2021
DOI: 10.1007/s11227-021-04018-6
|View full text |Cite
|
Sign up to set email alerts
|

A bi-objective task scheduling approach in fog computing using hybrid fireworks algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 42 publications
0
20
0
Order By: Relevance
“…Also, the monetary cost per second usage of the fog node is set to 0.0386$/s. 25 The tasks are varied from 1000 to 5000 with the size randomly set in the range between 100-500 MI and 100-1000 KB, respectively. In addition, deadline of the tasks is set in the range between 500 and 2500 ms. Further, we have categorized tasks into high priority and low priority tasks.…”
Section: Resultsmentioning
confidence: 99%
“…Also, the monetary cost per second usage of the fog node is set to 0.0386$/s. 25 The tasks are varied from 1000 to 5000 with the size randomly set in the range between 100-500 MI and 100-1000 KB, respectively. In addition, deadline of the tasks is set in the range between 500 and 2500 ms. Further, we have categorized tasks into high priority and low priority tasks.…”
Section: Resultsmentioning
confidence: 99%
“…IOA methods search iteratively for the optimal subset of variables, and the main differences among methods are the selection strategy and initialization of variables. Swarm intelligent and evolutionary methods, 50 such as the binary dragonfly algorithm, 51 cat swarm optimization, 52 cuckoo search, 53 harmony search, 54 GA, and firework algorithm, 55 can be used to search for the optimal combination of variables to maximize the model performance.…”
Section: Methodsmentioning
confidence: 99%
“…In Equation (1), vectors within the Euclidean space can be represented as x, italicub, and italiclb representing the upper and the lower bounds of the problem correspondingly (Yadav et al, 2022).…”
Section: Proposed Intrusion Detection Schemementioning
confidence: 99%