4.6 Article

Hybrid gradient descent cuckoo search (HGDCS) algorithm for resource scheduling in IaaS cloud computing environment

Publisher

SPRINGER
DOI: 10.1007/s10586-018-2856-x

Keywords

-

Ask authors/readers for more resources

Resource scheduling is a procedure for the distribution of resources over time to perform a required task and a decision making process in cloud computing. Optimal resource scheduling is a great challenge and considered to be an NP-hard problem due to the fluctuating demand of cloud users and dynamic nature of resources. In this paper, we formulate a new hybrid gradient descent cuckoo search (HGDCS) algorithm based on gradient descent (GD) approach and cuckoo search (CS) algorithm for optimizing and resolving the problems related to resource scheduling in Infrastructure as a Service (IaaS) cloud computing. This work compares the makespan, throughput, load balancing and performance improvement rate of existing meta-heuristic algorithms with proposed HGDCS algorithm applicable for cloud computing. In comparison with existing meta-heuristic algorithms, proposed HGDCS algorithm performs well for almost in both cases (Case-I and Case-II) with all selected datasets and workload archives. HGDCS algorithm is comparatively and statistically more effective than ACO, ABC, GA, LCA, PSO, SA and original CS algorithms in term of problem solving ability in accordance with results obtained from simulation and statistical analysis.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Review Computer Science, Artificial Intelligence

Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments

Nadim Rana, Muhammad Shafie Abd Latiff, Shafi'i Muhammad Abdulhamid, Haruna Chiroma

NEURAL COMPUTING & APPLICATIONS (2020)

Article Computer Science, Information Systems

Adopting automated whitelist approach for detecting phishing attacks

Nureni Ayofe Azeez, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernandez-Sanz, Shafi'i Muhammad Abdulhamid

Summary: Phishing is a significant issue in cyberspace, with challenges such as low detection rates and slow access times for existing anti-phishing solutions. However, a new automated white-list approach has been proposed, showing high accuracy in detecting phishing attacks, especially with lower-level datasets. This approach outperforms similar benchmarks in accuracy and efficiency, demonstrating robust detection performance in comparison to other techniques.

COMPUTERS & SECURITY (2021)

Article Engineering, Multidisciplinary

A hybrid whale optimization algorithm with differential evolution optimization for multi-objective virtual machine scheduling in cloud computing

Nadim Rana, Muhammad Shafie Abd Latiff, Shafi'i Muhammad Abdulhamid, Sanjay Misra

Summary: The study proposed a hybrid algorithm (M-WODE) based on evolutionary algorithm and whale optimization algorithm for solving virtual machine scheduling problems. Experimental results show that the algorithm outperformed previous algorithms in most cases in terms of makespan and cost trade-offs.

ENGINEERING OPTIMIZATION (2022)

Review Engineering, Multidisciplinary

Deep Learning-Based Big Data Analytics for Internet of Vehicles: Taxonomy, Challenges, and Research Directions

Haruna Chiroma, Shafi'i M. Abdulhamid, Ibrahim A. T. Hashem, Kayode S. Adewole, Absalom E. Ezugwu, Saidu Abubakar, Liyana Shuib

Summary: The Internet of Vehicles (IoV) is a developing technology attracting attention from both industry and academia, with the potential for hundreds of millions of connected vehicles by 2035. However, surveys on leveraging deep learning in IoV within the context of big data analytics are currently scarce. This study presents a survey exploring the theoretical perspective of the role of deep learning in IoV within the context of big data analytics, highlighting research opportunities that cut across deep learning, IoV, and big data analytics.

MATHEMATICAL PROBLEMS IN ENGINEERING (2021)

Article Computer Science, Artificial Intelligence

Regularized Least Squares Twin SVM for Multiclass Classification

Javed Ali, M. Aldhaifallah, Kottakkaran Sooppy Nisar, A. A. Aljabr, M. Tanveer

Summary: Support vector machines (SVMs) have been successfully used in classification and regression problems. Twin SVM (TWSVM) reduces the complexity of SVM, while least squares twin SVM (LSTSVM) is useful for solving multiclass classification problems with less computational cost and good generalization performance. A new regularization based method called multiclass regularized least squares twin support vector machine (MRLSTSVM) is proposed in this work to improve generalization performance in multiclass classification problems.

BIG DATA RESEARCH (2022)

Review Psychology, Multidisciplinary

Factors Influencing the Adoption of IoT for E-Learning in Higher Educational Institutes in Developing Countries

Syed Hamid Hussain Madni, Javed Ali, Hafiz Ali Husnain, Maidul Hasan Masum, Saad Mustafa, Junaid Shuja, Mohammed Maray, Samira Hosseini

Summary: This research investigates the factors influencing the adoption of IoT in E-Learning in higher educational institutes in developing countries. A proposed adoption model categorizes the influencing factors into four groups: individual, organizational, environmental, and technological. The significant factors identified include privacy, infrastructure readiness, financial constraints, ease of use, support of faculty, interaction, attitude, and network and data security.

FRONTIERS IN PSYCHOLOGY (2022)

Article Green & Sustainable Science & Technology

IoT Adoption Model for E-Learning in Higher Education Institutes: A Case Study in Saudi Arabia

Javed Ali, Syed Hamid Hussain Madni, Mohd Shamim Ilyas Jahangeer, Muhammad Abdullah Ahmed Danish

Summary: This study investigates factors influencing the adoption of Internet of Things (IoT) in e-learning systems of higher education institutions (HEIs) in Saudi Arabia. The results suggest that usability, accessibility, technical support, and individual proficiencies significantly contribute to the rate of IoT incorporation. Financial obstacles, self-efficacy, interactive capability, online surveillance, automated attendance tracking, training programs, network and data safeguarding measures, and relevant tools also have a significant impact on IoT adoption.

SUSTAINABILITY (2023)

Review Multidisciplinary Sciences

Application of Grey Wolf Optimization Algorithm: Recent Trends, Issues, and Possible Horizons

Emmanuel Gbenga Dada, Stephen Bassi Joseph, David Opeoluwa Oyewola, Alaba Ayotunde Fadele, Haruna Chiroma, Shafi'i Muhammad Abdulhamid

Summary: This paper presents the recent progress, variants, and applications of the Grey Wolf Optimization (GWO) algorithm, highlighting the potential for development of more robust variants. The review aims to stimulate researchers in advancing the effectiveness of GWO in solving complex optimization problems.

GAZI UNIVERSITY JOURNAL OF SCIENCE (2022)

Review Computer Science, Information Systems

Data Redundancy Reduction for Energy-Efficiency in Wireless Sensor Networks: A Comprehensive Review

Gul Sahar, Kamalrulnizam Bin Abu Bakar, Fatima Tul Zuhra, Sabit Rahim, Tehmina Bibi, Syed Hamid Hussain Madni

Summary: This paper reviews the existing energy-efficient data redundancy reduction schemes in Wireless Sensor Networks (WSNs), categorizing the concept into three levels: node, cluster head, and sink. It also highlights current key issues and challenges, as well as suggesting future research directions for reducing data redundancy.

IEEE ACCESS (2021)

Article Computer Science, Artificial Intelligence

Detecting ransomware attacks using intelligent algorithms: recent development and next direction from deep learning and big data perspectives

Ibrahim Bello, Haruna Chiroma, Usman A. Abdullahi, Abdulsalam Ya'u Gital, Fatsuma Jauro, Abdullah Khan, Julius O. Okesola, Shafi'i M. Abdulhamid

Summary: Recently, there has been a growing interest in using intelligent algorithms, particularly deep learning algorithms, for ransomware attack detection. However, there is a lack of comprehensive literature review on the applications of intelligent algorithms in detecting ransomware attacks, indicating a potential direction for future research.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Proceedings Paper Computer Science, Interdisciplinary Applications

An Intelligent Machine Learning-Based Real-Time Public Transport System

Menzi Skhosana, Absalom E. Ezugwu, Nadim Rana, Shafi'i M. Abdulhamid

COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2020, PT VI (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

Smart Home Automation System Using ZigBee, Bluetooth and Arduino Technologies

Olutosin Taiwo, Absalom E. Ezugwu, Nadim Rana, Shafi'i M. Abdulhamid

COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2020, PT VI (2020)

Article Computer Science, Artificial Intelligence

Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend

Fatsuma Jauro, Haruna Chiroma, Abdulsalam Y. Gital, Mubarak Almutairi, Shafi'i M. Abdulhamid, Jemal H. Abawajy

APPLIED SOFT COMPUTING (2020)

No Data Available