Next Article in Journal
The Rise of MCS and EMA in the Sustainable Field: A Systematic Literature Analysis
Next Article in Special Issue
Wearables-Assisted Smart Health Monitoring for Sleep Quality Prediction Using Optimal Deep Learning
Previous Article in Journal
A Review of the Force-Transferring Mechanism of Entirely Grouted Cable Tendons Performed with Experimental Pull Tests
Previous Article in Special Issue
Smart Water Quality Prediction Using Atom Search Optimization with Fuzzy Deep Convolutional Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Metaheuristics Based Energy Efficient Task Scheduling Scheme for Cyber-Physical Systems Environment

by
Anwer Mustafa Hilal
1,2,*,
Aisha Hassan Abdalla Hashim
1,
Marwa Obayya
3,
Abdulbaset Gaddah
4,
Abdullah Mohamed
5,
Ishfaq Yaseen
2,
Mohammed Rizwanullah
2 and
Abu Sarwar Zamani
2
1
Department of Electrical and Computer Engineering, International Islamic University Malaysia, Kuala Lumpur 53100, Malaysia
2
Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj 16278, Saudi Arabia
3
Department of Biomedical Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
4
Department of Computer Sciences, College of Computing and Information System, Umm Al-Qura University, Mecca 24382, Saudi Arabia
5
Research Centre, Future University in Egypt, New Cairo 11845, Egypt
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(24), 16539; https://doi.org/10.3390/su142416539
Submission received: 12 September 2022 / Revised: 30 November 2022 / Accepted: 6 December 2022 / Published: 9 December 2022
(This article belongs to the Special Issue IoT Quality Assessment and Sustainable Optimization)

Abstract

:
The widespread applicability of cyber-physical systems (CPS) necessitates efficient schemes to optimize the performance of both computing units and physical plant. Task scheduling (TS) in CPS is of vital importance to enhance resource usage and system efficiency. Traditional task schedulers in embedded real-time systems are unable to fulfill the performance requirements of CPS because of the task diversity and system heterogeneities. In this study, we designed a new artificial rabbit optimization enabled energy-efficient task-scheduling scheme (ARO-EETSS) for the CPS environment. The presented ARO-EETSS technique is based on the natural survival practices of rabbits, comprising detour foraging and arbitrary hiding. In the presented ARO-EETSS technique, the TS process is performed via the allocation of n autonomous tasks to m different resources. In addition, the objective function is based on the reduction of task completion time and the effective utilization of resources. In order to demonstrate the higher performance of the ARO-EETSS system, a sequence of simulations was implemented. The comparison study underlined the improved performance of the ARO-EETSS system in terms of different measures.

1. Introduction

Technological revolutions have intensely transformed customs within society, in which humans are irreversibly coupled with countless interlinked electronic gadgets and their cyber methods. This procedure is still ongoing, offering novel application scenarios and the continually arising novel scientific difficulties involved in the research fields of cyber-physical systems (CPS) and the Internet of Things (IoT) [1]. The application scenarios involve the fields of manufacturing, assisted living, telerehabilitation, e-health, automotive and smart environments. Certainly, by utilizing these mechanisms, both industry and users obtain a wide range of advantages in relation to their requirements that involve performance enhancement, security, low cost, and comfort [2]. The first and foremost objective is to enable users, machines, and applications to communicate and understand their surrounding atmosphere. By addressing the fundamental needs of users, such as communication, and mobility, water provisioning, and assistive monitoring, different communities (for instance embedded and intelligent) debate to support their views, technologies, and approaches [3]. These solutions can typically be, inappropriately, technically based, while the actual requirements of the particular application domain and its users may be ignored.
CPS range from comparatively small mechanisms, such as automobiles and aircraft, to large mechanisms such as the national power grid [4]. The physical features of these mechanisms will be regulated well by controllers by placing algorithms and computers into a loop; however, to attain the complete advantage of compiling CPS, power consumption, control, and computing can no longer be maximized distinctly [5]. The dynamics of physical systems and the dynamics of computers communicate in ways that need basically novel design techniques. Principally, they involve mechanisms with distinct performances, hardware, and time limitations which have direct communication with the atmosphere, such as a transportation system, a control system, a robotic system, and many more [6]. Each requirement arises from various kinds of applications; therefore, numerous types of scheduling systems are required.
A flexible scheduling policy that alters in accordance with different needs indicates a desideratum in many cases [7]. Handling such complicated difficulties has led to the advancement of novel ideas and a novel class of models: the mixed criticality system [8], which is “an embedded computing platform where application functions of various criticality share computation and or transmission resources” [9]. In numerous cases, the safety and real-time needs should match the limited resources, minimum cost, and small power limitations, which raises the difficulty level in CPS cases. The method of utilizing mixed criticality scheduling in CPS was mostly application based, resulting in a variety of specific task methods having a multitude of system performance limitations [10]. These techniques, while featuring higher real-world relevance, have inadequacies when it comes to interaction and scalability in an unpredictable atmosphere.
In this study, we propose a new artificial rabbit optimization enabled energy-efficient task-scheduling scheme (ARO-EETSS) for the CPS environment. The goal of the presented model is to allocate n autonomous tasks to m different resources, and thus the entire task completion period is minimized and resources totally exploited. To demonstrate the higher efficiency of the ARO-EETSS system, a sequence of simulations was performed. In summary, the paper’s contribution is given as follows.
  • Propose a new ARO-EETSS technique for scheduling tasks in the CPS environment. To the best of our knowledge, none of the existing task schedulers are based on the ARO algorithm and the ARO-EETSS technique does not exist in the literature.
  • Derive a task scheduler to assign n autonomous tasks to m different resources.
  • Validate the performance of the ARO-EETSS technique under different aspects.

2. Related Works

In [11], the authors modelled an energy-aware CPS (E-CPS) for Big Data analysis and recessive construction anomaly detection. The proposed model included a data association and data reduction study, which was devised for examining manufactured data in E-CPS. An energy Big Data-driven recessive production anomaly study technique was devised on the basis of DBN by consideration of the dynamics and complexity of the manufacturing procedure. In [12], the authors initially developed the mobile CPS (MCPS) security maximized issue as a mixed integer nonlinear programming (MINLP) issue and next converted it as an MILP issue without efficiency degradations. To resolve the converted MILP issue proficiently, the researchers suggested a decomposed technique for deriving the optimal task scheduling (TS) solution as an alternative utilizing MILP resolvers that might be time-consuming for MCPS of huge granularity.
Energy-aware and service-level agreements (SLAs) determining the job schedule structure based on MapReduce were proposed in [13]. The main objective of this modelled structure was to sightsee task-to-slot or container map issues as a unique case of energy-aware scheduling from deadline-limited cases. Therefore, this complexity was extracted as a complicated multi-objective issue that has various limitations. For solving this issue proficiently, it was divided into three sub-problems (SPs), such as deadline segregation, mapping, and minimizing stage energy-aware scheduling. In [14], the researchers studied the issue of TS in a heterogeneous multi-processor mechanism on chip (MPSoC) positioned in the IoT to optimize the security quality in energy, real-time, and task-precedence limitations. The authors initially offered an MILP design to schedule and allocate reliant on tasks having energy and real-time limitations on the heterogeneous MPSoC mechanism for maximizing security quality.
Tang et al. [15] presented an effectual scheduling technique that gratified cost and functional reliability limitations in multi-functional mixed-criticality task replication executing cases. Utilizing the modelled fault-tolerant hardware cost-aware multi-functional safety assurance (FT_HCMSA) technique could minimize DMR of higher criticality purpose suggestively when meeting the automotive functional security. Hossain et al. [16] presented an energy-aware CPS therapy mechanism (T-CPS) that inculcated smart gadgets and things in both the cyber and physical worlds for a therapy system. In [17], the authors recommended an energy aware meta-heuristic technique related to a Harris Hawks optimized technique related to local search strategy (HHOLS) for TS in fog computing (FC) (TSFC) for enhancing the quality of service offered to users from Industrial-Internet-of-Things (IIoT) applications. Firstly, the authors explained the higher virtual layered FC method considering its varied structure. The scaling and normalization stage helped the HHO to solve the TSFC, which would be discrete.
Ghobaei-Arani et al. [18] examined a TS technique dependent upon the moth-flame optimized (MFO) technique for assigning a better group of tasks to fog node for meeting the approval of the service quality requirements of CPS applications so that the entire execution time of tasks is minimized. The minimized task execution and transmission time in the presented technique were assumed the main functions. In [19], the authors examined energy-efficient and contention-aware static TS with priority and deadline constraints on intelligent edge devices utilizing heterogeneous VFI-based NoC-MPSoCs (VFI-NoC-HMPSoC) with DVFS-enabled processors. Different from the existing population-based optimized systems, the authors presented a new population-based technique named ARSH-FATI which is dynamically switched betwixt exploitative and explorative searching modes at run-time. Xu et al. [20] defined a new method for reducing thermally induced damage from CPS processors by targeting dynamic voltage and frequency scaling (DVFS) to high activity task stages. Specifically, by preferably slowing down high activity task stages, major extra savings in energy and thermal stress were obtained to provide a count of computational slowdowns; this method demonstrated that higher than typical approaches utilize DVFS without regard to activity level.

3. The Proposed Model

In this study, an ARO-EETSS system could be introduced for TS from the CPS situation. The presented ARO-EETSS technique depends upon the natural survival practices of rabbits, encompassing detour foraging and random hiding. In the presented ARO-EETSS technique, the TS process was carried out via the allocation of n autonomous tasks to m dissimilar resources, and thus the entire task completion period is minimized and resources are totally exploited. Figure 1 demonstrates the overall procedure of ARO-EETSS system.

3.1. Algorithmic Steps of ARO Technique

The ARO algorithm is based on the foraging and hiding practices of real rabbits and energy shrink [21]. The ARO algorithm has the following merits. It exhibits competitive performance over other metaheuristic algorithms. It avoids local extremum and carries out a global search. It maintains a balanced transition from exploration to exploitation throughout the iterations. Finally, the algorithm is effective and easy to implement. The mathematical modeling of the ARO algorithm is discussed in the following:

3.1.1. Detour Foraging (Exploration)

During the time of foraging, the rabbit looks further away and neglects what exists closer at hand. It can eat grass arbitrarily in the other area rather than its individual region; the foraging behavior can be defined as detour foraging. In the ARO algorithm, consider that every individual rabbit from the colony has its individual area of grass around the burrows, and the rabbits continually arbitrarily stray to the location of every other one to forage. In fact, at the time of foraging, the rabbits are likely to cause disturbance over the food source in order to obtain adequate food. So, the detour foraging nature of the ARO algorithm signifies that every searching individual tends to upgrade its position in the direction of another arbitrarily selected individual in the colony and inflict disturbance.
The detour foraging process of rabbits can be defined as follows [21]:
v i t + 1 = x j t + R · x t x j t + r o n n d 0.5 · 0.05 + r 1 · n 1 ,   i , j = 1 ,   , n   a n d   j i ,  
R = L · c ,
L = e e ( t 1 T ) 2 ·   sin   2 π r 2 ,  
c k = 1   i f   k = = g l 0   e l s e k = 1 ,   , d   a n d   l = 1 , r 3 · d ,
g = r a n d   p e r m d ,  
n 1 N 0 , 1 ,  
where v i t + 1 denotes the candidate’s place of i th rabbit at the time t + 1 ,   x i t defines place of ith rabbit at the time t ,   n implies rabbit population size, d is the dimension, round determines rounding to the adjoining integer, randperm provides an arbitrary permutation of the integers, r 1 , r 2 and r 3 are arbitrary numbers in zero and one, L refers to the running length representing the movement pace at the time of detour foraging, and n 1 defines the subject to normal distribution.
Equation (1) defines that the searching population carries out an arbitrary searching process for food based on the location. It enables a rabbit to move away from its original area to the areas of others. These peculiar characteristics of rabbits considerably contributed to the exploration and promise of the global searching ability of the ARO technique.

3.1.2. Random Hiding (Exploitation)

To escape from predators, a rabbit usually digs roughly diverse burrows over the nest to hide. In the ARO algorithm, at every round, the rabbit generally creates d burrows over every individual dimension of the searching area, and it arbitrarily selects one from every burrow for hiding and thereby minimizes the likelihood of being preyed upon. The jth burrow of the i th rabbit can be determined as follows [21]:
b i , j t = x i t + H · g · x i t , i = 1 , n   a n d   j = 1 , d ,
H = T t + 1 T · r 4 ,
g k = 1   i f   k = = j 0   e l s e ,   k = 1 , , d ,
where the d burrows are produced from the neighboring area of rabbits over each dimension. H denotes hiding variable that is linearly reduced in 1 to 1/T with an arbitrary perturbation over several iterations. Based on this, the burrows are produced from a larger region of a rabbit. With a rise in iterations, this neighboring area gets reduced.
As aforementioned, rabbits are frequently exposed to pursuing and attacking predators. For survival, the rabbits require a safe location for hiding. So, it can be reduced to arbitrarily selecting a burrow from its burrows to shelter in to avoid getting caught. In order find to mathematical system for this arbitrary hiding approach, the formulas are presented as:
v i t + 1 = x i t + R · r 4 · b i , r t x t ,   i = 1 , , n ,
g r k = 1 i f k = = r 5 · d 0                 e l s e k = 1 , , d ,
b i , r t = x i t + H · g r · x i t ,
where b i , r defines the arbitrarily selected burrow to hide in of their d burrows, and, r 4 and r 5 represent the 2 arbitrary numbers from zero and one. According to Equation (10), the ith search separately is the attempt to update their position only after selecting the burrow in their d burrows.
Afterward, once the detoured foraging and arbitrary hide were obtained, the place upgrade of ith rabbit is given as follows [21]:
x i t + 1 = x t f x t f v i t + 1 v t + 1 f x i t > f ( v i t + 1 ) ,
This formula represents that when the fitness of candidate places of the ith rabbit was superior to that of the present one, the rabbit gene abandons the present location and stops at the candidate place created.

3.1.3. Energy Shrink (Switch from Exploration to Exploitation)

In ARO, rabbits are continuously inclined to often carry out detour foraging at an early stage of iterations but often implement arbitrary hiding at the later stage of iterations. This outcome of this search process is that the energy of the rabbits is shrinking slowly with the lapse of time. Thus, an energy factor was planned for modeling the switch from exploration to exploitation. The energy influence in ARO was determined as:
A t = 4 1 t T ln 1 r ,
in which r denotes the arbitrary number from zero and one. The big value of energy factors defines that the rabbit is reaching appropriate energy and physical strength levels to resume detour foraging. Figure 2 showcases the flowchart of ARO technique.
Conversely, the smaller value of energy factors represents that the rabbit is less active; therefore it needs to remain arbitrarily hidden. Thus, in ARO, once the energy factor A t > 1 , the rabbit is prone to arbitrarily explore the area of other various rabbits to forage from the exploration stage; thus, detour foraging occurs; once the energy influence A t 1 , the rabbit then arbitrarily exploits its individual burrows during the exploitation stage, so, arbitrary hiding takes place. According to the value of the energy influence A, ARO is switched between detour foraging and arbitrary hiding. Specifically, exploration takes place once A t > 1 , but exploitation occurs once A t 1 .
To investigate the impact of the energy factor on the search performance of the technique, the probability of A > 1 was computed. Assume that = 2 · 1 t T , afterward A t = 2 ·   ln   1 r · θ , the probability of A > 0 was computed as:
P A t > 1 = 0 2 0 e 1 2 k d r d θ 1 · 2 = 1 4 · 1 4 e t t d t + e 1 4 0.5177 ,
Therefore, the action of detour foraging was about 0.5 during the iterative procedure of carrying out the action; the ARO technique is nearly the same for carrying out either detour foraging or arbitrary hiding under the iterative procedure that gives consideration for the balance of exploration and exploitation as explained in Algorithm 1 below.
Algorithm 1: Pseudocode of ARO algorithm.
Input: Parameter initialization
Arbitrarily prepare a group of rabbit X i (solutions) and evaluate its fitness F i t i ,   a n d   X b e s t is the optimum solution created so far.
While the termination condition is not fulfilled do
  For all the individuals X i do
  Compute the energy factor A utilizing in Equation (14).
   I f A > 1
    Select a rabbit arbitrarily in other individuals.
    Compute R utilizing in Equations (2) 6 .
    Implement detour foraging utilizing in Equation (1).
    Compute the fitness F i t i .
    Upgrade the position of present individual utilizing Equation (13).
  Else
    Create d burrows and arbitrarily choose one as hide utilizing in Equation (12).
    Execute arbitrary hiding utilizing Equation (10).
    Compute the fitness F i t i .
    Upgrade the position of individuals utilizing Equation (13).
  End If
  Upgrade the optimum solution create so far X b e s t
  End For
End While
Return X b e s t
Output: Scheduled Tasks

3.2. Process Involved in Scheduling Process

In the presented ARO-EETSS technique, the scheduling process is performed in the CPS environment. The rule of the presented system is assigning n independent tasks to m heterogeneous accessible resources, therefore the complete task completion duration is minimized and resources have been used entirely [22]. During the distributing method, n sub-tasks T a s k = T 1 ,   T 2 ,   ,   T n were allotted to m processors C =   C 1 ,   C 2 ,   ,   C m . R = R 1 ,   R 2 ,   ,   R m denotes the maximum resource quantity group of every processor, R j implies the higher source count of processors C j , and the count of resources required for every task execution is H = H 1 ,   H 2 ,   ,   H . T j = i   X i j = t i / v j demonstrates the number of execution times (ETs) of all tasks scheduled on processors j , whereas t i illustrates the ET of tasks i on minimal processors and v j represents the processing speed of processors j .
f X = min   A j = 1 m t j d + B i = 1 m j = 1 m p = 1 m q = 1 m ω i j p q X i j X p q ,
j = 1 m X i j = 1 , i = 1 , 2 , , n ,  
i = 1 m H i X i j R j , j = 1 , 2 , , m ,  
in which, A and B A + B = 1 imply the comparative importance of total end time and communication cost in the objective purpose, w i j p q represents the task i scheduling on processors j and task p carried out on processors q .
T = t i m e 11 t i m e 12 t i m e 1 m t i m e 21 t i m e 22 t i m e 2 m t i m e n 1 t i m e n 1 t i m e n m ,
in which t i m e i j denotes the ET required for virtual machine (VM) v j to process the task t i , and t i m e i j = M I i / M I P S j . The evaluated time for computing of n tasks on m effectual resources, defined as E , E is a n × m matrix. E i j implies the time required for T i to run in the VM, E i j = c i j + e i j . Next, the VM applies the allocated task gathering time expressed as E j . While the tasks assigned for every VM resource can be applied separately, the ET essential to all the tasks to the whole is the higher value array E represented as E t o t a l :
E j = i T a s k j   e i j + i T a s k j   t i j ,
whereas T a s k j stands for a set of tasks executed on VM. The matrix x i j is established dependent upon the equal linking betwixt the VM and the task, denoting once the task t i is assigned to VM v j , it is defined as:
x i j = 1 ,   i s   a s s i g n e d   t o   V j 0 ,   O t h e r w i s e ,  

4. Results and Discussion

This section assesses the TS performance of the ARO-EETSS model in the CPS environment. The proposed model was simulated using MATLAB tool. Table 1 and Figure 3 compare the task execution time (TET) examination of the ARO-EETSS method with current approaches such as earliest due date (EDD), earliest deadline first (EDF), ant colony optimization-based task scheduler (ACOTS), and quantum invasive weed optimization-based energy-aware scheduling (QIWO-EATS) [4]. The experimental values suggested the ARO-EETSS method reached least TET values under all iterations. For instance, on I-20 iterations, the ARO-EETSS model showed the lowest TET of 451 ms whereas the EDD, EDF, ACOTS, and QIWO-EATS models demonstrated higher TETs of 782, 773, 655, and 548 ms, respectively. Along with that, on I-100 iterations, the ARO-EETSS method displayed the lowest TET of 361 ms where the EDD, EDF, ACOTS, and QIWO-EATS methods showed increased TETs of 691, 644, 537, and 427 ms, correspondingly.
An average load balancing ratio (ALBR) of the ARO-EETSS method with current methodologies is investigated in Table 2 and Figure 4. The outcomes denoted the ARO-EETSS method gained improved outcomes in all iterations. For example, on I-20 iterations, the ARO-EETSS method offered a maximum ALBR of 58.16% whereas the EDD, EDF, ACOTS, and QIWO-EATS models depicted higher ALBRs of 13.32, 19.27, 35.54, and 49.83% respectively. In addition, on I-100 iterations, the ARO-EETSS method presented a maximum ALBR of 66.49% whereas the EDD, EDF, ACOTS, and QIWO-EATS methods portrayed higher ALBRs of 25.42, 31.57, 49.63, and 57.96%, correspondingly.
Table 3 and Figure 5 compare the task convergence rate (CR) inspection of the ARO-EETSS method with recent methods. The experimental values denoted by the ARO-EETSS method reached lowest CR values under all iterations. For example, on I-20 iterations, the ARO-EETSS approach displayed a minimal CR of 657 ms whereas the EDD, EDF, ACOTS, and QIWO-EATS methods demonstrated increased CRs of 660, 659, 660, and 656 ms, correspondingly. Similarly, on I-100 iterations, the ARO-EETSS method exhibited the lowest CR of 524 ms whereas the EDD, EDF, ACOTS, and QIWO-EATS methods demonstrated increased CRs of 593, 576, 560, and 539 ms, correspondingly.
Table 4 and Figure 6 compare the task energy consumption (ECON) inspection of ARO-EETSS method with recent methods. The experimental values denoted by the ARO-EETSS approach reached the least ECON values under all iterations. For example, on PM20, the ARO-EETSS technique showed a reduced ECON of 417 Wh whereas the EDD, EDF, ACOTS, and QIWO-EATS approaches illustrated higher ECONs of 1657, 3146, 4717, and 665 Wh, correspondingly. Moreover, on PM-100, the ARO-EETSS method exemplified a reduced ECON of 3435 Wh, for which the EDD, EDF, ACOTS, and QIWO-EATS methods demonstrated higher ECONs of 8439, 11,127, 12,533, and 7033 Wh, correspondingly.
Table 5 and Figure 7 compare the TET inspection of the ARO-EETSS method with recent methods. The experimental values denoted by the ARO-EETSS approach reached the lowest TET values under all iterations. For example, on T-200 tasks, the ARO-EETSS technique displayed a minimal TET of 49 ms, whereas the EDD, EDF, ACOTS, and QIWO-EATS models demonstrated higher TETs of 228, 170, 115, and 79 ms, correspondingly. Further, on T-1000 tasks, the ARO-EETSS method showed a reduced TET of 181 ms but the EDD, EDF, ACOTS, and QIWO-EATS methods established increased TETs of 726, 564, 407, and 283 ms, correspondingly.
The success rate (SR) of the ARO-EETSS method against recent models is shown in Table 6 and Figure 8. The outcomes denoted that the ARO-EETSS approach obtained improved outcomes in every iteration. For example, on I-100 iterations, the ARO-EETSS method offered a maximum SR of 93.73%, where the EDD, EDF, ACOTS, and QIWO-EATS approaches showed maximum SRs of 82.48, 85.60, 88.57, and 91.23%, correspondingly.
Furthermore, on I-500 iterations, the ARO-EETSS method presented a maximum SR of 87.32%, whereas the EDD, EDF, ACOTS, and QIWO-EATS methods gave SRs of 70.91, 75.76, 79.35, and 84.98%, correspondingly. These results show that the presented method has enhanced performance over other existing methods.

5. Conclusions

In this article, a novel ARO-EETSS system was introduced for TS from the CPS environment. The presented ARO-EETSS system depends upon the existing natural practices of rabbits, encompassing detour foraging and random hiding. In the presented ARO-EETSS technique, the TS process was carried out via the allocation of n autonomous tasks to m dissimilar resources, and thus the entire task completion period was minimized and resources were totally exploited. To demonstrate the higher efficiency of the ARO-EETSS system, a sequence of experiments was performed. The comparison study underlined the higher performance of the ARO-EETSS technique with respect to several measures.
In future, the outcomes of ARO-EETSS system will be improved by the use of hybrid metaheuristic optimization algorithms. Furthermore, in future, data deduplication mechanisms can be designed to improve network efficiency. Though adequate discussions and assessments have already been made in this work, some future work is discussed here. Flexible and dynamic TS can improve the schedulability of the CPS environment by the use of statistical learning techniques for supervision and cloud computing facilities for adaptively managing resource reclamation. In addition, a scheduler that better matches the dual-period model also deserves to be explored. An accurate timing analysis will be utilized for the effective analysis of resource utilization. Moreover, a real-world case study would provide stronger support for the usability of the framework. To transform the proposed method into a real-world application, some details related to software development, kernel modification, and communication with the cloud need to be formalized in future.

Author Contributions

Conceptualization, A.M.H.; Methodology, A.M.H. and M.O.; Software, A.M. and I.Y.; Validation, M.R. and A.S.Z.; Formal analysis, A.H.A.H.; Investigation, M.O.; Resources, A.G.; Data curation, A.H.A.H.; Writing—original draft, A.M.H.; Writing—review & editing, A.M.; Visualization, M.R. and A.S.Z.; Supervision, A.M. and I.Y.; Project administration, A.G.; Funding acquisition, M.O and A.G.. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R203), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Re-search at Umm Al-Qura University for supporting this work by Grant Code: (22UQU4320484DSR09).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors. All authors have given approval to the final version of the manuscript.

References

  1. Padmajothi, V.; Iqbal, J.M.; Ponnusamy, V. Load-aware intelligent multiprocessor scheduler for time-critical cyber-physical system applications. Comput. Electr. Eng. 2022, 97, 107613. [Google Scholar] [CrossRef]
  2. Sangaiah, A.K.; Medhane, D.V.; Bian, G.B.; Ghoneim, A.; Alrashoud, M.; Hossain, M.S. Energy-aware green adversary model for cyberphysical security in industrial system. IEEE Trans. Ind. Inform. 2019, 16, 3322–3329. [Google Scholar] [CrossRef]
  3. Mo, L.; Kritikakou, A.; Li, X. Energy-Efficient, Reliable and QoS-Aware Task Mapping on Cyber-Physical Systems. Ph.D. Thesis, IEEE Technical Committee on Cyber-Physical Systems, Southeast University, Nanjing, China, 2021. [Google Scholar]
  4. Neelakandan, S.; Keerthika, K.; Ilanchezhian, P.; Madeswaran, T.; Hardas, V.B.; Sakthi, U. Quantum invasive weed optimization-based energy aware task scheduling for cyber–physical system environment. Int. J. Model. Simul. Sci. Comput. 2022, 2341016. [Google Scholar] [CrossRef]
  5. Munoz, D.J.; Montenegro, J.A.; Pinto, M.; Fuentes, L. Energy-aware environments for the development of green applications for cyber–physical systems. Future Gener. Comput. Syst. 2019, 91, 536–554. [Google Scholar] [CrossRef]
  6. Soltani, R.; Kang, E.Y.; Mena, J.E.H. Towards Energy-aware Cyber-Physical Systems Verification and Optimization. In FedCSIS (Position Papers). Proceedings of the 16th Conference on Computer Science and Intelligence Systems, Online, 2–5 September 2021; FedCSIS: Leipzig, Germany, 2021; pp. 205–210. [Google Scholar]
  7. Singh, A.K.; Pamula, R.; Srivastava, G. An adaptive energy aware DTN-based communication layer for cyber-physical systems. Sustain. Comput. Inform. Syst. 2022, 35, 100657. [Google Scholar] [CrossRef]
  8. Padmajothi, V.; Iqbal, J.M. Distributive Processor Task Scheduling for the Cyber-Physical Systems–A Traveling Salesman Problem Approach. Res. Sq. 2022. [Google Scholar] [CrossRef]
  9. Zade, B.M.H.; Mansouri, N.; Javidi, M.M. SAEA: A security-aware and energy-aware task scheduling strategy by Parallel Squirrel Search Algorithm in cloud environment. Expert Syst. Appl. 2021, 176, 114915. [Google Scholar] [CrossRef]
  10. Qi, L.; Chen, Y.; Yuan, Y.; Fu, S.; Zhang, X.; Xu, X. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web 2020, 23, 1275–1297. [Google Scholar] [CrossRef]
  11. Zhang, C.; Wang, Z.; Ding, K.; Chan, F.T.; Ji, W. An energy-aware cyber physical system for energy Big data analysis and recessive production anomalies detection in discrete manufacturing workshops. Int. J. Prod. Res. 2020, 58, 7059–7077. [Google Scholar] [CrossRef]
  12. Zhou, J.; Wang, T.; Jiang, W.; Chai, H.; Wu, Z. Decomposed task scheduling for security-critical mobile cyber-physical systems. IEEE Internet Things J. 2021, 9, 22280–22290. [Google Scholar] [CrossRef]
  13. Kaur, K.; Garg, S.; Kaddoum, G.; Kumar, N. Energy and SLA-driven MapReduce job scheduling framework for cloud-based cyber-physical systems. ACM Trans. Internet Technol. (TOIT) 2021, 21, 31. [Google Scholar] [CrossRef]
  14. Zhou, J.; Sun, J.; Cong, P.; Liu, Z.; Zhou, X.; Wei, T.; Hu, S. Security-critical energy-aware task scheduling for heterogeneous real-time MPSoCs in IoT. IEEE Trans. Serv. Comput. 2019, 13, 745–758. [Google Scholar] [CrossRef]
  15. Tang, Y.; Yuan, Y.; Liu, Y. Cost-aware reliability task scheduling of automotive cyber-physical systems. Microprocess. Microsyst. 2021, 87, 103507. [Google Scholar] [CrossRef]
  16. Hossain, M.S.; Rahman, M.A.; Muhammad, G. Towards energy-aware cloud-oriented cyber-physical therapy system. Future Gener. Comput. Syst. 2020, 105, 800–813. [Google Scholar] [CrossRef]
  17. Abdel-Basset, M.; El-Shahat, D.; Elhoseny, M.; Song, H. Energy-aware metaheuristic algorithm for industrial-Internet-of-Things task scheduling problems in fog computing applications. IEEE Internet Things J. 2020, 8, 12638–12649. [Google Scholar] [CrossRef]
  18. Ghobaei-Arani, M.; Souri, A.; Safara, F.; Norouzi, M. An efficient task scheduling approach using moth-flame optimization algorithm for cyber-physical system applications in fog computing. Trans. Emerg. Telecommun. Technol. 2020, 31, e3770. [Google Scholar] [CrossRef]
  19. Tariq, U.U.; Ali, H.; Liu, L.; Panneerselvam, J.; Zhai, X. Energy-efficient static task scheduling on VFI-based NoC-HMPSoCs for intelligent edge devices in cyber-physical systems. ACM Trans. Intell. Syst. Technol. (TIST) 2019, 10, 66. [Google Scholar] [CrossRef] [Green Version]
  20. Xu, S.; Koren, I.; Krishna, C.M. Thermal aware task scheduling for enhanced cyber-physical systems sustainability. IEEE Trans. Sustain. Comput. 2019, 5, 581–593. [Google Scholar] [CrossRef]
  21. Wang, L.; Cao, Q.; Zhang, Z.; Mirjalili, S.; Zhao, W. Artificial rabbits optimization: A new bio-inspired meta-heuristic algorithm for solving engineering optimization problems. Eng. Appl. Artif. Intell. 2022, 114, 105082. [Google Scholar] [CrossRef]
  22. Salcedo-Sanz, S.; Xu, Y.; Yao, X. Hybrid meta-heuristics algorithms for task assignment in heterogeneous computing systems. Comput. Oper. Res. 2006, 33, 820–835. [Google Scholar] [CrossRef]
Figure 1. Overall process of ARO-EETSS approach.
Figure 1. Overall process of ARO-EETSS approach.
Sustainability 14 16539 g001
Figure 2. Process involved in ARO algorithm.
Figure 2. Process involved in ARO algorithm.
Sustainability 14 16539 g002
Figure 3. TET analysis of ARO-EETSS system in different iterations.
Figure 3. TET analysis of ARO-EETSS system in different iterations.
Sustainability 14 16539 g003
Figure 4. ALBR analysis of ARO-EETSS system under varying iterations.
Figure 4. ALBR analysis of ARO-EETSS system under varying iterations.
Sustainability 14 16539 g004
Figure 5. CR analysis of ARO-EETSS system in different iterations.
Figure 5. CR analysis of ARO-EETSS system in different iterations.
Sustainability 14 16539 g005
Figure 6. ECON analysis of ARO-EETSS system under varying iterations.
Figure 6. ECON analysis of ARO-EETSS system under varying iterations.
Sustainability 14 16539 g006
Figure 7. TET analysis of ARO-EETSS system with recent algorithms under varying tasks.
Figure 7. TET analysis of ARO-EETSS system with recent algorithms under varying tasks.
Sustainability 14 16539 g007
Figure 8. SR analysis of ARO-EETSS system under varying iterations.
Figure 8. SR analysis of ARO-EETSS system under varying iterations.
Sustainability 14 16539 g008
Table 1. TET analysis of ARO-EETSS system with recent algorithms in different iterations.
Table 1. TET analysis of ARO-EETSS system with recent algorithms in different iterations.
Task Execution (ms)
No. of IterationsEDDEDFACOTSQIWO-EATSARO-EETSS
I-20782773655548451
I-40773744627496414
I-60753677591481403
I-80722667573448380
I-100691644537427361
I-120680596510405332
I-140663599490388322
I-160639571459368298
I-180596557442364287
I-200552543430336285
Table 2. ALBR analysis of ARO-EETSS system with recent algorithms in different iterations.
Table 2. ALBR analysis of ARO-EETSS system with recent algorithms in different iterations.
Average Load Balancing Ratio (%)
No. of IterationsEDDEDFACOTSQIWO-EATSARO-EETSS
I-2013.3219.2735.5449.8358.16
I-4019.0727.0139.9151.4163.32
I-6023.2429.1943.6854.5965.50
I-8023.6430.1847.0557.3767.09
I-10025.4231.5749.6357.9666.49
I-12025.6230.5852.2160.5466.89
I-14028.8033.9552.2162.1367.29
I-16031.1836.9354.1964.1170.07
I-18035.9440.1055.5866.1073.84
I-20037.3344.2758.1669.6774.43
Table 3. CR analysis of ARO-EETSS system with recent algorithms under varying iterations.
Table 3. CR analysis of ARO-EETSS system with recent algorithms under varying iterations.
Convergence Rate (ms)
No. of IterationsEDDEDFACOTSQIWO-EATSARO-EETSS
I-20660659660656657
I-40636621613602594
I-60615604587571559
I-80604584571551535
I-100593576560539524
I-120586568554533519
I-140581562551530515
I-160577560543527511
I-180570555543525510
I-200568554538524510
Table 4. ECON analysis of ARO-EETSS system with recent algorithms under varying iterations.
Table 4. ECON analysis of ARO-EETSS system with recent algorithms under varying iterations.
Energy Consumption (Wh)
No. of Physical MachinesEDDEDFACOTSQIWO-EATSARO-EETSS
PM-20165731464717665417
PM-4032295255686819471285
PM-6045937364901832292236
PM-806578922510,96153792815
PM-100843911,12712,53370333435
PM-12010,71312,07814,31188114924
Table 5. TET analysis of ARO-EETSS system with recent algorithms under varying tasks.
Table 5. TET analysis of ARO-EETSS system with recent algorithms under varying tasks.
Task Execution Time (ms)
No. of TasksEDDEDFACOTSQIWO-EATSARO-EETSS
T-2002281701157949
T-40034623915913490
T-600470349231156107
T-800597440310219134
T-1000726564407283181
T-1200812663478335206
T-1400947779583393219
T-1600974881658478305
Table 6. SR analysis of ARO-EETSS system with recent algorithms in different iterations.
Table 6. SR analysis of ARO-EETSS system with recent algorithms in different iterations.
Success Rate (%)
No. of IterationsEDDEDFACOTSQIWO-EATSARO-EETSS
I-10082.4885.6088.5791.2393.73
I-20080.1384.0486.8590.7693.26
I-30078.2683.2687.1789.5192.32
I-40074.0479.8284.5186.7090.14
I-50070.9175.7679.3584.9887.32
I-60064.5073.4177.7982.7985.60
I-70062.1665.1370.7677.1682.95
I-80054.5060.9166.2272.3278.26
I-90048.0953.1057.9464.8271.69
I-100042.1646.3752.4758.2563.41
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hilal, A.M.; Abdalla Hashim, A.H.; Obayya, M.; Gaddah, A.; Mohamed, A.; Yaseen, I.; Rizwanullah, M.; Zamani, A.S. Metaheuristics Based Energy Efficient Task Scheduling Scheme for Cyber-Physical Systems Environment. Sustainability 2022, 14, 16539. https://doi.org/10.3390/su142416539

AMA Style

Hilal AM, Abdalla Hashim AH, Obayya M, Gaddah A, Mohamed A, Yaseen I, Rizwanullah M, Zamani AS. Metaheuristics Based Energy Efficient Task Scheduling Scheme for Cyber-Physical Systems Environment. Sustainability. 2022; 14(24):16539. https://doi.org/10.3390/su142416539

Chicago/Turabian Style

Hilal, Anwer Mustafa, Aisha Hassan Abdalla Hashim, Marwa Obayya, Abdulbaset Gaddah, Abdullah Mohamed, Ishfaq Yaseen, Mohammed Rizwanullah, and Abu Sarwar Zamani. 2022. "Metaheuristics Based Energy Efficient Task Scheduling Scheme for Cyber-Physical Systems Environment" Sustainability 14, no. 24: 16539. https://doi.org/10.3390/su142416539

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop