In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essenti...
详细信息
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing *** task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog *** process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource *** this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local *** balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization *** FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response *** relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks.
Extracting large amounts of information and knowledge from a large database is a trivial task. Existing bulk item mining algorithms for an extensive database are systematic and mathematically expensive and cannot be u...
详细信息
Nowadays, online networking is used generally as the spring of data on account of its ease and simplicity nature. This has turned out to be an open stage for discussion, knowledge dissemination, ideology expression, e...
详细信息
Cloud Data Security (CDS) is a set of strategies for securing data from security threats. However, the previous works ignored the prevention of multiple cloud security attacks. To tackle this problem, an efficient sec...
详细信息
Vehicle-to-everything (V2X) communication is crucial in Intelligent Transportation Systems (ITSs) for enhancing road safety, traffic efficiency, and convenience. To address the need for trust in V2X communications, a ...
详细信息
In the early days, it was difficult to study bio-electric signals, but now a days these problems have been solved by many hardware devices which are available at low cost. Even then there is a need for technical impro...
详细信息
This review paper explores emerging threats to information privacy and security within the dynamic landscape of Online Social Networks (OSNs), which serve as repositories of vast amounts of user data. The rise in soci...
详细信息
With the exponential increase in data consumption from activities like streaming, gaming, and IoT applications, existing network infrastructure is under significant strain. To address the growing demand for higher dat...
详细信息
Climate change still implies risks for economic security, such as for agriculture and its productivity and, therefore, national economic potential. Although similar approaches have been used in publications concerning...
详细信息
Several genetic disorders and other metabolic abnormalities work together to generate the lethal disease known as cancer. Today’s most contributing factors to mortality and disability in patients are lung and colon c...
详细信息
暂无评论