60
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      scite_
       
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      IoT Workflow Scheduling Using Intelligent Arithmetic Optimization Algorithm in Fog Computing

      research-article
      Overview Bookmark

            Abstract

            Instead of the cloud, the Internet of things (IoT) activities are offloaded into fog computing to boost the quality of services (QoSs) needed by many applications. However, the availability of continuous computing resources on fog computing servers is one of the restrictions for IoT applications since transmitting the large amount of data generated using IoT devices would create network traffic and cause an increase in computational overhead. Therefore, task scheduling is the main problem that needs to be solved efficiently. This study proposes an energy-aware model using an enhanced arithmetic optimization algorithm (AOA) method called AOAM, which addresses fog computing's job scheduling problem to maximize users' QoSs by maximizing the makespan measure. In the proposed AOAM, we enhanced the conventional AOA searchability using the marine predators algorithm (MPA) search operators to address the diversity of the used solutions and local optimum problems. The proposed AOAM is validated using several parameters, including various clients, data centers, hosts, virtual machines, tasks, and standard evaluation measures, including the energy and makespan. The obtained results are compared with other state-of-the-art methods; it showed that AOAM is promising and solved task scheduling effectively compared with the other comparative methods.

            Main article text

            1. Introduction

            The Internet of things (IoT) has recently become an attractive topic in network applications, which deal with various connection-based Internet devices [1, 2]. In IoT, popular intelligent tools, such as mobile devices, smartphones, pads, laptops, smart cars, and sensor nodes, are increased by employing different items, such as sensors, modern intelligent appliances, cameras, defense methods, smart watches, robots, and transports [3]. IoT's primary purpose is to offer different applications and services, for example, manufacturing, transportation, medical treatment, transfer instrument, energy management, health care, and industrialization. These IoT utilizations mainly generate an enormous volume of data that necessitate being processed, collected, stored, and analyzed to gain valuable reports to accomplish the user's demands and interests [4, 5]. The massive number of IoT applications' characteristics is proliferating and demanding a high processing capability and experience that even the standard smartest devices cannot currently coordinate [6, 7].

            Cloud environments are considered a powerful platform to fortify and support IoT populations. Cloud computing (CC) is the on-demand availability of network machine resources, particularly storage and computing capability, without immediate effective control by the end user. CC is commonly utilized to define data centers possible to various users across the Internet [8]. Several limitations of modern smart things, such as storage capacity, battery continuance, network devices, home appliances, and treatment ability, can be determined by finding the optimal condition demand and executing specific jobs in strong computing ecosystems, such as fog and cloud computing, while additionally giving easy tasks for smart things to succeed. A recently distributed computing environment, fog computing (FC), promotes IoT ecosystems [9]. It is a heterogeneous computing paradigm composed of machines named the fog nodes, which encourages applications, maintains meaningful data, and distributes connection capacity. Recap fog computing is an updated cloud computing version by distributing intelligence devices based on exchangeable users [10, 11]. The scheduling approach is employed to produce high and cost-effectiveness over fog connections. Fog computing provides less response time and fewer transportation difficulties in the system [12], but this will produce additional difficulties for task scheduling and resource allocation. These difficulties need to be addressed.

            The fog computing is organized over a three-layer network as presented in Figure 1. The top layer is the cloud computing center region, typically covered by cloud computing collecting, warehousing, and preparing a vast amount of tasks. The middle fog-adding part generally is covered by fog nodes with particular computing energy and supports portability. The bottom layer is the IoT design region of users, which typically involved smartphones, laptops, cars, sensors, PC machines, etc. [13].

            Task scheduling has an expanded distribution framework in cloud computing. Still, many things affect job efficiencies, such as varying loads and extreme usage of resources [14]. This process creates a long latency and weights out over the data center; therefore, the advent of FC is significant [15]. FC task scheduling is the prevalent underlying issue of changing the specifications and allocating resources [16]. There are several user specifications for IoT environments. Simultaneously, the FC device's service quality is slightly better than the cloud computing platform's service quality.

            Effectively designating tasks in FC and designating them as per the users' requirements to ensure optimal scheduling are a big issue that needs to be handled. The multitask scheduling topic's time complexity is known to be NP-hard [1]; the literature has also recommended numerous intelligence optimization techniques [17, 18]. Li et al. [19] advanced a new resource scheduling approach by integrating the fuzzy clustering algorithm along with particle swarm optimization to improve user satisfaction in fog environments. In [20], Nguyen et al. suggested an optimization method for dealing with IoT devices in FC systems to address the work scheduling problem. To execute many tasks in the cloud-fog networks, the suggested approach's critical goal is to achieve an optimum balance between time cost and work arrangements. A novel workflow scheduling strategy focused on utilizing an enhanced variant of the ant colony algorithm in multiple processor ecosystems was proposed by Boveiri et al. in [21]. A new advanced algorithm was implemented by Tong et al. in [22] by integrating the power of the neural network and the Q-learning method, specifically the allocation of Q-learning tasks. In cloud computing technology, the suggested algorithm is aimed at solving IoT workflow scheduling.

            Yang et al. in [23] introduced a new task allocation approach focused on utilizing the game technique to maximize the efficiency of the Internet objects activities in CC methods. A multi-objective optimization technique is suggested in [13] to address the job scheduling in FC ecosystems. In this analysis, a couple of principal variables are determined: the output rate and the allocation of resources. In [24], Mtshali et al. conducted a workflow scheduling scheme according to a visualization approach to create a helpful approach that can evaluate the optimum energy damage in fog computation circumstances with a low delay. A work scheduling method utilizing the moth-flame optimizer to determine a collection of jobs for FC nodes was proposed by Ghobaei-Arani et al. in [25]. This strategy aimed to achieve QoS satisfaction by minimizing the overall performance time of the tasks. A modern intelligent task scheduling approach utilizing a gray wolf optimizer to address CC challenges was suggested by Abualigah et al. in [16]. This approach aimed to find the optimum cost of time and resource distribution of the instrument's question. Zeng et al. in [26] proposed the job scheduling approach in FC ecosystems to support secured devices. The suggested approach has developed an optimized approach to schedule tasks and manage the resources with reduced task execution time to facilitate user operation.

            Abdel-Basset et al. in [27] introduced a multi-objective strategy to address the task scheduling for multiprocessor systems using the adjusted sine-cosine optimizer. The proposed method optimizes the makespan and energy. The proposed method is analyzed with several common multi-objective methods: it obtained superior results in most of the test cases. Xueying Guo introduced a CC approach for scheduling based on using multi-objective optimization based on a self-defense mechanism [28]. Several factors are taken in this research including least time, load balance, and the cost function. The empirical results revealed that the proposed method enhanced the performance of the original method and obtained better scheduling results compared with other methods.

            The general results of the task scheduling in the fog computing domain still need further investigation to obtain better results from the given studies. However, the latest developments can be better in regard to energy loss and makespan measures. Thus, we found a potential direction to investigate workflow scheduling in FC further. In the literature, it is also clear that the most suitable methods that have been successfully used in this domain are the modified and improved optimization methods. As observed, a new advanced approach using the improved technique is needed to solve the scheduling problems. The need of finding a new method to solve various task scheduling problems has become very important as this time the demands of the IoT applications in cloud computing become more and more.

            In the same context, arithmetic optimization algorithm (AOA) is an evolutionary metaheuristic technique proposed by Abualigah et al. in [29]. Evolutionary algorithms proved their ability to address various real-world engineering problems [30], which motivated us to conduct this research using the recently introduced evolutionary optimization method (i.e., AOA). AOA employs the distribution behavior of the leading arithmetic operators in mathematical science, including multiplication (M), division (D), subtraction (S), and addition (A). This algorithm was recently successfully employed to address various complicated optimization problems, such as classical benchmark functions, advanced CEC2005 benchmark functions, and real-world engineering design problems. However, the performance of AOA still requires more improvement, especially during the exploitation phase. This motivated us to enhance the ability of AOA and apply it to real-world problems. In this research, an intelligent IoT application workflow scheduling method is proposed based on the use of the AOA in FC ecosystems, called AOAM. The suggested method improved the conventional AOA using effective and powerful operators from the MPA [31]. In general, MPA is a metaheuristic technique proposed to solve various engineering problems. It is inspired by the general foraging approach, namely Levy distribution and Brownian movements in ocean predators and optimal defiance rate method in biological communication between predator and prey.

            AOA and MPA operatives' advantages are linked to achieve a robust method to tackle the task scheduling problems efficiently. The proposed approach seeks to optimize the total energy consumption and makespan time values experimented in this study to test IoT devices' QoS specifications. Comprehensive experiments with different datasets and task sizes validate the proposed AOAM performance. The achieved results demonstrate that the suggested AOAM gets more excellent results in almost all analysis scenarios. It is a powerful and promising task scheduling approach compared with other well-known comparative methods reported before.

            The main improvements of this study are listed as follows:

            1. An intelligent hybrid workflow scheduling approach is proposed to utilize the arithmetic optimization algorithm (AOA) for IoT device utilization in fog computing environments

            2. We analyzed IoT devices' QoS demands in terms of total energy consumption and makespan measures

            3. We assessed the effectiveness of the developed AOAM system in terms of several different standard evaluation criteria by providing comprehensive experiments with different task utilization scenarios

            This study's structure is rendered as follows: Section 2 presents the problem formulation and fitness function used to handle the task scheduling problem. Traditional arithmetic optimization algorithm and MPA are discussed in Section 3. The suggested IoT task scheduling using the enhanced optimization of AOA is given in Section 4. In Section 5, the experimental results and discussion are provided. In Section 6, we concluded the successes and proposed future work.

            2. Model and Problem Description

            This part explains the system design and the communication among various elements involved in the task scheduling phase of the suggested system. The task scheduling problem is then formulated.

            2.1. System Model

            This study assumes that the fog broker built in the fog layer is the main component of the suggested framework. The fog broker consists of three primary parts: task receiver, cloud-fog information duty, and task scheduler (TS). The task receiver gets all task demands obtained from IoT things and subscribers. This component manages the IoT tasks' characteristics and service requirements and then transmits them to the task scheduler. The cloud-fog information service gathers and monitors status reports of the resources possible. Also, it gives the computing nodes' status with the TS to better prepare proper schedule decisions. The TS deals with task scheduling by assigning the task requests to the relevant computing nodes following the task characteristics and the available resources' capabilities. Finally, handling the task applications is collected and returned to the fog mediator, which forwards them to the corresponding customers.

            2.2. Problem Description

            In this section, we introduce the mathematical description of the task scheduling problem. Consider there are n independent tasks (T={T1, T2, T3,…, Tn}) that are received by the fog mediator to be passed through the CC and FC environments. These tasks have properties such as input/output file size, memory requirement, and task length (millions of instructions (MI)). In addition, assume that the system of cloud-fog contains a set of m computing nodes (CN) that consists of mcloud and mFog nodes (i.e., CN=mcloudmFog). Each CNj,  j=1,2,…, m holds its characteristics such as storage capacity, memory size, network bandwidth, and CPU processing rate (millions of instructions per second (MIPS)).

            Therefore, the expected computing time of Tk,  k=1,2,…, n requests on CNj,  j=1,2,…, m is given by ECT and the task scheduler used it to determine the suitable schedule decision [32]. In general, the ECT of the task Tk on CNj is represented by ECTk,j and computed using the following equation:

            (1)ECTk,j=TLkPj.

            In equation (1), Pj denotes the processing speed of CNj and TLk denotes the length of task Tk. The makespan (MK) computed for a schedule X is given as follows:

            (2)MKX=maxj1,2,,mk=1nECTk,j.

            The energy consumption of the server represents nearly 60% of its active state. The energy consumption of CNj is represented by the energy consumed in its idle and active states. Also, the idle time of each CNj is denoted by its execution time subtracted from its makespan. So, the energy consumption of CNj (in terms of Joules) can be formulated as follows:

            (3)ECNj=Etj×bj+MKEtj×aj×Pj,
            (4)bj=108×Pj2,
            (5)aj=0.6×bj.

            In equation (3), Etj and MK represent the total execution time and makespan of CNj. bj denotes the consumed energy in the active state for CNj. The total energy consumption (Toteng) in cloud-fog environment can be calculated as follows:

            (6)Toteng=j=1mECNj.

            2.3. Fitness Function

            In this portion, the formulation of the fitness function used to determine the solution's quality for the task scheduling problem is given. Our objective is to optimize the makespan and total energy consumption since both have major influence on the overall performance of the fog system. This problem is considered a bi-objective problem, and the fitness function can be formalized as follows:

            (7)Fit=η×Toteng+1η×MK,
            where η denotes the balance parameter between the two factors of the fitness function. Hence, our task scheduling objective is to minimize Fit. In general, the weighted sum approach is used to solve the current bi-objective optimization problem (i.e., makespan and total energy consumption). This approach has high ability to determine a single unique solution for the tested problem. Followed [33, 34], the minimization of equation (7) is always Pareto optimal.

            3. Algorithm Background

            3.1. Arithmetic Optimization Algorithm (AOA)

            Within this section, the mathematical inspiration of arithmetic optimization algorithm (AOA) [29] as metaheuristic techniques is introduced. In general, AOA emulates the function of the basic arithmetic operators (i.e., subtraction S, addition (A), division (D), and multiplication (M)).

            AOA starts with building the initial candidate solutions (X), which consists of N solutions, as given in

            (8)X=x1,1x1,jx1,n1x1,nx2,1x2,jx2,nxN1,1xN1,jxN1,nxN,1xN,jxN,n1xN,n,
            where n represents each solution's dimension, and then, AOA computes the fitness value of Xi,  i=1,2 …, N and finds the best solution Xb. Then, the solutions (X) are updated according to either the exploitation phase or the exploration phase, and this is determined based on the value of the math optimizer accelerated (MOA) function formulated as follows:
            (9)MOAt=MinM+t×MaxMMinMtmax,
            where t denotes the current iteration, and MaxM and MinM refer to the accelerated function's maximum and minimum values, respectively.

            In the exploration phase, the updating process is performed using the division (D) or multiplication (M) operators. Followed [29], these operators are used to explore the search space to discover the infeasible region. The mathematical formulation of updating each solution (Xi,  i=1,2,…, N) in the current population X, based on the current best solution Xb at iteration t, is given as follows:

            (10)Xi,jt+1=Xb,jMOP+ε×Dmj+LBj,if r2<0.5,Xb,j×MOP×Dmj+LBj,otherwise.

            In equation (10), Dmj=Dj × μUBj and LBj are boundaries of search space at jth dimension. Dj=(UBj − LBj), and ε is very small number to avoid division by zero. μ=0.5 refers to a control parameter value, whereas MOP denotes the probability of the math optimizer, which is formulated as follows:

            (11)MOPt=1t1/αtmax1/α.

            In equation (11), tmax signifies the maximum number of iterations. α=5 is a dynamic parameter used to specify the precision of exploitation search method.

            Moreover, in the exploitation phase, the addition (A) and subtraction (S) are used to update the solutions (X) inside the discovered feasible region. The formulation of this updating process is given as follows:

            (12)Xi,jt+1=Xb,jMOP×Dj×μ+LBj,r3<0.5,Xb,j+MOP×Dj×μ+LBj,otherwise.

            In equation (12), r3 ∈ [0,1] refers to a random number applied to control the process of using either the subtraction operator or the addition operator.

            Thereafter, the updating process of the solutions is repeated until reaching the stop conditions and then returning the best solution Xb. The details of AOA are outlined in Algorithm 1.

            3.2. Marine Predators Algorithm

            This section introduces the steps of the marine predators algorithm (MPA) [31]. In general, MPA emulates the behavior of predators to catch the prey. The first step in MPA is to produce a set of N solutions X using the following equation:

            (13)X=LB+rand×UBLB,
            where rand ∈ [0,1] denotes a random number. LB and UB are the limit boundaries of search space [35]. Then, the Elite matrix is constructed as formulated in the following equation:
            (14)Elite=X111X121X1  d1X211X221X2  d1Xn11Xn21Xn  d1.

            The process of updating the solutions is performed through three stages [36], and the details of these stages are given as follows:

            • (1)

              In the first stage, the prey is faster than the predator. So, the predator still moves without stopping and this happens during the first third of the optimization period. The mathematical formulation of updating the position of prey is given as follows:

              (15)Si=RB×EliteiRB×Xi,i=1,2,,N,
              (16)Xi=Xi+P×R×Si,P=0.5.

            • In equation (16), R ∈ [0,1] denotes a random number and RB represents a Brownian motion value.

            • (2)

              In the second stage, it is considered that the prey and the predator have the same velocity. This happens during the middle interval of the period. The predator and prey's movement is simulated using the Brownian technique and the Levy flight technique, respectively. Within this stage, X is divided into halves; the first half is updated using the following equations:

              (17)Xi=Xi+P×R×Si,
              (18)Si=RL×EliteiRL×Xi,i=1,2,,N.

            • In equation (17), RL denotes the value generated using Levy distribution. Meanwhile, the second half of X is updated using the following equation:

              (19)Xi=Elitei+P×CF×Si,
              (20)CF=1ttmax2t/tmax,
              (21)Si=RB×RB×EliteiXi,i=1,2,,N,
               where t and tmax are the present and maximum number of iterations, respectively.

            • (3)

              In the third stage, it is considered that the predator has velocity faster than the velocity of the prey, and this occurred during the last third of the optimization period. The mathematical formulation of updating the solution is given in the following equation:

            (22)Xi=Elitei+P×CF×Si,
            (23)Si=RL×RL×EliteiXi,i=1,2,,N.

            Followed [31], the eddy formation and fish aggregating devices (FADS) can change the behavior of the predators, and MPA formulated this as in the following equation:

            (24)Xi=Xi+CFLB+R×UBLB×U,r5<FAD,Xi+FAD1r+rXr1Xr2,r5>FAD.

            In equation (24), U refers to a binary vector, FAD=0.2; r, r1, and r2 are random values in [0, 1].

            In addition, a marine has a memory that supports its ability to remember its previous position. So, this behavior is added to the MPA by comparing the current position with its previous one. The full steps of MPA are given in Algorithm 2.

            4. The Proposed Task Scheduler

            Within this section, the main steps of the developed task scheduler method are introduced as in Figure 2. This proposed method depends on improving the arithmetic optimization algorithm (AOA) behavior using the advantages of MPA. The main target of using MPA is to enhance the local searching ability of AOA. This leads to avoid attraction to local points and increase the convergence speed.

            The first step of the developed task scheduler method, named AOAM, is to construct the initial population X, which contains N solutions. Then, the fitness value (Fiti) is calculated and the best solution (Xb) is determined. Thereafter, the solutions X inside the current population are updated using AOA and MPA operators. This process of updating solutions is repeated until the terminal conditions are satisfied and return Xb. The description of the developed method is given in the following sections with more details.

            4.1. Initial Phase

            In this phase, the initial population X is constructed using the following equation:

            (25)Xij=floorLBij+rand×UBijLBij,j=1,2,,n.

            In equation (25), rand ∈ [0,1] is a random number. LB and UB refer to the limitations of the search space, and it is set to 1, and NM denotes the number of computing nodes. The dimension of Xi is set to NT, representing the number of tasks. floor(·) is applied to convert the actual values to discrete values. This is suitable for this kind of discrete optimization problem, such as task scheduling problems.

            4.2. Updating Stage

            In this phase, AOAM determines the quality of each solution by computing its fitness value (Fiti) that is given in equation (7), followed by determining the smallest fitness value and its corresponding solution, which represents the best solution Xb. The next step is to adopt the current population X using AOA and MPA operators as given in the following equation:

            (26)Xit+1=update Xi using AOAif rand0.5,update Xi using MPAif rand<0.5,
            where rand ∈ [0,1] is a random number used to switch between AOA and MPA operators.

            Finally, the stop conditions are checked, and when they are satisfied, the steps of the updating phase are stopped and the best solution Xb is returned. The pseudo-code of the AOAM is given in Algorithm 3.

            4.3. Computational Complexity Analysis

            This subsection provides the time complexity analysis of the aforementioned three algorithms. Assume N be the population size (number of solutions), M is the number of iterations, and L is the number of parameters (dimension). The computational complexity of AOA is O(N × (M × L+1)) [29]. The computational complexity of MPA is O(M × (N × L+Cof∗N)) [31], where Cof signifies the objective function cost. According to the steps of the proposed AOAM algorithm, the time complexity of population initialization (step 2 of the algorithm) is O(N) and the time complexity of updating solutions (steps 4 − 11 of the algorithm) is O(N × M). Therefore, the overall time complexity of AOAM is O(N+N × M), that is, O(N × M).

            5. Experimental Studies

            This section offers a detailed experimental performance evaluation of the contributions suggested in this study. In particular, the simulation settings and datasets are introduced in Section 5.1. The performance metrics are described in Section 5.2. Finally, the experimental results along with discussions are provided in Section 5.3.

            5.1. Experimental Settings

            All the experiments are conducted using MATLAB R2018a on a Dell PC configured with an Intel Core i5 CPU of 2.40 GHz frequency, 4GB RAM, and Windows 10 operating system. We remark the MATLAB simulator's widespread adoption for evaluating the schemes published in the literature [3739]. The cloud-fog framework in our tests consists of fog nodes that have small processing power. However, they are closer to the IoT devices and have a minimal delay. On the other hand, cloud nodes can quickly execute IoT tasks, but they need a long time to embrace them. The FC ecosystem contains two data centers, 4 hostess machines, and 20 VMs of various arrangements in all of the tests.

            Consequently, the suggested algorithms should manage the equilibrium between fog and cloud nodes to enhance system performance. Table 1 lists the attributes of the hosts and VMs. As represented in Table 1, the most inactive and active VM processing capacities are 1000 and 5000 MIPS, respectively.

            In our experiments, both synthetic and natural workloads are mainly involved. The real workloads are generated from the “Parallel Workload Archives” that consist of HPC2N and NASA Ames iPSC/860. These workload archives are made available to the research community in the standardized workload format (SWF) [40]. The NASA iPSC log comprises about 42,264 tasks, while the HPC2N comprises about 527,371 tasks. On the other hand, the synthetic workload consists of 1500 tasks with lengths ranging from 2,000 to 56,000 MI generated from a uniform distribution. The specification of the synthetic workload is listed in Table 2.

            5.2. Evaluation Metrics

            In this article, our objective is to guarantee lower energy consumption with a better makespan. We measured the overall energy consumption and makespan for assessing the efficiency of the AOAM against other peer algorithms. In the following, we present those two performance metrics.

            The makespan is defined as the completion time of the last accomplished task. A minimum makespan implies efficient mapping of user tasks to CNs. Makespan is computed on the basis of equation (2).

            The total energy consumption is defined as the energy consumed by the physical resources (which involves all cloud and fog nodes). For a practical system, the energy consumption of the CNs should be minimal. The total energy is calculated as specified in equation (6).

            5.3. Results and Discussion

            For comparative analysis, five state-of-the-art algorithms, including the standard AOA [29], Manta ray foraging optimization (MRFO) algorithm [41], marine predators algorithm (MPA) [31], Chimp optimization algorithm (CHOA) [42], Salp swarm algorithm (SSA) [43], and AEOSSA [10], are chosen as peer algorithms in this study. Table 3 lists the parameter settings for all peer algorithms. Each algorithm was independently performed 30 times on each test instance to achieve more accurate estimates of our results. To ensure a fair comparison, the population size for each algorithm is set to 100. Moreover, η is set to 0.7 since our main concern is to reduce energy consumption. The parameters of each algorithm are based on its original implementation.

            To study the performance behavior of the proposed AOAM algorithm, we plotted curves for the average fitness values obtained by AOAM and other comparison algorithms (MRFO, MPA, AOA, AEOSSA, SSA, and CHOA) for a different number of tasks, as shown in Figures 3Figure 45. The curves visualize the average fitness values generated by the algorithms for different datasets and task sizes. The number of tasks is shown along the x-axis. At the same time, the value of the fitness function is represented along the y-axis. Note that the fitness value is impacted by 70% of the total energy consumption value plus 30% of the value of the makespan.

            The curve of the synthetic workload is illustrated in Figure 3. The figure shows that the AOAM algorithm succeeded in obtaining lower fitness values compared with other methods when tasks vary between 300 and 1500. Similarly, the curve of fitness values for NASA Ames iPSC dataset depicted in Figure 4 establishes the better performance of the AOAM algorithm as compared to other comparison algorithms. Moreover, AOAM has succeeded in attaining lower fitness values than other scheduling approaches for the HPC2N actual workload, while the tasks vary from 1000 to 5000, as seen in Figure 5. The curves present that combining the MPA method with the AOA boosts its ability to find near-optimal solutions.

            Figures 6Figure 78 present the average makespan results obtained by the AOAM, AOA, MRFO, AEOSSA, MPA, SSA, and CHOA for the synthetic and real datasets with different task sizes. From Figure 6, we see that the AOAM is significantly better than the other peer algorithms on all of the synthetic instances considered. Similarly, from Figure 7, we can see that the AOAM performs significantly better than all of the other peer algorithms across all NASA Ames iPSC instances. Moreover, we can see from Figure 8 that the AOAM is substantially better compared with other five peer methods over all the HPC2N scenarios. Finally, the figures' results indicate that AOAM generates the best makespan among all six peer algorithms for all the tested instances.

            The comparison of the total energy consumption between AOAM, AOA, AEOSSA, MRFO, MPA, SSA, and CHOA using both synthetic and real workload traces is shown in Figures 9Figure 1011. Figure 9 shows that the proposed AOAM algorithm attains the lowest energy consumption compared with the original AOA and other peer algorithms for the synthetic dataset. Similarly, Figure 10 shows that the proposed algorithm, AOAM, achieves the lowest energy consumption compared with the other peer algorithms when the NASA Ames iPSC workload is considered. Furthermore, Figure 11 illustrates that the AOAM provides the lowest energy consumption in contrast to other peer algorithms when the HPC2N workload is taken into account. In a nutshell, the comparison results reveal that AOAM generates a better energy consumption than all other peer algorithms for all task sizes and datasets.

            5.4. Statistical Results

            To assess whether there are significant improvements in the results obtained by the developed method and other methods, a nonparametric test named the Friedman test is used. This test provides a P value that indicates whether the control group (AOAM) has a significant difference with other MH techniques or not based on different performance measures including makespan, energy, and fitness value. The mean rank of each algorithm over the tested datasets in terms of performance metrics is given in Table 4. From the given results, it can be seen that in terms of makespan the developed method has the best mean rank overall the competitive algorithms with P value of 1.39e − 4, whereas in terms of energy, it can be observed that the developed AOAM achieves the first rank followed by MRFO and AOA in the second and third ranks, respectively, over the three datasets.

            In summary, the findings revealed that the AOAM algorithm provides better solution quality and diversity, thus leading to near-optimum solutions. Overall, the results shown above justify the advantage of incorporating the MPA strategy along with the AOA. Therefore, integrating MPA with the AOA can effectively increase the search efficiency to achieve better solutions for all examined workload instances.

            6. Conclusion

            Task scheduling is among the significant challenges in cloud and fog computing environments because of the variability and dynamicity of the resources and the high volatility of service requests from cloud subscribers. This study proposed a hybrid algorithm that combines AOA with the marine predators algorithm (MPA) to find an appropriate solution for optimizing the fog task scheduling. The suggested AOAM approach is an attempt to enhance the solution goodness and convergence ratio of the original AOA. The performance of AOAM is evaluated and contrasted with the standard AOA and other four optimization algorithms, including MRFO, MPA, AEOSSA, SSA, and CHOA. The experimental results confirm the effectiveness of our AOAM approach in terms of makespan and total energy consumption. More specifically, the obtained results revealed that the AOAM is better than the original AOA and outperforms all comparative algorithms in all of the tested instances.

            In future work, we plan to investigate the performance of the AOAM approach in large-scale computing environments with hundreds of servicing nodes, considering more objectives such as response time, transmission costs, reliability, and security to fulfill the growing customer needs. In addition, AOAM could be further improved and integrated with other optimization algorithms to tackle more optimization problems such as vehicle routing problems, job shop scheduling, quadratic assignment, and traveling salesman problem.

            Acknowledgments

            This project was supported financially by the Academy of Scientific Research and Technology (ASRT), Egypt (Grant No. 6624).

            Data Availability

            The data used to support the findings of this study are available from the authors upon request.

            Conflicts of Interest

            The authors declare that there are no conflicts of interest regarding the publication of this study.

            References

            1. Abualigah L., Diabat A., Abd Elaziz M.. Intelligent workflow scheduling for big data applications in iot cloud computing environments. Cluster Computing . 2021. Vol. 24:1–20. [Cross Ref]

            2. Abualigah L., Diabat A., Sumari P., Gandomi A. H.. Applications, deployments, and integration of internet of drones (iod): a review. IEEE Sensors Journal . 2021. Vol. 21:[Cross Ref]

            3. Fu J.-S., Liu Y., Chao H.-C., Bhargava B. K., Zhang Z.-J.. Secure data storage and searching for industrial iot by integrating fog computing and cloud computing. IEEE Transactions on Industrial Informatics . 2018. Vol. 14(10):4519–4528. [Cross Ref] [2-s2.0-85041224602]

            4. Lin B., Guo W., Xiong N., Chen G., Vasilakos A. V., Zhang H.. A pretreatment workflow scheduling approach for big data applications in multicloud environments. IEEE Transactions on Network and Service Management . 2016. Vol. 13(3):581–594. [Cross Ref] [2-s2.0-84991294631]

            5. Kishor A., Chakraborty C., Jeberson W.. A novel fog computing approach for minimization of latency in healthcare using machine learning. Int J Interact Multimed Artif Intell . 2020. Vol. 1:

            6. Chen Z.-G., Zhan Z.-H., Lin Y., et al.. Multiobjective cloud workflow scheduling: a multiple populations ant colony system approach. IEEE Transactions on Cybernetics . 2018. Vol. 49:2912–2926. [PubMed]

            7. Kishor A., Chakarbarty C.. Task offloading in fog computing for using smart ant colony optimization. Wireless Personal Communications . 2021. Vol. 306:1–22. [Cross Ref]

            8. Liu X.-F., Zhan Z.-H., Deng J. D., Li Y., Gu T., Zhang J.. An energy efficient ant colony system for virtual machine placement in cloud computing. IEEE Transactions on Evolutionary Computation . 2016. Vol. 22:113–128

            9. Abualigah L., Diabat A.. A novel hybrid antlion optimization algorithm for multi-objective task scheduling problems in cloud computing environments. Cluster Computing . 2020. Vol. 24:1–19. [Cross Ref]

            10. Abd Elaziz M., Abualigah L., Attiya I.. Advanced optimization technique for scheduling iot tasks in cloud-fog computing environments. Future Generation Computer Systems . 2021. Vol. 124:142–154. [Cross Ref]

            11. Kishor A., Chakraborty C., Jeberson W.. Intelligent healthcare data segregation using fog computing with internet of things and machine learning. International Journal of Engineering Systems Modelling and Simulation . 2021. Vol. 12(2/3):188–194. [Cross Ref]

            12. Zhu C., Tao J., Pastor G., et al.. Folo: latency and quality optimized task allocation in vehicular fog computing. IEEE Internet of Things Journal . 2018. Vol. 6:4150–4161

            13. Yang M., Ma H., Wei S., Zeng Y., Chen Y., Hu Y.. A multi-objective task scheduling method for fog computing in cyber-physical-social services. IEEE Access . 2020. Vol. 8:65085–65095. [Cross Ref]

            14. Attiya I., Zhang X.. D-choices scheduling: a randomized load balancing algorithm for scheduling in the cloud. Journal of Computational and Theoretical Nanoscience . 2017. Vol. 14(9):4183–4190. [Cross Ref] [2-s2.0-85027992591]

            15. Abd Elaziz M., Attiya I.. An improved henry gas solubility optimization algorithm for task scheduling in cloud computing. Artificial Intelligence Review . 2021. Vol. 54(5):3599–3637. [Cross Ref]

            16. Abualigah L., Shehab M., Alshinwan M., et al.. Swarm Intelligence for Cloud Computing . 2020. Boca Raton, Florida: Chapman and Hall/CRC. p. 127–152. [Cross Ref]

            17. Tsai C.-W., Rodrigues J. J.. Metaheuristic scheduling for cloud: a survey. IEEE Systems Journal . 2013. Vol. 8:279–291

            18. Abualigah L., Yousri D., Abd Elaziz M., Ewees A. A., Al-qaness M. A. A., Gandomi A. H.. Aquila optimizer: a novel meta-heuristic optimization algorithm. Computers & Industrial Engineering . 2021. Vol. 157:[107250] [Cross Ref]

            19. Li G., Liu Y., Wu J., Lin D., Zhao S.. Methods of resource scheduling based on optimized fuzzy clustering in fog computing. Sensors . 2019. Vol. 19(9):p. 2122[Cross Ref] [2-s2.0-85065862219]

            20. Nguyen B. M., Thi Thanh Binh H., The Anh T., Bao Son D.. Evolutionary algorithms to optimize task scheduling problem for the iot based bag-of-tasks application in cloud–fog computing environment. Applied Sciences . 2019. Vol. 9(9):p. 1730[Cross Ref] [2-s2.0-85067194129]

            21. Boveiri H. R., Khayami R., Elhoseny M., Gunasekaran M.. An efficient swarm-intelligence approach for task scheduling in cloud-based internet of things applications. Journal of Ambient Intelligence and Humanized Computing . 2019. Vol. 10(9):3469–3479. [Cross Ref] [2-s2.0-85054557115]

            22. Tong Z., Chen H., Deng X., Li K., Li K.. A scheduling scheme in the cloud computing environment using deep q-learning. Information Sciences . 2020. Vol. 512:1170–1191. [Cross Ref]

            23. Yang J., Jiang B., Lv Z., Choo K.-K. R.. A task scheduling algorithm considering game theory designed for energy management in cloud computing. Future Generation Computer Systems . 2020. Vol. 105:985–992. [Cross Ref] [2-s2.0-85017476595]

            24. Mtshali M., Kobo H., Dlamini S., Adigun M., Mudali P.. Multi-objective optimization approach for task scheduling in fog computing. In: Proceedings of the 2019 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD); August 2019; Winterton, South Africa. IEEE. p. 1–6. [Cross Ref] [2-s2.0-85073499430]

            25. Ghobaei-Arani M., Souri A., Safara F., Norouzi M.. An efficient task scheduling approach using moth-flame optimization algorithm for cyber-physical system applications in fog computing. Transactions on Emerging Telecommunications Technologies . 2020. Vol. 31:[e3770]

            26. Zeng D., Gu L., Guo S., Cheng Z., Yu S.. Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system. IEEE Transactions on Computers . 2016. Vol. 65(12):3702–3712. [Cross Ref] [2-s2.0-84998610988]

            27. Abdel-Basset M., Mohamed R., Abouhawwash M., Chakrabortty R. K., Ryan M. J.. Ea-msca: an effective energy-aware multi-objective modified sine-cosine algorithm for real-time task scheduling in multiprocessor systems: methods and analysis. Expert Systems with Applications . 2021. Vol. 173:[114699] [Cross Ref]

            28. Guo X.. Multi-objective task scheduling optimization in cloud computing based on fuzzy self-defense algorithm. Alexandria Engineering Journal . 2021. Vol. 60(6):5603–5609. [Cross Ref]

            29. Abualigah L., Diabat A., Mirjalili S., Abd Elaziz M., Gandomi A. H.. The arithmetic optimization algorithm. Computer Methods in Applied Mechanics and Engineering . 2020. Vol. 376:[113609]

            30. Mnasri S., Nasri N., Alrashidi M., Van den Bossche A., Val T.. Iot networks 3d deployment using hybrid many-objective optimization algorithms. Journal of Heuristics . 2020. Vol. 26(5):663–709. [Cross Ref]

            31. Faramarzi A., Heidarinejad M., Mirjalili S., Gandomi A. H.. Marine predators algorithm: a nature-inspired metaheuristic. Expert Systems with Applications . 2020. Vol. 152:[113377] [Cross Ref]

            32. Attiya I., Abd Elaziz M., Xiong S.. Job scheduling in cloud computing using a modified Harris hawks optimization and simulated annealing algorithm. Computational Intelligence and Neuroscience . 2020. Vol. 2020:[3504642] [Cross Ref]

            33. Zadeh L.. Optimality and non-scalar-valued performance criteria. IEEE Transactions on Automatic Control . 1963. Vol. 8(1):59–60. [Cross Ref] [2-s2.0-84939004610]

            34. Goicoechea A., Hansen D. R., Duckstein L.. Multiobjective decision analysis with engineering and business applications. 1982. Hoboken, NJ, USA: John Wiley & Sons.

            35. Al-Qaness M. A. A., Ewees A. A., Fan H., Abualigah L., Abd Elaziz M.. Marine predators algorithm for forecasting confirmed cases of covid-19 in Italy, USA, Iran and korea. International Journal of Environmental Research and Public Health . 2020. Vol. 17(10):p. 3520[Cross Ref]

            36. Eid A., Kamel S., Abualigah L.. Marine predators algorithm for optimal allocation of active and reactive power resources in distribution networks. Neural Computing and Applications . 2021. Vol. 33:1–29. [Cross Ref]

            37. Al-Khafajiy M., Baker T., Al-Libawy H., Maamar Z., Aloqaily M., Jararweh Y.. Improving fog computing performance via fog-2-fog collaboration. Future Generation Computer Systems . 2019. Vol. 100:266–280. [Cross Ref] [2-s2.0-85065852869]

            38. Karimiafshar A., Hashemi M. R., Heidarpour M. R., Toosi A. N.. Effective utilization of renewable energy sources in fog computing environment via frequency and modulation level scaling. IEEE Internet of Things Journal . 2020. Vol. 7(11):10912–10921. [Cross Ref]

            39. Shukri S. E., Al-Sayyed R., Hudaib A., Mirjalili S.. Enhanced multi-verse optimizer for task scheduling in cloud computing environments. Expert Systems with Applications . 2021. Vol. 168:[114230] [Cross Ref]

            40. Parallel workloads archive. 2021. http://www.cse.huji.ac.il/labs/parallel/workload/logs.html

            41. Zhao W., Zhang Z., Wang L.. Manta ray foraging optimization: an effective bio-inspired optimizer for engineering applications. Engineering Applications of Artificial Intelligence . 2020. Vol. 87:[103300] [Cross Ref]

            42. Khishe M., Mosavi M. R.. Chimp optimization algorithm. Expert Systems with Applications . 2020. Vol. 149:[113338] [Cross Ref]

            43. Mirjalili S., Gandomi A. H., Mirjalili S. Z., Saremi S., Faris H., Mirjalili S. M.. Salp swarm algorithm: a bio-inspired optimizer for engineering design problems. Advances in Engineering Software . 2017. Vol. 114:163–191. [Cross Ref] [2-s2.0-85025449158]

            Floating objects

            Figure 1

            Fog computing structure.

            Figure 2

            Developed AOAM.

            Figure 3

            Fitness value for the synthetic workload.

            Figure 4

            Fitness value for real workload NASA iPSC.

            Figure 5

            Fitness value for real workload HPC2N.

            Figure 6

            Average makespan for the synthetic workload.

            Figure 7

            Average makespan for real workload NASA iPSC.

            Figure 8

            Average makespan for real workload HPC2N.

            Figure 9

            Total energy consumption for the synthetic workload.

            Figure 10

            Total energy consumption for real workload NASA iPSC.

            Figure 11

            Total energy consumption for real workload HPC2N.

            Algorithm 1

            Steps of AOA.

            Algorithm 2

            Steps of MPA.

            Algorithm 3

            AOAM scheduler.

            Table 1

            Characteristics of experimental parameters.

            Cloud EntityParameterValue
            DatacenterNo. of data centers2
            ClientNo. of clients100–200
            HostNo. of hosts4
            Storage capacity2 TB
            RAM20 GB
            Bandwidth capacity10 Gb/s
            Policy typeTime shared

            VMNo. of VMs20
            CPU power1000–5000 MIPS
            RAM2 GB
            Storage10 GB
            Bandwidth capacity1 Gb/s
            No. of CPUs1
            Table 2

            Characteristics of synthetic workload.

            ParameterValue
            No. of tasks300 to 1500
            Length of the task2000 to 56 000 MI
            File size400 to 600 MB
            Output size400 to 600 MB
            Table 3

            Parameter settings of AOAM and peer algorithms.

            AlgorithmParameterValue
            AOAMOPMax1
            MOPMin0.2
            α 5
            μ 0.499

            MPAFADs0.2
            P 0.5

            CHOA a [−1, 1]
            f 2⟶0

            MRFO S 2
            r 1, r2, r3[0, 1]

            SSA c 1, c2, and c3[0, 1]

            AOAMMOPMax1
            MOPMin0.2
            α 5
            μ 0.499
            FADs0.2
            P 0.5
            Table 4

            Results of the Friedman test.

            SSACHOAMPAMRFOAOAAOAM P value
            MakespanSynthetic6543211.39e − 04
            NASA6543211.39e − 04
            HPC2N6543211.39e − 04

            EnergySynthetic5.85.242.22.812.09e − 04
            NASA653.62.4313.13e − 04
            HPC2N653.623.411.88e − 04

            FitnessSynthetic5.85.242.22.812.09e − 04
            NASA653.62.4313.13e − 04
            HPC2N653.623.411.88e − 04

            Author and article information

            Contributors
            Journal
            Comput Intell Neurosci
            Comput Intell Neurosci
            cin
            Computational Intelligence and Neuroscience
            Hindawi
            1687-5265
            1687-5273
            2021
            24 December 2021
            : 2021
            : 9114113
            Affiliations
            1Department of Mathematics, Faculty of Science, Zagazig University, Zagazig 44519, Egypt
            2Academy of Scientific Research and Technology (ASRT), 101 Qasr Al Aini St., Cairo PO Box 11516, Cairo, Egypt
            3Artificial Intelligence Research Center (AIRC), Ajman University, Ajman 346, UAE
            4Faculty of Computer Science Engineering, Galala University, Suze 435611, Egypt
            5School of Computer Science and Robotics, Tomsk Polytechnic University, Tomsk 634050, Russia
            6Faculty of Computer Sciences and Informatics, Amman Arab University, Amman 11953, Jordan
            7School of Computer Sciences, Universiti Sains Malaysia, Gelugor, Pulau Pinang 11800, Malaysia
            Author notes

            Academic Editor: Miaolei Zhou

            Author information
            https://orcid.org/0000-0002-7682-6269
            https://orcid.org/0000-0002-2203-4549
            https://orcid.org/0000-0002-4340-1934
            https://orcid.org/0000-0003-3313-2299
            Article
            10.1155/2021/9114113
            8720004
            833b912b-938b-4145-a589-19e57f36ae0a
            Copyright © 2021 Mohamed Abd Elaziz et al.

            This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

            History
            : 19 July 2021
            : 28 October 2021
            : 29 November 2021
            Funding
            Funded by: Academy of Scientific Research and Technology
            Award ID: 6624
            Categories
            Research Article

            Neurosciences

            Comments

            Comment on this article