Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

Cloud systems supply different kinds of on-demand services in accordance with client needs. As the landscape of cloud computing undergoes continuous development, there is a growing imperative for effective utilization of resources, task scheduling, and fault tolerance mechanisms. To decrease the user task execution time (shorten the makespan) with reduced operational expenses, to improve the distribution of load, and to boost utilization of resources, proper mapping of user tasks to the available VMs is necessary. This study introduces a unique perspective in tackling these challenges by implementing inventive scheduling strategies along with robust and proactive fault tolerance mechanisms in cloud environments. This paper presents the Clustering and Reservation Fault-tolerant Scheduling (CRFTS), which adapts the heartbeat mechanism to detect failed VMs proactively and maximizes the system reliability while making it fault-tolerant and optimizing other Quality of Service (QoS) parameters, such as makespan, average resource utilization, and reliability. The study optimizes the allocation of tasks to improve resource utilization and reduce the time required for their completion. At the same time, the proactive reservation-based fault tolerance framework is presented to ensure continuous service delivery throughout its execution without any interruption. The effectiveness of the suggested model is illustrated through simulations and empirical analyses, highlighting enhancements in several QoS parameters while comparing with HEFT, FTSA-1, DBSA, E-HEFT, LB-HEFT, BDHEFT, HO-SSA, and MOTSWAO for various cases and conditions across different tasks and VMs. The outcomes demonstrate that CRFTS average progresses about 48.7%, 51.2%, 45.4%, 11.8%, 24.5%, 24.4% in terms of makespan and 13.1%, 9.3%, 6.5%, 21%, 22.1%, 26.3% in terms of average resource utilization compared to HEFT, FTSA-1, DBSA, E-HEFT, LB-HEFT, BDHEFT, HO-SSA, and MOTSWAO, respectively.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12402248PMC
http://dx.doi.org/10.1038/s41598-025-17609-7DOI Listing

Publication Analysis

Top Keywords

fault tolerance
12
resource utilization
12
fault-tolerant scheduling
8
cloud computing
8
utilization resources
8
tolerance mechanisms
8
tasks vms
8
qos parameters
8
average resource
8
heft ftsa-1
8

Similar Publications

This study aims to tackle the tracking control problem of multiple unmanned surface vessels (USVs). It considers the impact of connectivity-hybrid cyber-attacks in the networked level, and wave-induced disturbances, as well as severe and nonsevere unified modeling rudder angle faults in the physical level. To do this, the study establishes USV models, taking into account actuator fault and cyber-attack modeling.

View Article and Find Full Text PDF

FTC, due to its characteristic of fault prevention and mitigation, is an increasingly popular topic in wastewater treatment process (WWTP) for safety purpose. However, the presence of uncertainties and external disturbances inevitably leads to unknown faults in WWTP, making it challenging for fault-tolerant control (FTC) strategies using existing fault data to ensure continuous safe and stable operation. To address this issue, a knowledge compensation-based active fault-tolerant control (KC-AFTC) is designed in this article.

View Article and Find Full Text PDF

Modern robotic manufacturing requires collision-free coordination of multiple robots to complete numerous tasks in shared, obstacle-rich workspaces. Although individual tasks may be simple in isolation, automated joint task allocation, scheduling, and motion planning under spatiotemporal constraints remain computationally intractable for classical methods at real-world scales. Existing multiarm systems deployed in industry rely on human intuition and experience to design feasible trajectories manually in a labor-intensive process.

View Article and Find Full Text PDF

Enhanced secure storage and data privacy management system for big data based on multilayer model.

Sci Rep

September 2025

Remote Credit Business Department, Sichuan Rural Commercial United Bank Co., Ltd, Chengdu, 610041, Sichuan, China.

As big data systems expand in scale and complexity, managing and securing sensitive data-especially personnel records-has become a critical challenge in cloud environments. This paper proposes a novel Multi-Layer Secure Cloud Storage Model (MLSCSM) tailored for large-scale personnel data. The model integrates fast and secure ChaCha20 encryption, Dual Stage Data Partitioning (DSDP) to maintain statistical reliability across blocks, k-anonymization to ensure privacy, SHA-512 hashing for data integrity, and Cauchy matrix-based dispersion for fault-tolerant distributed storage.

View Article and Find Full Text PDF

A byzantine-resistant blockchain framework for secure and scalable immigration management.

Sci Rep

September 2025

Department of CSE, Ahsanullah University of Science and Technology (AUST), 141 & 142, Love Road, Tejgaon Industrial Area, Dhaka, 1208, Bangladesh.

Modern immigration management systems face three critical challenges: security vulnerabilities in centralized databases exemplified by a 2023 breach exposing over 120,000 records processing inefficiencies resulting in delays over 30 days, and interoperability gaps among stakeholders. Although blockchain has been proposed, current implementations often sacrifice regulatory compliance (e.g.

View Article and Find Full Text PDF