首页 > 最新文献

Int. J. Pervasive Comput. Commun.最新文献

英文 中文
An optimal communication in WSN enabled by fuzzy clustering and improved meta-heuristic model 利用模糊聚类和改进的元启发式模型实现无线传感器网络的最优通信
Pub Date : 2021-07-16 DOI: 10.1108/IJPCC-10-2020-0179
Y. A. Rani, E. Reddy
PurposeWireless sensor networks (WSN) have been widely adopted for various applications due to their properties of pervasive computing. It is necessary to prolong the WSN lifetime; it avails its benefit for a long time. WSN lifetime may vary according to the applications, and in most cases, it is considered as the time to the death of the first node in the module. Clustering has been one of the successful strategies for increasing the effectiveness of the network, as it selects the appropriate cluster head (CH) for communication. However, most clustering protocols are based on probabilistic schemes, which may create two CH for a single cluster group, leading to cause more energy consumption. Hence, it is necessary to build up a clustering strategy with the improved properties for the CH selection. The purpose of this paper is to provide better convergence for large simulation space and to use it for optimizing the communication path of WSN.Design/methodology/approachThis paper plans to develop a new clustering protocol in WSN using fuzzy clustering and an improved meta-heuristic algorithm. The fuzzy clustering approach is adopted for performing the clustering of nodes with respective fuzzy centroid by using the input constraints such as signal-to-interference-plus-noise ratio (SINR), load and residual energy, between the CHs and nodes. After the cluster formation, the combined utility function is used to refine the CH selection. The CH is determined based on computing the combined utility function, in which the node attaining the maximum combined utility function is selected as the CH. After the clustering and CH formation, the optimal communication between the CH and the nodes is induced by a new meta-heuristic algorithm called Fitness updated Crow Search Algorithm (FU-CSA). This optimal communication is accomplished by concerning a multi-objective function with constraints with residual energy and the distance between the nodes. Finally, the simulation results show that the proposed technique enhances the network lifetime and energy efficiency when compared to the state-of-the-art techniques.FindingsThe proposed Fuzzy+FU-CSA algorithm has achieved low-cost function values of 48% to Fuzzy+Particle Swarm Optimization (PSO), 60% to Fuzzy+Grey Wolf Optimizer (GWO), 40% to Fuzzy+Whale Optimization Algorithm (WOA) and 25% to Fuzzy+CSA, respectively. Thus, the results prove that the proposed Fuzzy+FU-CSA has the optimal performance than the other algorithms, and thus provides a high network lifetime and energy.Originality/valueFor the efficient clustering and the CH selection, a combined utility function was developed by using the network parameters such as energy, load, SINR and distance. The fuzzy clustering uses the constraint inputs such as residual energy, load and SINR for clustering the nodes of WSN. This work had developed an FU-CSA algorithm for the selection of the optimal communication path for the WSN.
目的无线传感器网络(WSN)由于其普适计算的特性而被广泛应用于各种应用。延长无线传感器网络的寿命是必要的;它利用它的好处很长一段时间。WSN的生存期可能因应用程序而异,在大多数情况下,它被认为是模块中第一个节点死亡的时间。聚类是提高网络效率的成功策略之一,因为它为通信选择了适当的簇头(CH)。然而,大多数集群协议基于概率方案,这可能会为单个集群组创建两个CH,从而导致更多的能量消耗。因此,有必要建立一个具有改进的CH选择属性的聚类策略。本文的目的是为大的仿真空间提供更好的收敛性,并将其用于优化WSN的通信路径。设计/方法/方法本文计划在WSN中使用模糊聚类和改进的元启发式算法开发一种新的聚类协议。采用模糊聚类方法,利用CHs和节点之间的信噪比(SINR)、负载和剩余能量等输入约束,对具有各自模糊质心的节点进行聚类。在聚类形成后,利用组合效用函数对CH的选择进行细化。通过计算组合效用函数来确定CH,其中选择组合效用函数最大的节点作为CH。在聚类和CH形成后,通过一种新的元启发式算法——适应度更新乌鸦搜索算法(FU-CSA)来诱导CH与节点之间的最优通信。这种最优通信是通过考虑带有剩余能量约束和节点间距离约束的多目标函数来实现的。最后,仿真结果表明,与现有技术相比,该技术提高了网络寿命和能源效率。结果提出的Fuzzy+FU-CSA算法相对于模糊+粒子群优化算法(PSO)的低成本函数值为48%,相对于模糊+灰狼优化算法(GWO)的低成本函数值为60%,相对于模糊+鲸鱼优化算法(WOA)的低成本函数值为40%,相对于模糊+CSA的低成本函数值为25%。结果表明,本文提出的模糊+FU-CSA算法具有较好的性能,具有较高的网络寿命和能量。独创性/价值为了高效聚类和CH选择,利用能量、负荷、信噪比和距离等网络参数建立了组合效用函数。模糊聚类利用剩余能量、负载、信噪比等约束输入对WSN节点进行聚类。本工作开发了一种用于WSN最优通信路径选择的FU-CSA算法。
{"title":"An optimal communication in WSN enabled by fuzzy clustering and improved meta-heuristic model","authors":"Y. A. Rani, E. Reddy","doi":"10.1108/IJPCC-10-2020-0179","DOIUrl":"https://doi.org/10.1108/IJPCC-10-2020-0179","url":null,"abstract":"\u0000Purpose\u0000Wireless sensor networks (WSN) have been widely adopted for various applications due to their properties of pervasive computing. It is necessary to prolong the WSN lifetime; it avails its benefit for a long time. WSN lifetime may vary according to the applications, and in most cases, it is considered as the time to the death of the first node in the module. Clustering has been one of the successful strategies for increasing the effectiveness of the network, as it selects the appropriate cluster head (CH) for communication. However, most clustering protocols are based on probabilistic schemes, which may create two CH for a single cluster group, leading to cause more energy consumption. Hence, it is necessary to build up a clustering strategy with the improved properties for the CH selection. The purpose of this paper is to provide better convergence for large simulation space and to use it for optimizing the communication path of WSN.\u0000\u0000\u0000Design/methodology/approach\u0000This paper plans to develop a new clustering protocol in WSN using fuzzy clustering and an improved meta-heuristic algorithm. The fuzzy clustering approach is adopted for performing the clustering of nodes with respective fuzzy centroid by using the input constraints such as signal-to-interference-plus-noise ratio (SINR), load and residual energy, between the CHs and nodes. After the cluster formation, the combined utility function is used to refine the CH selection. The CH is determined based on computing the combined utility function, in which the node attaining the maximum combined utility function is selected as the CH. After the clustering and CH formation, the optimal communication between the CH and the nodes is induced by a new meta-heuristic algorithm called Fitness updated Crow Search Algorithm (FU-CSA). This optimal communication is accomplished by concerning a multi-objective function with constraints with residual energy and the distance between the nodes. Finally, the simulation results show that the proposed technique enhances the network lifetime and energy efficiency when compared to the state-of-the-art techniques.\u0000\u0000\u0000Findings\u0000The proposed Fuzzy+FU-CSA algorithm has achieved low-cost function values of 48% to Fuzzy+Particle Swarm Optimization (PSO), 60% to Fuzzy+Grey Wolf Optimizer (GWO), 40% to Fuzzy+Whale Optimization Algorithm (WOA) and 25% to Fuzzy+CSA, respectively. Thus, the results prove that the proposed Fuzzy+FU-CSA has the optimal performance than the other algorithms, and thus provides a high network lifetime and energy.\u0000\u0000\u0000Originality/value\u0000For the efficient clustering and the CH selection, a combined utility function was developed by using the network parameters such as energy, load, SINR and distance. The fuzzy clustering uses the constraint inputs such as residual energy, load and SINR for clustering the nodes of WSN. This work had developed an FU-CSA algorithm for the selection of the optimal communication path for the WSN.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128354864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A self-congruence and impulse buying effect on user's shopping behaviour over social networking sites: an empirical study 自我一致和冲动购买对社交网站用户购物行为的影响:一项实证研究
Pub Date : 2021-07-16 DOI: 10.1108/IJPCC-01-2021-0013
S. Chauhan, Richa Banerjee, Chinmay Chakraborty, Mohit Mittal, Atul Shiva, Vinayakumar Ravi
PurposeThis study aims to investigate the shopping behaviour of consumers, mainly in fashion apparels, and intends to understand consumer buying patterns in Indian context. The study was designed to determine the level of consumer's sense of belonging towards apparel shopping by applying the concept of self-congruence.Design/methodology/approachThe study used variance-based partial least squares structural equational modelling (PLS-SEM) on a cross-sectional study conducted on 569 consumers. The study was conducted by using questionnaire to collect the responses from the central zone of India. The results support most of the projected hypotheses.FindingsThe study focused on the shopping behaviour of consumer such as self-congruence, impulse buying, hedonic values and consumer satisfaction. The results of the study highlight the association of constructs and analysed the mediation relation of hedonic and impulse buying constructs. The results revealed a positive association among the constructs and also found a partial mediation effect in their relation with constructs.Research limitations/implicationsThe findings are outcomes of an empirical study conducted in the fashion apparel industry of India based on the sample set of urban consumers. The study is restricted to the direct and indirect relationship of constructs. Further, research can examine by using moderating constructs like demographic factors (gender, age, income, etc.) and other shopping behaviours (like brand loyalty, brand love, brand attachment) for more clarity in results. Moreover, the study limited is with fashion apparel, whereas there are many categories in the fashion industry like accessories, perfumes, cosmetic products, footwear and also other products industry.Practical implicationsThe study provided valuable inputs to the literature of marketing where self-congruence affects consumer shopping behaviour such as impulse buying, hedonic values and consumer satisfaction. The study proposes a practical approach that can help the marketing professionals and product developers to have a deep understanding about consumer shopping behaviour for facilitating consumer-oriented goods in the Indian fashion industry.Originality/valueThis is one of the first studies in the fashion industry to test the association of self-congruence with hedonic value and consumer satisfaction. This relation is not tested in context of fashion apparel. Additionally, this study also examined the mediating effect of hedonic value and impulse buying in relation with self-congruence and consumer satisfaction in the Indian context.
本研究旨在调查消费者的购物行为,主要是在时尚服装方面,并试图了解消费者在印度语境下的购买模式。本研究旨在运用自我一致性的概念来确定消费者对服装购物的归属感水平。设计/方法/方法本研究使用基于方差的偏最小二乘结构方程模型(PLS-SEM)对569名消费者进行了横断面研究。本研究采用问卷调查的方式收集来自印度中部地区的反馈。研究结果支持大多数预测的假设。研究结果主要关注消费者的购物行为,如自我认同、冲动购买、享乐价值观和消费者满意度。研究结果突出了构念之间的关联,分析了享乐构念与冲动购买构念之间的中介关系。结果发现构念之间存在正相关关系,且构念与构念之间存在部分中介效应。研究局限/启示研究结果是对印度时尚服装行业进行的基于城市消费者样本集的实证研究的结果。研究仅限于构念之间的直接和间接关系。此外,研究可以通过使用人口统计学因素(性别、年龄、收入等)和其他购物行为(如品牌忠诚度、品牌热爱、品牌依恋)等调节结构来检验,以使结果更加清晰。此外,研究仅限于时尚服装,而时尚行业有许多类别,如配饰,香水,化妆品,鞋类和其他产品行业。实际意义本研究为市场营销文献提供了有价值的输入,其中自我一致性影响消费者的购物行为,如冲动购买、享乐价值和消费者满意度。该研究提出了一种实用的方法,可以帮助营销专业人员和产品开发人员深入了解消费者的购物行为,以促进印度时尚行业的消费者导向产品。原创性/价值这是时尚行业中第一个测试自我一致性与享乐价值和消费者满意度之间关系的研究之一。这种关系没有在时尚服装的背景下得到检验。此外,本研究还考察了享乐价值和冲动购买在印度情境下对自我和谐和消费者满意度的中介作用。
{"title":"A self-congruence and impulse buying effect on user's shopping behaviour over social networking sites: an empirical study","authors":"S. Chauhan, Richa Banerjee, Chinmay Chakraborty, Mohit Mittal, Atul Shiva, Vinayakumar Ravi","doi":"10.1108/IJPCC-01-2021-0013","DOIUrl":"https://doi.org/10.1108/IJPCC-01-2021-0013","url":null,"abstract":"\u0000Purpose\u0000This study aims to investigate the shopping behaviour of consumers, mainly in fashion apparels, and intends to understand consumer buying patterns in Indian context. The study was designed to determine the level of consumer's sense of belonging towards apparel shopping by applying the concept of self-congruence.\u0000\u0000\u0000Design/methodology/approach\u0000The study used variance-based partial least squares structural equational modelling (PLS-SEM) on a cross-sectional study conducted on 569 consumers. The study was conducted by using questionnaire to collect the responses from the central zone of India. The results support most of the projected hypotheses.\u0000\u0000\u0000Findings\u0000The study focused on the shopping behaviour of consumer such as self-congruence, impulse buying, hedonic values and consumer satisfaction. The results of the study highlight the association of constructs and analysed the mediation relation of hedonic and impulse buying constructs. The results revealed a positive association among the constructs and also found a partial mediation effect in their relation with constructs.\u0000\u0000\u0000Research limitations/implications\u0000The findings are outcomes of an empirical study conducted in the fashion apparel industry of India based on the sample set of urban consumers. The study is restricted to the direct and indirect relationship of constructs. Further, research can examine by using moderating constructs like demographic factors (gender, age, income, etc.) and other shopping behaviours (like brand loyalty, brand love, brand attachment) for more clarity in results. Moreover, the study limited is with fashion apparel, whereas there are many categories in the fashion industry like accessories, perfumes, cosmetic products, footwear and also other products industry.\u0000\u0000\u0000Practical implications\u0000The study provided valuable inputs to the literature of marketing where self-congruence affects consumer shopping behaviour such as impulse buying, hedonic values and consumer satisfaction. The study proposes a practical approach that can help the marketing professionals and product developers to have a deep understanding about consumer shopping behaviour for facilitating consumer-oriented goods in the Indian fashion industry.\u0000\u0000\u0000Originality/value\u0000This is one of the first studies in the fashion industry to test the association of self-congruence with hedonic value and consumer satisfaction. This relation is not tested in context of fashion apparel. Additionally, this study also examined the mediating effect of hedonic value and impulse buying in relation with self-congruence and consumer satisfaction in the Indian context.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114311766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Network efficient topology for low power and lossy networks in smart corridor design using RPL 基于RPL的低功耗有损网络的高效拓扑结构
Pub Date : 2021-07-14 DOI: 10.1108/IJPCC-08-2020-0118
S. Garg, D. Mehrotra, Sujata Pandey, Harikesh Pandey
PurposeThis paper aims to determine the network efficient topology for low power and lossy networks (LLNs) using routing protocol for LLN (RPL) with respect to the increase in network size and propose a novel approach to overcome the shortcomings of the existing models.Design/methodology/approachThe authors have used Contiki OS/Cooja simulator to conduct experiments on primarily four topologies (star, bus/linear, ring/eclipse and random). They have implemented RPL protocol using Sky motes for each topology from 10, 20, 30 and up to 70 nodes. Consequently, after 24 h of experimentation, the readings have been noted and, alongside, a comprehensive comparative analysis has been performed based on the network density and metric parameters: packet delivery ratio (PDR), expected transmission (ETX) and power consumption. Further, a hybrid model is proposed where the additional factors of mobility, multiple sink and a combination of static and mobile nodes are introduced. The proposed model is then compared with the star model (all static nodes and star topology) and the dynamic model (all mobile nodes) to analyze the efficiency and network performance for different network sizes (28, 36, 38 and 44 nodes). The mobility is introduced using BonnMotion tool in Contiki OS.FindingsSimulation results have shown that the star topology is most network efficient when compared with bus/linear, ring/eclipse and random topologies for low density and high scalable network. But when the same setup is compared with the proposed hybrid model, the proposed model shows a significant improvement and gives the best and efficient network performance with highest PDR (average improvement approximately 44.5%) and lowest ETX (average improvement approximately 49.5%) comparatively.Practical implicationsAlso, these findings will benefit the deployment of smart devices used in advanced metering infrastructure, road side units and in various industrial applications such as traffic monitoring system, electronic toll collection and traffic analysis in the smart grid infrastructure.Originality/valueThe impact of topology is significant and detailed analysis is required to understand the impact of different topologies of the nodes in the network for the present and the future scenarios. As very few research studies have discussed this gap, this research paper is quintessential and shall open novel future potential direction. Also, the proposed approach of hybrid model with mobility has not been considered in the literature yet.
本文旨在根据网络规模的增加,利用LLN路由协议(RPL)确定低功耗和有损网络(LLN)的网络高效拓扑,并提出一种新的方法来克服现有模型的缺点。作者使用Contiki OS/Cooja模拟器主要在四种拓扑(星型、总线/线性、环状/日蚀和随机)上进行实验。他们使用Sky mote实现了RPL协议,每个拓扑从10个、20个、30个到70个节点。因此,经过24小时的实验,已经记录了读数,并根据网络密度和度量参数:分组传输比(PDR),预期传输(ETX)和功耗进行了全面的比较分析。在此基础上,提出了一种引入移动性、多汇和静态与移动节点组合等附加因素的混合模型。然后将该模型与星型模型(所有静态节点和星型拓扑)和动态模型(所有移动节点)进行比较,分析不同网络规模(28、36、38和44节点)下的效率和网络性能。在contki OS中使用BonnMotion工具引入移动性。仿真结果表明,对于低密度、高可扩展性的网络,星型拓扑比总线/线性、环形/月食和随机拓扑的网络效率更高。但是当同样的设置与所提出的混合模型进行比较时,所提出的模型表现出了显著的改进,并给出了最高的PDR(平均改进约44.5%)和最低的ETX(平均改进约49.5%)的网络性能。此外,这些研究结果将有利于部署智能设备,用于先进的计量基础设施、道路旁单元和各种工业应用,如交通监控系统、电子收费和智能电网基础设施中的交通分析。原创性/价值拓扑的影响是重要的,需要详细的分析,以了解网络中节点的不同拓扑对当前和未来场景的影响。由于很少有研究讨论这一差距,因此本研究论文是典型的,并将开辟新的未来潜在方向。此外,本文提出的带迁移率的混合模型方法在文献中尚未得到考虑。
{"title":"Network efficient topology for low power and lossy networks in smart corridor design using RPL","authors":"S. Garg, D. Mehrotra, Sujata Pandey, Harikesh Pandey","doi":"10.1108/IJPCC-08-2020-0118","DOIUrl":"https://doi.org/10.1108/IJPCC-08-2020-0118","url":null,"abstract":"\u0000Purpose\u0000This paper aims to determine the network efficient topology for low power and lossy networks (LLNs) using routing protocol for LLN (RPL) with respect to the increase in network size and propose a novel approach to overcome the shortcomings of the existing models.\u0000\u0000\u0000Design/methodology/approach\u0000The authors have used Contiki OS/Cooja simulator to conduct experiments on primarily four topologies (star, bus/linear, ring/eclipse and random). They have implemented RPL protocol using Sky motes for each topology from 10, 20, 30 and up to 70 nodes. Consequently, after 24 h of experimentation, the readings have been noted and, alongside, a comprehensive comparative analysis has been performed based on the network density and metric parameters: packet delivery ratio (PDR), expected transmission (ETX) and power consumption. Further, a hybrid model is proposed where the additional factors of mobility, multiple sink and a combination of static and mobile nodes are introduced. The proposed model is then compared with the star model (all static nodes and star topology) and the dynamic model (all mobile nodes) to analyze the efficiency and network performance for different network sizes (28, 36, 38 and 44 nodes). The mobility is introduced using BonnMotion tool in Contiki OS.\u0000\u0000\u0000Findings\u0000Simulation results have shown that the star topology is most network efficient when compared with bus/linear, ring/eclipse and random topologies for low density and high scalable network. But when the same setup is compared with the proposed hybrid model, the proposed model shows a significant improvement and gives the best and efficient network performance with highest PDR (average improvement approximately 44.5%) and lowest ETX (average improvement approximately 49.5%) comparatively.\u0000\u0000\u0000Practical implications\u0000Also, these findings will benefit the deployment of smart devices used in advanced metering infrastructure, road side units and in various industrial applications such as traffic monitoring system, electronic toll collection and traffic analysis in the smart grid infrastructure.\u0000\u0000\u0000Originality/value\u0000The impact of topology is significant and detailed analysis is required to understand the impact of different topologies of the nodes in the network for the present and the future scenarios. As very few research studies have discussed this gap, this research paper is quintessential and shall open novel future potential direction. Also, the proposed approach of hybrid model with mobility has not been considered in the literature yet.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT based lung cancer detection using machine learning and cuckoo search optimization 基于物联网的肺癌检测,使用机器学习和布谷鸟搜索优化
Pub Date : 2021-06-17 DOI: 10.1108/IJPCC-10-2020-0160
Venkatesh Chapala, Polaiah Bojja
PurposeDetecting cancer from the computed tomography (CT)images of lung nodules is very challenging for radiologists. Early detection of cancer helps to provide better treatment in advance and to enhance the recovery rate. Although a lot of research is being carried out to process clinical images, it still requires improvement to attain high reliability and accuracy. The main purpose of this paper is to achieve high accuracy in detecting and classifying the lung cancer and assisting the radiologists to detect cancer by using CT images. The CT images are collected from health-care centres and remote places through Internet of Things (IoT)-enabled platform and the image processing is carried out in the cloud servers.Design/methodology/approachIoT-based lung cancer detection is proposed to access the lung CT images from any remote place and to provide high accuracy in image processing. Here, the exact separation of lung nodule is performed by Otsu thresholding segmentation with the help of optimal characteristics and cuckoo search algorithm. The important features of the lung nodules are extracted by local binary pattern. From the extracted features, support vector machine (SVM) classifier is trained to recognize whether the lung nodule is malicious or non-malicious.FindingsThe proposed framework achieves 99.59% in accuracy, 99.31% in sensitivity and 71% in peak signal to noise ratio. The outcomes show that the proposed method has achieved high accuracy than other conventional methods in early detection of lung cancer.Practical implicationsThe proposed algorithm is implemented and tested by using more than 500 images which are collected from public and private databases. The proposed research framework can be used to implement contextual diagnostic analysis.Originality/valueThe cancer nodules in CT images are precisely segmented by integrating the algorithms of cuckoo search and Otsu thresholding in order to classify malicious and non-malicious nodules.
目的对放射科医生来说,从肺结节的计算机断层扫描(CT)图像中检测肿瘤是非常有挑战性的。早期发现癌症有助于提前提供更好的治疗,并提高治愈率。尽管对临床图像的处理进行了大量的研究,但为了达到较高的可靠性和准确性,仍需要改进。本文的主要目的是利用CT图像对肺癌进行高准确率的检测和分类,辅助放射科医生对癌症进行检测。CT图像通过物联网(IoT)平台从医疗中心和偏远地区收集,图像处理在云服务器上进行。设计/方法学/方法提出了一种基于人机界面的肺癌检测方法,可以从任何远程位置获取肺部CT图像,并提供较高的图像处理精度。本文采用Otsu阈值分割,结合最优特征和布谷鸟搜索算法对肺结节进行精确分离。采用局部二值模式提取肺结节的重要特征。从提取的特征中,训练支持向量机(SVM)分类器识别肺结节是恶意的还是非恶意的。结果:该框架的准确率为99.59%,灵敏度为99.31%,峰值信噪比为71%。结果表明,该方法在肺癌早期检测中具有较高的准确性。实际意义通过使用从公共和私人数据库收集的500多幅图像来实现和测试所提出的算法。提出的研究框架可用于实施情境诊断分析。结合cuckoo搜索算法和Otsu阈值算法,对CT图像中的癌结节进行精确分割,对恶性结节和非恶性结节进行分类。
{"title":"IoT based lung cancer detection using machine learning and cuckoo search optimization","authors":"Venkatesh Chapala, Polaiah Bojja","doi":"10.1108/IJPCC-10-2020-0160","DOIUrl":"https://doi.org/10.1108/IJPCC-10-2020-0160","url":null,"abstract":"\u0000Purpose\u0000Detecting cancer from the computed tomography (CT)images of lung nodules is very challenging for radiologists. Early detection of cancer helps to provide better treatment in advance and to enhance the recovery rate. Although a lot of research is being carried out to process clinical images, it still requires improvement to attain high reliability and accuracy. The main purpose of this paper is to achieve high accuracy in detecting and classifying the lung cancer and assisting the radiologists to detect cancer by using CT images. The CT images are collected from health-care centres and remote places through Internet of Things (IoT)-enabled platform and the image processing is carried out in the cloud servers.\u0000\u0000\u0000Design/methodology/approach\u0000IoT-based lung cancer detection is proposed to access the lung CT images from any remote place and to provide high accuracy in image processing. Here, the exact separation of lung nodule is performed by Otsu thresholding segmentation with the help of optimal characteristics and cuckoo search algorithm. The important features of the lung nodules are extracted by local binary pattern. From the extracted features, support vector machine (SVM) classifier is trained to recognize whether the lung nodule is malicious or non-malicious.\u0000\u0000\u0000Findings\u0000The proposed framework achieves 99.59% in accuracy, 99.31% in sensitivity and 71% in peak signal to noise ratio. The outcomes show that the proposed method has achieved high accuracy than other conventional methods in early detection of lung cancer.\u0000\u0000\u0000Practical implications\u0000The proposed algorithm is implemented and tested by using more than 500 images which are collected from public and private databases. The proposed research framework can be used to implement contextual diagnostic analysis.\u0000\u0000\u0000Originality/value\u0000The cancer nodules in CT images are precisely segmented by integrating the algorithms of cuckoo search and Otsu thresholding in order to classify malicious and non-malicious nodules.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134134118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Kuznets curve with parabola-shaped ultra-wideband antenna with defected ground plane for communications 库兹涅茨曲线带带缺陷地平面的超宽带通信天线
Pub Date : 2021-06-17 DOI: 10.1108/IJPCC-02-2021-0056
Lalitha Bhavani Konkyana, Sudhakar V. Alapati
PurposeThis paper aims to state the configuration of the proposed antenna which is competent to many networks such as LTE and X band applications. The experimental study encountered the significance of the proposed antenna.Design/methodology/approachA novel compact Kuznets curve with parabola-shaped quad-band notched antenna is demonstrated in this paper. The presented prototype is ascertained on a composite material composed of woven fiberglass cloth with an epoxy resin binder. The resulting ultra-wideband antenna ranges 3.1–3.54 GHz, 5.17–5.51 GHz, 5.74–6.43 GHz and 6.79–7.60 GHz. To avoid the frequency bands which cause UWB interference,the projected antenna has been incorporated with slotted patch. The proposed antenna design is attained in four steps. The simple circular patch antenna model with defected ground plane is subjected to stepwise progression by including parabola-shaped slot and U shaped slot on the patch to attain four notched bands.FindingsThis projected antenna possesses an optimal bond among simulated and measured outcomes,which is more suitable for the quad notched band applications. Substrate analysis is done by varying substrate material, and notch behavior is presented. The proposed method’s optimum performance in metrics such as return loss, voltage standing wave ratio and radiation pattern varies its frequency range from 2.56 to 7.6 GHz.Originality/valueThe antenna adaptation of the defected ground plane has achieved through the quad notched band with operating frequency ranges 2.56 to 7.6 GHz and with eliminated frequency ranges 3.55–5.16 GHz, 5.52–5.73 GHz, 6.44–6.78 GHz and 7.66–10.6 GHz.
本文旨在说明所提出的天线的配置,该天线适用于许多网络,如LTE和X波段应用。实验研究遇到了所提出天线的意义。设计/方法/方法本文展示了一种新型的带抛物线型四带陷波天线的紧凑库兹涅茨曲线。在玻璃纤维织物与环氧树脂粘合剂组成的复合材料上确定了原型。由此产生的超宽带天线范围为3.1-3.54 GHz、5.17-5.51 GHz、5.74-6.43 GHz和6.79-7.60 GHz。为了避免产生超宽带干扰的频段,在投影天线中加入了开槽贴片。所提出的天线设计分为四个步骤。对具有缺陷地平面的简单圆形贴片天线模型,通过在贴片上加入抛物线形槽和U形槽进行逐步推进,得到4个缺口带。结果该投影天线在模拟和测量结果之间具有最佳的结合,更适合于四陷波带的应用。通过改变衬底材料进行衬底分析,并给出了缺口行为。在2.56 ~ 7.6 GHz的频率范围内,该方法在回波损耗、电压驻波比和辐射方向图等指标上的性能最优。通过工作频率2.56 ~ 7.6 GHz的四陷波带和消除频率3.55 ~ 5.16 GHz、5.52 ~ 5.73 GHz、6.44 ~ 6.78 GHz和7.66 ~ 10.6 GHz的四陷波带实现对缺陷地平面的天线适配。
{"title":"Kuznets curve with parabola-shaped ultra-wideband antenna with defected ground plane for communications","authors":"Lalitha Bhavani Konkyana, Sudhakar V. Alapati","doi":"10.1108/IJPCC-02-2021-0056","DOIUrl":"https://doi.org/10.1108/IJPCC-02-2021-0056","url":null,"abstract":"\u0000Purpose\u0000This paper aims to state the configuration of the proposed antenna which is competent to many networks such as LTE and X band applications. The experimental study encountered the significance of the proposed antenna.\u0000\u0000\u0000Design/methodology/approach\u0000A novel compact Kuznets curve with parabola-shaped quad-band notched antenna is demonstrated in this paper. The presented prototype is ascertained on a composite material composed of woven fiberglass cloth with an epoxy resin binder. The resulting ultra-wideband antenna ranges 3.1–3.54 GHz, 5.17–5.51 GHz, 5.74–6.43 GHz and 6.79–7.60 GHz. To avoid the frequency bands which cause UWB interference,the projected antenna has been incorporated with slotted patch. The proposed antenna design is attained in four steps. The simple circular patch antenna model with defected ground plane is subjected to stepwise progression by including parabola-shaped slot and U shaped slot on the patch to attain four notched bands.\u0000\u0000\u0000Findings\u0000This projected antenna possesses an optimal bond among simulated and measured outcomes,which is more suitable for the quad notched band applications. Substrate analysis is done by varying substrate material, and notch behavior is presented. The proposed method’s optimum performance in metrics such as return loss, voltage standing wave ratio and radiation pattern varies its frequency range from 2.56 to 7.6 GHz.\u0000\u0000\u0000Originality/value\u0000The antenna adaptation of the defected ground plane has achieved through the quad notched band with operating frequency ranges 2.56 to 7.6 GHz and with eliminated frequency ranges 3.55–5.16 GHz, 5.52–5.73 GHz, 6.44–6.78 GHz and 7.66–10.6 GHz.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks 软件定义车辆网络中最优资源分配与安全分析的寻销毁算法
Pub Date : 2021-06-16 DOI: 10.1108/ijpcc-01-2021-0020
U. Raut, L. Vishwamitra
PurposeSoftware-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource allocation strategy is focused on which the seek-and-destroy algorithm is implemented in the controller in such a way that an effective allocation of the resources is done based on the multi-objective function.Design/methodology/approachThe purpose of this study is focuses on the resource allocation algorithm for the SDVN with the security analysis to analyse the effect of the attacks in the network. The genuine nodes in the network are granted access to the communication in the network, for which the factors such as trust, throughput, delay and packet delivery ratio are used and the algorithm used is Seek-and-Destroy optimization. Moreover, the optimal resource allocation is done using the same optimization in such a way that the network lifetime is extended.FindingsThe security analysis is undergoing in the research using the simulation of the attackers such as selective forwarding attacks, replay attacks, Sybil attacks and wormhole attacks that reveal that the replay attacks and the Sybil attacks are dangerous attacks and in future, there is a requirement for the security model, which ensures the protection against these attacks such that the network lifetime is extended for a prolonged communication. The achievement of the proposed method in the absence of the attacks is 84.8513% for the remaining nodal energy, 95.0535% for packet delivery ratio (PDR), 279.258 ms for transmission delay and 28.9572 kbps for throughput.Originality/valueThe seek-and-destroy algorithm is one of the swarm intelligence-based optimization designed based on the characteristics of the scroungers and defenders, which is completely novel in the area of optimizations. The diversification and intensification of the algorithm are perfectly balanced, leading to good convergence rates.
目的软件定义车辆网络(SDVN)保证了控制车辆的直接可编程性,提高了准确性和灵活性。在本研究中,资源分配策略的重点是在控制器中实现寻和销毁算法,从而基于多目标函数对资源进行有效分配。设计/方法/方法本研究的目的是将SDVN的资源分配算法与安全性分析结合起来,分析攻击对网络的影响。该算法考虑了信任、吞吐量、时延和分组传送率等因素,采用寻优算法。此外,通过延长网络生命周期的方式,使用相同的优化来实现最优资源分配。本研究通过对选择性转发攻击、重放攻击、Sybil攻击和虫洞攻击等攻击者的仿真进行了安全性分析,揭示了重放攻击和Sybil攻击是一种危险的攻击,未来对安全模型提出了要求,以确保对这些攻击的防护,从而延长网络生命周期,延长通信时间。在没有攻击的情况下,该方法的节点剩余能量利用率为84.8513%,分组传送率(PDR)为95.0535%,传输延迟为279.258 ms,吞吐量为28.9572 kbps。寻找摧毁算法是一种基于群体智能的优化算法,它是根据行窃者和防御者的特点而设计的,在优化领域是完全新颖的。算法的多样化和集约化得到了很好的平衡,具有很好的收敛速度。
{"title":"Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks","authors":"U. Raut, L. Vishwamitra","doi":"10.1108/ijpcc-01-2021-0020","DOIUrl":"https://doi.org/10.1108/ijpcc-01-2021-0020","url":null,"abstract":"\u0000Purpose\u0000Software-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource allocation strategy is focused on which the seek-and-destroy algorithm is implemented in the controller in such a way that an effective allocation of the resources is done based on the multi-objective function.\u0000\u0000\u0000Design/methodology/approach\u0000The purpose of this study is focuses on the resource allocation algorithm for the SDVN with the security analysis to analyse the effect of the attacks in the network. The genuine nodes in the network are granted access to the communication in the network, for which the factors such as trust, throughput, delay and packet delivery ratio are used and the algorithm used is Seek-and-Destroy optimization. Moreover, the optimal resource allocation is done using the same optimization in such a way that the network lifetime is extended.\u0000\u0000\u0000Findings\u0000The security analysis is undergoing in the research using the simulation of the attackers such as selective forwarding attacks, replay attacks, Sybil attacks and wormhole attacks that reveal that the replay attacks and the Sybil attacks are dangerous attacks and in future, there is a requirement for the security model, which ensures the protection against these attacks such that the network lifetime is extended for a prolonged communication. The achievement of the proposed method in the absence of the attacks is 84.8513% for the remaining nodal energy, 95.0535% for packet delivery ratio (PDR), 279.258 ms for transmission delay and 28.9572 kbps for throughput.\u0000\u0000\u0000Originality/value\u0000The seek-and-destroy algorithm is one of the swarm intelligence-based optimization designed based on the characteristics of the scroungers and defenders, which is completely novel in the area of optimizations. The diversification and intensification of the algorithm are perfectly balanced, leading to good convergence rates.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116363237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM 基于优化LSTM的无线传感器网络黑洞和虫洞攻击检测与预防
Pub Date : 2021-06-03 DOI: 10.1108/IJPCC-10-2020-0162
Mohan V. Pawar, Anuradha Jagadeesan
PurposeThis study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here, different phases are included such as assigning the nodes, data collection, detecting black hole and wormhole attacks and preventing black hole and wormhole attacks by optimal path communication. Initially, a set of nodes is assumed for carrying out the communication in WSN. Further, the black hole attacks are detected by the Bait process, and wormhole attacks are detected by the round trip time (RTT) validation process. The data collection procedure is done with the Bait and RTT validation process with attribute information. The gathered data attributes are given for the training in which long short-term memory (LSTM) is used that includes the attack details. This is used for attack detection process. Once they are detected, those attacks are removed from the network using the optimal path selection process. Here, the optimal shortest path is determined by the improvement in the whale optimization algorithm (WOA) that is called as fitness rate-based whale optimization algorithm (FR-WOA). This shortest path communication is carried out based on the multi-objective function using energy, distance, delay and packet delivery ratio as constraints.Design/methodology/approachThis paper implements a detection and prevention of attacks model based on FR-WOA algorithm for the prevention of attacks in the WSNs. With this, this paper aims to accomplish the desired optimization of multi-objective functions.FindingsFrom the analysis, it is found that the accuracy of the optimized LSTM is better than conventional LSTM. The energy consumption of the proposed FR-WOA with 35 nodes is 7.14% superior to WOA and FireFly, 5.7% superior to grey wolf optimization and 10.3% superior to particle swarm optimization.Originality/valueThis paper develops the FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN. To the best of the authors’ knowledge, this is the first work that uses FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN.
目的提出一种基于深度学习模型的无线传感器网络黑洞和虫洞攻击检测与预防系统。其中包括节点分配、数据采集、检测黑洞和虫洞攻击以及通过最优路径通信防止黑洞和虫洞攻击等不同阶段。最初,在WSN中假设一组节点来进行通信。此外,黑洞攻击通过诱饵过程检测,虫洞攻击通过往返时间(RTT)验证过程检测。数据收集过程是通过带有属性信息的Bait和RTT验证过程完成的。收集到的数据属性用于训练,其中使用了包括攻击细节的长短期记忆(LSTM)。用于攻击检测过程。一旦它们被检测到,这些攻击就会使用最优路径选择过程从网络中移除。这里,最优最短路径是通过对鲸鱼优化算法(WOA)的改进来确定的,称为基于适应度的鲸鱼优化算法(FR-WOA)。该最短路径通信基于多目标函数,以能量、距离、时延和分组传送率为约束条件。设计/方法/方法本文实现了一种基于FR-WOA算法的攻击检测与预防模型,用于wsn中的攻击预防。为此,本文旨在实现多目标函数的理想优化。从分析中发现,优化后的LSTM的精度优于传统的LSTM。所提出的35节点FR-WOA的能耗比WOA和FireFly优化的能耗高7.14%,比灰狼优化的能耗高5.7%,比粒子群优化的能耗高10.3%。本文开发了一种基于优化LSTM的无线传感器网络黑洞和虫洞攻击检测和防御算法。据作者所知,这是第一个使用FR-WOA和优化的LSTM检测和防止来自WSN的黑洞和虫洞攻击的工作。
{"title":"Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM","authors":"Mohan V. Pawar, Anuradha Jagadeesan","doi":"10.1108/IJPCC-10-2020-0162","DOIUrl":"https://doi.org/10.1108/IJPCC-10-2020-0162","url":null,"abstract":"Purpose\u0000This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here, different phases are included such as assigning the nodes, data collection, detecting black hole and wormhole attacks and preventing black hole and wormhole attacks by optimal path communication. Initially, a set of nodes is assumed for carrying out the communication in WSN. Further, the black hole attacks are detected by the Bait process, and wormhole attacks are detected by the round trip time (RTT) validation process. The data collection procedure is done with the Bait and RTT validation process with attribute information. The gathered data attributes are given for the training in which long short-term memory (LSTM) is used that includes the attack details. This is used for attack detection process. Once they are detected, those attacks are removed from the network using the optimal path selection process. Here, the optimal shortest path is determined by the improvement in the whale optimization algorithm (WOA) that is called as fitness rate-based whale optimization algorithm (FR-WOA). This shortest path communication is carried out based on the multi-objective function using energy, distance, delay and packet delivery ratio as constraints.\u0000\u0000\u0000Design/methodology/approach\u0000This paper implements a detection and prevention of attacks model based on FR-WOA algorithm for the prevention of attacks in the WSNs. With this, this paper aims to accomplish the desired optimization of multi-objective functions.\u0000\u0000\u0000Findings\u0000From the analysis, it is found that the accuracy of the optimized LSTM is better than conventional LSTM. The energy consumption of the proposed FR-WOA with 35 nodes is 7.14% superior to WOA and FireFly, 5.7% superior to grey wolf optimization and 10.3% superior to particle swarm optimization.\u0000\u0000\u0000Originality/value\u0000This paper develops the FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN. To the best of the authors’ knowledge, this is the first work that uses FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN.","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Metaheuristic based auto-scaling for microservices in cloud environment: a new container-aware application scheduling 云环境中基于元启发式的微服务自动伸缩:一种新的容器感知应用程序调度
Pub Date : 2021-06-02 DOI: 10.1108/IJPCC-12-2020-0213
Subramonian Krishna Sarma
PurposeThe cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a service, platform as a service and software as a service. The containers in the cloud are defined as “standalone and self-contained units that package software and its dependencies together”. Similar to virtual machines, the virtualization method facilitates the resource on a specific server that could be used by numerous appliances.Design/methodology/approachThis study introduces a new Dragon Levy updated squirrel algorithm (DLU-SA) for container aware application scheduling. Furthermore, the solution of optimal resource allocation is attained via defining the objective function that considers certain criteria such as “total network distance (TND), system failure (SF), balanced cluster use (BC) and threshold distance (TD)”. Eventually, the supremacy of the presented model is confirmed over existing models in terms of cost and statistical analysis.FindingsOn observing the outcomes, the total cost of an adopted model for Experimentation 1 has attained a lesser cost value, and it was 0.97%, 10.45% and 10.37% superior to traditional velocity updated grey wolf (VU-GWO), squirrel search algorithm (SSA) and dragonfly algorithm (DA) models, respectively, for mean case scenario. Especially, under best case scenario, the implemented model has revealed a minimal cost value of 761.95, whereas, the compared models such as whale random update assisted lion algorithm, VU-GWO, SSA and DA has revealed higher cost value of 761.98, 779.46, 766.62 and 766.51, respectively. Thus, the enhancement of the developed model has been validated over the existing works.Originality/valueThis paper proposes a new DLU-SA for container aware application scheduling. This is the first work that uses the DLU-SA model for optimal container resource allocation by taking into consideration of certain constraints such as TND, SF, BC and TD.
云是一个服务器网络,用于共享计算资源,以运行应用程序和数据存储,提供各种形式的服务,即基础设施即服务、平台即服务和软件即服务。云中的容器被定义为“将软件及其依赖关系打包在一起的独立且自包含的单元”。与虚拟机类似,虚拟化方法简化了特定服务器上可供众多设备使用的资源。本研究引入了一种新的Dragon Levy更新的松鼠算法(DLU-SA),用于容器感知应用程序调度。进一步,通过定义考虑“网络总距离(TND)、系统故障(SF)、均衡集群使用(BC)和阈值距离(TD)”等标准的目标函数,得到资源最优分配的解。最后,本模型在成本和统计分析方面优于现有模型。结果表明,实验1所采用的模型总成本较低,在平均情况下分别比传统的速度更新灰狼(VU-GWO)、松鼠搜索算法(SSA)和蜻蜓算法(DA)模型高0.97%、10.45%和10.37%。特别是,在最佳情况下,所实现模型的成本值最小为761.95,而与之相比,鲸鱼随机更新辅助狮子算法、VU-GWO、SSA和DA模型的成本值更高,分别为761.98、779.46、766.62和766.51。因此,所开发的模型的增强已在现有工作上得到验证。提出了一种新的基于容器感知的应用程序调度方法。这是第一次使用DLU-SA模型通过考虑TND、SF、BC和TD等约束条件来优化容器资源分配。
{"title":"Metaheuristic based auto-scaling for microservices in cloud environment: a new container-aware application scheduling","authors":"Subramonian Krishna Sarma","doi":"10.1108/IJPCC-12-2020-0213","DOIUrl":"https://doi.org/10.1108/IJPCC-12-2020-0213","url":null,"abstract":"\u0000Purpose\u0000The cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a service, platform as a service and software as a service. The containers in the cloud are defined as “standalone and self-contained units that package software and its dependencies together”. Similar to virtual machines, the virtualization method facilitates the resource on a specific server that could be used by numerous appliances.\u0000\u0000\u0000Design/methodology/approach\u0000This study introduces a new Dragon Levy updated squirrel algorithm (DLU-SA) for container aware application scheduling. Furthermore, the solution of optimal resource allocation is attained via defining the objective function that considers certain criteria such as “total network distance (TND), system failure (SF), balanced cluster use (BC) and threshold distance (TD)”. Eventually, the supremacy of the presented model is confirmed over existing models in terms of cost and statistical analysis.\u0000\u0000\u0000Findings\u0000On observing the outcomes, the total cost of an adopted model for Experimentation 1 has attained a lesser cost value, and it was 0.97%, 10.45% and 10.37% superior to traditional velocity updated grey wolf (VU-GWO), squirrel search algorithm (SSA) and dragonfly algorithm (DA) models, respectively, for mean case scenario. Especially, under best case scenario, the implemented model has revealed a minimal cost value of 761.95, whereas, the compared models such as whale random update assisted lion algorithm, VU-GWO, SSA and DA has revealed higher cost value of 761.98, 779.46, 766.62 and 766.51, respectively. Thus, the enhancement of the developed model has been validated over the existing works.\u0000\u0000\u0000Originality/value\u0000This paper proposes a new DLU-SA for container aware application scheduling. This is the first work that uses the DLU-SA model for optimal container resource allocation by taking into consideration of certain constraints such as TND, SF, BC and TD.\u0000","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128800676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A network controlled vertical handoff mechanism for heterogeneous wireless network using optimized support vector neural network 一种基于优化支持向量神经网络的异构无线网络控制垂直切换机制
Pub Date : 2021-05-19 DOI: 10.1108/IJPCC-07-2020-0089
Mithun B. Patil, Rekha Patil
{"title":"A network controlled vertical handoff mechanism for heterogeneous wireless network using optimized support vector neural network","authors":"Mithun B. Patil, Rekha Patil","doi":"10.1108/IJPCC-07-2020-0089","DOIUrl":"https://doi.org/10.1108/IJPCC-07-2020-0089","url":null,"abstract":"","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive IWD-based algorithm for deployment of business processes into cloud federations 用于将业务流程部署到云联合中的基于iwd的自适应算法
Pub Date : 2021-05-17 DOI: 10.1108/IJPCC-10-2020-0159
Hamidreza Nasiriasayesh, A. Yari, E. Nazemi
{"title":"Adaptive IWD-based algorithm for deployment of business processes into cloud federations","authors":"Hamidreza Nasiriasayesh, A. Yari, E. Nazemi","doi":"10.1108/IJPCC-10-2020-0159","DOIUrl":"https://doi.org/10.1108/IJPCC-10-2020-0159","url":null,"abstract":"","PeriodicalId":210948,"journal":{"name":"Int. J. Pervasive Comput. Commun.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Pervasive Comput. Commun.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1