefore, they proposed a deadline modification scheme that transfers a non-EDF schedule into an EDF order by modifying transactions deadlines [4]. A MSG group is said to be a scanned MSG (S_MSG) if the requests in this group are seek-optimized. Otherwise, it is called an un-scanned MSG (U_MSG). Notably, only U_MSG is necessary to be rescheduled by SCAN. Note that these U_MSG groups are not mutually exclusive in nature. For example, we may have Gi = TiTi+1... TjTj+1...Ti+p and Gj = TjTj+1...Ti+p...Ti+q. It is easy to show that these two MSG groups are not mutually exclusive (Gi ∩ Gj = {Tj,Tj+1, ..., Ti+p} ≠ ∅) and cannot be rescheduled at the same time. In this approach, a procedure based on the first-come-first-serve (FCFS) policy is applied to select a set of mutually-exclusive U_MSG (MU_MSG, for short) groups for rescheduling [5][6]. For DM-SCAN the input schedule should be in EDF order. If the input schedule is not in EDF order modify the deadlines and make them in EDF order. In our example the following schedule is not in EDF order. T0 T1 T2 T3 T4 T5 T6 T7 T8 T9 EDF Schedule 6 8 10 12 14 13 15 17.5 24 25 Deadline Modify the above schedule in EDF order using DM-SCAN algorithm as follows: Figure 2.2: Deadline Modification of EDF schedule As shown in the Figure 2.2 deadline of T4 is 14 and deadline of T3 is 13, using above method deadline of T4 is modified to 13. After modifying the deadlines apply MSG algorithm to form MSG groups. Groups formed after applying MSG algorithm are: 204
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME G0 = {T0} G1 = {T1} G2 = {T3, T2} G4 = {T4, T3, T2} G5 = {T5, T4, T3, T2} G6 = {T6, T5, T4, T3} G7 = {T7, T6, T5, T4} G8 = {T8, T7, T6, T5} G9 = {T9, T8, T7, T6, T5} After applying MU_MSG algorithm on the above groups the final groups form are: G0 = {T0} G1 = {T1} G4 = {T4, T3, T2} G9 = {T9, T8, T7, T6, T5} Apply SCAN algorithm on each group as shown in the following Figure 2.3. T4 T3 T9 T0 T7 T2 T6 T5 T8 T1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Current Head Location Block Locations Figure 2.3: SCAN Algorithm on MU_MSG Groups Final schedule for DM-SCAN is: T0 T1 T2 T3 T4 T9 T7 T6 T9 T8 Using Table 1.2 Timing Diagram for DM-SCAN schedule is: Deadlines 6 8 10 12 13 25 17.5 15 14 24 T0 T1 T2 T3 T4 T9 T7 T6 T5 T8 2.7 5.7 9.3 13.5 17.1 21.9 26.1 28.5 30.9 34.5 Fulfill Time HIT = 4 MISS = 6 Figure 2.4: Timing Diagram for DM-SCAN schedule 2.3 Two-Way-Scan To resolve the drawback of local groups, globally seek-optimizing scheduling approach: Two-Way Scan was proposed in 2009 by Myung Sub Lee where local groups are merged depending upon block location of transactions in consecutive scan groups. Two way scan composed of three steps [6][7]: 205
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME 1) Insertion technique that can insert inconsecutive requests into proper scan groups called as maximum scanable groups(MSG) when deciding scan groups. Here also we formed MU-MSGs using MU-MSG algorithm. These MSGs and MU-MSGs are formed using same technique as DM-SCAN algorithm. 2) Scan group merge technique that can merge consecutive scan groups. If block location of first transaction in next group is less than block location of last transaction in previous group then these two groups are merged to form a new group. 3) Two-way scan technique that can decide the direction of scan in an effective way. 2.3.1 Example to illustrate the performance of two-way Scan Step I: Insertion Technique Schedule of our example is T0 T1 T2 T3 T4 T5 T6 T7 T8 T9 Apply MSG and MU_MSG algorithms on our example schedule to form MSGs and MU_MSGs. MSG MU_MSG G0 = {T0} G0 = {T0} G1 = {T1} G1 = {T1} G2 = {T3, T2} G4 = {T4, T3, T2} G4 = {T4, T3, T2} G9 = {T9, T8, T7, T6, T5} G5 = {T5, T4, T3, T2} G6 = {T6, T5, T4, T3} G7 = {T7, T6, T5, T4} G8 = {T8, T7, T6, T5} G9 = {T9, T8, T7, T6, T5} Step II: Scan Group Merge Technique Consecutive Scan Groups are merged by using the following condition Block location of first Block location of last transaction in next group < transaction in previous group After merging consecutive scan groups final groups formed are: G0 = {T0} and Gnew2 = {T1, T4, T3, T2, T9, T8, T7, T6, T5} Step III: Two-Way Scan Technique. Using Figure 5.11 after applying Two-way Scan technique on G0 and Gnew2 we get the final schedule as follows: 206
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME T0 T7 T2 T6 T5 T8 T1 T9 T3 T4 Using Table 1.2 Timing Diagram for Two-way Scan Schedule is: Deadlines 6 17.5 10 15 14 24 8 25 12 13 T0 T7 T2 T6 T5 T8 T1 T9 T3 T4 2.7 5.7 8.4 10.5 12.9 16.5 18.6 25.5 30 33.6 Fulfill Time HIT = 6 MISS = 4 Figure 2.5: Timing Diagram for Two-way Scan schedule 3. PROPOSED APPROACH Many approaches were proposed which combines the features of SCAN type of seek- optimizing algorithms with EDF type of real-time scheduling algorithms like SCAN-EDF and DM-SCAN. In SCAN-EDF, group is made up of transactions having the same deadline. Similarly DM-SCAN automatically selects groups of consecutive transactions and these groups are named as MSGs. However in SCAN-EDF and DM-SCAN once a transaction belongs to a certain group, it cannot be rescheduled to a different group. This type of scheduling is called locally seek-optimizing schemes i.e. transactions can be reschedule by SCAN within a local group. To resolve the drawback of previous approaches, globally seek-optimizing scheduling approach: Two-Way Scan was introduced where local groups are merged depending upon block locations of transactions in consecutive scan groups. In our approach after finding MSG and MU_MSG scan group merge technique is applied to merge the groups. We then assign priority to each transaction and transaction having lowest priority value is served first. Consecutive groups are served one after the other. Transactions are served only if they are feasible. There are three steps in our approach: Step I: Insertion technique that can insert inconsecutive requests into proper scan groups called as maximum scanable groups(MSG) when deciding scan groups. MU-MSGs are formed using MU-MSG algorithm. These MSGs and MU-MSGs are formed using same technique as DM-SCAN algorithm. Step II: Scan group merge technique that can merge consecutive scan groups. Same as Two-Way Scan approach. 207
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Step III: Shortest Seek Time approach here priorities is assign to each transaction in each group and serve the transactions according to their priority value. Transactions are served only if they are feasible. Following steps are used to assign priorities to the transactions [9]: 1) Assign weight to each transaction (Ti) using the following equation Wi = βi-1 where β ≥ 1 We assume β = 2, 2) Find the distance ‘di’ from current disk location for each transaction in a group using the following equation. Here we calculate distance ‘di’ in terms of seek time. Seek Time = abs(current disk head – start block of Ti) * 0.3 3) Calculate priority value P.V. P.V. = Wi*di Now, serve the transactions according to their priority values. The transaction having minimum priority value will be served first [8]. If two transactions have same priority value then transactions having less Release Time will be served first. Transactions are served only if they are feasible. 3.1 Example to illustrate the performance of our new approach (SST) Step I: Insertion technique Apply MSG and MU_MSG algorithms on our example schedule to form MSGs and MU_MSGs. MSG MU_MSG G0 = {T0} G0 = {T0} G1 = {T1} G1 = {T1} G2 = {T3, T2} G4 = {T4, T3, T2} G4 = {T4, T3, T2} G9 = {T9, T8, T7, T6, T5} G5 = {T5, T4, T3, T2} G6 = {T6, T5, T4, T3} G7 = {T7, T6, T5, T4} G8 = {T8, T7, T6, T5} G9 = {T9, T8, T7, T6, T5} Step II: Scan Group Merge Technique This step is same as Two-Way Scan algorithm. Group forms after merging are: G0 = {T0} Gnew2 = {T1, T4, T3, T2, T9, T8, T7, T6, T5} 208
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Step III: Shortest Seek Time approach Assign weight Wi to each transaction (Ti) T0 W0 = β0-1 = 2-1 = 0.5 T1 W1 = β1-1 = 20 = 1 T2 W2 = β2-1 = 21 = 2 T3 W3 = β3-1 = 22 = 4 T4 W4 = β4-1 = 23 = 8 T5 W5 = β5-1 = 24 = 16 T6 W6 = β6-1 = 25 = 32 T7 W7 = β7-1 = 26 = 64 T8 W8 = β8-1 = 27 = 128 T9 W9 = β9-1 = 28 = 256 1) Find the distance ‘di’ from current disk head position for each transaction in a group For Group G0 There is only one transaction T0. After servicing T0 T0 d0 = 1.5 Current head position = End block of T0 = 11 For Group Gnew2 T1 d1 = (11 - 17) * 0.3 = 1.8 T2 d2 = (11 - 12) * 0.3 = 0.3 T3 d3 = (11 – 6) * 0.3 = 1.5 T4 d4 = (11 – 4) * 0.3 = 2.1 T5 d5 = (11 – 15) * 0.3 = 1.2 T6 d6 = (11 – 13) * 0.3 = 0.6 T7 d7 = (11 – 11) * 0.3 = 0 T8 d8 = (11 – 6) * 0.3 = 1.5 T9 d9 = (11 – 9) * 0.3 = 0.6 2) Calculate priority value P.V. for each transactions P.V. = Wi*di T1 W1*d1 = 1.8 T2 W2*d2 = 0.6 T3 W3*d3 = 6.0 T4 W4*d4 = 16.8 T5 W5*d5 = 19.2 T6 W6*d6 = 19.2 T7 W7*d7 = 0 T8 W8*d8 = 192 T9 W9*d9 = 153.6 209
  • 11. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Serve the transactions according to their priority value. The transaction having minimum priority value will be served first. If two transactions have priority values then check their Release Time. The transaction having less Release Time will be served first. In our example transactions T5 and T6 are having same priority value but, the release of T5 is 1 and T6 is 6. So the final schedule will be T0 T7 T2 T1 T3 T4 T5 T6 T9 T8 Now check the feasibility of all the transactions in the schedule using following procedure. Access(n) = Total Transmission Time If (current time + Access(n)) ≤ Deadline ) then Feasible else Not Feasible Feasible Transactions are: T0 T7 T2 T5 T6 T9 T8 Not Feasible Transactions are: T1 T3 T4 Using Table 1.2 Timing Diagram for Shortest Seek Time Schedule is: Deadlines 6 17.5 10 8 12 14 13 15 25 24 T0 T7 T2 T1 T3 T4 T5 T6 T9 T8 2.7 5.7 8.4 8.4 8.4 8.4 11.1 14.1 20.4 23.7 Fulfill Time HIT = 7 Not Feasible = 3 Figure 2.6: Timing Diagram for Shortest Seek Time schedule 3.2 Performance Graph The following performance graph for the above example shows that in our proposed approach number of hit transactions is more than other approaches. 210
  • 12. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October December (2012), © IAEME October-December 8 7 6 5 Hit 4 Miss 3 2 1 0 EDF DM-SCAN Two-Way SCAN SST Figure 2.7: Performance graph for EDF, DM-SCAN, Two-Way Scan and SST : DM Way 4. CONCLUSION Seek time is the time for the disk are to move the heads to the cylinder containing the desired sector. Rotational latency is the additional time waiting for the disk to rotate the desired sector to the disk head. Transmission time is the time the disk page must be made to spin by the disk head. Lot of research is going on to minimize seek time. In this paper, various seek optimizing real time disk scheduling algorithms were arious investigated and algorithms like Earliest Deadline First (EDF), Deadline-Modification Scan Deadline Modification (DM-SCAN) and Two-way scan were simulated. A new approach is proposed where after way merging the groups the priority value is assign depending upon seek time to all the transactions in each group and transactions are arranged as per priority values in each group. Transactions are served only if they are feasible. Experimental results after simulation shows that our new approach performs better than previous approaches under different work load under conditions. REFERENCES [1] Ben Kao and Hector Garcia Garcia-Molina “An Overview of Real-Time Database Systems”, in Time proceedings of NATO Advanced Study Institute on Real-Time Computing. St. Maarten, Real Time Netherlands Antilles, Springer-Verlag, 1993. Springer [2] Saud A. Aldarmi Department of Computer Science The University of York, “Real “Real-Time Database Systems: Concepts and Design”, Book chapter, April 1998”. [3] C. L. Liu and James W. Layland “Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment” Journal of the Association for Computing Machinery, Time Vol 20, No. 1, pp. 46-61, 1973. 61, [4] Field Cady, Yi Zhuang, and Mor Harchol Balter, “A Stochastic Analysis of Hard Disk Harchol-Balter, Drives”, Hindawi Publishing Corporation International Journal of Stochastic Analysis Journal Volume 2011, Article ID 390548, 2011. 211
  • 13. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME [5] Ray. I. Chang, W K. Shih, and R. C. Chang, "Deadline-modification-scan with maximum scannable-groups for multimedia real-time disk scheduling," in Proceedings of the 19th IEEE Real-Time Systems Symposium, pp. 40-49, 1998. [6] H.P. Chang, R.I. Chang, W.K. Shih, and R.C. Chang, "GSR: A global seek-optimizing real-time disk-scheduling algorithm," The Journal of Systems and Software, vol. 80, no. 2, pp. 198-215, 2007 [7] Myung-Sub Lee, Kwang-Jung Kim and Chang-Hyeon Park, “Real Time Disk Scheduling Algorithms based on two-way scan Techniques”, Eight International Conference on Scalable Computing and Communications, 2009. [8] Yifeng Zhu “Evaluation of Scheduling Algorithms for Real-Time Disk I/O”, Technical Report, May 3, 2002. [9] Shenze Chen, John A. Stankovic, James Kurose and Don Towsley “Performance Evaluation of Two New Disk Scheduling Algorithms”, The Journal of Real-Time Systems, 1990 212