Volume 12 , Issue 1 , PP: 15-27, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Takura Wekwete 1 *
Doi: https://doi.org/10.54216/AJBOR.120102
The study proposes a GTO-FTASS (Gorilla Troop Optimizer-Based Fault Tolerant Aware Scheduling Scheme) for improving the reliability and performance in the cloud computing context. Cloud systems are more likely to fail due to the architecture of these layers and dependence on both the hardware and software, therefore require more sophisticated fault-tolerant solutions. The preliminary to this work is the design of an adaptive GTO-FTASS with a fitness function based on two constraints: Expected Time of Completion (ETC) and Failure probability that were derived from the gorilla value system. The approach provides resource utilization and task planning with the provision of fault recovery hence reducing exposure to time loss and operational vulnerability. MGS outperforms several state-of-the-art models, such as MTCT, MAXMIN, ACO, NSGA-II, and DCLCA in terms of makes pan, failure ratio and failure slowdown. Finally, the applicability of experimental validation with various situations and fluctuating intensities demonstrates the scalability of the model and its stability under pressure, decreased failure rates and increased effectiveness of performed tasks. Through the approaches to latency, resource, and error correction, GTO-FTASS is an investment that stewards have to make to cut costs and achieve high performance on clouds. The framework also provides competitive benefit and robustness for cloud enterprising in fluctuating and crucial strategic applications.
Fault Tolerance , Gorilla Troop Optimizer (GTO) , Fault Tolerant Aware Scheduling Scheme , Virtual Machines (VM) , Service-Level Agreements , Return on Investment and Resource Optimization
[1] M. Gollapalli, A. Alamoudi, A. Aldossary, A. Alqarni, S. Alwarthan, Y. Z. AlMunsour, M. M. Abdulqader, R. M. Mohammad, and S. Chabani, ‘‘Modeling algorithms for task scheduling in cloud computing using CloudSim,’’ Math. Model. Eng. Problems, vol. 9, no. 5, pp. 1201–1209, Dec. 2022, doi: 10.18280/mmep.090506.
[2] R. Indhumathi, K. Amuthabala, G. Kiruthiga, N. Yuvaraj, and A. Pandey, ‘‘Design of task scheduling and fault tolerance mechanism based on GWO algorithm for attaining better QoS in cloud system,’’ Wireless Pers. Commun., vol. 128, no. 4, pp. 2811–2829, Feb. 2023, doi: 10.1007/s11277-022-10072-x.
[3] B. Abdollahzadeh, F. S. Gharehchopogh and S. Mirjalili, “Artificial gorilla troops optimizer: A new nature-inspired metaheuristic algorithm for global optimization problems,” International Journal of Intelligent Systems, vol. 36, no. 10, pp. 5887–5958, 2021.
[4] H. Li, G. Xu, D. Wang, M. Zhou, Y. Yuan, and A. Alabdulwahab, ‘‘Chaotic-nondominated-sorting owl search algorithm for energyaware multi-workflow scheduling in hybrid clouds,’’ IEEE Trans. Sustain. Comput., vol. 7, no. 3, pp. 595–608, Jul. 2022, doi: 10.1109/TSUSC.2022.3144357.
[5] V. L. Padma Latha, N. Sudhakar Reddy, and A. Suresh Babu, ‘‘Optimizing scalability and availability of cloud-based software services using modified scale rate limiting algorithm,’’ Theor. Comput. Sci., vol. 943, pp. 230–240, Jan. 2023, doi: 10.1016/j.tcs.2022.07.019.
[6] V. Roy, S. Shukla, “Effective EEG Motion artifacts Removal with KS test Blind Source Separation and Wavelet Transform”, International Journal of Bio-Science and Bio-Technology, 2016, Vol. 8, No. 5, 2016, pp. 139-154, DOI:10.14257/ijbsbt.2016.8.5.13.
[7] B. Varghese and R. Buyya, “Next generation cloud computing: New trends and research directions,” Future Generation Computer Systems, vol. 79, no. 6, pp. 849–861, 2018
[8] Reem Atassi, Aditi Sharma, Intelligent Traffic Management using IoT and Machine Learning, Journal of Intelligent Systems and Internet of Things, Vol. 8 , No. 2 , (2023) : 08-19 (Doi : https://doi.org/10.54216/JISIoT.080201)
[9] Khder Alakkari, Alhumaima Ali Subhi, Hussein Alkattan, Ammar Kadi, Artem Malinin, Irina Potoroko, Mostafa Abotaleb, El-Sayed M El-kenawy, Forecasting COVID-19 Infection Using Encoder-Decoder LSTM and Attention LSTM Algorithms, Journal of Intelligent Systems and Internet of Things, Vol. 8 , No. 2 , (2023) : 20-33 (Doi : https://doi.org/10.54216/JISIoT.080202)
[10] Hani D. Hejazi , Ahmed A. Khamees , Said A. Salloum, Opinion mining for Arabic dialect in social media: A systematic review, International Journal of Advances in Applied Computational Intelligence, Vol. 1 , No. 2 , (2022) : 08-28 (Doi : https://doi.org/10.54216/IJAACI.010201)
[11] Ismail Eyad Samara, Intelligent systems and AI techniques: Recent advances and Future directions, Journal of International Journal of Advances in Applied Computational Intelligence, Vol. 1 , No. 2 , (2022) : 30-45 (Doi : https://doi.org/10.54216/IJAACI.010202) [12] P. K. Shukla, V. Roy, P. K. Shukla, A. K. Chaturvedi, A. K. Saxena, M. Maheshwari, P. R. Pal, “An Advanced EEG Motion Artifacts Eradication Algorithm”, The Computer Journal, 2021;, bxab170, https://doi.org/10.1093/comjnl/bxab170.
[13] K. Zervoudakis and S. Tsafarakis, ‘‘A mayfly optimization algorithm,’’ Comput. Ind. Eng., vol. 145, Jul. 2020, Art. no. 106559, doi: 10.1016/j.cie.2020.106559.
[14] P. Kasu, P. Hamandawana and T. S. Chung, “DLFT: Data and layout aware fault tolerance framework for big data transfer systems,” IEEE Access, vol. 9, pp. 22939–22954, 2021.
[15] K. E. Fahim, L. C. D. Silva, F. Hussain, and H. Yassin, ‘‘A state-ofthe-art review on optimization methods and techniques for economic load dispatch with photovoltaic systems: Progress, challenges, and recommendations,’’ Sustainability, vol. 15, no. 15, p. 11837, Aug. 2023, doi: 10.3390/su151511837. [16] V. Roy and S. Shukla, "A NLMS Based Approach for Artifacts Removal in Multichannel EEG Signals with ICA and Double Density Wavelet Transform," 2015 Fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 461-466, doi: 10.1109/CSNT.2015.61.
[17] M. Zhang and G. Wen, ‘‘Duck swarm algorithm: Theory, numerical optimization, and applications,’’ Cluster Comput., vol. 27, no. 5, pp. 6441–6469, Aug. 2024, doi: 10.1007/s10586-024-04293-x.
[18] Mustafa El-Taie,Aaras Y.Kraidi, Cybersecurity Detection Model using Machine Learning Techniques, Journal of Journal of Cybersecurity and Information Management, Vol. 12 , No. 1 , (2023) : 41-49 (Doi : https://doi.org/10.54216/JCIM.120104)
[19] Heba Mohammed Fadhil,Mohamed Elhoseny,Baydaa M Mushgil, Protecting Medical Data on the Internet of Things with an Integrated Chaotic-GIFT Lightweight Encryption Algorithm, Journal of Journal of Cybersecurity and Information Management, Vol. 12 , No. 1 , (2023) : 50-66 (Doi : https://doi.org/10.54216/JCIM.120105)
[20] O. E. Turgut, M. S. Turgut, and E. Kirtepe, ‘‘A systematic review of the emerging metaheuristic algorithms on solving complex optimization problems,’’ Neural Comput. Appl., vol. 35, no. 19, pp. 14275–14378, Jul. 2023, doi: 10.1007/s00521-023-08481-5. [21] S. Shukla, V. Roy and A. Prakash, "Wavelet Based Empirical Approach to Mitigate the Effect of Motion Artifacts from EEG Signal," 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), 2020, pp. 323-326, doi: 10.1109/CSNT48778.2020.9115761.
[22] Jayakaran P.,Jeffery matthew S.,Litheeswaran S.,Mohamed Arshad,Mahajan S.,R. Priya, Lip Print Scanner, Journal of Journal of Cognitive Human-Computer Interaction, Vol. 5 , No. 1 , (2023) : 46-52 (Doi : https://doi.org/10.54216/JCHCI.050105)
[23] C. Vivek,M. Indu,N. Nandhini, Speech Recognition Using Artificial Neural Network, Journal of Journal of Cognitive Human-Computer Interaction, Vol. 5 , No. 2 , (2023) : 08-14 (Doi : https://doi.org/10.54216/JCHCI.050201)
[24] S. A. Murad, A. J. M. Muzahid, Z. R. M. Azmi, M. I. Hoque, and M. Kowsher, ‘‘A review on job scheduling technique in cloud computing and priority rule based intelligent framework,’’ J. King Saud Univ.-Comput. Inf. Sci., vol. 34, no. 6, pp. 2309–2331, Jun. 2022, doi: 10.1016/j.jksuci.2022.03.027.
[25] X. Xu, R. Mo, F. Dai, W. Lin, S. Wan et al., “Dynamic resource provisioning with fault tolerance for data-intensive meteorological workflows in cloud,” IEEE Transactions on Industrial Informatics, vol. 16, no. 9, pp.6172–6181, 2019. [26] V. Roy, S. Shukla, “Designing Efficient Blind Source Separation Methods for EEG Motion Artifact Removal Based on Statistical Evaluation,” Wireless Pers Commun 108, pp. 1311–1327 (2019). https://doi.org/10.1007/s11277-019-06470-3.
[27] E. H. Houssein, A. G. Gad, Y. M. Wazery, and P. N. Suganthan, ‘‘Task scheduling in cloud computing based on meta-heuristics: Review, taxonomy, open challenges, and future trends,’’ Swarm Evol. Comput., vol. 62, Apr. 2021, Art. no. 100841, doi: 10.1016/j.swevo.2021.100841.