首页 > 最新文献

Int. J. Pervasive Comput. Commun.最新文献

英文 中文
Enhanced RSA key encryption application for metering data in smart grid 智能电网计量数据RSA密钥加密增强应用
Pub Date : 2021-11-12 DOI: 10.1108/ijpcc-07-2021-0172
Anita Philips, J. Jayaraj, T. JoshF., P. Venkateshkumar
PurposeDigitizing of the electrical power grid promotes the advantages of efficient energy management alongside the possibilities of major vulnerabilities. A typical inadequacy that needs critical attention to ensure the seamless operation of the smart grid system remains in the data transmission between consumer premises smart devices and the utility centres. Many researches aim at establishing security protocols to ensure secure and efficient energy management resulting in perfect demand–supply balance.Design/methodology/approachIn this paper, the authentication of the smart meter data has been proposed with enhanced Rivest–Shamir–Adleman (RSA) key encryption using an efficient way of generating large prime numbers. The trapdoor one-way function applied in the RSA algorithm makes it almost impossible for the reverse engineering attempts of cracking the key pair.FindingsThe algorithm for generating prime numbers has been tested both with the convention method and with the enhanced method of including a low-level primality test with a first few hundred primes. The combination of low-level and high-level primality tests shows an improvement in execution time of the algorithm.Originality/valueThere is a considerable improvement in the time complexities when using the combination method. This efficient generation of prime numbers can be successfully applied to the smart meter systems, thereby increasing the strength and speed of the key encryption.
目的:电网的数字化促进了高效能源管理的优势,同时也带来了重大漏洞的可能性。在消费者住宅智能设备和公用事业中心之间的数据传输中,需要高度关注以确保智能电网系统无缝运行的典型不足。许多研究旨在建立安全协议,以确保安全高效的能源管理,从而实现完美的供需平衡。设计/方法/方法本文提出了一种基于RSA (Rivest-Shamir-Adleman)密钥加密的智能电表数据认证方法,该方法采用一种有效的生成大素数的方法。RSA算法中应用的活门单向函数使得破解密钥对的逆向工程尝试几乎不可能。生成素数的算法已经用常规方法和增强的方法进行了测试,该方法包括使用前几百个素数进行低级素数测试。低级和高级质数测试的结合表明,该算法的执行时间有所改善。原创性/价值使用组合方法时,时间复杂度有相当大的改善。这种高效生成质数的方法可以成功地应用于智能电表系统,从而提高密钥加密的强度和速度。
{"title":"Enhanced RSA key encryption application for metering data in smart grid","authors":"Anita Philips, J. Jayaraj, T. JoshF., P. Venkateshkumar","doi":"10.1108/ijpcc-07-2021-0172","DOIUrl":"https://doi.org/10.1108/ijpcc-07-2021-0172","url":null,"abstract":"\u0000Purpose\u0000Digitizing of the electrical power grid promotes the advantages of efficient energy management alongside the possibilities of major vulnerabilities. A typical inadequacy that needs critical attention to ensure the seamless operation of the smart grid system remains in the data transmission between consumer premises smart devices and the utility centres. Many researches aim at establishing security protocols to ensure secure and efficient energy management resulting in perfect demand–supply balance.\u0000\u0000\u0000Design/methodology/approach\u0000In this paper, the authentication of the smart meter data has been proposed with enhanced Rivest–Shamir–Adleman (RSA) key encryption using an efficient way of generating large prime numbers. The trapdoor one-way function applied in the RSA algorithm makes it almost impossible for the reverse engineering attempts of cracking the key pair.\u0000\u0000\u0000Findings\u0000The algorithm for generating prime numbers has been tested both with the convention method and with the enhanced method of including a low-level primality test with a first few hundred primes. The combination of low-level and high-level primality tests shows an improvement in execution time of the algorithm.\u0000\u0000\u0000Originality/value\u0000There is a considerable improvement in the time complexities when using the combination method. This efficient generation of prime numbers can be successfully applied to the smart meter systems, thereby increasing the strength and speed of the key encryption.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131321119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework for scheduling IoT application jobs on fog computing infrastructure based on QoS parameters 基于 QoS 参数的雾计算基础设施物联网应用作业调度框架
Pub Date : 2021-10-25 DOI: 10.1108/ijpcc-08-2020-0108
Mandeep Kaur, Rajinder Sandhu, R. Mohana
PurposeThe purpose of this study is to verify that if applications categories are segmented and resources are allocated based on their specific category, how effective scheduling can be done?.Design/methodology/approachThis paper proposes a scheduling framework for IoT application jobs, based upon the Quality of Service (QoS) parameters, which works at coarse grained level to select a fog environment and at fine grained level to select a fog node. Fog environment is chosen considering availability, physical distance, latency and throughput. At fine grained (node selection) level, a probability triad (C, M, G) is anticipated using Naïve Bayes algorithm which provides probability of newly submitted application job to fall in either of the categories Compute (C) intensive, Memory (M) intensive and GPU (G) intensive.FindingsExperiment results showed that the proposed framework performed better than traditional cloud and fog computing paradigms.Originality/valueThe proposed framework combines types of applications and computation capabilities of Fog computing environment, which is not carried out to the best of knowledge of authors.
设计/方法/途径 本文根据服务质量(QoS)参数为物联网应用作业提出了一个调度框架,该框架在粗粒度层面上选择雾环境,在细粒度层面上选择雾节点。选择雾环境时要考虑可用性、物理距离、延迟和吞吐量。在细粒度(节点选择)层面,使用奈伊夫贝叶斯算法预测了概率三元组(C、M、G),该概率三元组提供了新提交的应用作业属于计算(C)密集型、内存(M)密集型和图形处理器(G)密集型中任何一类的概率。实验结果实验结果表明,所提出的框架比传统的云计算和雾计算范例表现得更好。原创性/价值所提出的框架将应用类型和雾计算环境的计算能力结合在一起,据作者所知,目前还没有进行过这种结合。
{"title":"A framework for scheduling IoT application jobs on fog computing infrastructure based on QoS parameters","authors":"Mandeep Kaur, Rajinder Sandhu, R. Mohana","doi":"10.1108/ijpcc-08-2020-0108","DOIUrl":"https://doi.org/10.1108/ijpcc-08-2020-0108","url":null,"abstract":"\u0000Purpose\u0000The purpose of this study is to verify that if applications categories are segmented and resources are allocated based on their specific category, how effective scheduling can be done?.\u0000\u0000\u0000Design/methodology/approach\u0000This paper proposes a scheduling framework for IoT application jobs, based upon the Quality of Service (QoS) parameters, which works at coarse grained level to select a fog environment and at fine grained level to select a fog node. Fog environment is chosen considering availability, physical distance, latency and throughput. At fine grained (node selection) level, a probability triad (C, M, G) is anticipated using Naïve Bayes algorithm which provides probability of newly submitted application job to fall in either of the categories Compute (C) intensive, Memory (M) intensive and GPU (G) intensive.\u0000\u0000\u0000Findings\u0000Experiment results showed that the proposed framework performed better than traditional cloud and fog computing paradigms.\u0000\u0000\u0000Originality/value\u0000The proposed framework combines types of applications and computation capabilities of Fog computing environment, which is not carried out to the best of knowledge of authors.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131167694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced packet reordering procedure to improve TCP communication 增强包重排序过程,以改善TCP通信
Pub Date : 2021-10-24 DOI: 10.1108/ijpcc-05-2021-0116
Sai Prasanthi Kasimsetti, Asdaque Hussain
PurposeThe research work is attained by Spurious Transmission–based Enhanced Packet Reordering Method (ST-EPRM). The packet reordering necessity is evaded by presenting random linear network coding process on wireless network physical layer which function on basis of sequence numbers. The spurious retransmission happening over wireless network is obtained by presenting monitoring concept for reducing number of spurious retransmissions because it might need more than three DUPACKs for triggering fast retransmit. This monitoring node performs as centralized node as well variation amid buffer length and number of packets being sent can be predicted. This information helps in differentiating spurious retransmission from the packet loss.Design/methodology/approachBased on transmission detection, action is accomplished whether to retransmit or evade transmission. Monitoring node selection is achieved by presenting improved cuckoo search algorithm. The modified support vector machine algorithm is greatly used for variation-based spurious transmission.FindingsThe research work which is attained by ST-EPRM. The packet reordering necessity is evaded by presenting random linear network coding process on wireless network physical layer which function on basis of sequence numbers. The spurious retransmission happening over wireless network is obtained by presenting monitoring concept for reducing number of spurious retransmissions because it might need more than three DUPACKs for triggering fast retransmit. This monitoring node performs as centralized node as well variation amid buffer length and number of packets being sent can be predicted. This information helps in differentiating spurious retransmission from the packet loss.Originality/valueBased on transmission detection, action is accomplished whether to retransmit or evade transmission. Monitoring node selection is achieved by presenting improved cuckoo search algorithm. The modified support vector machine algorithm is greatly used for variation-based spurious transmission.
目的采用基于伪传输的增强分组重排序方法(ST-EPRM)进行研究。在无线网络物理层上提出了基于序号的随机线性网络编码过程,避免了分组重新排序的必要性。针对无线网络中发生的虚假重传,由于触发快速重传可能需要三个以上的dupack,提出了减少虚假重传数量的监控概念。该监控节点作为集中式节点执行,并且可以预测缓冲区长度和发送的数据包数量之间的变化。此信息有助于区分虚假重传和丢包。设计/方法/方法基于传输检测,完成重传或逃避传输的动作。提出了改进的布谷鸟搜索算法,实现了监测节点的选择。改进的支持向量机算法被广泛用于基于变化的杂散传输。结果:ST-EPRM的研究成果。在无线网络物理层上提出了基于序号的随机线性网络编码过程,避免了分组重新排序的必要性。针对无线网络中发生的虚假重传,由于触发快速重传可能需要三个以上的dupack,提出了减少虚假重传数量的监控概念。该监控节点作为集中式节点执行,并且可以预测缓冲区长度和发送的数据包数量之间的变化。此信息有助于区分虚假重传和丢包。原创性/价值基于传输检测,完成重传或逃避传输的动作。提出了改进的布谷鸟搜索算法,实现了监测节点的选择。改进的支持向量机算法被广泛用于基于变化的杂散传输。
{"title":"Enhanced packet reordering procedure to improve TCP communication","authors":"Sai Prasanthi Kasimsetti, Asdaque Hussain","doi":"10.1108/ijpcc-05-2021-0116","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2021-0116","url":null,"abstract":"\u0000Purpose\u0000The research work is attained by Spurious Transmission–based Enhanced Packet Reordering Method (ST-EPRM). The packet reordering necessity is evaded by presenting random linear network coding process on wireless network physical layer which function on basis of sequence numbers. The spurious retransmission happening over wireless network is obtained by presenting monitoring concept for reducing number of spurious retransmissions because it might need more than three DUPACKs for triggering fast retransmit. This monitoring node performs as centralized node as well variation amid buffer length and number of packets being sent can be predicted. This information helps in differentiating spurious retransmission from the packet loss.\u0000\u0000\u0000Design/methodology/approach\u0000Based on transmission detection, action is accomplished whether to retransmit or evade transmission. Monitoring node selection is achieved by presenting improved cuckoo search algorithm. The modified support vector machine algorithm is greatly used for variation-based spurious transmission.\u0000\u0000\u0000Findings\u0000The research work which is attained by ST-EPRM. The packet reordering necessity is evaded by presenting random linear network coding process on wireless network physical layer which function on basis of sequence numbers. The spurious retransmission happening over wireless network is obtained by presenting monitoring concept for reducing number of spurious retransmissions because it might need more than three DUPACKs for triggering fast retransmit. This monitoring node performs as centralized node as well variation amid buffer length and number of packets being sent can be predicted. This information helps in differentiating spurious retransmission from the packet loss.\u0000\u0000\u0000Originality/value\u0000Based on transmission detection, action is accomplished whether to retransmit or evade transmission. Monitoring node selection is achieved by presenting improved cuckoo search algorithm. The modified support vector machine algorithm is greatly used for variation-based spurious transmission.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128204788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-viewpoints visual models for efficient modeling and analysis of Twitter based health-care services 用于对基于Twitter的医疗保健服务进行有效建模和分析的多视点可视化模型
Pub Date : 2021-10-21 DOI: 10.1108/IJPCC-06-2021-0140
Noorullah R. Mohammed, Moulana Mohammed
{"title":"Multi-viewpoints visual models for efficient modeling and analysis of Twitter based health-care services","authors":"Noorullah R. Mohammed, Moulana Mohammed","doi":"10.1108/IJPCC-06-2021-0140","DOIUrl":"https://doi.org/10.1108/IJPCC-06-2021-0140","url":null,"abstract":"","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132354149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Task scheduling and resource allocation of seasonal requests of users in cloud using NMKA and CM-GA techniques 基于NMKA和CM-GA技术的云环境下用户季节性请求的任务调度和资源分配
Pub Date : 2021-09-27 DOI: 10.1108/ijpcc-04-2021-0089
S. Prathiba, S. Sankar
PurposeThe purpose of this paper is to provide energy-efficient task scheduling and resource allocation (RA) in cloud data centers (CDC).Design/methodology/approachTask scheduling and RA is proposed in this paper for cloud environment, which schedules the user’s seasonal requests and allocates resources in an optimized manner. The proposed study does the following operations: data collection, feature extraction, feature reduction and RA. Initially, the online streaming data of seasonal requests of multiple users were gathered. After that, the features are extracted based on user requests along with the cloud server, and the extracted features are lessened using modified principal component analysis. For RA, the split data of the user request is identified and that data is pre-processed by computing closed frequent itemset along with entropy values. After that, the user requests are scheduled using the normalized K-means algorithm (NKMA) centered on the entropy values. Finally, the apt resources are allotted to that scheduled task using the Cauchy mutation-genetic algorithm (CM-GA). The investigational outcomes exhibit that the proposed study outruns other existing algorithms in respect to response time, execution time, clustering accuracy, precision and recall.FindingsThe proposed NKMA and CM-GA technique’s performance is analyzed by comparing them with the existing techniques. The NKMA performance is analyzed with KMA and Fuzzy C-means regarding Prc (Precision), Rca (Recall), F ms (f measure), Acr (Accuracy)and Ct (Clustering Time). The performance is compared to about 500 numbers of tasks. For all tasks, the NKMA provides the highest values for Prc, Rca, Fms and Acr, takes the lowest time (Ct) for clustering the data. Then, the CM-GA optimization for optimally allocating the resource in the cloud is contrasted with the GA and particle swarm optimization with respect to Rt (Response Time), Pt (Process Time), Awt (Average Waiting Time), Atat (Average Turnaround Time), Lcy (Latency) and Tp (Throughput). For all number of tasks, the proposed CM-GA gives the lowest values for Rt, Pt, Awt, Atat and Lcy and also provides the highest values for Tp. So, from the results, it is known that the proposed technique for seasonal requests RA works well and the method optimally allocates the resources in the cloud.Originality/valueThe proposed approach provides energy-efficient task scheduling and RA and it paves the way for the development of effective CDC.
目的为云数据中心(CDC)提供节能的任务调度和资源分配(RA)。本文针对云环境提出了任务调度和RA,对用户的季节性请求进行调度,优化资源分配。本研究主要进行以下操作:数据收集、特征提取、特征约简和RA。首先,收集多个用户季节性请求的在线流数据。然后,根据用户请求和云服务器提取特征,并使用改进的主成分分析对提取的特征进行精简。对于RA,识别用户请求的分割数据,并通过计算封闭频繁项集和熵值对该数据进行预处理。之后,使用以熵值为中心的规范化k -均值算法(NKMA)调度用户请求。最后,使用柯西突变遗传算法(CM-GA)将apt资源分配给该调度任务。研究结果表明,所提出的研究在响应时间、执行时间、聚类准确性、精度和召回率方面优于其他现有算法。通过与现有的NKMA和CM-GA技术进行比较,分析了所提出的NKMA和CM-GA技术的性能。用KMA和模糊C-means分析NKMA的性能,包括Prc (Precision)、Rca (Recall)、F ms (F measure)、Acr (Accuracy)和Ct (Clustering Time)。将性能与大约500个任务进行比较。对于所有任务,NKMA提供的Prc、Rca、Fms和Acr的值最高,聚类数据所需的时间(Ct)最短。然后,将CM-GA优化与遗传算法和粒子群优化在Rt(响应时间)、Pt(处理时间)、Awt(平均等待时间)、Atat(平均周转时间)、Lcy(延迟)和Tp(吞吐量)方面进行对比。对于所有数量的任务,所提出的CM-GA给出了Rt、Pt、Awt、Atat和Lcy的最低值,并提供了Tp的最高值。因此,从结果来看,所提出的季节性请求RA技术效果良好,并且该方法可以最佳地分配云中的资源。该方法提供了高效节能的任务调度和RA,为开发高效的CDC铺平了道路。
{"title":"Task scheduling and resource allocation of seasonal requests of users in cloud using NMKA and CM-GA techniques","authors":"S. Prathiba, S. Sankar","doi":"10.1108/ijpcc-04-2021-0089","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0089","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to provide energy-efficient task scheduling and resource allocation (RA) in cloud data centers (CDC).\u0000\u0000\u0000Design/methodology/approach\u0000Task scheduling and RA is proposed in this paper for cloud environment, which schedules the user’s seasonal requests and allocates resources in an optimized manner. The proposed study does the following operations: data collection, feature extraction, feature reduction and RA. Initially, the online streaming data of seasonal requests of multiple users were gathered. After that, the features are extracted based on user requests along with the cloud server, and the extracted features are lessened using modified principal component analysis. For RA, the split data of the user request is identified and that data is pre-processed by computing closed frequent itemset along with entropy values. After that, the user requests are scheduled using the normalized K-means algorithm (NKMA) centered on the entropy values. Finally, the apt resources are allotted to that scheduled task using the Cauchy mutation-genetic algorithm (CM-GA). The investigational outcomes exhibit that the proposed study outruns other existing algorithms in respect to response time, execution time, clustering accuracy, precision and recall.\u0000\u0000\u0000Findings\u0000The proposed NKMA and CM-GA technique’s performance is analyzed by comparing them with the existing techniques. The NKMA performance is analyzed with KMA and Fuzzy C-means regarding Prc (Precision), Rca (Recall), F ms (f measure), Acr (Accuracy)and Ct (Clustering Time). The performance is compared to about 500 numbers of tasks. For all tasks, the NKMA provides the highest values for Prc, Rca, Fms and Acr, takes the lowest time (Ct) for clustering the data. Then, the CM-GA optimization for optimally allocating the resource in the cloud is contrasted with the GA and particle swarm optimization with respect to Rt (Response Time), Pt (Process Time), Awt (Average Waiting Time), Atat (Average Turnaround Time), Lcy (Latency) and Tp (Throughput). For all number of tasks, the proposed CM-GA gives the lowest values for Rt, Pt, Awt, Atat and Lcy and also provides the highest values for Tp. So, from the results, it is known that the proposed technique for seasonal requests RA works well and the method optimally allocates the resources in the cloud.\u0000\u0000\u0000Originality/value\u0000The proposed approach provides energy-efficient task scheduling and RA and it paves the way for the development of effective CDC.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115261293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS aware web service selection using orthogonal array learning on fruit fly optimization approach 基于果蝇优化方法的正交阵列学习的QoS感知web服务选择
Pub Date : 2021-09-13 DOI: 10.1108/ijpcc-08-2020-0101
Manik Chandra, R. Niyogi
PurposeThis paper aims to solve the web service selection problem using an efficient meta-heuristic algorithm. The problem of selecting a set of web services from a large-scale service environment (web service repository) while maintaining Quality-of-Service (QoS), is referred to as web service selection (WSS). With the explosive growth of internet services, managing and selecting the proper services (or say web service) has become a pertinent research issue.Design/methodology/approachIn this paper, to address WSS problem, the authors propose a new modified fruit fly optimization approach, called orthogonal array-based learning in fruit fly optimizer (OL-FOA). In OL-FOA, they adopt a chaotic map to initialize the population; they add the adaptive DE/best/2mutation operator to improve the exploration capability of the fruit fly approach; and finally, to improve the efficiency of the search process (by reducing the search space), the authors use the orthogonal learning mechanism.FindingsTo test the efficiency of the proposed approach, a test suite of 2500 web services is chosen from the public repository. To establish the competitiveness of the proposed approach, it compared against four other meta-heuristic approaches (including classical as well as state-of-the-art), namely, fruit fly optimization (FOA), differential evolution (DE), modified artificial bee colony algorithm (mABC) and global-best ABC (GABC). The empirical results show that the proposed approach outperforms its counterparts in terms of response time, latency, availability and reliability.Originality/valueIn this paper, the authors have developed a population-based novel approach (OL-FOA) for the QoS aware web services selection (WSS). To justify the results, the authors compared against four other meta-heuristic approaches (including classical as well as state-of-the-art), namely, fruit fly optimization (FOA), differential evolution (DE), modified artificial bee colony algorithm (mABC) and global-best ABC (GABC) over the four QoS parameter response time, latency, availability and reliability. The authors found that the approach outperforms overall competitive approaches. To satisfy all objective simultaneously, the authors would like to extend this approach in the frame of multi-objective WSS optimization problem. Further, this is declared that this paper is not submitted to any other journal or under review.
目的利用一种高效的元启发式算法解决web服务选择问题。在保持服务质量(QoS)的同时,从大规模服务环境(web服务存储库)中选择一组web服务的问题称为web服务选择(WSS)。随着internet服务的爆炸式增长,管理和选择合适的服务(或者说是web服务)已经成为一个相关的研究问题。为了解决WSS问题,作者提出了一种新的改进的果蝇优化方法,即基于正交阵列的学习果蝇优化器(OL-FOA)。在OL-FOA中,他们采用混沌映射来初始化种群;增加了自适应DE/best/2突变算子,提高了果蝇方法的探测能力;最后,为了提高搜索过程的效率(通过减少搜索空间),作者使用了正交学习机制。为了测试所提出方法的效率,从公共存储库中选择了包含2500个web服务的测试套件。为了确定该方法的竞争力,将其与其他四种元启发式方法(包括经典方法和最新方法)进行了比较,即果蝇优化(FOA)、差分进化(DE)、改进人工蜂群算法(mABC)和全局最优ABC (GABC)。实证结果表明,该方法在响应时间、延迟、可用性和可靠性方面都优于同类方法。在本文中,作者提出了一种基于群体的基于QoS感知的web服务选择(WSS)的新方法(OL-FOA)。为了验证结果,作者比较了其他四种元启发式方法(包括经典方法和最先进的方法),即果蝇优化(FOA)、差分进化(DE)、改进人工蜂群算法(mABC)和全局最佳ABC (GABC)在四个QoS参数响应时间、延迟、可用性和可靠性方面的影响。作者发现,这种方法优于整体竞争方法。为了同时满足所有目标,作者将该方法扩展到多目标WSS优化问题的框架中。此外,声明此论文未提交给任何其他期刊或正在审查中。
{"title":"QoS aware web service selection using orthogonal array learning on fruit fly optimization approach","authors":"Manik Chandra, R. Niyogi","doi":"10.1108/ijpcc-08-2020-0101","DOIUrl":"https://doi.org/10.1108/ijpcc-08-2020-0101","url":null,"abstract":"\u0000Purpose\u0000This paper aims to solve the web service selection problem using an efficient meta-heuristic algorithm. The problem of selecting a set of web services from a large-scale service environment (web service repository) while maintaining Quality-of-Service (QoS), is referred to as web service selection (WSS). With the explosive growth of internet services, managing and selecting the proper services (or say web service) has become a pertinent research issue.\u0000\u0000\u0000Design/methodology/approach\u0000In this paper, to address WSS problem, the authors propose a new modified fruit fly optimization approach, called orthogonal array-based learning in fruit fly optimizer (OL-FOA). In OL-FOA, they adopt a chaotic map to initialize the population; they add the adaptive DE/best/2mutation operator to improve the exploration capability of the fruit fly approach; and finally, to improve the efficiency of the search process (by reducing the search space), the authors use the orthogonal learning mechanism.\u0000\u0000\u0000Findings\u0000To test the efficiency of the proposed approach, a test suite of 2500 web services is chosen from the public repository. To establish the competitiveness of the proposed approach, it compared against four other meta-heuristic approaches (including classical as well as state-of-the-art), namely, fruit fly optimization (FOA), differential evolution (DE), modified artificial bee colony algorithm (mABC) and global-best ABC (GABC). The empirical results show that the proposed approach outperforms its counterparts in terms of response time, latency, availability and reliability.\u0000\u0000\u0000Originality/value\u0000In this paper, the authors have developed a population-based novel approach (OL-FOA) for the QoS aware web services selection (WSS). To justify the results, the authors compared against four other meta-heuristic approaches (including classical as well as state-of-the-art), namely, fruit fly optimization (FOA), differential evolution (DE), modified artificial bee colony algorithm (mABC) and global-best ABC (GABC) over the four QoS parameter response time, latency, availability and reliability. The authors found that the approach outperforms overall competitive approaches. To satisfy all objective simultaneously, the authors would like to extend this approach in the frame of multi-objective WSS optimization problem. Further, this is declared that this paper is not submitted to any other journal or under review.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks 混合网络中数据包大小对RIP和OSPF路由协议性能的影响
Pub Date : 2021-09-10 DOI: 10.1108/IJPCC-02-2021-0036
N. Jain, A. Payal, Aarti Jain
PurposeThe purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are the most popular routing protocols, and it has always been a challenge to select between these routing protocols, especially for hybrid networks. The efficiency of routing protocol mainly depends on resulting throughput and delay. Also, it has been observed that data packet size also plays an essential role in determining the efficiency of routing protocol.Design/methodology/approachTo analyse the effect of different packet sizes using two routing protocols, routing information protocol (RIP) and open shortest path first (OSPF) on the hybrid network, require detailed planning. Designing the network for simulate and then finally analysing the results requires proper study. Each stage needs to be understood well for work accomplishment. Thus, the network’s simulation and evaluation require implementing the proposed work step by step, saving time and cost. Here, the proposed work methodology is defined in six steps or stages.FindingsThe simulation results show that both routing protocols – RIP and OSPF are equally good in terms of network throughput for all different packet sizes. However, OSPF performs better in terms of network delay than RIP routing protocol in different packet size scenarios.Research limitations/implicationsIn this paper, a fixed network of 125 objects and only RIP and OSPF routing protocol have been used for analysis. Therefore, in the future, a comparison of different network sizes can be considered by increasing or decreasing the number of objects in the proposed network. Furthermore, the other routing protocols can be used for performance evaluation on the same proposed network.Originality/valueThe analysis can be conducted by simulation of the network, enabling us to develop a network environment without restricting the selection of parameters as it minimizes cost, network deployment overhead, human resources, etc. The results are analysed, calculated and compared for each packet size on different routing protocol networks individually and the conclusion is made.
本研究的目的是计算256、512、1024和2048字节不同数据包大小对大规模混合网络的影响,并分析和确定在不同数据包大小下哪种路由协议最适合应用吞吐量、应用延迟和网络链路参数。路由协议用于选择数据包从源到目的的最优路径。在最终的网络配置之前,考虑路由协议的性能总是很重要的。从文献中可以观察到,RIP(路由信息协议)和OSPF(开放最短路径优先)是最流行的路由协议,在这些路由协议之间进行选择一直是一个挑战,特别是对于混合网络。路由协议的效率主要取决于产生的吞吐量和延迟。此外,数据包大小在决定路由协议的效率方面也起着至关重要的作用。设计/方法/方法在混合网络中使用路由信息协议(RIP)和开放最短路径优先(OSPF)两种路由协议来分析不同数据包大小的影响,需要详细的规划。设计网络进行仿真,最后对结果进行分析,需要进行适当的研究。为了完成工作,每个阶段都需要很好地理解。因此,网络的仿真和评估需要逐步实现所提出的工作,从而节省时间和成本。在这里,建议的工作方法被定义为六个步骤或阶段。仿真结果表明,RIP和OSPF两种路由协议在不同数据包大小的情况下都具有相同的网络吞吐量。但是在不同报文大小的场景下,OSPF在网络时延方面要优于RIP。研究局限/意义在本文中,固定网络中有125个对象,仅使用RIP和OSPF路由协议进行分析。因此,在未来,可以通过增加或减少提出的网络中的对象数量来考虑不同网络大小的比较。此外,其他路由协议可以用于同一提议网络的性能评估。独创性/价值分析可以通过网络模拟进行,使我们能够在不限制参数选择的情况下开发网络环境,因为它可以最大限度地降低成本,网络部署开销,人力资源等。对不同路由协议网络中每个数据包大小的结果分别进行了分析、计算和比较,得出了结论。
{"title":"Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks","authors":"N. Jain, A. Payal, Aarti Jain","doi":"10.1108/IJPCC-02-2021-0036","DOIUrl":"https://doi.org/10.1108/IJPCC-02-2021-0036","url":null,"abstract":"\u0000Purpose\u0000The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are the most popular routing protocols, and it has always been a challenge to select between these routing protocols, especially for hybrid networks. The efficiency of routing protocol mainly depends on resulting throughput and delay. Also, it has been observed that data packet size also plays an essential role in determining the efficiency of routing protocol.\u0000\u0000\u0000Design/methodology/approach\u0000To analyse the effect of different packet sizes using two routing protocols, routing information protocol (RIP) and open shortest path first (OSPF) on the hybrid network, require detailed planning. Designing the network for simulate and then finally analysing the results requires proper study. Each stage needs to be understood well for work accomplishment. Thus, the network’s simulation and evaluation require implementing the proposed work step by step, saving time and cost. Here, the proposed work methodology is defined in six steps or stages.\u0000\u0000\u0000Findings\u0000The simulation results show that both routing protocols – RIP and OSPF are equally good in terms of network throughput for all different packet sizes. However, OSPF performs better in terms of network delay than RIP routing protocol in different packet size scenarios.\u0000\u0000\u0000Research limitations/implications\u0000In this paper, a fixed network of 125 objects and only RIP and OSPF routing protocol have been used for analysis. Therefore, in the future, a comparison of different network sizes can be considered by increasing or decreasing the number of objects in the proposed network. Furthermore, the other routing protocols can be used for performance evaluation on the same proposed network.\u0000\u0000\u0000Originality/value\u0000The analysis can be conducted by simulation of the network, enabling us to develop a network environment without restricting the selection of parameters as it minimizes cost, network deployment overhead, human resources, etc. The results are analysed, calculated and compared for each packet size on different routing protocol networks individually and the conclusion is made.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121302738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure 一种增强的网络入侵检测系统,用于无处不在的银行基础设施中的恶意爬虫检测和安全事件关联
Pub Date : 2021-09-06 DOI: 10.1108/ijpcc-04-2021-0102
Sivaraman Eswaran, Vakula Rani, Daniel Dominic, Jayabrabu Ramakrishnan, S. Selvakumar
PurposeIn the recent era, banking infrastructure constructs various remotely handled platforms for users. However, the security risk toward the banking sector has also elevated, as it is visible from the rising number of reported attacks against these security systems. Intelligence shows that cyberattacks of the crawlers are increasing. Malicious crawlers can crawl the Web pages, crack the passwords and reap the private data of the users. Besides, intrusion detection systems in a dynamic environment provide more false positives. The purpose of this research paper is to propose an efficient methodology to sense the attacks for creating low levels of false positives.Design/methodology/approachIn this research, the authors have developed an efficient approach for malicious crawler detection and correlated the security alerts. The behavioral features of the crawlers are examined for the recognition of the malicious crawlers, and a novel methodology is proposed to improvise the bank user portal security. The authors have compared various machine learning strategies including Bayesian network, support sector machine (SVM) and decision tree.FindingsThis proposed work stretches in various aspects. Initially, the outcomes are stated for the mixture of different kinds of log files. Then, distinct sites of various log files are selected for the construction of the acceptable data sets. Session identification, attribute extraction, session labeling and classification were held. Moreover, this approach clustered the meta-alerts into higher level meta-alerts for fusing multistages of attacks and the various types of attacks.Originality/valueThis methodology used incremental clustering techniques and analyzed the probability of existing topologies in SVM classifiers for more deterministic classification. It also enhanced the taxonomy for various domains.
目的近年来,银行基础设施为用户构建了各种远程办理平台。然而,银行业面临的安全风险也有所上升,这一点从越来越多的针对这些安全系统的攻击报告中可见一斑。情报显示,爬虫的网络攻击正在增加。恶意爬虫可以抓取网页,破解密码,获取用户的私人数据。此外,动态环境下的入侵检测系统会产生更多的误报。本研究论文的目的是提出一种有效的方法来感知攻击,以创造低水平的误报。设计/方法/方法在本研究中,作者开发了一种有效的恶意爬虫检测方法,并将安全警报关联起来。通过分析爬虫的行为特征来识别恶意爬虫,提出了一种提高银行用户门户安全性的新方法。作者比较了各种机器学习策略,包括贝叶斯网络、支持扇区机(SVM)和决策树。研究结果这项工作涉及多个方面。最初,对不同类型的日志文件的混合表示结果。然后,选择不同日志文件的不同位置构建可接受的数据集。进行了会话识别、属性提取、会话标注和分类。此外,该方法还将元警报聚类为更高级的元警报,以融合多阶段攻击和各种类型的攻击。该方法使用增量聚类技术,并分析支持向量机分类器中现有拓扑的概率,以获得更确定的分类。它还增强了各个领域的分类法。
{"title":"An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure","authors":"Sivaraman Eswaran, Vakula Rani, Daniel Dominic, Jayabrabu Ramakrishnan, S. Selvakumar","doi":"10.1108/ijpcc-04-2021-0102","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0102","url":null,"abstract":"\u0000Purpose\u0000In the recent era, banking infrastructure constructs various remotely handled platforms for users. However, the security risk toward the banking sector has also elevated, as it is visible from the rising number of reported attacks against these security systems. Intelligence shows that cyberattacks of the crawlers are increasing. Malicious crawlers can crawl the Web pages, crack the passwords and reap the private data of the users. Besides, intrusion detection systems in a dynamic environment provide more false positives. The purpose of this research paper is to propose an efficient methodology to sense the attacks for creating low levels of false positives.\u0000\u0000\u0000Design/methodology/approach\u0000In this research, the authors have developed an efficient approach for malicious crawler detection and correlated the security alerts. The behavioral features of the crawlers are examined for the recognition of the malicious crawlers, and a novel methodology is proposed to improvise the bank user portal security. The authors have compared various machine learning strategies including Bayesian network, support sector machine (SVM) and decision tree.\u0000\u0000\u0000Findings\u0000This proposed work stretches in various aspects. Initially, the outcomes are stated for the mixture of different kinds of log files. Then, distinct sites of various log files are selected for the construction of the acceptable data sets. Session identification, attribute extraction, session labeling and classification were held. Moreover, this approach clustered the meta-alerts into higher level meta-alerts for fusing multistages of attacks and the various types of attacks.\u0000\u0000\u0000Originality/value\u0000This methodology used incremental clustering techniques and analyzed the probability of existing topologies in SVM classifiers for more deterministic classification. It also enhanced the taxonomy for various domains.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122861670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and analysis of buffer and bufferless routing based NoC for high throughput and low latency communication on FPGA 基于NoC的FPGA高吞吐量低时延通信的缓冲和无缓冲路由设计与分析
Pub Date : 2021-08-26 DOI: 10.1108/ijpcc-05-2021-0115
B. SujataS., Anuradha M. Sandi
PurposeThe small area network for data communication within routers is suffering from storage of packet, throughput, latency and power consumption. There are a lot of solutions to increase speed of commutation and optimization of power consumption; one among them is Network-on-chip (NoC). In the literature, there are several NoCs which can reconfigurable dynamically and can easily test and validate the results on FPGA. But still, NoCs have limitations which are regarding chip area, reconfigurable time and throughput.Design/methodology/approachTo address these limitations, this research proposes the dynamically buffered and bufferless reconfigurable NoC (DB2R NoC) using X-Y algorithm for routing, Torus for switching and Flexible Direction Order (FDOR) for direction finding between source and destination nodes. Thus, the 3 × 3 and 4 × 4 DB2R NoCs are made free from deadlock, low power and latency and high throughput. To prove the applicability and performance analysis of DB2R NoC for 3 × 3 and 4 × 4 routers on FPGA, the 22 bits for buffered and 19 bit for bufferless designs have been successfully synthesized using Verilog HDL and implemented on Artix-7 FPGA development bond. The virtual input/output chips cope pro tool has been incorporated in the design to verify and debug the complete design on Artix-7 FPGA.FindingsIn the obtained result, it has been found that 35% improvement in throughput, 23% improvement in latency and 47% optimization in area has been made. The complete design has been tested for 28 packets of injection rate 0.01; the packets have been generated by using NLFSR.Originality/valueIn the obtained result, it has been found that 35% improvement in throughput, 23% improvement in latency and 47% optimization in area has been made. The complete design has been tested for 28 packets of injection rate 0.01; the packets have been generated by using NLFSR.
目的用于路由器内部数据通信的小区域网络存在数据包存储、吞吐量、时延和功耗等问题。有很多提高换相速度和优化功耗的解决方案;其中之一就是片上网络(NoC)。在文献中,有几种noc可以动态重新配置,并且可以很容易地在FPGA上测试和验证结果。但是,noc在芯片面积、可重构时间和吞吐量方面仍然存在局限性。设计/方法/方法为了解决这些限制,本研究提出了动态缓冲和无缓冲可重构的NoC (DB2R NoC),使用X-Y算法进行路由,使用Torus进行交换,使用灵活方向顺序(FDOR)在源节点和目标节点之间进行测向。因此,3 × 3和4 × 4 DB2R noc没有死锁、低功耗和延迟以及高吞吐量。为了证明DB2R NoC在FPGA上用于3 × 3和4 × 4路由器的适用性和性能分析,利用Verilog HDL成功合成了22位缓冲设计和19位无缓冲设计,并在Artix-7 FPGA开发接口上实现。设计中引入了虚拟输入/输出芯片cope pro tool,在Artix-7 FPGA上对整个设计进行了验证和调试。在得到的结果中,吞吐量提高了35%,延迟提高了23%,面积优化了47%。完整设计已在28包注射速率为0.01的情况下进行了测试;报文是通过NLFSR协议生成的。在获得的结果中,发现吞吐量提高了35%,延迟提高了23%,面积优化了47%。完整设计已在28包注射速率为0.01的情况下进行了测试;报文是通过NLFSR协议生成的。
{"title":"Design and analysis of buffer and bufferless routing based NoC for high throughput and low latency communication on FPGA","authors":"B. SujataS., Anuradha M. Sandi","doi":"10.1108/ijpcc-05-2021-0115","DOIUrl":"https://doi.org/10.1108/ijpcc-05-2021-0115","url":null,"abstract":"\u0000Purpose\u0000The small area network for data communication within routers is suffering from storage of packet, throughput, latency and power consumption. There are a lot of solutions to increase speed of commutation and optimization of power consumption; one among them is Network-on-chip (NoC). In the literature, there are several NoCs which can reconfigurable dynamically and can easily test and validate the results on FPGA. But still, NoCs have limitations which are regarding chip area, reconfigurable time and throughput.\u0000\u0000\u0000Design/methodology/approach\u0000To address these limitations, this research proposes the dynamically buffered and bufferless reconfigurable NoC (DB2R NoC) using X-Y algorithm for routing, Torus for switching and Flexible Direction Order (FDOR) for direction finding between source and destination nodes. Thus, the 3 × 3 and 4 × 4 DB2R NoCs are made free from deadlock, low power and latency and high throughput. To prove the applicability and performance analysis of DB2R NoC for 3 × 3 and 4 × 4 routers on FPGA, the 22 bits for buffered and 19 bit for bufferless designs have been successfully synthesized using Verilog HDL and implemented on Artix-7 FPGA development bond. The virtual input/output chips cope pro tool has been incorporated in the design to verify and debug the complete design on Artix-7 FPGA.\u0000\u0000\u0000Findings\u0000In the obtained result, it has been found that 35% improvement in throughput, 23% improvement in latency and 47% optimization in area has been made. The complete design has been tested for 28 packets of injection rate 0.01; the packets have been generated by using NLFSR.\u0000\u0000\u0000Originality/value\u0000In the obtained result, it has been found that 35% improvement in throughput, 23% improvement in latency and 47% optimization in area has been made. The complete design has been tested for 28 packets of injection rate 0.01; the packets have been generated by using NLFSR.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128168413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel design layout of three disjoint paths multistage interconnection network & its reliability analysis 三不相交路径多级互联网络的一种新型设计布局及其可靠性分析
Pub Date : 2021-08-24 DOI: 10.1108/ijpcc-04-2021-0094
Vipin Sharma, Abdul Q. Ansari, Rajesh Mishra
PurposeThe purpose of this paper is to design a efficient layout of Multistage interconnection network which has cost effective solution with high reliability and fault-tolerence capability. For parallel computation, various multistage interconnection networks (MINs) have been discussed hitherto in the literature, however, these networks always required further improvement in reliability and fault-tolerance capability. The fault-tolerance capability of the network can be achieved by increasing the number of disjoint paths as a result the reliability of the interconnection networks is also improved.Design/methodology/approachThis proposed design is a modification of gamma interconnection network (GIN) and three disjoint path gamma interconnection network (3-DGIN). It has a total seven number of paths for all tag values which is uniform out of these seven paths, three paths are disjoint paths which increase the fault tolerance capability by two faults. Due to the presence of more paths than the GIN and 3-DGIN, this proposed design is more reliable.FindingsIn this study, a new design layout of a MIN has been proposed which provides three disjoint paths and uniformity in terms of an equal number of paths for all source-destination (S-D) pairs. The new layout contains fewer nodes as compared to GIN and 3-DGIN. This design provides a symmetrical structure, low cost, better terminal reliability and provides an equal number of paths for all tag values (|S-D|) when compared with existing MINs of this class.Originality/valueA new design layout of MINs has been purposed and its two terminal reliability is calculated with the help of the reliability block diagram technique.
目的设计一种高效的多级互连网络布局,具有高可靠性和容错能力的经济有效的解决方案。为了实现并行计算,文献中已经讨论了各种多级互连网络,但这些网络的可靠性和容错能力都有待进一步提高。通过增加不相交路径的数量,可以提高网络的容错能力,从而提高互连网络的可靠性。设计/方法/方法提出的设计是对γ互连网络(GIN)和三不相交路径γ互连网络(3-DGIN)的改进。所有标签值共有7条路径,这7条路径是一致的,其中3条路径是不相交的,这使容错能力增加了2个错误。由于存在比GIN和3-DGIN更多的路径,因此提出的设计更可靠。在本研究中,提出了一种新的MIN设计布局,该布局提供了三个不相交的路径,并且在所有源-目的地(S-D)对的路径数量相等方面具有均匀性。与GIN和3-DGIN相比,新的布局包含更少的节点。该设计结构对称,成本低,终端可靠性好,并且与现有同类min相比,所有标签值(|S-D|)的路径数相等。提出了一种新的设计方案,并利用可靠性方框图技术对其两端可靠性进行了计算。
{"title":"A novel design layout of three disjoint paths multistage interconnection network & its reliability analysis","authors":"Vipin Sharma, Abdul Q. Ansari, Rajesh Mishra","doi":"10.1108/ijpcc-04-2021-0094","DOIUrl":"https://doi.org/10.1108/ijpcc-04-2021-0094","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to design a efficient layout of Multistage interconnection network which has cost effective solution with high reliability and fault-tolerence capability. For parallel computation, various multistage interconnection networks (MINs) have been discussed hitherto in the literature, however, these networks always required further improvement in reliability and fault-tolerance capability. The fault-tolerance capability of the network can be achieved by increasing the number of disjoint paths as a result the reliability of the interconnection networks is also improved.\u0000\u0000\u0000Design/methodology/approach\u0000This proposed design is a modification of gamma interconnection network (GIN) and three disjoint path gamma interconnection network (3-DGIN). It has a total seven number of paths for all tag values which is uniform out of these seven paths, three paths are disjoint paths which increase the fault tolerance capability by two faults. Due to the presence of more paths than the GIN and 3-DGIN, this proposed design is more reliable.\u0000\u0000\u0000Findings\u0000In this study, a new design layout of a MIN has been proposed which provides three disjoint paths and uniformity in terms of an equal number of paths for all source-destination (S-D) pairs. The new layout contains fewer nodes as compared to GIN and 3-DGIN. This design provides a symmetrical structure, low cost, better terminal reliability and provides an equal number of paths for all tag values (|S-D|) when compared with existing MINs of this class.\u0000\u0000\u0000Originality/value\u0000A new design layout of MINs has been purposed and its two terminal reliability is calculated with the help of the reliability block diagram technique.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127631904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Int. J. Pervasive Comput. Commun.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1