2021
DOI: 10.1093/comjnl/bxab028
|View full text |Cite
|
Sign up to set email alerts
|

CWOA: Hybrid Approach for Task Scheduling in Cloud Environment

Abstract: A cloud computing system typically comprises of a huge number of interconnected servers that are organized in a datacentre. Such servers dynamically cater to the on-demand requests put forward by the clients seeking solutions to their applications through an interface. The scheduling activity concerned with scientific applications is designated under the NP hard problem category since they make use of heterogeneous resources of dynamic capabilities. Recently cloud computing researchers had developed numerous m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…100 Vms and 200 VMs were considered for execution purpose. The proposed GWOC had been compared with GSA [27], WOA [15] and GWO [28] algorithms.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…100 Vms and 200 VMs were considered for execution purpose. The proposed GWOC had been compared with GSA [27], WOA [15] and GWO [28] algorithms.…”
Section: Resultsmentioning
confidence: 99%
“…Service quality and energy consumption are vital for realizing an enhanced cloud performance. The authors [15] had designed an improvised task scheduling algorithm by integrating the Cuckoo search algorithm (CSA) and whale optimization algorithm (WOA), named the CWOA to enhance the cloud performance.…”
Section: Related Workmentioning
confidence: 99%
“…Artificial neural network, support vector machines, and deep learning are the widely used techniques for intrusion detection. [15][16][17] An IDS 18,19 mainly secures the system and alerts you in case of any malicious entry. There are two types of IDS: host-based IDS (HIDS) and network-based IDS (NIDS).…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection mainly identifies malicious behavior by comparing the anomalous behavior with the normal data. Artificial neural network, support vector machines, and deep learning are the widely used techniques for intrusion detection 15–17 …”
Section: Introductionmentioning
confidence: 99%
“…For future research, the author planned to use evolutionary algorithms such as PSO and GA, to solve the task scheduling problem. (Pradeep, et al, 2021) have combined two techniques, the Cuckoo search algorithm (CSA) and the Whale Optimization Algorithm (WOA) to develop an efficient hybrid algorithm called (CWOA). The proposed strategy improved two important factors that affect the efficiency of cloud computing environment namely: quality of service and energy consumption.…”
mentioning
confidence: 99%