Performance Analysis of FIFO and Round Robin Scheduling Process Algorithm in IoT Operating System for Collecting Landslide Data

Author(s):  
Hayatunnufus ◽  
Mardhani Riasetiawan ◽  
Ahmad Ashari
Author(s):  
Sonia Zouaoui ◽  
Lotfi Boussaid ◽  
Abdellatif Mtibaa

<p>This paper introduce a new approach for scheduling algorithms which aim to improve real time operating system CPU performance. This new approach of CPU Scheduling algorithm is based on the combination of round-robin (RR) and Priority based (PB) scheduling algorithms. This solution maintains the advantage of simple round robin scheduling algorithm, which is reducing starvation and integrates the advantage of priority scheduling. The proposed algorithm implements the concept of time quantum and assigning as well priority index to the processes. Existing round robin CPU scheduling algorithm cannot be dedicated to real time operating system due to their large waiting time, large response time, large turnaround time and less throughput. This new algorithm improves all the drawbacks of round robin CPU scheduling algorithm. In addition, this paper presents analysis comparing proposed algorithm with existing round robin scheduling algorithm focusing on average waiting time and average turnaround time.</p>


2018 ◽  
Vol 2 (5) ◽  
pp. 295
Author(s):  
Hamid Reza Ganji ◽  
Kiarash Aghakhani

The security of the configuration of files in the Linux operating system depends on many factors that can be referenced to the system level and the applicable level. The most important thing about the security of Linux operating systems is its dynamism, for example, when you secure your Linux system, it will not stay safe forever, because applications and cyber criminals through new threats and/or new exploits that are packaged Systems or applications that cause the operating system to become unsafe, for this reason, we need a secure operating system. The main purpose of this article is to provide a new way to enhance the security of the Linux operating system. For this purpose, how can simple, continuous, and practical Linux environment be secured, solutions are presented, also based on performance analysis of the proposed method and evaluation parameters for existing systems against the proposed system, the superiority of this method is introduced.


Author(s):  
Paweł Dymora ◽  
Mirosław Mazurek ◽  
Tomasz Pilecki

AbstractThe purpose of the study is to analyze the efficiency of communication with the server using the methods of secure remote access, as well as checking and comparing the quality of services provided by the server depending on the method of secure remote connection. The article focuses on VPN technology implemented in the latest Windows Server 2012 R2 operating system.


Sign in / Sign up

Export Citation Format

Share Document