Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221896
M. Gupta, Devendra Singh
– This work introduces a method that focuses on enhancing resource allocation in cloud computing environments by considering Quality of Service (QoS) factors. Since resource allocation plays a crucial role in determining the QoS of cloud services, it is important to consider indicators like response time, throughput, waiting time, and makespan. The primary difficulty in cloud computing lies in resource allocation, which can be tackled by proposing a novel algorithm known as Modified Fire Hawks Gazelle Optimization (MFHGO). The proposed approach involves the hybridization of the modified fire hawks algorithm with gazelle optimization to facilitate efficient resource allocation. It aims to optimize several objectives, such as resource utilization, degree of imbalance, completion time, throughput, relative error, and response time. To achieve this, an optimal resource allocation is achieved using the Partitioning around K-medoids (PAKM) clustering approach. The proposed model extends the K-means clustering method. For simulation purposes, the GWA-T-12 Bitbrains dataset is utilized, while the JAVA tool is employed for exploratory analysis. The effectiveness of the proposed resource allocation and clustering approach is demonstrated by comparing it with existing schemes. The proposed work's makespan is 1.45 seconds for 50 tasks, 3.6 seconds for 100 tasks, 3.67 seconds for 150 tasks, and 5.34 seconds for 200 jobs. As a result, the proposed model achieves the smallest makespan value when compared to the previous approaches. The proposed work yielded response times of 105ms for a task length of 100, 376ms for 200, 555ms for 300, 624ms for 400, and 1014ms for 500. These results indicate that the proposed model outperforms current approaches by achieving a faster response time and also attains a bandwidth utilization of 0.80%, 0.90%, and 0.97% for 4, 6, and 16 tasks, respectively, indicating better bandwidth utilization than the other approaches.
{"title":"Modified Fire Hawks Gazelle Optimization (MFHGO) Algorithm Based Optimized Approach to Improve the QoS Provisioning in Cloud Computing Environment","authors":"M. Gupta, Devendra Singh","doi":"10.22247/ijcna/2023/221896","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221896","url":null,"abstract":"– This work introduces a method that focuses on enhancing resource allocation in cloud computing environments by considering Quality of Service (QoS) factors. Since resource allocation plays a crucial role in determining the QoS of cloud services, it is important to consider indicators like response time, throughput, waiting time, and makespan. The primary difficulty in cloud computing lies in resource allocation, which can be tackled by proposing a novel algorithm known as Modified Fire Hawks Gazelle Optimization (MFHGO). The proposed approach involves the hybridization of the modified fire hawks algorithm with gazelle optimization to facilitate efficient resource allocation. It aims to optimize several objectives, such as resource utilization, degree of imbalance, completion time, throughput, relative error, and response time. To achieve this, an optimal resource allocation is achieved using the Partitioning around K-medoids (PAKM) clustering approach. The proposed model extends the K-means clustering method. For simulation purposes, the GWA-T-12 Bitbrains dataset is utilized, while the JAVA tool is employed for exploratory analysis. The effectiveness of the proposed resource allocation and clustering approach is demonstrated by comparing it with existing schemes. The proposed work's makespan is 1.45 seconds for 50 tasks, 3.6 seconds for 100 tasks, 3.67 seconds for 150 tasks, and 5.34 seconds for 200 jobs. As a result, the proposed model achieves the smallest makespan value when compared to the previous approaches. The proposed work yielded response times of 105ms for a task length of 100, 376ms for 200, 555ms for 300, 624ms for 400, and 1014ms for 500. These results indicate that the proposed model outperforms current approaches by achieving a faster response time and also attains a bandwidth utilization of 0.80%, 0.90%, and 0.97% for 4, 6, and 16 tasks, respectively, indicating better bandwidth utilization than the other approaches.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45430061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.22247/ijcna/2023/221888
R. Mohan, G. Prabakaran, T. Priyaradhikadevi
– Vehicular Ad Hoc network (VANET) has group of stationary or moving vehicles linked via wireless networks. Clustering in VANET is used to enhance network efficiency, scalability, and performance. By aggregating vehicles into clusters, communication overhead was decreased, and the network was managed with a greater count of vehicles. Moreover, clustering supports minimizing inter-cluster communication and decreasing congestion, therefore enhancing network reliability. The cluster head (CH) has the responsibility to manage communication in the cluster and forward communications to other clusters. In recent times, Blockchain (BC) technology has been executed to VANETs for enhancing privacy and security. A BC-based scheme is utilized for recording transactions like the change of data amongst vehicles from the secure and tamper-proof method. This makes sure that data cannot be falsified or altered and that the authenticity of data is verified. Therefore, this study develops a Blockchain Assisted Chaotic Chameleon Swarm Optimization based Energy Aware Clustering (BCCSO-EAC) technique in VANET. The presented BCCSO-EAC technique constructs clusters and selects CHs using a fitness function comprising residual energy (RE), node degree (ND), and intra-cluster distance parameters. The BCCSO-EAC technique selects CHs in such that the load among the nodes gets distributed properly. Moreover, BC technology was carried out to enable secure inter-cluster and intra-cluster VANET communication. The experimental result analysis of the BCCSO-EAC method is tested under various measures. The outcomes stated the improved results of the BCCSO-EAC technique over other recent approaches in terms of different evaluation metrics.
{"title":"Blockchain Assisted Chaotic Chameleon Swarm Optimization Based Clustering Technique in Vehicular Ad Hoc Networks","authors":"R. Mohan, G. Prabakaran, T. Priyaradhikadevi","doi":"10.22247/ijcna/2023/221888","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221888","url":null,"abstract":"– Vehicular Ad Hoc network (VANET) has group of stationary or moving vehicles linked via wireless networks. Clustering in VANET is used to enhance network efficiency, scalability, and performance. By aggregating vehicles into clusters, communication overhead was decreased, and the network was managed with a greater count of vehicles. Moreover, clustering supports minimizing inter-cluster communication and decreasing congestion, therefore enhancing network reliability. The cluster head (CH) has the responsibility to manage communication in the cluster and forward communications to other clusters. In recent times, Blockchain (BC) technology has been executed to VANETs for enhancing privacy and security. A BC-based scheme is utilized for recording transactions like the change of data amongst vehicles from the secure and tamper-proof method. This makes sure that data cannot be falsified or altered and that the authenticity of data is verified. Therefore, this study develops a Blockchain Assisted Chaotic Chameleon Swarm Optimization based Energy Aware Clustering (BCCSO-EAC) technique in VANET. The presented BCCSO-EAC technique constructs clusters and selects CHs using a fitness function comprising residual energy (RE), node degree (ND), and intra-cluster distance parameters. The BCCSO-EAC technique selects CHs in such that the load among the nodes gets distributed properly. Moreover, BC technology was carried out to enable secure inter-cluster and intra-cluster VANET communication. The experimental result analysis of the BCCSO-EAC method is tested under various measures. The outcomes stated the improved results of the BCCSO-EAC technique over other recent approaches in terms of different evaluation metrics.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46831478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-29DOI: 10.22247/ijcna/2023/220739
A. S. Ibrahim, H. Al-Mahdi, H. Nassar
– Fog computing is a viable approach to improving the performance of cloud computing, especially in terms of response time, which is critical to real-time applications. Specifically, the fog brings the cloud resources closer to terminal devices (TDs), thereby decreasing latency and increasing throughput. The problem of task offloading from TDs to the fog has enjoyed much research work, but the issue of TD mobility has not found enough attention, and hence is the present work. Herein, TD mobility in fog computing involves the transfer of services while the TD is moving from one fog to another, requiring delicate coordination between the fogs. To this end, a framework is proposed to ensure that the fogs together with the cloud collaborate, first to always keep track of the current location of the TD offloading the task, and second to accurately serve the task in a distributed fashion while the TD is moving. The framework dedicates two queues in each fog, one to receive fresh tasks from TDs and one to receive hand-over tasks from other fogs, and leverages a vigilant inter-fog messaging system capable of keeping all concerned components abreast of the latest status. A program has been written in Python to simulate the framework and example operational environments. The program has been used to perform extensive experiments in order to assess the performance of the framework under high and low mobility conditions. The findings indicate that the framework is highly reliable and can deliver, under various mobility modes
{"title":"A Collaborative Offloading Task Framework for IoT Fog Computing","authors":"A. S. Ibrahim, H. Al-Mahdi, H. Nassar","doi":"10.22247/ijcna/2023/220739","DOIUrl":"https://doi.org/10.22247/ijcna/2023/220739","url":null,"abstract":"– Fog computing is a viable approach to improving the performance of cloud computing, especially in terms of response time, which is critical to real-time applications. Specifically, the fog brings the cloud resources closer to terminal devices (TDs), thereby decreasing latency and increasing throughput. The problem of task offloading from TDs to the fog has enjoyed much research work, but the issue of TD mobility has not found enough attention, and hence is the present work. Herein, TD mobility in fog computing involves the transfer of services while the TD is moving from one fog to another, requiring delicate coordination between the fogs. To this end, a framework is proposed to ensure that the fogs together with the cloud collaborate, first to always keep track of the current location of the TD offloading the task, and second to accurately serve the task in a distributed fashion while the TD is moving. The framework dedicates two queues in each fog, one to receive fresh tasks from TDs and one to receive hand-over tasks from other fogs, and leverages a vigilant inter-fog messaging system capable of keeping all concerned components abreast of the latest status. A program has been written in Python to simulate the framework and example operational environments. The program has been used to perform extensive experiments in order to assess the performance of the framework under high and low mobility conditions. The findings indicate that the framework is highly reliable and can deliver, under various mobility modes","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45512096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-29DOI: 10.22247/ijcna/2023/220734
M. Alatawi
– An increasing number of healthcare applications are making use of wireless body sensor networks (WBSNs). WBSN technology provides a framework that allows for remote physiological monitoring of patients without the use of wired connections in the house. Furthermore, these systems provide real-time data transfer for medical personnel, allowing them to make timely decisions regarding patient care. Despite this, worries remain about patient data being compromised. This research presents a strategy for protecting patient-provider communications by making use of WBSNs. To solve the problem of how to securely store sensitive information on blockchains, a hybrid cryptographic architecture is proposed. The strengths of both public key and symmetric key cryptography are leveraged in my approach. In order to achieve this goal, I have developed a new algorithm by fusing the AES, RSA, and Blowfish algorithms. My experiments have shown that the proposed solution can keep private data safe without affecting its scalability. Using Logi-XGB as a prediction model for attacks, the proposed approach can successfully thwart 99.7 percent of them.
{"title":"A Hybrid Cryptography and LogiXGBoost Model for Intelligent and Privacy Protection in Wireless Body Sensor Networks (WBSNS)","authors":"M. Alatawi","doi":"10.22247/ijcna/2023/220734","DOIUrl":"https://doi.org/10.22247/ijcna/2023/220734","url":null,"abstract":"– An increasing number of healthcare applications are making use of wireless body sensor networks (WBSNs). WBSN technology provides a framework that allows for remote physiological monitoring of patients without the use of wired connections in the house. Furthermore, these systems provide real-time data transfer for medical personnel, allowing them to make timely decisions regarding patient care. Despite this, worries remain about patient data being compromised. This research presents a strategy for protecting patient-provider communications by making use of WBSNs. To solve the problem of how to securely store sensitive information on blockchains, a hybrid cryptographic architecture is proposed. The strengths of both public key and symmetric key cryptography are leveraged in my approach. In order to achieve this goal, I have developed a new algorithm by fusing the AES, RSA, and Blowfish algorithms. My experiments have shown that the proposed solution can keep private data safe without affecting its scalability. Using Logi-XGB as a prediction model for attacks, the proposed approach can successfully thwart 99.7 percent of them.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41423754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-29DOI: 10.22247/ijcna/2023/220738
S. Markkandan, P. Santhosh Kumar, Prathipa R, K. Vengatesan, G. Bindu
– 6G networks are predicted to provide new prospects for Smart Cities and Internet of Things (IoT) applications because of their global seamless coverage. Therefore, to fulfil the growing need for huge data rates for 6G and greater applications, network capacity must be enhanced. As a result, there is an increase in spectrum demand. Only by successfully sharing existing spectrum and avoiding spectrum underutilization will the increased demand for cellular services be addressed. As a result, for 6G to achieve considerably enhanced network capacity, efficient spectrum management systems must be developed. As a result, maintaining 6G's predicted huge network capacity in such as heterogeneous environment necessitates the shared exploitation of available spectrum resources through dynamic coordination across device and network, which can be accomplished by incorporating SDN into 6G networks. Due to the increased speeds and reliability of 6G networks, users may have to pay more for energy, to overcome these issues, In this paper, a novel proposed a 6G HetNet spectrum management system based on HSA and Smart Contracts. HSA harmonizes network operation by spreading local decision-making and network-wide policy-making processes between BS and the SDN controller, correspondingly, to relieve any possible controller scalability and latency difficulties. And, to tackle the intricacies of service-level agreements, leverage blockchain's smart contract technology, which allows for automation and trustworthy, transparent radio spectrum negotiation among several parties. This proposed solution is dependable, scalable, and implementable, as seen by the results.
{"title":"Spectrum Management in 6G HetNet Based on Smart Contracts and Harmonized Software-Defined Networking-Enabled Approach","authors":"S. Markkandan, P. Santhosh Kumar, Prathipa R, K. Vengatesan, G. Bindu","doi":"10.22247/ijcna/2023/220738","DOIUrl":"https://doi.org/10.22247/ijcna/2023/220738","url":null,"abstract":"– 6G networks are predicted to provide new prospects for Smart Cities and Internet of Things (IoT) applications because of their global seamless coverage. Therefore, to fulfil the growing need for huge data rates for 6G and greater applications, network capacity must be enhanced. As a result, there is an increase in spectrum demand. Only by successfully sharing existing spectrum and avoiding spectrum underutilization will the increased demand for cellular services be addressed. As a result, for 6G to achieve considerably enhanced network capacity, efficient spectrum management systems must be developed. As a result, maintaining 6G's predicted huge network capacity in such as heterogeneous environment necessitates the shared exploitation of available spectrum resources through dynamic coordination across device and network, which can be accomplished by incorporating SDN into 6G networks. Due to the increased speeds and reliability of 6G networks, users may have to pay more for energy, to overcome these issues, In this paper, a novel proposed a 6G HetNet spectrum management system based on HSA and Smart Contracts. HSA harmonizes network operation by spreading local decision-making and network-wide policy-making processes between BS and the SDN controller, correspondingly, to relieve any possible controller scalability and latency difficulties. And, to tackle the intricacies of service-level agreements, leverage blockchain's smart contract technology, which allows for automation and trustworthy, transparent radio spectrum negotiation among several parties. This proposed solution is dependable, scalable, and implementable, as seen by the results.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46467728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-29DOI: 10.22247/ijcna/2023/220735
V. K. Pandey, Suddhasil De
– Post-disaster timely search and rescue can save huge amount of lives but often it is observed that due to absence of reliable and running network rescue operation can’t be performed efficiently. In search of handling the challenge handheld mobile devices with ability to form ad hoc network is explored through the means of proposed model to form a reliable network with resources available in-situ both in case of no-network connectivity or fully collapsed infrastructure connectivity to give post-disaster coverage. To achieve the motivation discussed above the paper proposes following contributions: (i) a new approach for remotely carrying out reliable configuration of mobile devices over-the-air to form a rapid infrastructure-less network for post-disaster information exchange through proposed daemon service. (ii) a newer technique where by using the mobile devices of the victim getting the location, SOS and other critical information of the incapacitated or unattainable victims for carrying out rescue information by connecting to the reliable network formed over-the-air using handheld devices. The proposed approaches is tested and validated via simulation and test bed for its network performance and reliability parameters and found more than 20% reliability improvement and over 15% network performance improvement against next best related compared works.
{"title":"Reliable Network Formation Using New Approach of Daemon Service Installation in Handheld Devices for Post-Disaster Search and Rescue","authors":"V. K. Pandey, Suddhasil De","doi":"10.22247/ijcna/2023/220735","DOIUrl":"https://doi.org/10.22247/ijcna/2023/220735","url":null,"abstract":"– Post-disaster timely search and rescue can save huge amount of lives but often it is observed that due to absence of reliable and running network rescue operation can’t be performed efficiently. In search of handling the challenge handheld mobile devices with ability to form ad hoc network is explored through the means of proposed model to form a reliable network with resources available in-situ both in case of no-network connectivity or fully collapsed infrastructure connectivity to give post-disaster coverage. To achieve the motivation discussed above the paper proposes following contributions: (i) a new approach for remotely carrying out reliable configuration of mobile devices over-the-air to form a rapid infrastructure-less network for post-disaster information exchange through proposed daemon service. (ii) a newer technique where by using the mobile devices of the victim getting the location, SOS and other critical information of the incapacitated or unattainable victims for carrying out rescue information by connecting to the reliable network formed over-the-air using handheld devices. The proposed approaches is tested and validated via simulation and test bed for its network performance and reliability parameters and found more than 20% reliability improvement and over 15% network performance improvement against next best related compared works.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44650483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-29DOI: 10.22247/ijcna/2023/220733
S. Shanmuga Priya, N. Shanmuga Priya
{"title":"Energy-Efficient Trust and Quarantine-Based Secure Data Transmission in Wireless Sensor Networks","authors":"S. Shanmuga Priya, N. Shanmuga Priya","doi":"10.22247/ijcna/2023/220733","DOIUrl":"https://doi.org/10.22247/ijcna/2023/220733","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47300466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-29DOI: 10.22247/ijcna/2023/220736
S. Asakipaam, J. J. Kponyo, K. Gyasi
– The increasing demands for higher bandwidth and lower latency in modern telecommunications networks have led to the exploration of network slicing as a means to meet these requirements more efficiently in next-generation 5G networks. Despite substantial academic interest in resource allocation and management in network slicing, existing research is dispersed and fragmented. This study presents a categorization and assessment of the latest research on resource allocation and optimization techniques in 5G network slicing. It also shows how advanced machine learning techniques can support resource management in sliced wireless networks. The present paper offers a complete overview and analysis of current solutions for resource allocation and management in 5G network slicing, outlines open research challenges, and suggests future research directions for researchers and engineers in this field
{"title":"Resource Provisioning and Utilization in 5G Network Slicing: A Survey of Recent Advances, Challenges, and Open Issues","authors":"S. Asakipaam, J. J. Kponyo, K. Gyasi","doi":"10.22247/ijcna/2023/220736","DOIUrl":"https://doi.org/10.22247/ijcna/2023/220736","url":null,"abstract":"– The increasing demands for higher bandwidth and lower latency in modern telecommunications networks have led to the exploration of network slicing as a means to meet these requirements more efficiently in next-generation 5G networks. Despite substantial academic interest in resource allocation and management in network slicing, existing research is dispersed and fragmented. This study presents a categorization and assessment of the latest research on resource allocation and optimization techniques in 5G network slicing. It also shows how advanced machine learning techniques can support resource management in sliced wireless networks. The present paper offers a complete overview and analysis of current solutions for resource allocation and management in 5G network slicing, outlines open research challenges, and suggests future research directions for researchers and engineers in this field","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43924605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-29DOI: 10.22247/ijcna/2023/220740
Anshu Vashisth, Balraj Singh, Ranbir Singh Batth
– The design of efficient routing strategies for Unmanned Aerial Vehicle (UAV) Networks is a multidomain task that involves analysis of node-level & network-level parameters, and mapping them with communication & contextual conditions. Existing path planning optimization models either showcase higher complexity or cannot be scaled for larger network scenarios. Moreover, the efficiency of these models also reduces w.r.t. the number of communication requests, which limits their scalability levels. To get a better result over these challenges, this article provides an idea to design an efficient Q-Learning model to improve the routing efficiency of UAV networks via bioinspired optimizations. The model initially collects temporal routing performance data samples for individual nodes and uses them to form coarse routes via Q-Learning optimizations. These routes are further processed via a Mayfly Optimization (MO) Model, which assists in the selection of optimal routing paths for high Quality of Service (QoS) even under large-scale routing requests. The MO Model can identify alternate paths via the evaluation of a high-density routing fitness function that assists the router in case the selected paths are occupied during current routing requests. This assists in improving temporal routing performance even under dense network conditions. Due to these optimizations, the model is capable of reducing the routing delay by 8.5%, improving energy efficiency by 4.9%, and reducing the routing jitter by 3.5% when compared with existing routing techniques by taking similar routing conditions.
{"title":"QMRNB: Design of an Efficient Q-Learning Model to Improve Routing Efficiency of UAV Networks via Bioinspired Optimizations","authors":"Anshu Vashisth, Balraj Singh, Ranbir Singh Batth","doi":"10.22247/ijcna/2023/220740","DOIUrl":"https://doi.org/10.22247/ijcna/2023/220740","url":null,"abstract":"– The design of efficient routing strategies for Unmanned Aerial Vehicle (UAV) Networks is a multidomain task that involves analysis of node-level & network-level parameters, and mapping them with communication & contextual conditions. Existing path planning optimization models either showcase higher complexity or cannot be scaled for larger network scenarios. Moreover, the efficiency of these models also reduces w.r.t. the number of communication requests, which limits their scalability levels. To get a better result over these challenges, this article provides an idea to design an efficient Q-Learning model to improve the routing efficiency of UAV networks via bioinspired optimizations. The model initially collects temporal routing performance data samples for individual nodes and uses them to form coarse routes via Q-Learning optimizations. These routes are further processed via a Mayfly Optimization (MO) Model, which assists in the selection of optimal routing paths for high Quality of Service (QoS) even under large-scale routing requests. The MO Model can identify alternate paths via the evaluation of a high-density routing fitness function that assists the router in case the selected paths are occupied during current routing requests. This assists in improving temporal routing performance even under dense network conditions. Due to these optimizations, the model is capable of reducing the routing delay by 8.5%, improving energy efficiency by 4.9%, and reducing the routing jitter by 3.5% when compared with existing routing techniques by taking similar routing conditions.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46595680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-29DOI: 10.22247/ijcna/2023/220737
A. Senthilkumar, J. Ramkumar, M. Lingaraj, D. Jayaraj, B. Sureshkumar
– Increasing traffic issues, particularly in highly populated nations, have prompted recent interest in Vehicular Sensor Networks (VSNETs) from academics in several fields. Accident rates continue to rise, highlighting the need for a highly functional Smart Transport System (STS). Improvements to the STS should not be spread thin across the board but should concentrate on improving traffic flow, maintaining system reliability, and decreasing vehicle carbon dioxide and methane emissions. Current routing protocols for VSNETs consider various scenarios and approaches to provide safe and effective vehicle-to-infrastructure communication. The reliability of vehicle connections during data transmission has not been well explored. This paper proposes a Relentless Particle Swarm Optimization based Routing Protocol (RPSORP) for VSNET to use vehicle kinematics and mobility to identify vehicle location, send routing information packets to road-side devices, and choose the most reliable path for travel. RPSORP optimizes local and global search to minimize energy consumption in VSNET. The RPSORP is evaluated in the GNS3 simulator using Throughput, Packet Delivery, Delay, and Energy Consumption metrics. RPSORP has superior performance than state-of-the-art routing protocols.
{"title":"Minimizing Energy Consumption in Vehicular Sensor Networks Using Relentless Particle Swarm Optimization Routing","authors":"A. Senthilkumar, J. Ramkumar, M. Lingaraj, D. Jayaraj, B. Sureshkumar","doi":"10.22247/ijcna/2023/220737","DOIUrl":"https://doi.org/10.22247/ijcna/2023/220737","url":null,"abstract":"– Increasing traffic issues, particularly in highly populated nations, have prompted recent interest in Vehicular Sensor Networks (VSNETs) from academics in several fields. Accident rates continue to rise, highlighting the need for a highly functional Smart Transport System (STS). Improvements to the STS should not be spread thin across the board but should concentrate on improving traffic flow, maintaining system reliability, and decreasing vehicle carbon dioxide and methane emissions. Current routing protocols for VSNETs consider various scenarios and approaches to provide safe and effective vehicle-to-infrastructure communication. The reliability of vehicle connections during data transmission has not been well explored. This paper proposes a Relentless Particle Swarm Optimization based Routing Protocol (RPSORP) for VSNET to use vehicle kinematics and mobility to identify vehicle location, send routing information packets to road-side devices, and choose the most reliable path for travel. RPSORP optimizes local and global search to minimize energy consumption in VSNET. The RPSORP is evaluated in the GNS3 simulator using Throughput, Packet Delivery, Delay, and Energy Consumption metrics. RPSORP has superior performance than state-of-the-art routing protocols.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47598045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}