169 164
Full Length Article
Journal of Cybersecurity and Information Management
Volume 13 , Issue 1, PP: 28-35 , 2024 | Cite this article as | XML | Html |PDF

Title

A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms

  Vandana Roy 1 *

1  Professor, GGITS, Jabalpur
    (vandanaroy@ggits.org)


Doi   :   https://doi.org/10.54216/JCIM.130103

Received: May 11, 2023 Revised: August 17, 2023 Accepted: December 08, 2023

Abstract :

 

In recent years, smart computing has emerged as a promising and rapidly expanding field of technology. It senses the environment in real time and gives powerful analytics to perform intelligent decisions. Creating a scheduling algorithm based on priorities in order to decrease IoT process latency was the primary emphasis of the study challenge. The constraints of existing scheduling algorithms were investigated in order to build a scheduling algorithm that is based on priorities. We provide a context-based priority scheduling method to get around these restrictions. In order to determine which steps of the IoT process were crucial, we developed context attributes. Once the criticality has been identified, the proposed scheduling technique is used to schedule the IoT processes. The outcomes of the algorithms were confirmed using a variety of evaluation indicators. As demonstrated by the experimental results, the suggested scheduling algorithms outperformed the state-of-the-art techniques. Smart ATM uses a Case Study technique to analyse the algorithm. We identified the sensors that are part of the ATM and the settings in which they are relevant. We determined the priority value for each sensor. The processes are subsequently categorized according to their priority values. Then, a priority-based FCFS scheduling algorithm is used, and its performance is assessed using metrics like Average TAT, Cost, Energy, and the High critical process TAT ratio.

Keywords :

IoT; TAT; EFCFS; PFCFS; Cost.

References :

[1]    S. Agarwal, S. Yadav, and A. K. Yadav, An Efficient Architecture and Algorithm for Resource Provisioning in Fog Computing, International Journal of Information Engineering and Electronic Business, 8 (1) (2016), 48-61.

[2]    L. Ni, J. Zhang,C. Jiang,C. Yan, and K. Yu, Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets, IEEE Internet of Things Journal, 4 (5) (2017), 1216–1228.

[3]    X. Xu, S. Fu and Q. Cai, Dynamic Resource Allocation for Load Balancing in Fog Environment, Wireless Communications and Mobile Computing 2018, Article ID 6421607 (2018), 15 pages.

[4]    S. Bitam, S. Zeadally, and A. Mellouk, Fog Computing Job Scheduling Optimization Based on Bees Swarm, Enterprise Information Systems, 12 (4), (2017), 373-397.

[5]    H. J. Hong, From Cloud Computing to Fog Computing: Unleash the Power of Edge and End Devices. Proceedings of IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (2017), 331-334.

[6]    R. K. Naha, S. Garg, D. Georgakopoulos, P. P. Jayaraman, L. Gao, Y. Xi-ang, and R. Ranjan, Fog Computing: Survey of Trends, Architectures,Requirements, and Research Directions, IEEE Access, (2018).

[7]    R. Vijayalakshmi and V.Vasudevan, Scheduling Independent Obligations on Heterogeneous Computing Systems by Heuristic Approach, International Journal of Pure and Applied Mathematics, Special Issue, 119 (12) (2018), 13983-13989, ISSN: 1314-3395 (on-line version), url: http://www.ijpam.eu.

[8]    Yang, S.; Tian, K.; Liu, R. Task scheduling algorithm based on value optimisation for anti-missile phased array radar. IET Radar Sonar Navig. 2019, 13, 1883–1889.

[9]    Liu, Y.; Lu, X.; Zhang, Y.; Mou, Z. A task scheduling algorithm for phased array radar based on dynamic time window. In Proceedings of the IET International Radar Conference (IET IRC 2020), Online, 4–6 November 2020.

[10] Liu, D.; Zhao, Y.; Cai, X.; Xu, B.; Qiu, T. Adaptive scheduling algorithm based on CPI and impact of tasks for multifunction radar. IEEE Sens. J. 2019, 19, 11205–11212.

[11] Huang, L.; Zhang, Y.; Li, Q.; Pan, C.; Song, J. Task-scheduling scheme based on greedy algorithm in integrated radar and communication systems. J. Eng. 2019, 2019, 5864–5867.

[12] Zhu, X.; Yang, R.; Li, X.; Yuan, K. Multifunctional integrated system resource scheduling method based on improved GA-PSO. J. Air Force Early Warn. Acad. 2021, 35, 202–206.

[13] Huang, Y.; Hu, S.; Ma, S.; Liu, Z.; Xiao, M. Designing low-PAPR waveform for OFDM-based RadCom systems. IEEE Trans. Wirel. Commun. 2022, 21, 6979–6993.

[14] Li, W.; Ren, P.; Xiang, Z. Waveform design for dual-function radar-communication system with golay block coding. IEEE Access 2019, 7, 184053–184062.

[15] Rong, J.; Liu, F.; Miao, Y. High-efficiency optimization algorithm of PMEPR for OFDM integrated radar and communication waveform based on conjugate gradient. Remote Sens. 2022, 14, 1715.

[16] Rong, J.; Liu, F.; Miao, Y. Integrated radar and communications waveform design based on multi-symbol OFDM. Remote Sens. 2022, 14, 4705.

[17] Rong, J.; Liu, F.; Miao, Y. Multifunctional waveform design method combining AC-ICF and TR techniques. J. Signal Process. 2020, 36, 1721–1726.

[18] Li, C.; Bao, W.; Xu, L.; Zhang, H.; Huang, Z. Radar communication integrated waveform design based on OFDM and circular shift sequence. Math. Probl. Eng. 2017, 2017, 9840172.

[19] Lin, Z.; Lin, M.; Wang, J.; Cola, T.; Wang, J. Joint beamforming and power allocation for satellite-terrestrial integrated networks with non-orthogonal multiple access. IEEE J. Sel. Top. Signal Process. 2019, 13, 657–670.

[20] Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based secure energy efficient beamforming in multibeam satellite systems. IEEE Trans. Aerosp. Electron. Syst. 2022.

[21] Khan, M.J.; Khan, M.A.; Malik, S.; Kulkarni, P.; Alkaabi, N.; Ullah, O.; El-Sayed, H.; Ahmed, A.; Turaev, S. Advancing C-V2X for Level 5 Autonomous Driving from the Perspective of 3GPP Standards. Sensors 2023, 23, 2261.

[22] Pradhan, R.; Satapathy, S. Energy-Aware Cloud Task Scheduling algorithm in heterogeneous multi-cloud environment. Intell. Decis. Technol. 2022, 16, 279–284.

[23] Chen, H.; Liu, G.; Yin, S.; Liu, X.; Qiu, D. ERECT: Energy-Efficient Reactive Scheduling for Real-Time Tasks in Heterogeneous Virtualized Clouds. J. Comput. Sci. 2017, 28, 416–425.

[24] Duan, H.; Chen, C.; Min, G.; Wu, Y. Energy-aware scheduling of virtual machines in heterogeneous cloud computing systems. Future Gener. Comput. Syst. 2017, 74, 142–150. 

 


Cite this Article as :
Style #
MLA Vandana Roy. "A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms." Journal of Cybersecurity and Information Management, Vol. 13, No. 1, 2024 ,PP. 28-35 (Doi   :  https://doi.org/10.54216/JCIM.130103)
APA Vandana Roy. (2024). A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms. Journal of Journal of Cybersecurity and Information Management, 13 ( 1 ), 28-35 (Doi   :  https://doi.org/10.54216/JCIM.130103)
Chicago Vandana Roy. "A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms." Journal of Journal of Cybersecurity and Information Management, 13 no. 1 (2024): 28-35 (Doi   :  https://doi.org/10.54216/JCIM.130103)
Harvard Vandana Roy. (2024). A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms. Journal of Journal of Cybersecurity and Information Management, 13 ( 1 ), 28-35 (Doi   :  https://doi.org/10.54216/JCIM.130103)
Vancouver Vandana Roy. A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms. Journal of Journal of Cybersecurity and Information Management, (2024); 13 ( 1 ): 28-35 (Doi   :  https://doi.org/10.54216/JCIM.130103)
IEEE Vandana Roy, A Context-Aware Internet of Things (IoT) founded Approach to Scheming an Operative Priority-Based Scheduling Algorithms, Journal of Journal of Cybersecurity and Information Management, Vol. 13 , No. 1 , (2024) : 28-35 (Doi   :  https://doi.org/10.54216/JCIM.130103)