You are on page 1of 6

International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

RESEARCH ARTICLE OPEN ACCESS

TASK SCHEDULING IN CLOUD ENVIRONMENT


Dr. Isabella Jones
Academic Development Manager, Goldsmiths, University of London

ABSTRACT
By the upgrading request of the distributed computing items, task booking issue has become the hot examination
subject around there. The undertaking booking issue of the distributed computing strategy is more troublesome than
the traditional appropriated framework. Most of the past booking plans utilize virtual machine occasions, which
takes gigantic beginning up time and requires the full assets to play out the undertakings. The proposed approach
uses an Adaptive Neuro-Fuzzy Inference System (ANFIS) – Black Widow Optimization (BWO) (ANFIS-BWO)
strategy for building up the correct Virtual Machine (VM) for each undertaking with less postponement. Asset
booking is another significant goal for ideal use of assets (workers) in the cloud climate. The BWO calculation is
utilized to acquire the best arrangement in the ANFIS plot. The proposed approach can utilize the VMs on the best
worker by the ideal planning plan. The principle point of the proposed approach is to limit the computational time,
computational expense, and energy utilizations of the assignments with helpful asset use. We portray that the
proposed approach performs in a way that is better than the current methodology concerning execution
measurements, for example, computational time, makespan, energy utilization, computational expense, and asset
use.
Keywords: Task scheduling, Virtual machines, BWO, ANFIS and cloud environment

I. INTRODUCTION Since different IoT gadgets are assembled, the


measure of information to be handled in the cloud
As of late, the distributed computing (CC) allows area has been significantly increased. The cloud is
greater speed organization of immense scope controlled such that all the customer assets and the
applications to work productively with the worker reacts to the information requested by the
improvement of computational prerequisite of outside customers by means of the capacity and
enormous scope applications [1-12]. The cloud offers worker's datasets [4].This figuring can be utilized
versatile and adaptable registering assets or gadgets extensively in various fields. However, there are a
to employed on the compensation per-use portrayal few issues that have been showed up in the IoT
[3]. A gigantic measure of occupations/errands improvement. Distributed computing experiences
present in the enormous scope applications. There are issues in position-mindful applications and is
four classifications of distributed computing rewardingly delay-touchy, however can scarcely be
utilization models. introduced in enormous amount because of the high
They are private cloud, half and half cloud, network development cost before gigantic IoT devices[20-25].
cloud, and public cloud. It additionally comprises of The improved Scheduling Algorithm for QoS is
different help models, for example, programming as- moderatelyquicker than the targetobsessed planning
a-administration (SAAS), framework as-a- and thus, it is suitable for more effectuallysaving and
administration (IAAS) and stage as-a-administration recouping E-wellbeing certifications from the cloud.
(PAAS) [13-15].Cloud processing grants entryto The tale task planning calculation isused to upgrade
shared framework assets resultant in highcomputing the QoS attributesthatconsist of measurements like
power with sensibly little administration tries. Virtual calculation time, reaction time, cost, and
machines (VM's) can be impacted to utilize the actual accessibility. [26-30]. Since different IoT gadgets are
machine assets without legitimately helping out assembled, the measure of information to be handled
it.The traditional cloud framework is colossally in the cloud area has been significantly increased.
famous; it has raised beginning arrangement and The cloud is controlled such that all the customer
maintaining cost. In an organization separated region assets and the worker reacts to the information
[16-19], the customary cloud neglects to play out any requested by the outside customers by means of the
capacity that includes dissemination of the sensor or capacity and worker's datasets [31-40].This figuring
estimation. can be utilized extensively in various fields.
However, there are a few issues that have been
showed up in the IoT improvement.

ISSN: 2347-8578 www.ijcstjournal.org Page 26


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

II. RELATED WORKS executing gadget that is doled out for the comparing
task. The energy utilization of the assignment
Ramkumar et al. [41] proposed a Multi-target depends on the energy utilized by the sending
Cuckoo Search Optimization (MOCSO) approach for channel and the assets when the undertaking is
the asset planning issue. The objective of this handled in the registering worker. In this, the gadget
calculation is to limit cloud use expenses and must use the base measure of assets that will diminish
increment effectiveness by diminishing makespan the general energy utilization for task consummation.
time, which assists with boosting income or The proposed approach finds the fitting gadget for
advantage for cloud suppliers with the most elevated each undertaking and appoints it to the ideal worker
asset utilization in the distributed computing climate [46-54].
of IaaS. It is suitable for distributed computing due to Consider there are two sorts of clients like IoT based
its proficient asset use by means of the base expense just as Non-IoTbased who can advance the few sorts
and season of makespan. The cuckoo search of utilizations or undertakings (eg. demand based
calculation is hybridized with improved and meta- undertakings, memory-serious errands, function
heuristic methodologies end up being effective for driven assignments) to the cloud server farm for
the distributed computing climate. Balakiruthiga et handling. Yet, a portion of the IoT deviceshave
al. [42] proposed the whale improvement calculation preparing capability and capacity for playing out
(WOA) for task planning for the cloud some miniature administrations applications or
environment.It plans the assignment that relies upon errands.
wellness limitation. The wellness constraintwas The activity of the affirmation regulator is to
dependent on three mainconstrictions: energy, asset designate the undertaking regulator either to the
utilization,and nature of administration. What's more, holder plan or virtual machine supervisor for extra
the planned undertaking relies upon the over three processing.Hence, the exact virtual machine allotted
imperatives so the usage season of the assignment which gains less expense or time for task execution is
and priceoccupied in the execution on virtual the serious issue [55-60]. The planning technique
machines is irrelevant. The better QoS improves the sorts out the solicitation for getting to the support of
framework by and large execution and hence, ensures the clients. This timetable depends on the energy and
the improved booking request for the errand limit engaged with running the undertaking. Let us
execution. consider the cloud involves qm number of actual
Chu et al. [43] presented the new half and half antlion machines that can be spoken to as.
enhancement calculation through world class based
differential advancement for settling multi-target task

Pm = pm1 , pm 2 , ..., pmj , ..., pmqm 
booking issues in distributed computing conditions. (1)

 
This methodology was improved by utilizing tip top
based differential advancement as the nearby pursuit vmj = v1j , v2j , ..., vkj , ..., vhj
strategy to upgrade the investigation capacity and to (2)
avoid giving caught in bound optima.The proposed
technique is improved to broaden time multifaceted Else, the IoT gadgets and all non-IoT gadgets can
nature [43]. Sivaram et al. [44] proposed a multi- transfer the applications to the cloud server farm. The
target advancement approach relies upon the confirmation regulator acknowledges the
upgraded molecule swarm is to improve the best undertakings from the clients and settles on a choice
arrangement precision, guarantee the calculation if the errands can be announced [61-68]. The above-
intermingling capacity, and distributed computing expressed choice relies upon the figuring assets
execution is improved. This calculation is improved availability of the workers.
for settling the multifaceted nature of the multi-target
streamlining issue Gochhayat et al. [45]. IV. RESULT AND DISCUSSION

III. PROPOSED METHODOLOGY Energy utilization of the errand is the aggregate sum
of energy used by the assets of the executing gadget
We consider the holder based cloud server farm that is doled out for the comparing task. The energy
model by the registering workers set which can utilization of the assignment depends on the energy
oblige compartments and virtual machine (VM) utilized by the sending channel and the assets when
events according to the necessities of the undertaking the undertaking is handled in the registering worker.
and is appeared. Energy utilization of the errand is In this, the gadget must use the base measure of
the aggregate sum of energy used by the assets of the assets that will diminish the general energy utilization
for task consummation. The proposed ANFIS-BWO

ISSN: 2347-8578 www.ijcstjournal.org Page 27


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

approach finds the fitting gadget for each undertaking [4] Sujitha, B., Parvathy, V. S., Lydia, E. L., Rani,
and appoints it to the ideal worker. P., Polkowski, Z., & Shankar, K. (2020).
The other methodology, for example, EECS and LB- Optimal deep learning based image
RC utilizes the errands for the suitable virtual compression technique for data transmission
machines that will burn-through high energy for the on industrial Internet of things
assignment execution. For the various methodologies, applications. Transactions on Emerging
measurements, for example, greatest worth, mean, Telecommunications Technologies, e3976.
least worth, and standard deviation (SD) are meant [5] Ezhilarasu, P., Krishnaraj, N., &Dhiyanesh, B.
and assessed relying upon the impacts of a few (2015). Arithmetic Coding for Lossless Data
information bases' energy consumption.The different Compression–A Review. International Journal
methodologies, for example, EECS, LB-RC, and of Computer Science Trends and
ANFIS exhibitions are more regrettable than our Technology, 3(3).
proposed approach. [6] Porkodi, V., Singh, A. R., Sait, A. R. W.,
The normal energy utilization for the proposed Shankar, K., Yang, E., Seo, C., & Joshi, G. P.
ANFIS-BWO approach is superior to the LB-RC by (2020). Resource Provisioning for Cyber–
22%, EECS calculation by 28%, and ANFIS by 31%. Physical–Social System in Cloud-Fog-Edge
Relies upon the tests, the proposed approach Computing Using Optimal Flower Pollination
accomplishes less energy utilization when contrasted Algorithm. IEEE Access, 8, 105311-105319.
with different methodologies for different datasets is [7] Gao, D., Wang, G. G., &Pedrycz, W. (2020).
appeared. Solving fuzzy job-shop scheduling problem
using DE algorithm improved by a selection
V. CONCLUSION mechanism. IEEE Transactions on Fuzzy
Systems.
The proposed approach technique is to build up the [8] Sivaram, M., Mohammed, A. S., Yuvaraj, D.,
privilege VM with lesser postponement. In this work, Porkodi, V., Manikandan, V., &Yuvaraj, N.
we have built up the fluffy based dark widow (2019, February). Advanced expert system
advancement calculation to acquire the ideal using particle swarm optimization based
boundaries in the cloud server.The principle adaptive network based fuzzy inference
commitment of this technique is to make the suitable system to diagnose the physical constitution of
virtual machines for each assignment, in view of human body. In International Conference on
multi-goal, for example, energy use, computational Emerging Technologies in Computer
time, computational expense, makespan, and asset Engineering (pp. 349-362). Springer,
usage. This strategy diminishes energy utilization, Singapore.
makespan, computational time, and offers effective [9] Jiménez, A. C., García-Díaz, V., González-
asset utilization. The calculation builds up an Crespo, R., &Bolaños, S. (2018).
appropriate worker dependent on the decision Decentralized Online Simultaneous
conspire for the virtual machine for better asset Localization and Mapping for Multi-Agent
usage. Systems. Sensors, 18(8), 2612.
[10] Venkatraman, S., Surendiran, B., & Kumar, P.
REFERENCES A. R. (2020). Spam e-mail classification for
the Internet of Things environment using
[1] Feng, Y., Yi, J. H., & Wang, G. G. (2019). semantic similarity approach. The Journal of
Enhanced Moth Search Algorithm for the Set- Supercomputing, 76(2), 756-776.
Union Knapsack Problems. IEEE Access, 7, [11] Lydia, E. L., Raj, J. S., PandiSelvam, R.,
173774-173785. Elhoseny, M., & Shankar, K. (2019).
[2] Sivaram, M., Batri, K., Amin Salih, M., Application of discrete transforms with
&Porkodi, V. (2019). Exploiting the Local selective coefficients for blind image
Optima in Genetic Algorithm using Tabu watermarking. Transactions on Emerging
Search. Indian Journal of Science and Telecommunications Technologies, e3771.
Technology, 12(1), 1-13. [12] Ezhilarasu, P., Prakash, J., Krishnaraj, N.,
[3] Venkatraman, S., &Surendiran, B. (2020). Kumar, D. S., Babu, K. S., &Parthasarathy, C.
Adaptive hybrid intrusion detection system for (2015). A Novel Approach to Design the
crowd sourced multimedia internet of things Finite Automata to Accept the Palindrome
systems. Multimedia Tools and with the Three Input Characters. Indian
Applications, 79(5), 3993-4010. Journal of Science and Technology, 8(28).

ISSN: 2347-8578 www.ijcstjournal.org Page 28


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[13] Devaraj, A. F. S., Elhoseny, M., Transport System in a metropolitan area. IEEE
Dhanasekaran, S., Lydia, E. L., & Shankar, K. Internet of Things Journal.
(2020). Hybridization of firefly and Improved [23] Gu, Z. M., & Wang, G. G. (2020). Improving
Multi-Objective Particle Swarm Optimization NSGA-III algorithms with information
algorithm for energy efficient load balancing feedback models for large-scale many-
in Cloud Computing environments. Journal of objective optimization. Future Generation
Parallel and Distributed Computing. Computer Systems, 107, 49-69.
[14] Zou, D., Wang, G. G., Sangaiah, A. K., & [24] Porkodi, V., Khan, J., Mohammed, A. S.,
Kong, X. (2017). A memory-based simulated Bhuvana, J., & Sivaram, M. OPTIMIZED
annealing algorithm and a new auxiliary COOPERATIVE QOS ENHANCED
function for the fixed-outline floorplanning DISTRIBUTED MULTIPATH ROUTING
with soft blocks. Journal of Ambient PROTOCOL.
Intelligence and Humanized Computing, 1-12. [25] Geerthik, S., Venkatraman, S., & Gandhi, R.
[15] Kumar, A., Ahuja, H., Singh, N. K., Gupta, D., (2016). AnswerRank: Identifying Right
Khanna, A., & Rodrigues, J. J. (2018). Answers in QA system. International Journal
Supported matrix factorization using of Electrical and Computer Engineering, 6(4),
distributed representations for personalised 1889.
recommendations on twitter. Computers & [26] Samad, A., Salima, R., Lydia, E. L., &
Electrical Engineering, 71, 569-577. Shankar, K. (2020). Definition and Features of
[16] Sivaram, M., Porkodi, V., Mohammed, A. S., Rural Marketing Strategies for Encourage
Manikandan, V., &Yuvaraj, N. (2019). Development in Rural Areas. TEST
Retransmission DBTMA protocol with fast Engineering & Management, 82, 4983-4988.
retransmission strategy to improve the [27] Palani, E., Nagappan, K., &Alhadidi, B.
performance of MANETs. IEEE Access, 7, (2016). Segmentation and Texture Analysis for
85098-85109. Efficient Classification of Breast Tumors from
[17] Venkatraman, S., & Kumar, P. A. R. (2019). Sonograms. Current Signal Transduction
Improving Adhoc wireless sensor networks Therapy, 11(2), 84-90.
security using distributed automaton. Cluster [28] Rajagopal, A., Ramachandran, A., Shankar,
Computing, 22(6), 14551-14557. K., Khari, M., Jha, S., Lee, Y., & Joshi, G. P.
[18] Lydia, E. L., Govindaswamy, P., (2020). Fine-tuned residual network-based
Lakshmanaprabu, S., &Ramya, D. (2018). features with latent variable support vector
Document clustering based on text mining K- machine-based optimal scene classification
means algorithm using euclidean distance model for unmanned aerial vehicles. IEEE
similarity. J. Adv. Res. Dyn. Control Access, 8, 118396-118404.
Syst.(JARDCS), 10(2), 208-214. [29] Mondragon, V. M., García-Díaz, V., Porcel,
[19] Ortin, F., Mendez, S., García‐Díaz, V., & C., & Crespo, R. G. (2018). Adaptive contents
Garcia, M. (2014). On the suitability of for interactive TV guided by machine learning
dynamic languages for hot‐reprogramming a based on predictive sentiment analysis of
robotics framework: a Python case data. Soft Computing, 22(8), 2731-2752.
study. Software: Practice and [30] Feng, Y., Yu, X., & Wang, G. G. (2019). A
Experience, 44(1), 77-104. Novel Monarch Butterfly Optimization with
[20] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z. Global Position Updating Operator for Large-
Hybrid Soft Computing Approach for Scale 0-1 Knapsack
Prediction of Cancer in Colon Using Problems. Mathematics, 7(11), 1056.
Microarray Gene Data. Current Signal [31] Mohammed, A. S., & Sivaram, P. (2018).
Transduction Therapy, 11(2). Securing the Sensor Networks Along With
[21] Le Nguyen, B., Lydia, E. L., Elhoseny, M., Secured Routing Protocols for Data Transfer
Pustokhina, I., Pustokhin, D. A., Selim, M. M., in Wireless Sensor Networks.
... & Shankar, K. (2020). Privacy Preserving [32] Geerthik, S., Venkatraman, S., & Gandhi, K.
Blockchain Technique to Achieve Secure and R. (2016, February). Reward rank: A novel
Reliable Sharing of IoT Data. CMC- approach for positioning user answers in
COMPUTERS MATERIALS & community question answering system.
CONTINUA, 65(1), 87-107. In 2016 International Conference on
[22] Chavhan, S., Gupta, D., Chandana, B. N., Information Communication and Embedded
Khanna, A., & Rodrigues, J. J. (2019). IoT- Systems (ICICES) (pp. 1-6). IEEE.
based Context-Aware Intelligent Public

ISSN: 2347-8578 www.ijcstjournal.org Page 29


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

[33] Sivaram, M., Lydia, E. L., Pustokhina, I. V., [44] Sivaram, M., Yuvaraj, D., Mohammed, A. S.,
Pustokhin, D. A., Elhoseny, M., Joshi, G. P., Manikandan, V., Porkodi, V., &Yuvaraj, N.
& Shankar, K. (2020). An optimal least square (2019). Improved Enhanced Dbtma with
support vector machine based earnings Contention-Aware Admission Control to
prediction of blockchain financial Improve the Network Performance in Manets.
products. IEEE Access, 8, 120321-120330. CMC-COMPUTERS MATERIALS &
[34] Ghantasala, G. P., &KrishnaRaj, N. Support CONTINUA, 60(2), 435-454.
Vector Machine Based Automatic [45] Gochhayat, S. P., Lal, C., Sharma, L., Sharma,
Mammogram Classification Using Hybrid D. P., Gupta, D., Saucedo, J. A. M., &Kose, U.
Optimization Algorithm. (2019). Reliable and secure data transfer in
[35] Sikkandar, M. Y., Alrasheadi, B. A., Prakash, IoT networks. Wireless Networks, 1-14.
N. B., Hemalakshmi, G. R., Mohanarathinam, [46] Subbarayalu, V., Surendiran, B., &Arun Raj
A., & Shankar, K. (2020). Deep learning based Kumar, P. (2019). Hybrid Network Intrusion
an automated skin lesion segmentation and Detection System for Smart Environments
intelligent classification model. Journal of Based on Internet of Things. The Computer
Ambient Intelligence and Humanized Journal, 62(12), 1822-1839.
Computing, 1-11. [47] Rosa, A. T. R., Pustokhina, I. V., Lydia, E. L.,
[36] Zhang, Z., Wang, G. G., Zou, K., & Zhang, J. Shankar, K., & Huda, M. (2019). Concept of
(2014). A solution quality assessment method electronic document management system
for swarm intelligence optimization (EDMS) as an efficient tool for storing
algorithms. The Scientific World document. Journal of Critical Reviews, 6(5),
Journal, 2014. 85-90.
[37] Sivaram, Murugan et al. ‘Data Fusion Using [48] Espada, J. P., Diaz, V. G., Crespo, R. G.,
Tabu Crossover Genetic Algorithm in Bustelo, B. C. P. G., &Lovelle, J. M. C.
Information Retrieval’. 1 Jan. 2020 : 1 – 10. (2015). An intelligent Mobile Web Browser to
[38] Khamparia, A., Pandey, B., Tiwari, S., Gupta, adapt the mobile web as a function of the
D., Khanna, A., & Rodrigues, J. J. (2020). An physical environment. IEEE Latin America
integrated hybrid CNN–RNN model for visual Transactions, 13(2), 503-509.
description and generation of [49] Kumar, R. S., Krishnaraj, N., &Keerthana, G.
captions. Circuits, Systems, and Signal (2017). Assessment of Quality of Service in
Processing, 39(2), 776-788. Communication Network and Evaluating
[39] Geerthik, S., Gandhi, K. R., &Venkatraman, S. Connectivity Among IP Networks. Asian
(2016, December). Domain expert ranking for Journal of Applied Science and Technology
finding domain authoritative users on (AJAST), 1(3), 319-322.
community question answering sites. In 2016 [50] Elhoseny, M., Rajan, R. S., Hammoudeh, M.,
IEEE International Conference on Shankar, K., &Aldabbas, O. (2020). Swarm
Computational Intelligence and Computing intelligence–based energy efficient clustering
Research (ICCIC) (pp. 1-5). IEEE. with multihop routing protocol for sustainable
[40] Muruganantham, A., Nguyen, P. T., Lydia, E. wireless sensor networks. International Journal
L., Shankar, K., Hashim, W., &Maseleno, A. of Distributed Sensor Networks, 16(9),
(2019). Big data analytics and intelligence: A 1550147720949133.
perspective for health care. [51] Chu, H. C., Wang, G. G., & Park, J. H. (2015).
[41] Ramkumar, V., &Krishnaraj, N. Weight Based The digital fingerprinting analysis concerning
LSA to Retrieve Information from Web Pages google calendar under ubiquitous mobile
Based On Document Score. computing era. Symmetry, 7(2), 383-394.
[42] Balakiruthiga, B., Deepalakshmi, P., Mohanty, [52] Manikandan, V., Sivaram, M., Mohammed, A.
S. N., Gupta, D., Kumar, P. P., & Shankar, K. S., &Porkodi, V. (2020). Nature Inspired
(2020). Segment routing based energy aware Improved Firefly Algorithm for Node
routing for software defined data Clustering in WSNs. CMC-COMPUTERS
center. Cognitive Systems Research. MATERIALS & CONTINUA, 64(2), 753-
[43] Chu, H. C., Wang, G. G., & Deng, D. J. 776.
(2016). The social networking investigation of [53] Kuppusamy, P., Venkatraman, S.,
metadata of forensic artifacts of a typical Rishikeshan, C. A., & Reddy, Y. P. (2020).
WeChat session under Windows. Security and Deep learning based energy efficient optimal
Communication Networks, 9(18), 5698-5709. timetable rescheduling model for intelligent

ISSN: 2347-8578 www.ijcstjournal.org Page 30


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 6, Nov-Dec 2020

metro transportation systems. Physical [64] Krishnaraj, N., Kumar, K. A., & Kumar, P. K.
Communication, 101131. (2018). DESIGN OF ADAPTIVE
[54] Asih, E. S., Nguyen, P. T., Lydia, E. L., SCHEDULER TO IMPROVE
Shankar, K., Hashim, W., &Maseleno, A. PERFORMANCE OF COMPUTATIONAL
(2019). Mobile E-commerce website for GRIDS. International Journal of Pure and
technology-based buying selling Applied Mathematics, 119(18), 1741-1751.
services. International Journal of Engineering [65] Shankar, K., & Eswaran, P. (2016, January). A
and Advanced Technology, 8(6), 884-888. new k out of n secret image sharing scheme in
[55] Lydia, E. L., &Swarup, M. B. (2015). Big data visual cryptography. In 2016 10th
analysis using hadoop components like flume, International Conference on Intelligent
mapreduce, pig and hive. International Journal Systems and Control (ISCO) (pp. 1-6). IEEE.
of Science, Engineering and Computer [66] Wei, C. L., & Wang, G. G. (2020). Hybrid
Technology, 5(11), 390. Annealing Krill Herd and Quantum-Behaved
[56] Sengar, S. S., Hariharan, U., &Rajkumar, K. Particle Swarm
(2020, March). Multimodal Biometric Optimization. Mathematics, 8(9), 1403.
Authentication System using Deep Learning [67] Sivaram, M., Yuvaraj, D., Mohammed, A. S.,
Method. In 2020 International Conference on &Porkodi, V. Estimating the Secret Message
Emerging Smart Computing and Informatics in the Digital Image. International Journal of
(ESCI) (pp. 309-312). IEEE. Computer Applications, 975, 8887.
[57] Maseleno, A., Hashim, W., Perumal, E., [68] Nieto, Y., Gacía-Díaz, V., Montenegro, C.,
Ilayaraja, M., & Shankar, K. (2020). Access González, C. C., & Crespo, R. G. (2019).
control and classifier-based blockchain Usage of machine learning for strategic
technology in e-healthcare applications. decision making at higher educational
In Intelligent Data Security Solutions for e- institutions. IEEE Access, 7, 75007-75017.
Health Applications (pp. 151-167). Academic
Press.
[58] Li, J., Lei, H., Alavi, A. H., & Wang, G. G.
(2020). Elephant Herding Optimization:
Variants, Hybrids, and
Applications. Mathematics, 8(9), 1415.
[59] Mohammed, A. S., Kareem, S. W., Al Azzawi,
A. K., & Sivaram, M. (2018). Time series
prediction using SRE-NAR and SRE-
ADALINE. Journal of Advanced Research in
Dynamical and Control Systems, Pages, 1716-
1726.
[60] Shankar, K., Elhoseny, M., Chelvi, E. D.,
Lakshmanaprabu, S. K., & Wu, W. (2018). An
efficient optimal key based chaos function for
medical image security. IEEE Access, 6,
77145-77154.
[61] Geerthik, S., Gandhi, R., &Venkatraman, S.
(2006). CATEGORY BASED EXPERT
RANKING: A NOVEL APPROACH FOR
EXPERT IDENTIFICATION IN
COMMUNITY QUESTION ANSWERING.
[62] Laxmi, C. V., &Somasundaram, K. (2014).
Application Level Scheduling (AppLeS) in
Grid with Quality of Service
(QoS). International Journal of Grid
Computing & Applications, 5(2), 1.
[63] Kumar, R. S., Krishnaraj, N., &Keerthana, G.
Highly Energy Efficient and Scalable
Distributed Clustering Procedure for Dense
Wireless Sensor Networks.

ISSN: 2347-8578 www.ijcstjournal.org Page 31

You might also like