Priority based parallel processing multi user multi task scheduling algorithm
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.04Keywords:
Task scheduling, Multi User, Parallel Processing, Edge server, Data centreDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Mobile Edge computing is one of the emerging fields in cloud environments where numerous user applications leverage a wide range of strong and powerful resources. To ensure optimal utilization, cloud computing resources such as storage, applications, and other services require effective management and scheduling. Managing resources is particularly challenging in scientific workflows, which involve extensive computations and interdependent operations. Task scheduling is the crucial challenge in this setup since the edge setup is migrated near to the user’s environment most of the computation is going to be handled by the edge server. Various algorithms and techniques have been proposed to address this issue. This paper explores a novel scheduling method for tasks offloaded by different users in a multi-user access computing paradigm. Also, the priority of the task is being considered while the tasks from mobile users are assigned to the data center. Considering the priority of the task, the tasks are being scheduled parallelly to the data centers. The completion time and the CPU utilization are extremely enhanced by using the proposed PBPPMUMTSA- Priority Based Parallel Processing Multi User Multi Task Scheduling Algorithm.Abstract
How to Cite
Downloads
Similar Articles
- Priya Nandhagopal, Jayasimman Lawrence, ETTG: Enhanced token and tag generation for authenticating users and deduplicating data stored in public cloud storage , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- R. Prabhu, P. Archana, S. Anusooya, P. Anuradha, Improved Steganography for IoT Network Node Data Security Promoting Secure Data Transmission using Generative Adversarial Networks , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Karthik Baburaj, Navaneeth kattil Madathil, Roshini Barkur, NLP Based Voice Assistant Usage on Consumer Shopping , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Bommaiah Boya, Premara Devaraju, Integrating clinical and ECG data for heart disease prediction: A hybrid deep learning approach based on two modalities with particle swarm optimization , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- N. Ruba, A. S. A. Khadir, Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Brigith Gladys L, Merline Vinotha J, Sustainable fuzzy rough multi-objective multi-route cold transportation model with traffic flow and route constraints , The Scientific Temper: Vol. 16 No. 01 (2025): The Scientific Temper
- I.Bhuvaneshwarri, M. N. Sudha, An implementation of secure storage using blockchain technology on cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Priya Nandhagopal, Jayasimman Lawrence, ECE cipher: Enhanced convergent encryption for securing and deduplicating public cloud data , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Chandrasekaran M, Rajesh P K, Optimization of cost to customer of power train in commercial vehicle using knapsack dynamic programming influenced by vehicle IoT data , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Optimizing IoT application deployment with fog - cloud paradigm: A resource-aware approach , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

