首页 > 最新文献

International Journal of Intelligent Unmanned Systems最新文献

英文 中文
Hybrid filter detection network model for secondary user transmission in cognitive radio networks 认知无线电网络中二次用户传输的混合滤波器检测网络模型
IF 1 Q4 ROBOTICS Pub Date : 2021-11-12 DOI: 10.1108/ijius-08-2021-0091
D. Vijaya Saradhi, Swetha Katragadda, H. Valiveti
PurposeA huge variety of devices accumulates as well distributes a large quantity of data either with the help of wired networks or wireless networks to implement a wide variety of application scenarios. The spectrum resources on the other hand become extremely unavailable with the development of communication devices and thereby making it difficult to transmit data on time.Design/methodology/approachThe spectrum resources on the other hand become extremely unavailable with the development of communication devices and thereby making it difficult to transmit data on time. Therefore, the technology of cognitive radio (CR) is considered as one of the efficient solutions for addressing the drawbacks of spectrum distribution whereas the secondary user (SU) performance is significantly influenced by the spatiotemporal instability of spectrum.FindingsAs a result, the technique of the hybrid filter detection network model (HFDNM) is suggested in this research work under various SU relationships in the networks of CR. Furthermore, a technique of hybrid filter detection was recommended in this work to enhance the performance of idle spectrum applications. When compared to other existing techniques, the suggested research work achieves enhanced efficiency with respect to both throughputs as well as delay.Originality/valueThe proposed HFDNM improved the transmission delay at 3 SUs with 0.004 s/message and 0.008 s/message when compared with existing NCNC and NNC methods in case of number of SUs and also improved 0.02 s/message and 0.08 s/message when compared with the existing methods of NCNC and NNC in case of channel loss probability at 0.3.
目的各种各样的设备在有线网络或无线网络的帮助下积累和分发大量数据,以实现各种各样的应用场景。另一方面,随着通信设备的发展,频谱资源变得极不可用,从而使数据难以按时传输。设计/方法/方法另一方面,随着通信设备的发展,频谱资源变得极不可用,从而使数据难以按时传输。因此,认知无线电(CR)技术被认为是解决频谱分布缺陷的有效解决方案之一,而二次用户(SU)的性能受到频谱时空不稳定性的显著影响。结果表明,在CR网络中各种SU关系下,本文提出了混合滤波器检测网络模型(HFDNM)技术。此外,本文还提出了一种混合滤波器检测技术,以提高空闲频谱应用的性能。与其他现有技术相比,所建议的研究工作在吞吐量和延迟方面都提高了效率。独创性/价值在SU数量的情况下,与现有的NCNC和NNC方法相比,所提出的HFDNM在3个SU处的传输延迟分别提高了0.004秒/消息和0.008秒/消息,并且在信道丢失概率为0.3的情况下与NCNC和NN的现有方法相比,还提高了0.02秒/消息、0.08秒/消息。
{"title":"Hybrid filter detection network model for secondary user transmission in cognitive radio networks","authors":"D. Vijaya Saradhi, Swetha Katragadda, H. Valiveti","doi":"10.1108/ijius-08-2021-0091","DOIUrl":"https://doi.org/10.1108/ijius-08-2021-0091","url":null,"abstract":"PurposeA huge variety of devices accumulates as well distributes a large quantity of data either with the help of wired networks or wireless networks to implement a wide variety of application scenarios. The spectrum resources on the other hand become extremely unavailable with the development of communication devices and thereby making it difficult to transmit data on time.Design/methodology/approachThe spectrum resources on the other hand become extremely unavailable with the development of communication devices and thereby making it difficult to transmit data on time. Therefore, the technology of cognitive radio (CR) is considered as one of the efficient solutions for addressing the drawbacks of spectrum distribution whereas the secondary user (SU) performance is significantly influenced by the spatiotemporal instability of spectrum.FindingsAs a result, the technique of the hybrid filter detection network model (HFDNM) is suggested in this research work under various SU relationships in the networks of CR. Furthermore, a technique of hybrid filter detection was recommended in this work to enhance the performance of idle spectrum applications. When compared to other existing techniques, the suggested research work achieves enhanced efficiency with respect to both throughputs as well as delay.Originality/valueThe proposed HFDNM improved the transmission delay at 3 SUs with 0.004 s/message and 0.008 s/message when compared with existing NCNC and NNC methods in case of number of SUs and also improved 0.02 s/message and 0.08 s/message when compared with the existing methods of NCNC and NNC in case of channel loss probability at 0.3.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47389504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimum bug fixing rate and bug fixing time detection by software reliability modelling 基于软件可靠性模型的最佳bug修复率和bug修复时间检测
IF 1 Q4 ROBOTICS Pub Date : 2021-11-02 DOI: 10.1108/ijius-07-2021-0065
Rama Rao Narvaneni, K. Suresh Babu
PurposeSoftware reliability growth models (SRGMs) are used to assess and predict reliability of a software system. Many of these models are effective in predicting future failures unless the software evolves.Design/methodology/approachThis objective of this paper is to identify the best path for rectifying the BFT (bug fixing time) and BFR (bug fixing rate). Moreover, the flexible software project has been examined while materializing the BFR. To enhance the BFR, the traceability of bug is lessened by the version tag virtue in every software deliverable component. The release time of software build is optimized with the utilization of mathematical optimization mechanisms like ‘software reliability growth’ and ‘non-homogeneous Poisson process methods.’FindingsIn current market scenario, this is most essential. The automation and variation of build is also resolved in this contribution. Here, the software, which is developed, is free from the bugs or defects and enhances the quality of software by increasing the BFR.Originality/valueIn current market scenario, this is most essential. The automation and variation of build is also resolved in this contribution. Here, the software, which is developed, is free from the bugs or defects and enhances the quality of software by increasing the BFR.
目的软件可靠性增长模型(SRGM)用于评估和预测软件系统的可靠性。除非软件进化,否则这些模型中的许多在预测未来故障方面都是有效的。设计/方法/方法本文的目的是确定纠正BFT(错误修复时间)和BFR(错误修复率)的最佳路径。此外,在实现BFR的同时,对柔性软件项目进行了检验。为了增强BFR,每个软件可交付组件中的版本标记优点降低了bug的可追溯性。软件构建的发布时间通过使用数学优化机制进行优化,如“软件可靠性增长”和“非齐次泊松过程方法”发现在目前的市场情况下,这是最重要的。构建的自动化和变化也在这篇文章中得到了解决。在这里,开发的软件没有错误或缺陷,并通过增加BFR来提高软件的质量。创意/价值在当前的市场场景中,这是最重要的。构建的自动化和变化也在这篇文章中得到了解决。在这里,开发的软件没有错误或缺陷,并通过增加BFR来提高软件的质量。
{"title":"Optimum bug fixing rate and bug fixing time detection by software reliability modelling","authors":"Rama Rao Narvaneni, K. Suresh Babu","doi":"10.1108/ijius-07-2021-0065","DOIUrl":"https://doi.org/10.1108/ijius-07-2021-0065","url":null,"abstract":"PurposeSoftware reliability growth models (SRGMs) are used to assess and predict reliability of a software system. Many of these models are effective in predicting future failures unless the software evolves.Design/methodology/approachThis objective of this paper is to identify the best path for rectifying the BFT (bug fixing time) and BFR (bug fixing rate). Moreover, the flexible software project has been examined while materializing the BFR. To enhance the BFR, the traceability of bug is lessened by the version tag virtue in every software deliverable component. The release time of software build is optimized with the utilization of mathematical optimization mechanisms like ‘software reliability growth’ and ‘non-homogeneous Poisson process methods.’FindingsIn current market scenario, this is most essential. The automation and variation of build is also resolved in this contribution. Here, the software, which is developed, is free from the bugs or defects and enhances the quality of software by increasing the BFR.Originality/valueIn current market scenario, this is most essential. The automation and variation of build is also resolved in this contribution. Here, the software, which is developed, is free from the bugs or defects and enhances the quality of software by increasing the BFR.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44371344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-based intelligent recommendation by code reuse for smart decision support and cognitive adaptive systems 基于上下文的代码重用智能推荐在智能决策支持和认知自适应系统中的应用
IF 1 Q4 ROBOTICS Pub Date : 2021-10-28 DOI: 10.1108/ijius-07-2021-0055
S. Khapre, Prabhishek Singh, A. Shankar, S. R. Nayak, M. Diwakar
PurposeThis paper aims to use the concept of machine learning to enable people and machines to interact more certainly to extend and expand human expertise and cognition.Design/methodology/approachIntelligent code reuse recommendations based on code big data analysis, mining and learning can effectively improve the efficiency and quality of software reuse, including common code units in a specific field and common code units that are not related to the field.FindingsFocusing on the topic of context-based intelligent code reuse recommendation, this paper expounds the research work in two aspects mainly in practical applications of smart decision support and cognitive adaptive systems: code reuse recommendation based on template mining and code reuse recommendation based on deep learning.Originality/valueOn this basis, the future development direction of intelligent code reuse recommendation based on context has prospected.
本文旨在利用机器学习的概念,使人和机器之间的交互更加确定,从而扩展和扩展人类的专业知识和认知。设计/方法论/方法基于代码大数据分析、挖掘和学习的智能代码重用建议,可以有效提高软件重用的效率和质量,包括特定领域的通用代码单元和与该领域无关的通用代码单元。本文围绕基于上下文的智能代码重用推荐这一主题,从基于模板挖掘的代码重用推荐和基于深度学习的代码重用推荐两方面阐述了智能决策支持和认知自适应系统在实际应用中的研究工作。在此基础上,对基于上下文的智能代码重用推荐的未来发展方向进行了展望。
{"title":"Context-based intelligent recommendation by code reuse for smart decision support and cognitive adaptive systems","authors":"S. Khapre, Prabhishek Singh, A. Shankar, S. R. Nayak, M. Diwakar","doi":"10.1108/ijius-07-2021-0055","DOIUrl":"https://doi.org/10.1108/ijius-07-2021-0055","url":null,"abstract":"PurposeThis paper aims to use the concept of machine learning to enable people and machines to interact more certainly to extend and expand human expertise and cognition.Design/methodology/approachIntelligent code reuse recommendations based on code big data analysis, mining and learning can effectively improve the efficiency and quality of software reuse, including common code units in a specific field and common code units that are not related to the field.FindingsFocusing on the topic of context-based intelligent code reuse recommendation, this paper expounds the research work in two aspects mainly in practical applications of smart decision support and cognitive adaptive systems: code reuse recommendation based on template mining and code reuse recommendation based on deep learning.Originality/valueOn this basis, the future development direction of intelligent code reuse recommendation based on context has prospected.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46493408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel system-level modeling and design approach for high performance single-loop sigma-delta (∑Δ) modulators 一种新的高性能单环∑Δ调制器系统级建模与设计方法
IF 1 Q4 ROBOTICS Pub Date : 2021-10-19 DOI: 10.1108/ijius-06-2021-0051
S. Vamsee Krishna, P. Sudhakara Reddy, S. Chandra Mohan Reddy
PurposeThis paper attempted a novel approach for system-level modeling and simulation of sigma-delta modulator for low-frequency CMOS integrated analog to digital interfaces. Comparative analysis of various architectures topologies, circuit implementation techniques are described with analytical procedure for effective selection of topologies for targeted specifications.Design/methodology/approachVirtual instruments are presented in labview environment to analyze the correlation of circuit-level non-ideal effects with key design parameters over sampling ratio, coarse quantizer bits and loop filter order. A fourth-order single-loop sigma-delta modulator is designed and verified in MATLAB simulink environment with careful selection of integrator weights to meet stable desired performance.FindingsThe proposed designed achieved SNDR of 122 dB and 20 bit resolution satisfying high-resolution requirements of low-frequency biomedical signal processing applications. Even though the simulation performed at behavioral level, the results obtained are considered as accurate, by including all non-ideal and non-linear circuit errors in simulation process.Originality/valueVirtual instruments using labview environment used to analyze the correlation of circuit-level non-ideal effects with key design parameters over sampling ratio, coarse quantizer bits and loop filter order for accurate design.
目的本文尝试了一种新的方法来对低频CMOS集成模数接口的∑-Δ调制器进行系统级建模和仿真。对各种架构拓扑结构、电路实现技术的比较分析,以及为目标规范有效选择拓扑结构的分析过程进行了描述。设计/方法论/方法在labview环境中使用虚拟仪器来分析电路级非理想效应与关键设计参数在采样率、粗量化器位和环路滤波器阶数上的相关性。设计了一种四阶单环∑-Δ调制器,并在MATLAB simulink环境中进行了验证,仔细选择了积分器权重,以满足稳定的期望性能。发现所提出的设计实现了122dB的SNDR和20位的分辨率,满足了低频生物医学信号处理应用的高分辨率要求。即使在行为层面上进行了模拟,通过在模拟过程中包括所有非理想和非线性电路误差,所获得的结果也被认为是准确的。独创性/价值使用labview环境的虚拟仪器用于分析电路级非理想效应与关键设计参数在采样率、粗量化器位和环路滤波器阶数方面的相关性,以实现准确的设计。
{"title":"A novel system-level modeling and design approach for high performance single-loop sigma-delta (∑Δ) modulators","authors":"S. Vamsee Krishna, P. Sudhakara Reddy, S. Chandra Mohan Reddy","doi":"10.1108/ijius-06-2021-0051","DOIUrl":"https://doi.org/10.1108/ijius-06-2021-0051","url":null,"abstract":"PurposeThis paper attempted a novel approach for system-level modeling and simulation of sigma-delta modulator for low-frequency CMOS integrated analog to digital interfaces. Comparative analysis of various architectures topologies, circuit implementation techniques are described with analytical procedure for effective selection of topologies for targeted specifications.Design/methodology/approachVirtual instruments are presented in labview environment to analyze the correlation of circuit-level non-ideal effects with key design parameters over sampling ratio, coarse quantizer bits and loop filter order. A fourth-order single-loop sigma-delta modulator is designed and verified in MATLAB simulink environment with careful selection of integrator weights to meet stable desired performance.FindingsThe proposed designed achieved SNDR of 122 dB and 20 bit resolution satisfying high-resolution requirements of low-frequency biomedical signal processing applications. Even though the simulation performed at behavioral level, the results obtained are considered as accurate, by including all non-ideal and non-linear circuit errors in simulation process.Originality/valueVirtual instruments using labview environment used to analyze the correlation of circuit-level non-ideal effects with key design parameters over sampling ratio, coarse quantizer bits and loop filter order for accurate design.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42997372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EGMM video surveillance for monitoring urban traffic scenario EGMM视频监控用于监控城市交通场景
IF 1 Q4 ROBOTICS Pub Date : 2021-10-12 DOI: 10.1108/ijius-07-2021-0061
A. Reyana, S. Kautish, A. S. Vibith, S. Goyal
PurposeIn the traffic monitoring system, the detection of stirring vehicles is monitored by fitting static cameras in the traffic scenarios. Background subtraction a commonly used method detaches poignant objects in the foreground from the background. The method applies a Gaussian Mixture Model, which can effortlessly be contaminated through slow-moving or momentarily stopped vehicles.Design/methodology/approachThis paper proposes the Enhanced Gaussian Mixture Model to overcome the addressed issue, efficiently detecting vehicles in complex traffic scenarios.FindingsThe model was evaluated with experiments conducted using real-world on-road travel videos. The evidence intimates that the proposed model excels with other approaches showing the accuracy of 0.9759 when compared with the existing Gaussian mixture model (GMM) model and avoids contamination of slow-moving or momentarily stopped vehicles.Originality/valueThe proposed method effectively combines, tracks and classifies the traffic vehicles, resolving the contamination problem that occurred by slow-moving or momentarily stopped vehicles.
目的在交通监控系统中,通过在交通场景中安装静态摄像机来监控搅拌车辆的检测。背景减法是一种常用的方法,将前景中的尖锐物体从背景中分离出来。该方法采用高斯混合模型,可以毫不费力地通过缓慢移动或暂时停止的车辆污染。本文提出了增强高斯混合模型来克服所解决的问题,有效地检测复杂交通场景中的车辆。该模型通过使用真实道路旅行视频进行的实验进行了评估。结果表明,该模型与现有的高斯混合模型(GMM)模型相比,精度达到0.9759,并且避免了对缓慢移动或瞬间停车车辆的污染。独创性/价值提出的方法有效地对交通车辆进行组合、跟踪和分类,解决了车辆缓慢移动或瞬间停车造成的污染问题。
{"title":"EGMM video surveillance for monitoring urban traffic scenario","authors":"A. Reyana, S. Kautish, A. S. Vibith, S. Goyal","doi":"10.1108/ijius-07-2021-0061","DOIUrl":"https://doi.org/10.1108/ijius-07-2021-0061","url":null,"abstract":"PurposeIn the traffic monitoring system, the detection of stirring vehicles is monitored by fitting static cameras in the traffic scenarios. Background subtraction a commonly used method detaches poignant objects in the foreground from the background. The method applies a Gaussian Mixture Model, which can effortlessly be contaminated through slow-moving or momentarily stopped vehicles.Design/methodology/approachThis paper proposes the Enhanced Gaussian Mixture Model to overcome the addressed issue, efficiently detecting vehicles in complex traffic scenarios.FindingsThe model was evaluated with experiments conducted using real-world on-road travel videos. The evidence intimates that the proposed model excels with other approaches showing the accuracy of 0.9759 when compared with the existing Gaussian mixture model (GMM) model and avoids contamination of slow-moving or momentarily stopped vehicles.Originality/valueThe proposed method effectively combines, tracks and classifies the traffic vehicles, resolving the contamination problem that occurred by slow-moving or momentarily stopped vehicles.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43650514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of novel approach for emerging power-domain superposition coding (SC)-using hybrid NOMA-OFDM for 5G communications 一种新的功率域叠加编码(SC)方法的设计——用于5G通信的混合NOMA-OFDM
IF 1 Q4 ROBOTICS Pub Date : 2021-10-11 DOI: 10.1108/ijius-07-2021-0056
Y. Shobha, H. Rangaraju
PurposeThe suggested work examines the latest developments such as the techniques employed for allocation of power, browser techniques, modern analysis and bandwidth efficiency of nonorthogonal multiple accesses (NOMA) in the network of 5G. Furthermore, the proposed work also illustrates the performance of NOMA when it is combined with various techniques of wireless communication namely network coding, multiple-input multiple-output (MIMO), space-time coding, collective communications, as well as many more. In the case of the MIMO system, the proposed research work specifically deals with a less complex recursive linear minimum mean square error (LMMSE) multiuser detector along with NOMA (MIMO-NOMA); here the multiple-antenna base station (BS) and multiple single-antenna users interact with each other instantaneously. Although LMMSE is a linear detector with a low intricacy, it performs poorly in multiuser identification because of the incompatibility between LMMSE identification and multiuser decoding. Thus, to obtain a desirable iterative identification rate, the proposed research work presents matching constraints among the decoders and identifiers of MIMO-NOMA.Design/methodology/approachTo improve the performance in 5G technologies as well as in cellular communication, the NOMA technique is employed and contemplated as one of the best methodologies for accessing radio. The above-stated technique offers several advantages such as enhanced spectrum performance in contrast to the high-capacity orthogonal multiple access (OMA) approach that is also known as orthogonal frequency division multiple access (OFDMA). Code and power domain are some of the categories of the NOMA technique. The suggested research work mainly concentrates on the technique of NOMA, which is based on the power domain. This approach correspondingly makes use of superposition coding (SC) as well as successive interference cancellation (SIC) at source and recipient. For the fifth-generation applications, the network-level, as well as user-experienced data rate prerequisites, are successfully illustrated by various researchers.FindingsThe suggested combined methodology such as MIMO-NOMA demonstrates a synchronized iterative LMMSE system that can accomplish the optimized efficiency of symmetric MIMO NOMA with several users. To transmit the information from sender to the receiver, hybrid methodologies are confined to 2 × 2 as well as 4 × 4 antenna arrays, and thereby parameters such as PAPR, BER, SNR are analyzed and efficiency for various modulation strategies such as BPSK and QAMj (j should vary from 8,16,32,64) are computed.Originality/valueThe proposed hybrid MIMO-NOMA methodologies are synchronized in terms of iterative process for optimization of LMMSE that can accomplish the optimized efficiency of symmetric for several users under different noisy conditions. From the obtained simulated results, it is found, there are 18%, 23% 16%, and 8% improvement in terms of Bit Error R
建议的工作考察了5G网络中用于分配功率的技术、浏览器技术、现代分析和非正交多址(NOMA)带宽效率等最新发展。此外,所提出的工作还说明了NOMA在与各种无线通信技术(即网络编码、多输入多输出(MIMO)、时空编码、集体通信等)相结合时的性能。在MIMO系统的情况下,提出的研究工作专门处理一个不太复杂的递归线性最小均方误差(LMMSE)多用户检测器以及NOMA (MIMO-NOMA);在这里,多天线基站(BS)和多个单天线用户可以即时交互。虽然LMMSE是一种复杂度较低的线性检测器,但由于LMMSE识别与多用户解码不兼容,其在多用户识别中的性能较差。因此,为了获得理想的迭代识别率,本研究提出了MIMO-NOMA解码器和标识符之间的匹配约束。设计/方法/方法为了提高5G技术和蜂窝通信的性能,NOMA技术被采用并被认为是访问无线电的最佳方法之一。与高容量正交多址(OMA)方法(也称为正交频分多址(OFDMA))相比,上述技术提供了一些优点,例如增强的频谱性能。代码和功率域是NOMA技术的两个范畴。建议的研究工作主要集中在基于功率域的NOMA技术。这种方法相应地利用了源端和接收端的叠加编码(SC)和连续干扰抵消(SIC)。对于第五代应用,各种研究人员成功地说明了网络级以及用户体验数据速率的先决条件。结果提出的MIMO-NOMA组合方法证明了一种同步迭代LMMSE系统,可以实现多用户对称MIMO NOMA的优化效率。为了将信息从发送方传输到接收方,混合方法被限制在2 × 2和4 × 4天线阵列中,因此分析了PAPR、BER和SNR等参数,并计算了各种调制策略(如BPSK和QAMj)的效率(j应从8、16、32、64变化)。提出的混合MIMO-NOMA方法在迭代过程上同步优化LMMSE,可以在不同噪声条件下实现多个用户的对称优化效率。从仿真结果来看,二相移键(BPSK)和正交调幅(QAM)调制技术在误码率(BER)、最小均方误差(LMMSE)、峰值平均功率比(PAPR)和信道容量方面分别提高了18%、23%、16%和8%。
{"title":"Design of novel approach for emerging power-domain superposition coding (SC)-using hybrid NOMA-OFDM for 5G communications","authors":"Y. Shobha, H. Rangaraju","doi":"10.1108/ijius-07-2021-0056","DOIUrl":"https://doi.org/10.1108/ijius-07-2021-0056","url":null,"abstract":"PurposeThe suggested work examines the latest developments such as the techniques employed for allocation of power, browser techniques, modern analysis and bandwidth efficiency of nonorthogonal multiple accesses (NOMA) in the network of 5G. Furthermore, the proposed work also illustrates the performance of NOMA when it is combined with various techniques of wireless communication namely network coding, multiple-input multiple-output (MIMO), space-time coding, collective communications, as well as many more. In the case of the MIMO system, the proposed research work specifically deals with a less complex recursive linear minimum mean square error (LMMSE) multiuser detector along with NOMA (MIMO-NOMA); here the multiple-antenna base station (BS) and multiple single-antenna users interact with each other instantaneously. Although LMMSE is a linear detector with a low intricacy, it performs poorly in multiuser identification because of the incompatibility between LMMSE identification and multiuser decoding. Thus, to obtain a desirable iterative identification rate, the proposed research work presents matching constraints among the decoders and identifiers of MIMO-NOMA.Design/methodology/approachTo improve the performance in 5G technologies as well as in cellular communication, the NOMA technique is employed and contemplated as one of the best methodologies for accessing radio. The above-stated technique offers several advantages such as enhanced spectrum performance in contrast to the high-capacity orthogonal multiple access (OMA) approach that is also known as orthogonal frequency division multiple access (OFDMA). Code and power domain are some of the categories of the NOMA technique. The suggested research work mainly concentrates on the technique of NOMA, which is based on the power domain. This approach correspondingly makes use of superposition coding (SC) as well as successive interference cancellation (SIC) at source and recipient. For the fifth-generation applications, the network-level, as well as user-experienced data rate prerequisites, are successfully illustrated by various researchers.FindingsThe suggested combined methodology such as MIMO-NOMA demonstrates a synchronized iterative LMMSE system that can accomplish the optimized efficiency of symmetric MIMO NOMA with several users. To transmit the information from sender to the receiver, hybrid methodologies are confined to 2 × 2 as well as 4 × 4 antenna arrays, and thereby parameters such as PAPR, BER, SNR are analyzed and efficiency for various modulation strategies such as BPSK and QAMj (j should vary from 8,16,32,64) are computed.Originality/valueThe proposed hybrid MIMO-NOMA methodologies are synchronized in terms of iterative process for optimization of LMMSE that can accomplish the optimized efficiency of symmetric for several users under different noisy conditions. From the obtained simulated results, it is found, there are 18%, 23% 16%, and 8% improvement in terms of Bit Error R","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48563953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Navigation of a wheeled mobile robotic agent using modified grey wolf optimization controller 基于改进的灰狼优化控制器的轮式移动机器人智能体导航
IF 1 Q4 ROBOTICS Pub Date : 2021-10-04 DOI: 10.1108/ijius-06-2020-0023
Chittaranjan Paital, Saroj Kumar, M. Muni, D. Parhi, P. R. Dhal
PurposeSmooth and autonomous navigation of mobile robot in a cluttered environment is the main purpose of proposed technique. That includes localization and path planning of mobile robot. These are important aspects of the mobile robot during autonomous navigation in any workspace. Navigation of mobile robots includes reaching the target from the start point by avoiding obstacles in a static or dynamic environment. Several techniques have already been proposed by the researchers concerning navigational problems of the mobile robot still no one confirms the navigating path is optimal.Design/methodology/approachTherefore, the modified grey wolf optimization (GWO) controller is designed for autonomous navigation, which is one of the intelligent techniques for autonomous navigation of wheeled mobile robot (WMR). GWO is a nature-inspired algorithm, which mainly mimics the social hierarchy and hunting behavior of wolf in nature. It is modified to define the optimal positions and better control over the robot. The motion from the source to target in the highly cluttered environment by negotiating obstacles. The controller is authenticated by the approach of V-REP simulation software platform coupled with real-time experiment in the laboratory by using Khepera-III robot.FindingsDuring experiments, it is observed that the proposed technique is much efficient in motion control and path planning as the robot reaches its target position without any collision during its movement. Further the simulation through V-REP and real-time experimental results are recorded and compared against each corresponding results, and it can be seen that the results have good agreement as the deviation in the results is approximately 5% which is an acceptable range of deviation in motion planning. Both the results such as path length and time taken to reach the target is recorded and shown in respective tables.Originality/valueAfter literature survey, it may be said that most of the approach is implemented on either mathematical convergence or in mobile robot, but real-time experimental authentication is not obtained. With a lack of clear evidence regarding use of MGWO (modified grey wolf optimization) controller for navigation of mobile robots in both the environment, such as in simulation platform and real-time experimental platforms, this work would serve as a guiding link for use of similar approaches in other forms of robots.
目的:在复杂环境中实现移动机器人的平稳自主导航是本文研究的主要目的。其中包括移动机器人的定位和路径规划。这些都是移动机器人在任何工作空间中自主导航的重要方面。移动机器人的导航包括在静态或动态环境中避开障碍物从起点到达目标。针对移动机器人的导航问题,研究人员已经提出了几种技术,但没有人能确定哪种导航路径是最优的。为此,针对轮式移动机器人自主导航的智能技术之一,设计了改进的灰狼优化(GWO)控制器。GWO是一种受自然启发的算法,主要模仿自然界中狼的社会等级和狩猎行为。对其进行了修改,以确定最佳位置并更好地控制机器人。在高度混乱的环境中,通过越过障碍物从源到目标的运动。以Khepera-III机器人为例,采用V-REP仿真软件平台结合实验室实时实验的方法对控制器进行了验证。实验结果表明,该方法在运动控制和路径规划方面非常有效,机器人在运动过程中没有发生碰撞。进一步记录了V-REP仿真结果和实时实验结果,并与各对应结果进行了比较,结果偏差约为5%,在运动规划中可接受的偏差范围内,一致性较好。结果,如路径长度和到达目标所花费的时间都被记录并显示在各自的表中。原创性/价值经过文献调查,可以说大多数方法要么是在数学收敛上实现的,要么是在移动机器人上实现的,但并没有得到实时的实验验证。由于缺乏关于在仿真平台和实时实验平台等环境中使用MGWO(改进灰狼优化)控制器进行移动机器人导航的明确证据,本工作将作为在其他形式的机器人中使用类似方法的指导环节。
{"title":"Navigation of a wheeled mobile robotic agent using modified grey wolf optimization controller","authors":"Chittaranjan Paital, Saroj Kumar, M. Muni, D. Parhi, P. R. Dhal","doi":"10.1108/ijius-06-2020-0023","DOIUrl":"https://doi.org/10.1108/ijius-06-2020-0023","url":null,"abstract":"PurposeSmooth and autonomous navigation of mobile robot in a cluttered environment is the main purpose of proposed technique. That includes localization and path planning of mobile robot. These are important aspects of the mobile robot during autonomous navigation in any workspace. Navigation of mobile robots includes reaching the target from the start point by avoiding obstacles in a static or dynamic environment. Several techniques have already been proposed by the researchers concerning navigational problems of the mobile robot still no one confirms the navigating path is optimal.Design/methodology/approachTherefore, the modified grey wolf optimization (GWO) controller is designed for autonomous navigation, which is one of the intelligent techniques for autonomous navigation of wheeled mobile robot (WMR). GWO is a nature-inspired algorithm, which mainly mimics the social hierarchy and hunting behavior of wolf in nature. It is modified to define the optimal positions and better control over the robot. The motion from the source to target in the highly cluttered environment by negotiating obstacles. The controller is authenticated by the approach of V-REP simulation software platform coupled with real-time experiment in the laboratory by using Khepera-III robot.FindingsDuring experiments, it is observed that the proposed technique is much efficient in motion control and path planning as the robot reaches its target position without any collision during its movement. Further the simulation through V-REP and real-time experimental results are recorded and compared against each corresponding results, and it can be seen that the results have good agreement as the deviation in the results is approximately 5% which is an acceptable range of deviation in motion planning. Both the results such as path length and time taken to reach the target is recorded and shown in respective tables.Originality/valueAfter literature survey, it may be said that most of the approach is implemented on either mathematical convergence or in mobile robot, but real-time experimental authentication is not obtained. With a lack of clear evidence regarding use of MGWO (modified grey wolf optimization) controller for navigation of mobile robots in both the environment, such as in simulation platform and real-time experimental platforms, this work would serve as a guiding link for use of similar approaches in other forms of robots.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48576487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scale to estimate the aspect-oriented sentiment polarity under anaphors influence (SPAI) 回指影响下面向方面的情感极性量表(SPAI)
IF 1 Q4 ROBOTICS Pub Date : 2021-09-27 DOI: 10.1108/ijius-06-2021-0040
S. S. Sonawane, S. Kolhe
PurposeThe purpose of this paper is to handle the anaphors through anaphora resolution in aspect-oriented sentiment analysis. Sentiment analysis is one of the predictive analytics of social media. In particular, the social media platform Twitter is an open platform to post the opinion by subscribers on contextual issues, events, products, individuals and organizations.Design/methodology/approachThe sentiment polarity assessment is not deterministic to conclude the opinion of the target audience unless the polarity is assessed under diversified aspects. Hence, the aspect-oriented sentiment polarity assessment is a crucial objective of the opinion assessment over social media. However, the aspect-oriented sentiment polarity assessment often influences by the curse of anaphora resolution.FindingsFocusing on these limitations, a scale to estimate the aspects oriented sentiment polarity under anaphors influence has been portrayed in this article. To assess the aspect-based sentiment polarity of the tweets, the anaphors of the tweets have been considered to assess the weightage of the tweets toward the sentiment polarity.Originality/valueThe experimental study presents the performance of the proposed model by comparing it with the contemporary models, which are estimating the sentiment polarity tweets under anaphors impact.
目的在面向方面的情感分析中,通过回指消解对回指进行处理。情感分析是社交媒体预测分析的一种。特别是,社交媒体平台Twitter是一个开放的平台,可以发布用户对上下文问题、事件、产品、个人和组织的意见。设计/方法/途径情感极性评估不能确定地得出目标受众的意见,除非从多个方面对极性进行评估。因此,面向方面的情感极性评估是社交媒体意见评估的重要目标。然而,面向方面的情感极性评估往往受到回指消解的诅咒的影响。针对这些局限性,本文描绘了一个量表来估计在隐喻影响下面向情感极性的方面。为了评估推文的基于方面的情绪极性,考虑了推文的类比来评估推文对情绪极性的权重。独创性/价值实验研究通过将所提出的模型与现有模型进行比较,展示了该模型的性能。
{"title":"Scale to estimate the aspect-oriented sentiment polarity under anaphors influence (SPAI)","authors":"S. S. Sonawane, S. Kolhe","doi":"10.1108/ijius-06-2021-0040","DOIUrl":"https://doi.org/10.1108/ijius-06-2021-0040","url":null,"abstract":"PurposeThe purpose of this paper is to handle the anaphors through anaphora resolution in aspect-oriented sentiment analysis. Sentiment analysis is one of the predictive analytics of social media. In particular, the social media platform Twitter is an open platform to post the opinion by subscribers on contextual issues, events, products, individuals and organizations.Design/methodology/approachThe sentiment polarity assessment is not deterministic to conclude the opinion of the target audience unless the polarity is assessed under diversified aspects. Hence, the aspect-oriented sentiment polarity assessment is a crucial objective of the opinion assessment over social media. However, the aspect-oriented sentiment polarity assessment often influences by the curse of anaphora resolution.FindingsFocusing on these limitations, a scale to estimate the aspects oriented sentiment polarity under anaphors influence has been portrayed in this article. To assess the aspect-based sentiment polarity of the tweets, the anaphors of the tweets have been considered to assess the weightage of the tweets toward the sentiment polarity.Originality/valueThe experimental study presents the performance of the proposed model by comparing it with the contemporary models, which are estimating the sentiment polarity tweets under anaphors impact.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41395278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms 面向物联网应用的无线移动自组网网络安全研究综述:网络攻击与检测机制
IF 1 Q4 ROBOTICS Pub Date : 2021-09-21 DOI: 10.1108/ijius-05-2021-0028
Satyanarayana Pamarthi, R. Narmadha
PurposeNowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.Design/methodology/approachThis paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.FindingsIt observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.Originality/valueThis paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.
目的当前,研究人员对MANET及其在各种环境下的性能在实践和理论领域越来越感兴趣。无线传感器网络已经开始通过互联网连接设备的感知能力和传感器节点的互联网接入能力与物联网相结合。通过保持路由器的安全来保护网络免受互联网攻击是至关重要的。设计/方法论/方法本文计划对无线传感器网络(WSN)和移动自组织网络(MANET)中的各种入侵检测和预防系统进行有效的文献综述,这些系统非常适合物联网(IoT)应用中的安全。文献综述侧重于每种贡献中集中的各种类型的攻击,并观察到预防和缓解模型的采用。此外,还分析了所使用的数据集类型、集中的攻击类型、用于实现的工具类型以及在每个贡献中分析的性能度量。最后,试图在总结这篇综述时提出几个未来的研究方向,即为MANET设计和实现IDS,以保护IoT.Findings的安全方面。它观察到了不同的攻击类型,重点关注每一种贡献以及预防和缓解模型的采用。此外,还对所使用的数据集类型、重点攻击类型、用于实现的工具类型和性能度量进行了调查。原创性/价值本文对攻击检测和预防的不同贡献、不同机器学习和深度学习模型的立场进行了文献综述,并分析了所使用的数据集类型、集中的攻击、用于实施的工具以及物联网应用网络安全的性能措施。
{"title":"Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms","authors":"Satyanarayana Pamarthi, R. Narmadha","doi":"10.1108/ijius-05-2021-0028","DOIUrl":"https://doi.org/10.1108/ijius-05-2021-0028","url":null,"abstract":"PurposeNowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.Design/methodology/approachThis paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.FindingsIt observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.Originality/valueThis paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45495636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Distributed cloud resources allocation for fair utilization using multi-objective bin packing algorithm 基于多目标装箱算法的分布式云资源合理分配
IF 1 Q4 ROBOTICS Pub Date : 2021-09-08 DOI: 10.1108/ijius-05-2021-0032
Senthil Kumar Angappan, Tezera Robe, Sisay Muleta, Bekele Worku M
PurposeCloud computing services gained huge attention in recent years and many organizations started moving their business data traditional server to the cloud storage providers. However, increased data storage introduces challenges like inefficient usage of resources in the cloud storage, in order to meet the demands of users and maintain the service level agreement with the clients, the cloud server has to allocate the physical machine to the virtual machines as requested, but the random resource allocations procedures lead to inefficient utilization of resources.Design/methodology/approachThis thesis focuses on resource allocation for reasonable utilization of resources. The overall framework comprises of cloudlets, broker, cloud information system, virtual machines, virtual machine manager, and data center. Existing first fit and best fit algorithms consider the minimization of the number of bins but do not consider leftover bins.FindingsThe proposed algorithm effectively utilizes the resources compared to first, best and worst fit algorithms. The effect of this utilization efficiency can be seen in metrics where central processing unit (CPU), bandwidth (BW), random access memory (RAM) and power consumption outperformed very well than other algorithms by saving 15 kHz of CPU, 92.6kbps of BW, 6GB of RAM and saved 3kW of power compared to first and best fit algorithms.Originality/valueThe proposed multi-objective bin packing algorithm is better for packing VMs on physical servers in order to better utilize different parameters such as memory availability, CPU speed, power and bandwidth availability in the physical machine.
目的云计算服务近年来获得了巨大的关注,许多组织开始将其业务数据的传统服务器转移到云存储提供商。然而,数据存储的增加带来了云存储资源的低效利用等挑战,为了满足用户的需求和维护与客户端的服务水平协议,云服务器必须根据请求将物理机分配给虚拟机,但随机的资源分配过程导致资源的低效利用。设计/方法/方法本文的重点是资源分配,以合理利用资源。整个框架由cloudlets、代理、云信息系统、虚拟机、虚拟机管理器和数据中心组成。现有的首次拟合和最佳拟合算法考虑最小化箱子的数量,但不考虑剩余的箱子。结果与第一拟合算法、最佳拟合算法和最差拟合算法相比,该算法有效地利用了资源。这种利用效率的效果可以从中央处理单元(CPU)、带宽(BW)、随机存取存储器(RAM)和功耗的指标中看到,与第一种和最适合的算法相比,它节省了15 kHz的CPU、92.6kbps的BW、6GB的RAM和3kW的功耗,比其他算法表现得更好。提出的多目标装箱算法更适合在物理服务器上打包vm,以便更好地利用物理机器中的不同参数,如内存可用性、CPU速度、功率和带宽可用性。
{"title":"Distributed cloud resources allocation for fair utilization using multi-objective bin packing algorithm","authors":"Senthil Kumar Angappan, Tezera Robe, Sisay Muleta, Bekele Worku M","doi":"10.1108/ijius-05-2021-0032","DOIUrl":"https://doi.org/10.1108/ijius-05-2021-0032","url":null,"abstract":"PurposeCloud computing services gained huge attention in recent years and many organizations started moving their business data traditional server to the cloud storage providers. However, increased data storage introduces challenges like inefficient usage of resources in the cloud storage, in order to meet the demands of users and maintain the service level agreement with the clients, the cloud server has to allocate the physical machine to the virtual machines as requested, but the random resource allocations procedures lead to inefficient utilization of resources.Design/methodology/approachThis thesis focuses on resource allocation for reasonable utilization of resources. The overall framework comprises of cloudlets, broker, cloud information system, virtual machines, virtual machine manager, and data center. Existing first fit and best fit algorithms consider the minimization of the number of bins but do not consider leftover bins.FindingsThe proposed algorithm effectively utilizes the resources compared to first, best and worst fit algorithms. The effect of this utilization efficiency can be seen in metrics where central processing unit (CPU), bandwidth (BW), random access memory (RAM) and power consumption outperformed very well than other algorithms by saving 15 kHz of CPU, 92.6kbps of BW, 6GB of RAM and saved 3kW of power compared to first and best fit algorithms.Originality/valueThe proposed multi-objective bin packing algorithm is better for packing VMs on physical servers in order to better utilize different parameters such as memory availability, CPU speed, power and bandwidth availability in the physical machine.","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2021-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49015787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Intelligent Unmanned Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1