首页 > 最新文献

International Journal of Grid and High Performance Computing最新文献

英文 中文
RFA Reinforced Firefly Algorithm to Identify Optimal Feature Subsets for Network IDS 基于RFA增强的萤火虫算法识别网络入侵检测的最优特征子集
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-07-01 DOI: 10.4018/ijghpc.2020070105
Rajakumar Ramalingam, K. Dinesh, A. Dumka, L. Jayakumar
Intrusion detection systems (IDS's) play a vital role in network security to prevent the unauthorized use of data over networks. The feature selection approach is an important paradigm to strengthen IDS systems. In this article, a reinforced firefly-based feature selection model is proposed. This model utilizes the firefly inspired optimizer to select the features and it combines filter-based and wrapper-based approaches to boost the optimizer approach of the significant feature subset. In addition to that, novel classifiers are used to validate the efficiency of the selected subset. The proposed work is tested on the KDD Cup99 data sets which include 41 different features. Experimental results convey that the proposed work outperforms in terms of better detection accuracy, FPR and F-score. Also, it achieves better classification accuracy and less computational complexity compared to other algorithms.
入侵检测系统(IDS)在网络安全中起着至关重要的作用,它可以防止未经授权使用网络上的数据。特征选择方法是加强入侵检测系统的一个重要范例。本文提出了一种基于增强萤火虫的特征选择模型。该模型利用萤火虫启发的优化器来选择特征,并结合基于过滤器和基于包装的方法来增强重要特征子集的优化器方法。除此之外,还使用新的分类器来验证所选子集的效率。在包含41个不同特征的KDD Cup99数据集上对所提出的工作进行了测试。实验结果表明,该方法具有更好的检测精度、FPR和F-score。与其他算法相比,它具有更好的分类精度和更小的计算复杂度。
{"title":"RFA Reinforced Firefly Algorithm to Identify Optimal Feature Subsets for Network IDS","authors":"Rajakumar Ramalingam, K. Dinesh, A. Dumka, L. Jayakumar","doi":"10.4018/ijghpc.2020070105","DOIUrl":"https://doi.org/10.4018/ijghpc.2020070105","url":null,"abstract":"Intrusion detection systems (IDS's) play a vital role in network security to prevent the unauthorized use of data over networks. The feature selection approach is an important paradigm to strengthen IDS systems. In this article, a reinforced firefly-based feature selection model is proposed. This model utilizes the firefly inspired optimizer to select the features and it combines filter-based and wrapper-based approaches to boost the optimizer approach of the significant feature subset. In addition to that, novel classifiers are used to validate the efficiency of the selected subset. The proposed work is tested on the KDD Cup99 data sets which include 41 different features. Experimental results convey that the proposed work outperforms in terms of better detection accuracy, FPR and F-score. Also, it achieves better classification accuracy and less computational complexity compared to other algorithms.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"42 1","pages":"68-87"},"PeriodicalIF":1.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91165961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Technique Based on Enhanced Metaheuristic for Optimization Problem in Internet of Things and Wireless Sensor Network 基于增强元启发式的物联网和无线传感器网络优化问题智能技术
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-07-01 DOI: 10.4018/ijghpc.2020070102
M. Mihoubi, Abdellatif Rahmoun, Meriem Zerkouk, P. Lorenz, Lotfi Baidar
For the last decade, there has been an intensive research development in the area of wireless sensor networks (WSN). This is mainly due to their growing interest in several applications of the Internet of Things (IoT). Several issues are thus discussed such as node localization, a capability that is highly desirable for performance evaluation in monitoring applications. The localization aim is to look for precise geographical positions of sensors. Recently, swarm intelligence techniques are suggested to deal with localization challenge and localization is seen as an optimization problem. In this article, an Enhanced Fruit Fly Optimization Algorithm (EFFOA) is proposed to solve the localization. EFFOA has a strong capacity to calculate the position of the unknown nodes and converges iteratively to the best solution. Distributing and exploiting nodes is a chief challenge to testing the scalability performance. the EFFOA is simulated under variant studies and scenarios. in addition, a comparative experimental study proves that EFFOA outperforms some of the well-known optimization algorithms.
近十年来,无线传感器网络(WSN)领域的研究得到了广泛的发展。这主要是由于他们对物联网(IoT)的几种应用越来越感兴趣。因此讨论了几个问题,例如节点定位,这是监视应用程序中非常需要的性能评估功能。定位的目的是寻找传感器的精确地理位置。近年来,群体智能技术被提出用于解决定位问题,并将定位问题视为一个优化问题。本文提出了一种改进的果蝇优化算法(EFFOA)来解决定位问题。EFFOA具有较强的未知节点位置计算能力,并迭代收敛到最优解。分布和利用节点是测试可伸缩性性能的主要挑战。EFFOA在不同的研究和场景下进行了模拟。此外,对比实验研究表明,EFFOA算法优于一些知名的优化算法。
{"title":"Intelligent Technique Based on Enhanced Metaheuristic for Optimization Problem in Internet of Things and Wireless Sensor Network","authors":"M. Mihoubi, Abdellatif Rahmoun, Meriem Zerkouk, P. Lorenz, Lotfi Baidar","doi":"10.4018/ijghpc.2020070102","DOIUrl":"https://doi.org/10.4018/ijghpc.2020070102","url":null,"abstract":"For the last decade, there has been an intensive research development in the area of wireless sensor networks (WSN). This is mainly due to their growing interest in several applications of the Internet of Things (IoT). Several issues are thus discussed such as node localization, a capability that is highly desirable for performance evaluation in monitoring applications. The localization aim is to look for precise geographical positions of sensors. Recently, swarm intelligence techniques are suggested to deal with localization challenge and localization is seen as an optimization problem. In this article, an Enhanced Fruit Fly Optimization Algorithm (EFFOA) is proposed to solve the localization. EFFOA has a strong capacity to calculate the position of the unknown nodes and converges iteratively to the best solution. Distributing and exploiting nodes is a chief challenge to testing the scalability performance. the EFFOA is simulated under variant studies and scenarios. in addition, a comparative experimental study proves that EFFOA outperforms some of the well-known optimization algorithms.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"138 1","pages":"17-42"},"PeriodicalIF":1.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80100523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Machine Learning Evaluation for Music Genre Classification of Audio Signals 音频信号音乐类型分类的机器学习评价
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-07-01 DOI: 10.4018/ijghpc.2020070104
Chetna Dabas, Aditya Agarwal, Naman Gupta, Vaibhav Jain, S. Pathak
Music genre classification has its own popularity index in the present times. Machine learning can play an important role in the music streaming task. This research article proposes a machine learning based model for the classification of music genre. The evaluation of the proposed model is carried out while considering different music genres as in blues, metal, pop, country, classical, disco, jazz and hip-hop. Different audio features utilized in this study include MFCC (Mel Frequency Spectral Coefficients), Delta, Delta-Delta and temporal aspects for processing the data. The implementation of the proposed model has been done in the Python language. The results of the proposed model reveal an accuracy SVM accuracy of 95%. The proposed algorithm has been compared with existing algorithms and the proposed algorithm performs better than the existing ones in terms of accuracy.
音乐类型分类在当代有自己的流行指数。机器学习可以在音乐流媒体任务中发挥重要作用。本文提出了一种基于机器学习的音乐体裁分类模型。对所提出的模型的评估是在考虑蓝调、金属、流行、乡村、古典、迪斯科、爵士和嘻哈等不同音乐类型的同时进行的。本研究中使用的音频特征包括MFCC (Mel Frequency Spectral Coefficients)、Delta、Delta-Delta和时间方面来处理数据。提出的模型的实现已经在Python语言中完成。结果表明,该模型的SVM准确率达到95%。将所提算法与现有算法进行了比较,发现所提算法在精度上优于现有算法。
{"title":"Machine Learning Evaluation for Music Genre Classification of Audio Signals","authors":"Chetna Dabas, Aditya Agarwal, Naman Gupta, Vaibhav Jain, S. Pathak","doi":"10.4018/ijghpc.2020070104","DOIUrl":"https://doi.org/10.4018/ijghpc.2020070104","url":null,"abstract":"Music genre classification has its own popularity index in the present times. Machine learning can play an important role in the music streaming task. This research article proposes a machine learning based model for the classification of music genre. The evaluation of the proposed model is carried out while considering different music genres as in blues, metal, pop, country, classical, disco, jazz and hip-hop. Different audio features utilized in this study include MFCC (Mel Frequency Spectral Coefficients), Delta, Delta-Delta and temporal aspects for processing the data. The implementation of the proposed model has been done in the Python language. The results of the proposed model reveal an accuracy SVM accuracy of 95%. The proposed algorithm has been compared with existing algorithms and the proposed algorithm performs better than the existing ones in terms of accuracy.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"13 1","pages":"57-67"},"PeriodicalIF":1.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86937628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DUICM Deep Underwater Image Classification Mobdel using Convolutional Neural Networks 基于卷积神经网络的DUICM深水图像分类模型
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-07-01 DOI: 10.4018/ijghpc.2020070106
Manimaran Aridoss, Chandramohan Dhasarathan, A. Dumka, L. Jayakumar
Classification of underwater images is a challenging task due to wavelength-dependent light propagation, absorption, and dispersion distort the visibility of images, which produces low contrast and degraded images in difficult operating environments. Deep learning algorithms are suitable to classify the turbid images, for that softmax activation function used for classification and minimize cross-entropy loss. The proposed deep underwater image classification model (DUICM) uses a convolutional neural network (CNN), a machine learning algorithm, for automatic underwater image classification. It helps to train the image and apply the classification techniques to categorise the turbid images for the selected features from the Benchmark Turbid Image Dataset. The proposed system was trained with several underwater images based on CNN models, which are independent to each sort of underwater image formation. Experimental results show that DUICM provides better classification accuracy against turbid underwater images. The proposed neural network model is validated using turbid images with different characteristics to prove the generalization capabilities.
水下图像的分类是一项具有挑战性的任务,因为波长相关的光传播、吸收和色散会扭曲图像的可见性,从而在困难的操作环境中产生低对比度和退化的图像。深度学习算法适合对浑浊图像进行分类,因为使用了softmax激活函数进行分类,并且最小化了交叉熵损失。本文提出的深海图像分类模型(DUICM)采用卷积神经网络(CNN)这一机器学习算法对水下图像进行自动分类。它有助于训练图像并应用分类技术对从基准浑浊图像数据集中选择的特征进行浑浊图像分类。基于CNN模型的多幅水下图像训练系统,该模型独立于每种水下图像的形成。实验结果表明,DUICM对浑浊水下图像具有较好的分类精度。利用不同特征的浑浊图像验证了所提神经网络模型的泛化能力。
{"title":"DUICM Deep Underwater Image Classification Mobdel using Convolutional Neural Networks","authors":"Manimaran Aridoss, Chandramohan Dhasarathan, A. Dumka, L. Jayakumar","doi":"10.4018/ijghpc.2020070106","DOIUrl":"https://doi.org/10.4018/ijghpc.2020070106","url":null,"abstract":"Classification of underwater images is a challenging task due to wavelength-dependent light propagation, absorption, and dispersion distort the visibility of images, which produces low contrast and degraded images in difficult operating environments. Deep learning algorithms are suitable to classify the turbid images, for that softmax activation function used for classification and minimize cross-entropy loss. The proposed deep underwater image classification model (DUICM) uses a convolutional neural network (CNN), a machine learning algorithm, for automatic underwater image classification. It helps to train the image and apply the classification techniques to categorise the turbid images for the selected features from the Benchmark Turbid Image Dataset. The proposed system was trained with several underwater images based on CNN models, which are independent to each sort of underwater image formation. Experimental results show that DUICM provides better classification accuracy against turbid underwater images. The proposed neural network model is validated using turbid images with different characteristics to prove the generalization capabilities.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"26 1","pages":"88-100"},"PeriodicalIF":1.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82102057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Optimized Classification of Mammograms Based on the Antlion Technique 基于Antlion技术的乳房x线影像优化分类
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-01 DOI: 10.4018/ijghpc.2020040104
A. Negi, Saurabh Sharma
Breast cancer is one of the main health issues for women. This disease can be cured only if detected at early stages. Digital mammography is used to detect the malignant cells at an early stage. This article designs a methodology to detect the malignant tumors. The methodology is comprised of preprocessing feature extraction by Gabor and Law's feature extraction, and feature reduction by ant-lion optimization as well as a classification step using a SVM classifier which is implemented on the live dataset prepared through the Rajindra Hospital Patiala along with MIAS and DDSM datasets. The results of proposed techniques have been compared with three states of art techniques SVM based classification without feature reduction, PSOWNN i.e. PSO based reduction with a neural network as a classifier and binary gray wolf-based feature reduction with SVM classifier. The performance analysis proves the significance of the technique.
乳腺癌是妇女的主要健康问题之一。这种疾病只有在早期发现才能治愈。数字乳房x光检查用于早期发现恶性细胞。本文设计了一种检测恶性肿瘤的方法。该方法包括通过Gabor和Law的特征提取进行预处理特征提取,通过蚁狮优化进行特征约简,以及使用支持向量机分类器的分类步骤,该分类器是在Rajindra医院Patiala以及MIAS和DDSM数据集准备的实时数据集上实现的。所提出的技术的结果已与三种最先进的技术进行了比较,即基于支持向量机的无特征约简的分类,PSOWNN,即基于PSO的约简与神经网络作为分类器和基于二元灰狼的特征约简与支持向量机分类器。性能分析证明了该技术的意义。
{"title":"The Optimized Classification of Mammograms Based on the Antlion Technique","authors":"A. Negi, Saurabh Sharma","doi":"10.4018/ijghpc.2020040104","DOIUrl":"https://doi.org/10.4018/ijghpc.2020040104","url":null,"abstract":"Breast cancer is one of the main health issues for women. This disease can be cured only if detected at early stages. Digital mammography is used to detect the malignant cells at an early stage. This article designs a methodology to detect the malignant tumors. The methodology is comprised of preprocessing feature extraction by Gabor and Law's feature extraction, and feature reduction by ant-lion optimization as well as a classification step using a SVM classifier which is implemented on the live dataset prepared through the Rajindra Hospital Patiala along with MIAS and DDSM datasets. The results of proposed techniques have been compared with three states of art techniques SVM based classification without feature reduction, PSOWNN i.e. PSO based reduction with a neural network as a classifier and binary gray wolf-based feature reduction with SVM classifier. The performance analysis proves the significance of the technique.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"18 1","pages":"64-86"},"PeriodicalIF":1.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78002502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Modelling of an Energy Efficient Algorithm Considering the Temperature Effect on the Lifetime of a Node in a Wireless Network 考虑温度对无线网络节点寿命影响的节能算法建模
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-01 DOI: 10.4018/ijghpc.2020040105
Meenu Vijarania, Vivek Jaglan, B. K. Mishra
In wireless ad-hoc networks the nodes may be placed in a remote area and with no fixed infrastructure. Wireless nodes have limited energy resources which act as a key factor to estimate the node lifetime. Most research is based on the power aware schemes, which takes advantage of the remaining energy of wireless nodes. Existing schemes estimate remaining energy based on only current consumption and voltage, leading to erroneous estimations that result in early power exhaustion of nodes that affects real world deployment, because the residual energy in real batteries is also affected by temperature, charge cycle, aging, self-discharge, and various other factors. A lifetime estimation model examines the battery characteristics to investigate their performance under varying operational conditions more precisely. In this article a lifetime estimation model is proposed, it takes into account the varying environmental temperatures effecting battery performance. An experimental approach is proposed to determine the actual capacity of ad-hoc nodes under varying temperatures.
在无线自组织网络中,节点可以放置在远程区域并且没有固定的基础设施。无线节点具有有限的能量资源,这是估计节点寿命的关键因素。大多数研究都是基于功率感知方案,该方案充分利用了无线节点的剩余能量。现有方案仅根据电流消耗和电压来估计剩余能量,导致错误的估计,导致节点过早耗尽电力,从而影响实际部署,因为实际电池中的剩余能量还受到温度、充电周期、老化、自放电和各种其他因素的影响。寿命估计模型检查电池特性,以更精确地研究其在不同操作条件下的性能。本文提出了一个考虑环境温度变化对电池性能影响的寿命估计模型。提出了一种实验方法来确定在不同温度下ad-hoc节点的实际容量。
{"title":"The Modelling of an Energy Efficient Algorithm Considering the Temperature Effect on the Lifetime of a Node in a Wireless Network","authors":"Meenu Vijarania, Vivek Jaglan, B. K. Mishra","doi":"10.4018/ijghpc.2020040105","DOIUrl":"https://doi.org/10.4018/ijghpc.2020040105","url":null,"abstract":"In wireless ad-hoc networks the nodes may be placed in a remote area and with no fixed infrastructure. Wireless nodes have limited energy resources which act as a key factor to estimate the node lifetime. Most research is based on the power aware schemes, which takes advantage of the remaining energy of wireless nodes. Existing schemes estimate remaining energy based on only current consumption and voltage, leading to erroneous estimations that result in early power exhaustion of nodes that affects real world deployment, because the residual energy in real batteries is also affected by temperature, charge cycle, aging, self-discharge, and various other factors. A lifetime estimation model examines the battery characteristics to investigate their performance under varying operational conditions more precisely. In this article a lifetime estimation model is proposed, it takes into account the varying environmental temperatures effecting battery performance. An experimental approach is proposed to determine the actual capacity of ad-hoc nodes under varying temperatures.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"18 1","pages":"87-101"},"PeriodicalIF":1.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76844846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Backup and Recovery With a Minimum Replica Plan in a Multi-Cloud Environment 多云环境下最小副本备份与恢复
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-01 DOI: 10.4018/ijghpc.2020040106
Mohammad M. Alshammari, A. Alwan, Azlin Nordin, A. Abualkishik
Cloud computing has become a desirable choice to store and share large amounts of data among several users. The two main concerns with cloud storage are data recovery and cost of storage. This article discusses the issue of data recovery in case of a disaster in a multi-cloud environment. This research proposes a preventive approach for data backup and recovery aiming at minimizing the number of replicas and ensuring high data reliability during disasters. This approach named Preventive Disaster Recovery Plan with Minimum Replica (PDRPMR) aims at reducing the number of replications in the cloud without compromising the data reliability. PDRPMR means preventive action checking of the availability of replicas and monitoring of denial of service attacks to maintain data reliability. Several experiments were conducted to evaluate the effectiveness of PDRPMR and the results demonstrated that the storage space used one-third to two-thirds compared to typical 3-replicas replication strategies.
云计算已经成为在多个用户之间存储和共享大量数据的理想选择。云存储的两个主要问题是数据恢复和存储成本。本文讨论了在多云环境中发生灾难时的数据恢复问题。本研究提出一种预防性的数据备份与恢复方法,旨在减少灾难时的副本数量,保证数据的高可靠性。这种名为“最小副本预防性灾难恢复计划”(PDRPMR)的方法旨在减少云中的复制数量,同时不影响数据可靠性。PDRPMR意味着检查副本的可用性和监视拒绝服务攻击的预防措施,以维护数据的可靠性。为了评估PDRPMR的有效性,进行了几个实验,结果表明,与典型的3副本复制策略相比,存储空间使用了三分之一到三分之二。
{"title":"Data Backup and Recovery With a Minimum Replica Plan in a Multi-Cloud Environment","authors":"Mohammad M. Alshammari, A. Alwan, Azlin Nordin, A. Abualkishik","doi":"10.4018/ijghpc.2020040106","DOIUrl":"https://doi.org/10.4018/ijghpc.2020040106","url":null,"abstract":"Cloud computing has become a desirable choice to store and share large amounts of data among several users. The two main concerns with cloud storage are data recovery and cost of storage. This article discusses the issue of data recovery in case of a disaster in a multi-cloud environment. This research proposes a preventive approach for data backup and recovery aiming at minimizing the number of replicas and ensuring high data reliability during disasters. This approach named Preventive Disaster Recovery Plan with Minimum Replica (PDRPMR) aims at reducing the number of replications in the cloud without compromising the data reliability. PDRPMR means preventive action checking of the availability of replicas and monitoring of denial of service attacks to maintain data reliability. Several experiments were conducted to evaluate the effectiveness of PDRPMR and the results demonstrated that the storage space used one-third to two-thirds compared to typical 3-replicas replication strategies.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"183 1","pages":"102-120"},"PeriodicalIF":1.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80457109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Adaptive Service Monitoring System in a Cloud Computing Environment 云计算环境下的自适应业务监控系统
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-01 DOI: 10.4018/ijghpc.2020040103
E. Sathiyamoorthy, P. Karthikeyan
Cloud computing is a trending area of information technology (IT). In a cloud environment, the Cloud service provider (CSP) provides all the functionalities to the users or customers in terms of services. With the rapid development of cloud computing, the performance of any cloud environment relies on the quality of services (QoS) at the time of providing the services. A service level agreement (SLA) increases the confidence of the user or customer to use the cloud services in a cloud environment. There should be negotiation between the CSP and users to achieve a strong SLA. Many existing SLA models are already developed. However, these models do not concentrate to maintain the quality in a long-time duration period. To solve this issue, a novel SLA model has been proposed in this article by using Fuzzy logic. Both the theoretical and simulation results show the proficiency of the proposed scheme over the existing schemes in a cloud computing environment.
云计算是信息技术(IT)的一个趋势领域。在云环境中,云服务提供商(CSP)以服务的形式向用户或客户提供所有功能。随着云计算的快速发展,任何云环境的性能都依赖于提供服务时的服务质量(QoS)。服务水平协议(SLA)提高了用户或客户在云环境中使用云服务的信心。CSP和用户之间应该进行协商,以实现强大的SLA。已经开发了许多现有的SLA模型。然而,这些模型不能集中精力在长时间内保持质量。为了解决这一问题,本文利用模糊逻辑提出了一种新的SLA模型。理论和仿真结果均表明,在云计算环境下,所提方案优于现有方案。
{"title":"An Adaptive Service Monitoring System in a Cloud Computing Environment","authors":"E. Sathiyamoorthy, P. Karthikeyan","doi":"10.4018/ijghpc.2020040103","DOIUrl":"https://doi.org/10.4018/ijghpc.2020040103","url":null,"abstract":"Cloud computing is a trending area of information technology (IT). In a cloud environment, the Cloud service provider (CSP) provides all the functionalities to the users or customers in terms of services. With the rapid development of cloud computing, the performance of any cloud environment relies on the quality of services (QoS) at the time of providing the services. A service level agreement (SLA) increases the confidence of the user or customer to use the cloud services in a cloud environment. There should be negotiation between the CSP and users to achieve a strong SLA. Many existing SLA models are already developed. However, these models do not concentrate to maintain the quality in a long-time duration period. To solve this issue, a novel SLA model has been proposed in this article by using Fuzzy logic. Both the theoretical and simulation results show the proficiency of the proposed scheme over the existing schemes in a cloud computing environment.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"33 1","pages":"47-63"},"PeriodicalIF":1.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77576510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Collaborative Black Hole Attack in IoT Construction Using a CBHA-AODV Routing Protocol 利用CBHA-AODV路由协议防止物联网建设中的协同黑洞攻击
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-04-01 DOI: 10.4018/ijghpc.2020040102
T. Srinivas, S. Manivannan
Workers or labors who are working in construction sites are prone to severe risks such as death, injuries happened due to accidents, falls and stuck in between objects. Internet of things (IoT) based sensors can be utilized to monitor the behavior of workers when they are in danger zones/areas. To safeguard site workers, supervisors or site managers should monitor and alert them when they are in danger. Data will be routed from site worker to supervisor, during this routing process data is subjected to routing attacks such as black hole attack and so on, due to wireless transmission. This article addresses the problem of black hole attack that happens during the wireless transmission between nodes and the base station (BS) of IoT-based civil construction. The proposed solution Collaborative Black Hole Attack – Ad Hoc On-Demand Distance Vector routing protocol (CBHA-AODV) prevents the collaborative black hole attack by 87.72%.
在建筑工地工作的工人或劳工容易发生严重的危险,如死亡、意外受伤、坠落和卡在物体之间。基于物联网(IoT)的传感器可用于监控工人在危险区域/区域的行为。为了保障现场工人的安全,监工或现场管理人员应在他们遇到危险时进行监视和提醒。数据将从现场工作人员路由到主管,在此路由过程中,由于无线传输,数据会受到黑洞攻击等路由攻击。本文针对物联网民用建设中节点与基站之间无线传输过程中出现的黑洞攻击问题进行了研究。提出的协同黑洞攻击解决方案-自组织按需距离矢量路由协议(CBHA-AODV)可防止87.72%的协同黑洞攻击。
{"title":"Preventing Collaborative Black Hole Attack in IoT Construction Using a CBHA-AODV Routing Protocol","authors":"T. Srinivas, S. Manivannan","doi":"10.4018/ijghpc.2020040102","DOIUrl":"https://doi.org/10.4018/ijghpc.2020040102","url":null,"abstract":"Workers or labors who are working in construction sites are prone to severe risks such as death, injuries happened due to accidents, falls and stuck in between objects. Internet of things (IoT) based sensors can be utilized to monitor the behavior of workers when they are in danger zones/areas. To safeguard site workers, supervisors or site managers should monitor and alert them when they are in danger. Data will be routed from site worker to supervisor, during this routing process data is subjected to routing attacks such as black hole attack and so on, due to wireless transmission. This article addresses the problem of black hole attack that happens during the wireless transmission between nodes and the base station (BS) of IoT-based civil construction. The proposed solution Collaborative Black Hole Attack – Ad Hoc On-Demand Distance Vector routing protocol (CBHA-AODV) prevents the collaborative black hole attack by 87.72%.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"1 1","pages":"25-46"},"PeriodicalIF":1.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91187114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Secure and Privacy-Preserving Approach to Protect User Data across Cloud based Online Social Networks 在基于云的在线社交网络中保护用户数据的安全和隐私保护方法
IF 1 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-02-21 DOI: 10.4018/IJGHPC.2020040101
Neelu Khare, Xia Xie, Jin Huang, Song Wu, Hai Jin, Melvin Koh, Jie Song, Shanshan Yu, Jindian Su, Pengfei Li
The tremendous growth of social networking systems enables the active participation of a wide variety of users. This has led to an increased probability of security and privacy concerns. In order to solve the issue, the article defines a secure and privacy-preserving approach to protect user data across Cloud-based online social networks. The proposed approach models social networks as a directed graph, such that a user can share sensitive information with other users only if there exists a directed edge from one user to another. The connectivity between data users data is efficiently shared using an attribute-based encryption (ABE) with different data access levels. The proposed ABE technique makes use of a trapdoor function to re-encrypt the data without the use of proxy re-encryption techniques. Experimental evaluation states that the proposed approach provides comparatively better results than the existing techniques.
社会网络系统的巨大增长使各种各样的用户能够积极参与。这增加了人们对安全和隐私问题的担忧。为了解决这个问题,本文定义了一种安全且保护隐私的方法来保护基于云的在线社交网络中的用户数据。提出的方法将社交网络建模为一个有向图,这样一个用户只有在从一个用户到另一个用户之间存在有向边时才能与其他用户共享敏感信息。数据用户之间的连接使用基于属性的加密(ABE)有效地共享不同数据访问级别的数据。提出的ABE技术利用trapdoor函数对数据进行重加密,而不使用代理重加密技术。实验评价表明,该方法比现有的技术提供了相对更好的结果。
{"title":"A Secure and Privacy-Preserving Approach to Protect User Data across Cloud based Online Social Networks","authors":"Neelu Khare, Xia Xie, Jin Huang, Song Wu, Hai Jin, Melvin Koh, Jie Song, Shanshan Yu, Jindian Su, Pengfei Li","doi":"10.4018/IJGHPC.2020040101","DOIUrl":"https://doi.org/10.4018/IJGHPC.2020040101","url":null,"abstract":"The tremendous growth of social networking systems enables the active participation of a wide variety of users. This has led to an increased probability of security and privacy concerns. In order to solve the issue, the article defines a secure and privacy-preserving approach to protect user data across Cloud-based online social networks. The proposed approach models social networks as a directed graph, such that a user can share sensitive information with other users only if there exists a directed edge from one user to another. The connectivity between data users data is efficiently shared using an attribute-based encryption (ABE) with different data access levels. The proposed ABE technique makes use of a trapdoor function to re-encrypt the data without the use of proxy re-encryption techniques. Experimental evaluation states that the proposed approach provides comparatively better results than the existing techniques.","PeriodicalId":43565,"journal":{"name":"International Journal of Grid and High Performance Computing","volume":"1 1","pages":"1-24"},"PeriodicalIF":1.0,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77596728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Grid and High Performance Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1