{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:09Z","timestamp":1750220649711,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T00:00:00Z","timestamp":1574467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,23]]},"DOI":"10.1145\/3372422.3372425","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T23:20:13Z","timestamp":1581117613000},"page":"74-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Study on GA-based Scheduling on Cloud Computing"],"prefix":"10.1145","author":[{"given":"Lamisha","family":"Rawshan","sequence":"first","affiliation":[{"name":"Department of Software Engineering, Daffodil International University"}]},{"given":"Tasnim","family":"Rahman","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Daffodil International University"}]},{"given":"Afsana","family":"Begum","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Daffodil International University"}]},{"given":"Syeda Sumbul","family":"Hossain","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Daffodil International University"}]},{"given":"Touhid","family":"Bhuiyan","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Daffodil International University"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"volume-title":"2017 4th International Conference on Advances in Electrical Engineering (ICAEE)(pp. 176--180)","author":"Sadia F.","key":"e_1_3_2_1_1_1","unstructured":"Sadia , F. , Jahan , N. , Rawshan , L. , Jeba , M.T. and Bhuiyan , T ., 2017, September. A priority based dynamic resource mapping algorithm for load balancing in cloud . In 2017 4th International Conference on Advances in Electrical Engineering (ICAEE)(pp. 176--180) . IEEE. Sadia, F., Jahan, N., Rawshan, L., Jeba, M.T. and Bhuiyan, T., 2017, September. A priority based dynamic resource mapping algorithm for load balancing in cloud. In 2017 4th International Conference on Advances in Electrical Engineering (ICAEE)(pp. 176--180). IEEE."},{"volume-title":"Proceedings of the The International Conference on Engineering & MIS 2015 (p. 46)","author":"Rawshan L.","key":"e_1_3_2_1_2_1","unstructured":"Rawshan , L. , Sakib , K. and Imran , A ., 2015, September. Time-Waved Monitoring and Emergent Self Adaption of Software Components in Open Source Cloud . In Proceedings of the The International Conference on Engineering & MIS 2015 (p. 46) . ACM. Rawshan, L., Sakib, K. and Imran, A., 2015, September. Time-Waved Monitoring and Emergent Self Adaption of Software Components in Open Source Cloud. In Proceedings of the The International Conference on Engineering & MIS 2015 (p. 46). ACM."},{"volume-title":"2010 24th IEEE international conference on advanced information networking and applications (pp. 27--33)","author":"Dillon T.","key":"e_1_3_2_1_3_1","unstructured":"Dillon , T. , Wu , C. and Chang , E ., 2010, April. Cloud computing: issues and challenges . In 2010 24th IEEE international conference on advanced information networking and applications (pp. 27--33) . Ieee. Dillon, T., Wu, C. and Chang, E., 2010, April. Cloud computing: issues and challenges. In 2010 24th IEEE international conference on advanced information networking and applications (pp. 27--33). Ieee."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Ramgovind S. Eloff M.M. and Smith E. 2010 August. The management of security in cloud computing. In 2010 Information Security for South Africa (pp. 1--7). IEEE.  Ramgovind S. Eloff M.M. and Smith E. 2010 August. The management of security in cloud computing. In 2010 Information Security for South Africa (pp. 1--7). IEEE.","DOI":"10.1109\/ISSA.2010.5588290"},{"key":"e_1_3_2_1_5_1","first-page":"23","volume-title":"Software: Practice and experience, 41(1)","author":"Calheiros R.N.","year":"2011","unstructured":"Calheiros , R.N. , Ranjan , R. , Beloglazov , A. , De Rose , C.A. and Buyya , R. , 2011 . CloudSim : a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and experience, 41(1) , pp. 23 -- 50 . Calheiros, R.N., Ranjan, R., Beloglazov, A., De Rose, C.A. and Buyya, R., 2011. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software: Practice and experience, 41(1), pp.23--50."},{"issue":"8","key":"e_1_3_2_1_6_1","first-page":"304","article-title":"Effectively and securely using the cloud computing paradigm. NIST","volume":"2","author":"Mell P.","year":"2009","unstructured":"Mell , P. and Grance , T. , 2009 . Effectively and securely using the cloud computing paradigm. NIST , Information Technology Laboratory , 2 ( 8 ), pp. 304 -- 311 . Mell, P. and Grance, T., 2009. Effectively and securely using the cloud computing paradigm. NIST, Information Technology Laboratory, 2(8), pp.304--311.","journal-title":"Information Technology Laboratory"},{"key":"e_1_3_2_1_7_1","unstructured":"Sysmans J. 2006. Software-as-a-service; a comprehensive look at the total cost of ownership of software applications. Retrieved April 3 p.2009.  Sysmans J. 2006. Software-as-a-service; a comprehensive look at the total cost of ownership of software applications. Retrieved April 3 p.2009."},{"volume-title":"Proceedings of the International Conference on Information Systems and Design of Communication (pp. 127--131)","author":"Pinheiro P.","key":"e_1_3_2_1_8_1","unstructured":"Pinheiro , P. , Aparicio , M. and Costa , C ., 2014, May. Adoption of cloud computing systems . In Proceedings of the International Conference on Information Systems and Design of Communication (pp. 127--131) . ACM. Pinheiro, P., Aparicio, M. and Costa, C., 2014, May. Adoption of cloud computing systems. In Proceedings of the International Conference on Information Systems and Design of Communication (pp. 127--131). ACM."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4123"},{"key":"e_1_3_2_1_10_1","volume-title":"Applied Algorithms. Retrieved","author":"Antonina Kolokolova","year":"2019","unstructured":"Antonina Kolokolova .2014 : Applied Algorithms. Retrieved July 15, 2019 from: http:\/\/www.cs.mun.ca\/~kol\/courses\/6901-f14\/lec3.pdf Antonina Kolokolova.2014: Applied Algorithms. Retrieved July 15, 2019from: http:\/\/www.cs.mun.ca\/~kol\/courses\/6901-f14\/lec3.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Laha D. 2008. Heuristics and metaheuristics for solving scheduling problems. In Handbook of Computational Intelligence in Manufacturing and Production Management(pp. 1--18). IGI Global.  Laha D. 2008. Heuristics and metaheuristics for solving scheduling problems. In Handbook of Computational Intelligence in Manufacturing and Production Management(pp. 1--18). IGI Global.","DOI":"10.4018\/978-1-59904-582-5.ch001"},{"key":"e_1_3_2_1_12_1","unstructured":"Z. Caner Taskin.Optimizationvs Heuristics. Retrieved July 15 2019 https:\/\/icrontech.com\/blog_item\/optimization-vs-heuristics-which-is-the-right-approach-for-your-business\/.  Z. Caner Taskin.Optimizationvs Heuristics. Retrieved July 15 2019 https:\/\/icrontech.com\/blog_item\/optimization-vs-heuristics-which-is-the-right-approach-for-your-business\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.1.42-52"},{"issue":"1","key":"e_1_3_2_1_14_1","first-page":"134","article-title":"Job scheduling model for cloud computing based on multi-objective genetic algorithm","volume":"10","author":"Liu J.","year":"2013","unstructured":"Liu , J. , Luo , X.G. , Zhang , X.M. , Zhang , F. and Li , B.N. , 2013 . Job scheduling model for cloud computing based on multi-objective genetic algorithm . International Journal of Computer Science Issues (IJCSI) , 10 ( 1 ), p. 134 . Liu, J., Luo, X.G., Zhang, X.M., Zhang, F. and Li, B.N., 2013. Job scheduling model for cloud computing based on multi-objective genetic algorithm. International Journal of Computer Science Issues (IJCSI), 10(1), p.134.","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers6020015"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Kaur K. Kaur N. and Kaur K. 2018. A novel context and load-aware family genetic algorithm based task scheduling in cloud computing. In Data Engineering and Intelligent Computing (pp. 521--531). Springer Singapore.  Kaur K. Kaur N. and Kaur K. 2018. A novel context and load-aware family genetic algorithm based task scheduling in cloud computing. In Data Engineering and Intelligent Computing (pp. 521--531). Springer Singapore.","DOI":"10.1007\/978-981-10-3223-3_51"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.01.036"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.12.2962-2970"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3942"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-015-1074-0"},{"volume-title":"In2012 IEEE 12th International Conference on Computer and Information Technology 2012 Oct 27 (pp. 177--184)","author":"Chen S","key":"e_1_3_2_1_21_1","unstructured":"Chen S , Wu J , Lu Z. A cloud computing resource scheduling policy based on genetic algorithm with multiple fitness . In2012 IEEE 12th International Conference on Computer and Information Technology 2012 Oct 27 (pp. 177--184) . IEEE. Chen S, Wu J, Lu Z. A cloud computing resource scheduling policy based on genetic algorithm with multiple fitness. In2012 IEEE 12th International Conference on Computer and Information Technology 2012 Oct 27 (pp. 177--184). IEEE."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2839"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.122"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-014-0420-x"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.02.013"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Zhang N Yang X Zhang M Sun Y Long K. A genetic algorithm-based task scheduling for cloud resource crowd-funding model. International Journal of Communication Systems. 2018 Jan 10;31(1):e3394.  Zhang N Yang X Zhang M Sun Y Long K. A genetic algorithm-based task scheduling for cloud resource crowd-funding model. International Journal of Communication Systems. 2018 Jan 10;31(1):e3394.","DOI":"10.1002\/dac.3394"}],"event":{"name":"CIIS 2019: 2019 The 2nd International Conference on Computational Intelligence and Intelligent Systems","sponsor":["Queensland University of Technology","City University of Hong Kong City University of Hong Kong"],"location":"Bangkok Thailand","acronym":"CIIS 2019"},"container-title":["Proceedings of the 2019 2nd International Conference on Computational Intelligence and Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372422.3372425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372422.3372425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:21Z","timestamp":1750197741000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372422.3372425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,23]]},"references-count":26,"alternative-id":["10.1145\/3372422.3372425","10.1145\/3372422"],"URL":"https:\/\/doi.org\/10.1145\/3372422.3372425","relation":{},"subject":[],"published":{"date-parts":[[2019,11,23]]},"assertion":[{"value":"2020-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}