Author:
Mahmood Salman,Yahaya Nor Adnan
Abstract
This review paper provides a comprehensive assessment of scheduling methods for cloud computing, with an emphasis on optimizing resource allocation in cloud computing systems. The PRISMA methodology was utilized to identify 2,487 articles for this comprehensive review of scheduling methods in cloud computing systems. Following a rigorous screening process, 30 papers published between 2018 and 2023 were selected for inclusion in the review. These papers were analyzed in-depth to provide an extensive overview of the current state of scheduling methods in cloud computing, along with the challenges and opportunities for improving resource allocation. The review evaluates various scheduling approaches, including heuristics, optimization, and machine learning-based methods, discussing their strengths and limitations and comparing results from multiple studies. The paper also highlights the latest trends and future directions in cloud computing scheduling research, offering insights for practitioners and researchers in this field.
Publisher
Sir Syed University of Engineering and Technology
Reference76 articles.
1. Al Hasani, I. M. M., Kazmi, S. I. A., Shah, R. A., Hasan, R., & Hussain, S. (2022). IoT based Fire Alerting Smart System. Sir Syed University Research Journal of Engineering & Technology, 12(2), 46-50.
2. Chawla, Y., & Bhonsle, M. (2012). A study on scheduling methods in cloud computing. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 1(3), 12-17.
3. Madni, S. H. H., Abd Latiff, M. S., Abdullahi, M., Abdulhamid, S. I. M., & Usman, M. J. (2017). Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment. PloS one, 12(5), e0176321.
4. Smanchat, S., & Viriyapant, K. (2015). Taxonomies of workflow scheduling problem and techniques in the cloud. Future Generation Computer Systems, 52, 1-12.
5. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Retrieved from:
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Rootkit Detection Using Hybrid Machine Learning Models and Deep Learning Model: Implementation;2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI);2024-05-09
2. Rootkit Detection using Deep Learning: A Comprehensive Survey;2024 10th International Conference on Communication and Signal Processing (ICCSP);2024-04-12
3. Evaluation of the Omni-Secure Firewall System in a Private Cloud Environment;Knowledge;2024-04-02