A Parallel Heuristic Scheduler for Cloud Computing Environment

被引:0
|
作者
Salmi, Cheikh [1 ]
Walker, Jessie [2 ]
Ahmed, AitBouzaid [1 ]
机构
[1] Univ Mhammed Bougarra, Dept Comp Sci, Boumerdes, Algeria
[2] STEM Resources, Res, Little Rock, AR USA
来源
关键词
Cloud Computing; Job Scheduling; Particle Swam; Optimization virtualization; Shifting Bottleneck Introduction;
D O I
10.1109/SOUTHEASTCON45413.2021.9401946
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is a different paradigm from traditional computing. It consists of providing IT services such as servers, storage, databases, network management, software, data analytics, artificial intelligence, etc., via the Internet (the Cloud) to provide faster innovation, flexible resources, productivity, and competitiveness. Several challenges in handling end-user applications need to be addressed more efficiently. Task Scheduling is a significant problem in Cloud computing since the cloud provider has to deal with many user applications. Consequently, task scheduling can no longer be handled by traditional schedulers. This paper's primary purpose is to propose a parallel multi-core hybrid heuristic scheduler based on exceeding the computing capacity of any processor while guaranteeing the results' accuracy. The main objective is to determine the feasible schedule that minimizes applications execution time while maximizing cloud resource utilization. Tests on benchmark instances showed that the proposed approach finds optimum/near-optimum solutions in many cases, while the computational times are minimal compared to other sequential techniques found intheliterature.
引用
收藏
页码:50 / 57
页数:8
相关论文
共 50 条
  • [1] A Heuristic Meta Scheduler for Optimal Resource Utilization and Improved QoS in Cloud Computing Environment
    Jeyarani, R.
    Nagaveni, N.
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2012, 2 (01) : 41 - 52
  • [2] A hybrid meta-heuristic scheduler algorithm for optimization of workflow scheduling in cloud heterogeneous computing environment
    Noorian Talouki, Reza
    Hosseini Shirvani, Mirsaeid
    Motameni, Homayon
    [J]. JOURNAL OF ENGINEERING DESIGN AND TECHNOLOGY, 2022, 20 (06) : 1581 - 1605
  • [3] A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment
    Povar, Digambar
    Geethakumari, G.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 341 - 352
  • [4] Design and Implementation of an efficient Two-level Scheduler for Cloud Computing Environment
    Sadhasivam, Sudha
    Jayarani, R.
    Nagaveni, N.
    Ram, R. Vasanth
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 884 - +
  • [5] CHASE: Component High Availability-Aware Scheduler in Cloud Computing Environment
    Jammal, Manar
    Kanso, Ali
    Shami, Abdallah
    [J]. 2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 477 - 484
  • [6] Energy-Aware Scheduler for HPC Parallel Task Base Applications in Cloud Computing
    Juarez, Fredy
    Ejarque, Jorge
    Badia, Rosa M.
    Gonzalez Rocha, Sergio N.
    Esquivel-Flores, Oscar A.
    [J]. INTERNATIONAL JOURNAL OF COMBINATORIAL OPTIMIZATION PROBLEMS AND INFORMATICS, 2018, 9 (01): : 54 - 61
  • [7] Heuristic scheduling algorithm for hybrid storage data in the cloud computing environment
    Luo, Dawei
    Liu, Jinming
    Xin, Zhihong
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2020, 13 (03) : 131 - 136
  • [8] Optimal Task Scheduling in Cloud Computing Environment: Meta Heuristic Approaches
    Mandal, Tripti
    Acharyya, Sriyankar
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL INFORMATION AND COMMUNICATION TECHNOLOGY (EICT), 2015, : 24 - 28
  • [9] MobSched: Customizable Scheduler for Mobile Cloud Computing
    Sindia, Suraj
    Gao, Song
    Black, Bobby
    Lim, Alvin S.
    Agrawal, Vishwani
    Agrawal, Prathima
    [J]. 45TH SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2013, : 129 - 134
  • [10] Scheduler vulnerabilities and coordinated attacks in cloud computing
    Zhou, Fangfei
    Goel, Manish
    Desnoyers, Peter
    Sundaram, Ravi
    [J]. JOURNAL OF COMPUTER SECURITY, 2013, 21 (04) : 533 - 559