You are currently viewing a new version of our website. To view the old version click .
Sustainability
  • Article
  • Open Access

9 December 2022

Metaheuristics Based Energy Efficient Task Scheduling Scheme for Cyber-Physical Systems Environment

,
,
,
,
,
,
and
1
Department of Electrical and Computer Engineering, International Islamic University Malaysia, Kuala Lumpur 53100, Malaysia
2
Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj 16278, Saudi Arabia
3
Department of Biomedical Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
4
Department of Computer Sciences, College of Computing and Information System, Umm Al-Qura University, Mecca 24382, Saudi Arabia
This article belongs to the Special Issue IoT Quality Assessment and Sustainable Optimization

Abstract

The widespread applicability of cyber-physical systems (CPS) necessitates efficient schemes to optimize the performance of both computing units and physical plant. Task scheduling (TS) in CPS is of vital importance to enhance resource usage and system efficiency. Traditional task schedulers in embedded real-time systems are unable to fulfill the performance requirements of CPS because of the task diversity and system heterogeneities. In this study, we designed a new artificial rabbit optimization enabled energy-efficient task-scheduling scheme (ARO-EETSS) for the CPS environment. The presented ARO-EETSS technique is based on the natural survival practices of rabbits, comprising detour foraging and arbitrary hiding. In the presented ARO-EETSS technique, the TS process is performed via the allocation of n autonomous tasks to m different resources. In addition, the objective function is based on the reduction of task completion time and the effective utilization of resources. In order to demonstrate the higher performance of the ARO-EETSS system, a sequence of simulations was implemented. The comparison study underlined the improved performance of the ARO-EETSS system in terms of different measures.

1. Introduction

Technological revolutions have intensely transformed customs within society, in which humans are irreversibly coupled with countless interlinked electronic gadgets and their cyber methods. This procedure is still ongoing, offering novel application scenarios and the continually arising novel scientific difficulties involved in the research fields of cyber-physical systems (CPS) and the Internet of Things (IoT) []. The application scenarios involve the fields of manufacturing, assisted living, telerehabilitation, e-health, automotive and smart environments. Certainly, by utilizing these mechanisms, both industry and users obtain a wide range of advantages in relation to their requirements that involve performance enhancement, security, low cost, and comfort []. The first and foremost objective is to enable users, machines, and applications to communicate and understand their surrounding atmosphere. By addressing the fundamental needs of users, such as communication, and mobility, water provisioning, and assistive monitoring, different communities (for instance embedded and intelligent) debate to support their views, technologies, and approaches []. These solutions can typically be, inappropriately, technically based, while the actual requirements of the particular application domain and its users may be ignored.
CPS range from comparatively small mechanisms, such as automobiles and aircraft, to large mechanisms such as the national power grid []. The physical features of these mechanisms will be regulated well by controllers by placing algorithms and computers into a loop; however, to attain the complete advantage of compiling CPS, power consumption, control, and computing can no longer be maximized distinctly []. The dynamics of physical systems and the dynamics of computers communicate in ways that need basically novel design techniques. Principally, they involve mechanisms with distinct performances, hardware, and time limitations which have direct communication with the atmosphere, such as a transportation system, a control system, a robotic system, and many more []. Each requirement arises from various kinds of applications; therefore, numerous types of scheduling systems are required.
A flexible scheduling policy that alters in accordance with different needs indicates a desideratum in many cases []. Handling such complicated difficulties has led to the advancement of novel ideas and a novel class of models: the mixed criticality system [], which is “an embedded computing platform where application functions of various criticality share computation and or transmission resources” []. In numerous cases, the safety and real-time needs should match the limited resources, minimum cost, and small power limitations, which raises the difficulty level in CPS cases. The method of utilizing mixed criticality scheduling in CPS was mostly application based, resulting in a variety of specific task methods having a multitude of system performance limitations []. These techniques, while featuring higher real-world relevance, have inadequacies when it comes to interaction and scalability in an unpredictable atmosphere.
In this study, we propose a new artificial rabbit optimization enabled energy-efficient task-scheduling scheme (ARO-EETSS) for the CPS environment. The goal of the presented model is to allocate n autonomous tasks to m different resources, and thus the entire task completion period is minimized and resources totally exploited. To demonstrate the higher efficiency of the ARO-EETSS system, a sequence of simulations was performed. In summary, the paper’s contribution is given as follows.
  • Propose a new ARO-EETSS technique for scheduling tasks in the CPS environment. To the best of our knowledge, none of the existing task schedulers are based on the ARO algorithm and the ARO-EETSS technique does not exist in the literature.
  • Derive a task scheduler to assign n autonomous tasks to m different resources.
  • Validate the performance of the ARO-EETSS technique under different aspects.

3. The Proposed Model

In this study, an ARO-EETSS system could be introduced for TS from the CPS situation. The presented ARO-EETSS technique depends upon the natural survival practices of rabbits, encompassing detour foraging and random hiding. In the presented ARO-EETSS technique, the TS process was carried out via the allocation of n autonomous tasks to m dissimilar resources, and thus the entire task completion period is minimized and resources are totally exploited. Figure 1 demonstrates the overall procedure of ARO-EETSS system.
Figure 1. Overall process of ARO-EETSS approach.

3.1. Algorithmic Steps of ARO Technique

The ARO algorithm is based on the foraging and hiding practices of real rabbits and energy shrink []. The ARO algorithm has the following merits. It exhibits competitive performance over other metaheuristic algorithms. It avoids local extremum and carries out a global search. It maintains a balanced transition from exploration to exploitation throughout the iterations. Finally, the algorithm is effective and easy to implement. The mathematical modeling of the ARO algorithm is discussed in the following:

3.1.1. Detour Foraging (Exploration)

During the time of foraging, the rabbit looks further away and neglects what exists closer at hand. It can eat grass arbitrarily in the other area rather than its individual region; the foraging behavior can be defined as detour foraging. In the ARO algorithm, consider that every individual rabbit from the colony has its individual area of grass around the burrows, and the rabbits continually arbitrarily stray to the location of every other one to forage. In fact, at the time of foraging, the rabbits are likely to cause disturbance over the food source in order to obtain adequate food. So, the detour foraging nature of the ARO algorithm signifies that every searching individual tends to upgrade its position in the direction of another arbitrarily selected individual in the colony and inflict disturbance.
The detour foraging process of rabbits can be defined as follows []:
v i t + 1 = x j t + R · x t x j t + r o n n d 0.5 · 0.05 + r 1 · n 1 ,   i , j = 1 ,   , n   a n d   j i ,  
R = L · c ,
L = e e ( t 1 T ) 2 ·   sin   2 π r 2 ,  
c k = 1   i f   k = = g l 0   e l s e k = 1 ,   , d   a n d   l = 1 , r 3 · d ,
g = r a n d   p e r m d ,  
n 1 N 0 , 1 ,  
where v i t + 1 denotes the candidate’s place of i th rabbit at the time t + 1 ,   x i t defines place of ith rabbit at the time t ,   n implies rabbit population size, d is the dimension, round determines rounding to the adjoining integer, randperm provides an arbitrary permutation of the integers, r 1 , r 2 and r 3 are arbitrary numbers in zero and one, L refers to the running length representing the movement pace at the time of detour foraging, and n 1 defines the subject to normal distribution.
Equation (1) defines that the searching population carries out an arbitrary searching process for food based on the location. It enables a rabbit to move away from its original area to the areas of others. These peculiar characteristics of rabbits considerably contributed to the exploration and promise of the global searching ability of the ARO technique.

3.1.2. Random Hiding (Exploitation)

To escape from predators, a rabbit usually digs roughly diverse burrows over the nest to hide. In the ARO algorithm, at every round, the rabbit generally creates d burrows over every individual dimension of the searching area, and it arbitrarily selects one from every burrow for hiding and thereby minimizes the likelihood of being preyed upon. The jth burrow of the i th rabbit can be determined as follows []:
b i , j t = x i t + H · g · x i t , i = 1 , n   a n d   j = 1 , d ,
H = T t + 1 T · r 4 ,
g k = 1   i f   k = = j 0   e l s e ,   k = 1 , , d ,
where the d burrows are produced from the neighboring area of rabbits over each dimension. H denotes hiding variable that is linearly reduced in 1 to 1/T with an arbitrary perturbation over several iterations. Based on this, the burrows are produced from a larger region of a rabbit. With a rise in iterations, this neighboring area gets reduced.
As aforementioned, rabbits are frequently exposed to pursuing and attacking predators. For survival, the rabbits require a safe location for hiding. So, it can be reduced to arbitrarily selecting a burrow from its burrows to shelter in to avoid getting caught. In order find to mathematical system for this arbitrary hiding approach, the formulas are presented as:
v i t + 1 = x i t + R · r 4 · b i , r t x t ,   i = 1 , , n ,
g r k = 1 i f k = = r 5 · d 0                 e l s e k = 1 , , d ,
b i , r t = x i t + H · g r · x i t ,
where b i , r defines the arbitrarily selected burrow to hide in of their d burrows, and, r 4 and r 5 represent the 2 arbitrary numbers from zero and one. According to Equation (10), the ith search separately is the attempt to update their position only after selecting the burrow in their d burrows.
Afterward, once the detoured foraging and arbitrary hide were obtained, the place upgrade of ith rabbit is given as follows []:
x i t + 1 = x t f x t f v i t + 1 v t + 1 f x i t > f ( v i t + 1 ) ,
This formula represents that when the fitness of candidate places of the ith rabbit was superior to that of the present one, the rabbit gene abandons the present location and stops at the candidate place created.

3.1.3. Energy Shrink (Switch from Exploration to Exploitation)

In ARO, rabbits are continuously inclined to often carry out detour foraging at an early stage of iterations but often implement arbitrary hiding at the later stage of iterations. This outcome of this search process is that the energy of the rabbits is shrinking slowly with the lapse of time. Thus, an energy factor was planned for modeling the switch from exploration to exploitation. The energy influence in ARO was determined as:
A t = 4 1 t T ln 1 r ,
in which r denotes the arbitrary number from zero and one. The big value of energy factors defines that the rabbit is reaching appropriate energy and physical strength levels to resume detour foraging. Figure 2 showcases the flowchart of ARO technique.
Figure 2. Process involved in ARO algorithm.
Conversely, the smaller value of energy factors represents that the rabbit is less active; therefore it needs to remain arbitrarily hidden. Thus, in ARO, once the energy factor A t > 1 , the rabbit is prone to arbitrarily explore the area of other various rabbits to forage from the exploration stage; thus, detour foraging occurs; once the energy influence A t 1 , the rabbit then arbitrarily exploits its individual burrows during the exploitation stage, so, arbitrary hiding takes place. According to the value of the energy influence A, ARO is switched between detour foraging and arbitrary hiding. Specifically, exploration takes place once A t > 1 , but exploitation occurs once A t 1 .
To investigate the impact of the energy factor on the search performance of the technique, the probability of A > 1 was computed. Assume that = 2 · 1 t T , afterward A t = 2 ·   ln   1 r · θ , the probability of A > 0 was computed as:
P A t > 1 = 0 2 0 e 1 2 k d r d θ 1 · 2 = 1 4 · 1 4 e t t d t + e 1 4 0.5177 ,
Therefore, the action of detour foraging was about 0.5 during the iterative procedure of carrying out the action; the ARO technique is nearly the same for carrying out either detour foraging or arbitrary hiding under the iterative procedure that gives consideration for the balance of exploration and exploitation as explained in Algorithm 1 below.
Algorithm 1: Pseudocode of ARO algorithm.
Input: Parameter initialization
Arbitrarily prepare a group of rabbit X i (solutions) and evaluate its fitness F i t i ,   a n d   X b e s t is the optimum solution created so far.
While the termination condition is not fulfilled do
  For all the individuals X i do
  Compute the energy factor A utilizing in Equation (14).
   I f A > 1
    Select a rabbit arbitrarily in other individuals.
    Compute R utilizing in Equations (2) 6 .
    Implement detour foraging utilizing in Equation (1).
    Compute the fitness F i t i .
    Upgrade the position of present individual utilizing Equation (13).
  Else
    Create d burrows and arbitrarily choose one as hide utilizing in Equation (12).
    Execute arbitrary hiding utilizing Equation (10).
    Compute the fitness F i t i .
    Upgrade the position of individuals utilizing Equation (13).
  End If
  Upgrade the optimum solution create so far X b e s t
  End For
End While
Return X b e s t
Output: Scheduled Tasks

3.2. Process Involved in Scheduling Process

In the presented ARO-EETSS technique, the scheduling process is performed in the CPS environment. The rule of the presented system is assigning n independent tasks to m heterogeneous accessible resources, therefore the complete task completion duration is minimized and resources have been used entirely []. During the distributing method, n sub-tasks T a s k = T 1 ,   T 2 ,   ,   T n were allotted to m processors C =   C 1 ,   C 2 ,   ,   C m . R = R 1 ,   R 2 ,   ,   R m denotes the maximum resource quantity group of every processor, R j implies the higher source count of processors C j , and the count of resources required for every task execution is H = H 1 ,   H 2 ,   ,   H . T j = i   X i j = t i / v j demonstrates the number of execution times (ETs) of all tasks scheduled on processors j , whereas t i illustrates the ET of tasks i on minimal processors and v j represents the processing speed of processors j .
f X = min   A j = 1 m t j d + B i = 1 m j = 1 m p = 1 m q = 1 m ω i j p q X i j X p q ,
j = 1 m X i j = 1 , i = 1 , 2 , , n ,  
i = 1 m H i X i j R j , j = 1 , 2 , , m ,  
in which, A and B A + B = 1 imply the comparative importance of total end time and communication cost in the objective purpose, w i j p q represents the task i scheduling on processors j and task p carried out on processors q .
T = t i m e 11 t i m e 12 t i m e 1 m t i m e 21 t i m e 22 t i m e 2 m t i m e n 1 t i m e n 1 t i m e n m ,
in which t i m e i j denotes the ET required for virtual machine (VM) v j to process the task t i , and t i m e i j = M I i / M I P S j . The evaluated time for computing of n tasks on m effectual resources, defined as E , E is a n × m matrix. E i j implies the time required for T i to run in the VM, E i j = c i j + e i j . Next, the VM applies the allocated task gathering time expressed as E j . While the tasks assigned for every VM resource can be applied separately, the ET essential to all the tasks to the whole is the higher value array E represented as E t o t a l :
E j = i T a s k j   e i j + i T a s k j   t i j ,
whereas T a s k j stands for a set of tasks executed on VM. The matrix x i j is established dependent upon the equal linking betwixt the VM and the task, denoting once the task t i is assigned to VM v j , it is defined as:
x i j = 1 ,   i s   a s s i g n e d   t o   V j 0 ,   O t h e r w i s e ,  

4. Results and Discussion

This section assesses the TS performance of the ARO-EETSS model in the CPS environment. The proposed model was simulated using MATLAB tool. Table 1 and Figure 3 compare the task execution time (TET) examination of the ARO-EETSS method with current approaches such as earliest due date (EDD), earliest deadline first (EDF), ant colony optimization-based task scheduler (ACOTS), and quantum invasive weed optimization-based energy-aware scheduling (QIWO-EATS) []. The experimental values suggested the ARO-EETSS method reached least TET values under all iterations. For instance, on I-20 iterations, the ARO-EETSS model showed the lowest TET of 451 ms whereas the EDD, EDF, ACOTS, and QIWO-EATS models demonstrated higher TETs of 782, 773, 655, and 548 ms, respectively. Along with that, on I-100 iterations, the ARO-EETSS method displayed the lowest TET of 361 ms where the EDD, EDF, ACOTS, and QIWO-EATS methods showed increased TETs of 691, 644, 537, and 427 ms, correspondingly.
Table 1. TET analysis of ARO-EETSS system with recent algorithms in different iterations.
Figure 3. TET analysis of ARO-EETSS system in different iterations.
An average load balancing ratio (ALBR) of the ARO-EETSS method with current methodologies is investigated in Table 2 and Figure 4. The outcomes denoted the ARO-EETSS method gained improved outcomes in all iterations. For example, on I-20 iterations, the ARO-EETSS method offered a maximum ALBR of 58.16% whereas the EDD, EDF, ACOTS, and QIWO-EATS models depicted higher ALBRs of 13.32, 19.27, 35.54, and 49.83% respectively. In addition, on I-100 iterations, the ARO-EETSS method presented a maximum ALBR of 66.49% whereas the EDD, EDF, ACOTS, and QIWO-EATS methods portrayed higher ALBRs of 25.42, 31.57, 49.63, and 57.96%, correspondingly.
Table 2. ALBR analysis of ARO-EETSS system with recent algorithms in different iterations.
Figure 4. ALBR analysis of ARO-EETSS system under varying iterations.
Table 3 and Figure 5 compare the task convergence rate (CR) inspection of the ARO-EETSS method with recent methods. The experimental values denoted by the ARO-EETSS method reached lowest CR values under all iterations. For example, on I-20 iterations, the ARO-EETSS approach displayed a minimal CR of 657 ms whereas the EDD, EDF, ACOTS, and QIWO-EATS methods demonstrated increased CRs of 660, 659, 660, and 656 ms, correspondingly. Similarly, on I-100 iterations, the ARO-EETSS method exhibited the lowest CR of 524 ms whereas the EDD, EDF, ACOTS, and QIWO-EATS methods demonstrated increased CRs of 593, 576, 560, and 539 ms, correspondingly.
Table 3. CR analysis of ARO-EETSS system with recent algorithms under varying iterations.
Figure 5. CR analysis of ARO-EETSS system in different iterations.
Table 4 and Figure 6 compare the task energy consumption (ECON) inspection of ARO-EETSS method with recent methods. The experimental values denoted by the ARO-EETSS approach reached the least ECON values under all iterations. For example, on PM20, the ARO-EETSS technique showed a reduced ECON of 417 Wh whereas the EDD, EDF, ACOTS, and QIWO-EATS approaches illustrated higher ECONs of 1657, 3146, 4717, and 665 Wh, correspondingly. Moreover, on PM-100, the ARO-EETSS method exemplified a reduced ECON of 3435 Wh, for which the EDD, EDF, ACOTS, and QIWO-EATS methods demonstrated higher ECONs of 8439, 11,127, 12,533, and 7033 Wh, correspondingly.
Table 4. ECON analysis of ARO-EETSS system with recent algorithms under varying iterations.
Figure 6. ECON analysis of ARO-EETSS system under varying iterations.
Table 5 and Figure 7 compare the TET inspection of the ARO-EETSS method with recent methods. The experimental values denoted by the ARO-EETSS approach reached the lowest TET values under all iterations. For example, on T-200 tasks, the ARO-EETSS technique displayed a minimal TET of 49 ms, whereas the EDD, EDF, ACOTS, and QIWO-EATS models demonstrated higher TETs of 228, 170, 115, and 79 ms, correspondingly. Further, on T-1000 tasks, the ARO-EETSS method showed a reduced TET of 181 ms but the EDD, EDF, ACOTS, and QIWO-EATS methods established increased TETs of 726, 564, 407, and 283 ms, correspondingly.
Table 5. TET analysis of ARO-EETSS system with recent algorithms under varying tasks.
Figure 7. TET analysis of ARO-EETSS system with recent algorithms under varying tasks.
The success rate (SR) of the ARO-EETSS method against recent models is shown in Table 6 and Figure 8. The outcomes denoted that the ARO-EETSS approach obtained improved outcomes in every iteration. For example, on I-100 iterations, the ARO-EETSS method offered a maximum SR of 93.73%, where the EDD, EDF, ACOTS, and QIWO-EATS approaches showed maximum SRs of 82.48, 85.60, 88.57, and 91.23%, correspondingly.
Table 6. SR analysis of ARO-EETSS system with recent algorithms in different iterations.
Figure 8. SR analysis of ARO-EETSS system under varying iterations.
Furthermore, on I-500 iterations, the ARO-EETSS method presented a maximum SR of 87.32%, whereas the EDD, EDF, ACOTS, and QIWO-EATS methods gave SRs of 70.91, 75.76, 79.35, and 84.98%, correspondingly. These results show that the presented method has enhanced performance over other existing methods.

5. Conclusions

In this article, a novel ARO-EETSS system was introduced for TS from the CPS environment. The presented ARO-EETSS system depends upon the existing natural practices of rabbits, encompassing detour foraging and random hiding. In the presented ARO-EETSS technique, the TS process was carried out via the allocation of n autonomous tasks to m dissimilar resources, and thus the entire task completion period was minimized and resources were totally exploited. To demonstrate the higher efficiency of the ARO-EETSS system, a sequence of experiments was performed. The comparison study underlined the higher performance of the ARO-EETSS technique with respect to several measures.
In future, the outcomes of ARO-EETSS system will be improved by the use of hybrid metaheuristic optimization algorithms. Furthermore, in future, data deduplication mechanisms can be designed to improve network efficiency. Though adequate discussions and assessments have already been made in this work, some future work is discussed here. Flexible and dynamic TS can improve the schedulability of the CPS environment by the use of statistical learning techniques for supervision and cloud computing facilities for adaptively managing resource reclamation. In addition, a scheduler that better matches the dual-period model also deserves to be explored. An accurate timing analysis will be utilized for the effective analysis of resource utilization. Moreover, a real-world case study would provide stronger support for the usability of the framework. To transform the proposed method into a real-world application, some details related to software development, kernel modification, and communication with the cloud need to be formalized in future.

Author Contributions

Conceptualization, A.M.H.; Methodology, A.M.H. and M.O.; Software, A.M. and I.Y.; Validation, M.R. and A.S.Z.; Formal analysis, A.H.A.H.; Investigation, M.O.; Resources, A.G.; Data curation, A.H.A.H.; Writing—original draft, A.M.H.; Writing—review & editing, A.M.; Visualization, M.R. and A.S.Z.; Supervision, A.M. and I.Y.; Project administration, A.G.; Funding acquisition, M.O and A.G.. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R203), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Re-search at Umm Al-Qura University for supporting this work by Grant Code: (22UQU4320484DSR09).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

References

  1. Padmajothi, V.; Iqbal, J.M.; Ponnusamy, V. Load-aware intelligent multiprocessor scheduler for time-critical cyber-physical system applications. Comput. Electr. Eng. 2022, 97, 107613. [Google Scholar] [CrossRef]
  2. Sangaiah, A.K.; Medhane, D.V.; Bian, G.B.; Ghoneim, A.; Alrashoud, M.; Hossain, M.S. Energy-aware green adversary model for cyberphysical security in industrial system. IEEE Trans. Ind. Inform. 2019, 16, 3322–3329. [Google Scholar] [CrossRef]
  3. Mo, L.; Kritikakou, A.; Li, X. Energy-Efficient, Reliable and QoS-Aware Task Mapping on Cyber-Physical Systems. Ph.D. Thesis, IEEE Technical Committee on Cyber-Physical Systems, Southeast University, Nanjing, China, 2021. [Google Scholar]
  4. Neelakandan, S.; Keerthika, K.; Ilanchezhian, P.; Madeswaran, T.; Hardas, V.B.; Sakthi, U. Quantum invasive weed optimization-based energy aware task scheduling for cyber–physical system environment. Int. J. Model. Simul. Sci. Comput. 2022, 2341016. [Google Scholar] [CrossRef]
  5. Munoz, D.J.; Montenegro, J.A.; Pinto, M.; Fuentes, L. Energy-aware environments for the development of green applications for cyber–physical systems. Future Gener. Comput. Syst. 2019, 91, 536–554. [Google Scholar] [CrossRef]
  6. Soltani, R.; Kang, E.Y.; Mena, J.E.H. Towards Energy-aware Cyber-Physical Systems Verification and Optimization. In FedCSIS (Position Papers). Proceedings of the 16th Conference on Computer Science and Intelligence Systems, Online, 2–5 September 2021; FedCSIS: Leipzig, Germany, 2021; pp. 205–210. [Google Scholar]
  7. Singh, A.K.; Pamula, R.; Srivastava, G. An adaptive energy aware DTN-based communication layer for cyber-physical systems. Sustain. Comput. Inform. Syst. 2022, 35, 100657. [Google Scholar] [CrossRef]
  8. Padmajothi, V.; Iqbal, J.M. Distributive Processor Task Scheduling for the Cyber-Physical Systems–A Traveling Salesman Problem Approach. Res. Sq. 2022. [Google Scholar] [CrossRef]
  9. Zade, B.M.H.; Mansouri, N.; Javidi, M.M. SAEA: A security-aware and energy-aware task scheduling strategy by Parallel Squirrel Search Algorithm in cloud environment. Expert Syst. Appl. 2021, 176, 114915. [Google Scholar] [CrossRef]
  10. Qi, L.; Chen, Y.; Yuan, Y.; Fu, S.; Zhang, X.; Xu, X. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web 2020, 23, 1275–1297. [Google Scholar] [CrossRef]
  11. Zhang, C.; Wang, Z.; Ding, K.; Chan, F.T.; Ji, W. An energy-aware cyber physical system for energy Big data analysis and recessive production anomalies detection in discrete manufacturing workshops. Int. J. Prod. Res. 2020, 58, 7059–7077. [Google Scholar] [CrossRef]
  12. Zhou, J.; Wang, T.; Jiang, W.; Chai, H.; Wu, Z. Decomposed task scheduling for security-critical mobile cyber-physical systems. IEEE Internet Things J. 2021, 9, 22280–22290. [Google Scholar] [CrossRef]
  13. Kaur, K.; Garg, S.; Kaddoum, G.; Kumar, N. Energy and SLA-driven MapReduce job scheduling framework for cloud-based cyber-physical systems. ACM Trans. Internet Technol. (TOIT) 2021, 21, 31. [Google Scholar] [CrossRef]
  14. Zhou, J.; Sun, J.; Cong, P.; Liu, Z.; Zhou, X.; Wei, T.; Hu, S. Security-critical energy-aware task scheduling for heterogeneous real-time MPSoCs in IoT. IEEE Trans. Serv. Comput. 2019, 13, 745–758. [Google Scholar] [CrossRef]
  15. Tang, Y.; Yuan, Y.; Liu, Y. Cost-aware reliability task scheduling of automotive cyber-physical systems. Microprocess. Microsyst. 2021, 87, 103507. [Google Scholar] [CrossRef]
  16. Hossain, M.S.; Rahman, M.A.; Muhammad, G. Towards energy-aware cloud-oriented cyber-physical therapy system. Future Gener. Comput. Syst. 2020, 105, 800–813. [Google Scholar] [CrossRef]
  17. Abdel-Basset, M.; El-Shahat, D.; Elhoseny, M.; Song, H. Energy-aware metaheuristic algorithm for industrial-Internet-of-Things task scheduling problems in fog computing applications. IEEE Internet Things J. 2020, 8, 12638–12649. [Google Scholar] [CrossRef]
  18. Ghobaei-Arani, M.; Souri, A.; Safara, F.; Norouzi, M. An efficient task scheduling approach using moth-flame optimization algorithm for cyber-physical system applications in fog computing. Trans. Emerg. Telecommun. Technol. 2020, 31, e3770. [Google Scholar] [CrossRef]
  19. Tariq, U.U.; Ali, H.; Liu, L.; Panneerselvam, J.; Zhai, X. Energy-efficient static task scheduling on VFI-based NoC-HMPSoCs for intelligent edge devices in cyber-physical systems. ACM Trans. Intell. Syst. Technol. (TIST) 2019, 10, 66. [Google Scholar] [CrossRef]
  20. Xu, S.; Koren, I.; Krishna, C.M. Thermal aware task scheduling for enhanced cyber-physical systems sustainability. IEEE Trans. Sustain. Comput. 2019, 5, 581–593. [Google Scholar] [CrossRef]
  21. Wang, L.; Cao, Q.; Zhang, Z.; Mirjalili, S.; Zhao, W. Artificial rabbits optimization: A new bio-inspired meta-heuristic algorithm for solving engineering optimization problems. Eng. Appl. Artif. Intell. 2022, 114, 105082. [Google Scholar] [CrossRef]
  22. Salcedo-Sanz, S.; Xu, Y.; Yao, X. Hybrid meta-heuristics algorithms for task assignment in heterogeneous computing systems. Comput. Oper. Res. 2006, 33, 820–835. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.