首页 > 最新文献

Multiagent and Grid Systems最新文献

英文 中文
Lipoprotein detection: Hybrid deep classification model with improved feature set 脂蛋白检测:改进特征集的混合深度分类模型
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-03 DOI: 10.3233/mgs-220329
P. N. Kathavate, J. Amudhavel
Patients with chronic liver diseases typically experience lipid profile problems, and mortality from cirrhosis complicated by portal vein thrombosis (PVT) is very significant. A lipoprotein (Lp) is a bio-chemical assemblage with the main job of moving fat molecules in water that are hydrophobic. Lipoproteins are present in all eubacterial walls. Lipoproteins are of tremendous interest in the study of spirochaetes’ pathogenic mechanisms. Since spirochaete lipobox sequences are more malleable than other bacteria, it’s proven difficult to apply current prediction methods to new sequence data. The major goal is to present a Lipoprotein detection model in which correlation features, enhanced log energy entropy, raw features, and semantic similarity features are extracted. These extracted characteristics are put through a hybrid model that combines a Gated Recurrent Unit (GRU) and a Long Short-Term Memory (LSTM). Then, the outputs of GRU and LSTM are averaged to obtain the output. Here, GRU weights are optimized via the Selfish combined Henry Gas Solubility Optimization with cubic map initialization (SHGSO) model.
慢性肝病患者通常会出现血脂问题,肝硬化并发门静脉血栓(PVT)的死亡率非常高。脂蛋白(Lp)是一种生物化学组合物,其主要工作是在水中移动疏水的脂肪分子。脂蛋白存在于所有真细菌的细胞壁中。脂蛋白在螺旋体致病机制的研究中具有重要意义。由于螺旋体脂盒序列比其他细菌更具延展性,因此很难将现有的预测方法应用于新的序列数据。主要目标是提出一种脂蛋白检测模型,其中提取了相关特征、增强的对数能量熵、原始特征和语义相似特征。这些提取的特征通过门控循环单元(GRU)和长短期记忆(LSTM)相结合的混合模型进行处理。然后,对GRU和LSTM的输出进行平均,得到输出。在这里,GRU的权重是通过自私的Henry气体溶解度优化和立方映射初始化(SHGSO)模型来优化的。
{"title":"Lipoprotein detection: Hybrid deep classification model with improved feature set","authors":"P. N. Kathavate, J. Amudhavel","doi":"10.3233/mgs-220329","DOIUrl":"https://doi.org/10.3233/mgs-220329","url":null,"abstract":"Patients with chronic liver diseases typically experience lipid profile problems, and mortality from cirrhosis complicated by portal vein thrombosis (PVT) is very significant. A lipoprotein (Lp) is a bio-chemical assemblage with the main job of moving fat molecules in water that are hydrophobic. Lipoproteins are present in all eubacterial walls. Lipoproteins are of tremendous interest in the study of spirochaetes’ pathogenic mechanisms. Since spirochaete lipobox sequences are more malleable than other bacteria, it’s proven difficult to apply current prediction methods to new sequence data. The major goal is to present a Lipoprotein detection model in which correlation features, enhanced log energy entropy, raw features, and semantic similarity features are extracted. These extracted characteristics are put through a hybrid model that combines a Gated Recurrent Unit (GRU) and a Long Short-Term Memory (LSTM). Then, the outputs of GRU and LSTM are averaged to obtain the output. Here, GRU weights are optimized via the Selfish combined Henry Gas Solubility Optimization with cubic map initialization (SHGSO) model.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"52 1","pages":"345-363"},"PeriodicalIF":0.7,"publicationDate":"2023-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83794346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Urban building extraction based on information fusion-oriented deep encoder-decoder network in remote sensing imagery 基于信息融合的遥感影像深度编解码器网络的城市建筑提取
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-03 DOI: 10.3233/mgs-220339
Cheng Zhang, Mingzhou Ma, Dan He
The building extraction technology in remote sensing imagery has been a research hotspot. Building extraction in remote sensing imagery plays an important role in land planning, disaster assessment, digital city construction, etc. Although many scholars have explored many methods, it is difficult to realize high-precision automatic extraction due to the problems in high-resolution remote sensing images, such as the same object with different spectrum, the same spectrum with different object, noise shadow and ground object occlusion. Therefore, this paper proposes an urban building extraction based on information fusion-oriented deep encoder-decoder network. First, the deep encoder-decoder network is adopted to extract the shallow semantic features of building objects. Second, a polynomial kernel is used to describe the middle feature map of deep network to improve the identification ability for fuzzy features. Third, the shallow features and high-order features are fused and sent to the end of the encoder-decoder network to obtain the building segmentation results. Finally, we conduct abundant experiments on public data sets, the recall rate, accuracy rate, and F1-Score are greatly improved. The overall F1-score increases by about 4%. Compared with other state-of-the-art building extraction network structures, the proposed network is better to segment the building target from the background.
遥感影像中的建筑物提取技术一直是研究的热点。遥感影像中的建筑物提取在土地规划、灾害评估、数字城市建设等方面具有重要作用。虽然很多学者已经探索了很多方法,但由于高分辨率遥感图像存在同物不同谱、同物不同谱、噪声阴影、地物遮挡等问题,难以实现高精度的自动提取。为此,本文提出了一种基于信息融合的深度编解码器网络的城市建筑提取方法。首先,采用深度编码器-解码器网络提取建筑对象的浅层语义特征;其次,利用多项式核来描述深度网络的中间特征映射,提高对模糊特征的识别能力;第三步,将浅阶特征和高阶特征融合后发送到编码器-解码器网络的末端,得到建筑物分割结果。最后,我们在公共数据集上进行了大量的实验,召回率、准确率和F1-Score都有了很大的提高。f1总分提高了约4%。与现有的建筑物提取网络结构相比,该网络能更好地从背景中分割出建筑物目标。
{"title":"Urban building extraction based on information fusion-oriented deep encoder-decoder network in remote sensing imagery","authors":"Cheng Zhang, Mingzhou Ma, Dan He","doi":"10.3233/mgs-220339","DOIUrl":"https://doi.org/10.3233/mgs-220339","url":null,"abstract":"The building extraction technology in remote sensing imagery has been a research hotspot. Building extraction in remote sensing imagery plays an important role in land planning, disaster assessment, digital city construction, etc. Although many scholars have explored many methods, it is difficult to realize high-precision automatic extraction due to the problems in high-resolution remote sensing images, such as the same object with different spectrum, the same spectrum with different object, noise shadow and ground object occlusion. Therefore, this paper proposes an urban building extraction based on information fusion-oriented deep encoder-decoder network. First, the deep encoder-decoder network is adopted to extract the shallow semantic features of building objects. Second, a polynomial kernel is used to describe the middle feature map of deep network to improve the identification ability for fuzzy features. Third, the shallow features and high-order features are fused and sent to the end of the encoder-decoder network to obtain the building segmentation results. Finally, we conduct abundant experiments on public data sets, the recall rate, accuracy rate, and F1-Score are greatly improved. The overall F1-score increases by about 4%. Compared with other state-of-the-art building extraction network structures, the proposed network is better to segment the building target from the background.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"6 1","pages":"279-294"},"PeriodicalIF":0.7,"publicationDate":"2023-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87979781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi objective task scheduling based on hybrid metaheuristic algorithm for cloud environment 云环境下基于混合元启发式算法的多目标任务调度
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-30 DOI: 10.3233/mgs-220218
P. Neelakantan, N. Yadav
Cloud computing is gaining a huge popularity for on-demand services on a pay-per-use basis. However, single data centre is restricted in offering the services, as it does not have unlimited resource capacity mostly in the peak demand time. Generally, the count of Virtual Machines (VM) is more in public cloud; still, the security is not ensured. In contrast, the VMs are limited in private cloud with high security. So, the consideration of security levels in task scheduling is remains to be more critical for secured processing. This works intends to afford the optimization strategies for optimal task scheduling with multi-objective constraints in cloud environment. Accordingly, the proposed optimal task allocation framework considers the objectives such as execution time, risk probability, and task priority. For this, a new hybrid optimization algorithm known as Clan Updated Seagull Optimization (CUSO) algorithm is introduced in this work, which is the conceptual blending of Elephant Herding Optimization (EHO) and Seagull Optimization Algorithm (SOA). Finally, the performance of proposed work is evaluated over other conventional models with respect to certain performance measures.
云计算在按使用付费的基础上获得了按需服务的巨大普及。然而,单个数据中心在提供服务方面受到限制,因为它没有无限的资源容量,主要是在需求高峰时间。通常,公有云中虚拟机(VM)的数量更多;然而,安全并没有得到保证。而在安全性较高的私有云中,虚拟机数量有限。因此,在任务调度中考虑安全级别对于安全处理来说仍然是非常重要的。本文旨在为云环境下多目标约束下的最优任务调度提供优化策略。因此,所提出的最优任务分配框架考虑了执行时间、风险概率和任务优先级等目标。为此,本文引入了一种新的混合优化算法,即Clan - Updated Seagull optimization (CUSO)算法,该算法是大象放牧优化算法(EHO)和海鸥优化算法(SOA)的概念融合。最后,根据某些绩效指标对拟议工作的绩效进行评估,而不是其他传统模型。
{"title":"Multi objective task scheduling based on hybrid metaheuristic algorithm for cloud environment","authors":"P. Neelakantan, N. Yadav","doi":"10.3233/mgs-220218","DOIUrl":"https://doi.org/10.3233/mgs-220218","url":null,"abstract":"Cloud computing is gaining a huge popularity for on-demand services on a pay-per-use basis. However, single data centre is restricted in offering the services, as it does not have unlimited resource capacity mostly in the peak demand time. Generally, the count of Virtual Machines (VM) is more in public cloud; still, the security is not ensured. In contrast, the VMs are limited in private cloud with high security. So, the consideration of security levels in task scheduling is remains to be more critical for secured processing. This works intends to afford the optimization strategies for optimal task scheduling with multi-objective constraints in cloud environment. Accordingly, the proposed optimal task allocation framework considers the objectives such as execution time, risk probability, and task priority. For this, a new hybrid optimization algorithm known as Clan Updated Seagull Optimization (CUSO) algorithm is introduced in this work, which is the conceptual blending of Elephant Herding Optimization (EHO) and Seagull Optimization Algorithm (SOA). Finally, the performance of proposed work is evaluated over other conventional models with respect to certain performance measures.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"40 1","pages":"149-169"},"PeriodicalIF":0.7,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90453813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on cloud computing scheduling algorithms 云计算调度算法综述
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-30 DOI: 10.3233/mgs-220217
M. Malekimajd, Ali Safarpoor-Dehkordi
Cloud computing has emerged as one of the hottest topics in technology and has quickly become a widely used information and communication technology model. Performance is a critical component in the cloud environment concerning constraints like economic, time, and hardware issues. Various characteristics and conditions for providing solutions and designing strategies must be dealt with in different situations to perform better. For example, task scheduling and resource allocation are significant challenges in cloud management. Adopting proper techniques in such conditions leads to performance improvement. This paper surveys existing scheduling algorithms concerning the macro design idea. We classify these algorithms into four main categories: deterministic algorithms, metaheuristic algorithms, learning algorithms, and algorithms based on game theory. Each category is discussed by citing appropriate studies, and the MapReduce review is addressed as an example.
云计算已成为当今技术领域最热门的话题之一,并迅速成为一种广泛应用的信息通信技术模式。性能是云环境中涉及经济、时间和硬件问题等约束的关键组件。提供解决方案和设计策略的各种特点和条件必须在不同的情况下处理,以便更好地执行。例如,任务调度和资源分配是云管理中的重大挑战。在这种情况下采用适当的技术可以提高性能。本文综述了基于宏设计思想的现有调度算法。我们将这些算法分为四大类:确定性算法、元启发式算法、学习算法和基于博弈论的算法。通过引用适当的研究来讨论每个类别,并以MapReduce评论为例。
{"title":"A survey on cloud computing scheduling algorithms","authors":"M. Malekimajd, Ali Safarpoor-Dehkordi","doi":"10.3233/mgs-220217","DOIUrl":"https://doi.org/10.3233/mgs-220217","url":null,"abstract":"Cloud computing has emerged as one of the hottest topics in technology and has quickly become a widely used information and communication technology model. Performance is a critical component in the cloud environment concerning constraints like economic, time, and hardware issues. Various characteristics and conditions for providing solutions and designing strategies must be dealt with in different situations to perform better. For example, task scheduling and resource allocation are significant challenges in cloud management. Adopting proper techniques in such conditions leads to performance improvement. This paper surveys existing scheduling algorithms concerning the macro design idea. We classify these algorithms into four main categories: deterministic algorithms, metaheuristic algorithms, learning algorithms, and algorithms based on game theory. Each category is discussed by citing appropriate studies, and the MapReduce review is addressed as an example.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"273 1","pages":"119-148"},"PeriodicalIF":0.7,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73083754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges and review of goal-oriented requirements engineering based competitive non-functional requirements analysis 基于竞争性非功能需求分析的目标导向需求工程的挑战和回顾
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-30 DOI: 10.3233/mgs-220231
Sreenithya Sumesh, A. Krishna
Modelling and analysis in software system development can be especially challenging in early requirements engineering (RE), where high-level system non-functional requirements are discovered. In the early stage, hard to measure non-functional requirements are critical; understanding the interactions between systems and stakeholders is key to system success. Goal-oriented requirements engineering (GORE) has been successful in dealing with the issues that may arise during the analysis of requirements. While assisting in the analysis of requirements, i* goal model is the only framework available among the many GORE models, emphasising socio-technical domains such as stakeholders/actors/players, goals/objectives, dependencies and design options/alternatives. Most current approaches to goal-model analysis use quantitative methods or formal information that is hard to gather in early RE, or produce analysis results automatically over models. In real-time competitive applications, the goals of various stakeholders are conflicting in complex systems. Also, each of the system goals have various alternative design options for the systems and optimal selection of goal-oriented requirements faces several challenges in requirements-based engineering. Hence, effective decision-making frameworks are necessary to capture the real issues to achieve multi-objective optimisation of interdependent actors. To obtain an optimum strategy for interdependent actors in the i* goal model must balance the opposing goals reciprocally. To achieve this, the model needs to go beyond the analytical decision-making tools such as sensitivity analysis tasks, cost-effective analysis process, game-theoretic concepts and analytical hierarchical process. To address these requirements, this paper discusses the design of novel frameworks for an agent-based goal model analysis in requirements engineering. The objective of this paper is to provide a brief and comprehensive review of the major efforts undertaken along this line of research. In this paper we have prepared literature review of the concepts, terminology, significance and techniques of Goal oriented requirements engineering in the context of non-functional requirements analysis.
软件系统开发中的建模和分析在早期需求工程(RE)中尤其具有挑战性,在早期需求工程中发现高级系统非功能需求。在早期阶段,难以度量的非功能性需求是至关重要的;理解系统和涉众之间的相互作用是系统成功的关键。面向目标的需求工程(GORE)在处理需求分析过程中可能出现的问题方面已经取得了成功。在协助需求分析的同时,i*目标模型是众多GORE模型中唯一可用的框架,强调社会技术领域,如利益相关者/行动者/参与者、目标/目的、依赖关系和设计选项/替代方案。大多数当前的目标模型分析方法使用定量方法或形式化信息,这在早期的RE中很难收集到,或者在模型上自动产生分析结果。在实时竞争应用中,不同利益相关者的目标在复杂系统中是相互冲突的。此外,每个系统目标都有各种可供选择的系统设计选项,面向目标的需求的最佳选择在基于需求的工程中面临着几个挑战。因此,有效的决策框架是必要的,以捕捉实际问题,实现相互依存的行动者的多目标优化。为了获得i*目标模型中相互依赖的参与者的最佳策略,必须相互平衡对立的目标。要实现这一点,模型需要超越敏感性分析任务、成本效益分析过程、博弈论概念和分析层次过程等分析决策工具。为了满足这些需求,本文讨论了需求工程中基于代理的目标模型分析的新框架的设计。本文的目的是对沿着这条研究路线进行的主要努力提供一个简短而全面的回顾。本文对非功能需求分析背景下面向目标的需求工程的概念、术语、意义和技术进行了文献综述。
{"title":"Challenges and review of goal-oriented requirements engineering based competitive non-functional requirements analysis","authors":"Sreenithya Sumesh, A. Krishna","doi":"10.3233/mgs-220231","DOIUrl":"https://doi.org/10.3233/mgs-220231","url":null,"abstract":"Modelling and analysis in software system development can be especially challenging in early requirements engineering (RE), where high-level system non-functional requirements are discovered. In the early stage, hard to measure non-functional requirements are critical; understanding the interactions between systems and stakeholders is key to system success. Goal-oriented requirements engineering (GORE) has been successful in dealing with the issues that may arise during the analysis of requirements. While assisting in the analysis of requirements, i* goal model is the only framework available among the many GORE models, emphasising socio-technical domains such as stakeholders/actors/players, goals/objectives, dependencies and design options/alternatives. Most current approaches to goal-model analysis use quantitative methods or formal information that is hard to gather in early RE, or produce analysis results automatically over models. In real-time competitive applications, the goals of various stakeholders are conflicting in complex systems. Also, each of the system goals have various alternative design options for the systems and optimal selection of goal-oriented requirements faces several challenges in requirements-based engineering. Hence, effective decision-making frameworks are necessary to capture the real issues to achieve multi-objective optimisation of interdependent actors. To obtain an optimum strategy for interdependent actors in the i* goal model must balance the opposing goals reciprocally. To achieve this, the model needs to go beyond the analytical decision-making tools such as sensitivity analysis tasks, cost-effective analysis process, game-theoretic concepts and analytical hierarchical process. To address these requirements, this paper discusses the design of novel frameworks for an agent-based goal model analysis in requirements engineering. The objective of this paper is to provide a brief and comprehensive review of the major efforts undertaken along this line of research. In this paper we have prepared literature review of the concepts, terminology, significance and techniques of Goal oriented requirements engineering in the context of non-functional requirements analysis.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"231 1","pages":"171-191"},"PeriodicalIF":0.7,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76433090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An approach for data integrity authentication and protection in fog computing 雾计算中数据完整性认证与保护方法
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-30 DOI: 10.3233/mgs-220210
M.N. Babitha, M. Siddappa
The data integrity verification process in cloud has become more promising research area in several Internet of Things (IoT) applications. The traditional data verification approaches use encryption in order to preserve data. Moreover, fog computing is considered as extensively employed virtualized platform and it affords various services including storage as well as services interconnected to computing and networking between user and data center based on standard cloud computing. Moreover, fog computing is an extensive description of cloud computing. Thus, fog servers effectively decrease the latency by integrating fog servers. In this paper, novel model for data integrity authentication and protection is designed in IoT cloud-fog model. This method mainly comprises fog nodes, cloud server, IoT nodes, and key distribution center. Here, dynamic and secure key is produced based on the request to key distribution center based on hashing, Exclusive OR (XOR), homomorphic encryption and polynomial. The fog nodes are employed to encrypt the data gathered from IoT nodes as well as allocate the nearby nodes based on Artificial Bee Colony-based Fuzzy-C-Means (ABC FCM) – based partitioning approach. The proposed data integrity authentication approach in IoT fog cloud system outperformed than other existing methods with respect to detection rate, computational time and memory usage of 0.8541, 34.25 s, and 54.8 MB, respectively.
云环境下的数据完整性验证过程已成为物联网应用中较有前景的研究领域。传统的数据验证方法使用加密来保存数据。雾计算被认为是一种被广泛应用的虚拟化平台,它提供包括存储在内的各种服务,以及基于标准云计算的用户与数据中心之间的计算互联和网络服务。此外,雾计算是云计算的广泛描述。因此,雾服务器通过集成雾服务器有效地减少了延迟。本文在物联网云雾模型中设计了一种新的数据完整性认证与保护模型。该方法主要由雾节点、云服务器、物联网节点和密钥分发中心组成。基于哈希、异或(XOR)、同态加密和多项式,根据对密钥分发中心的请求生成动态安全密钥。雾节点用于对从物联网节点收集的数据进行加密,并基于基于人工蜂群的模糊c均值(ABC FCM)划分方法对附近节点进行分配。本文提出的物联网雾云系统数据完整性认证方法在检测率、计算时间和内存占用方面均优于现有方法,分别为0.8541、34.25 s和54.8 MB。
{"title":"An approach for data integrity authentication and protection in fog computing","authors":"M.N. Babitha, M. Siddappa","doi":"10.3233/mgs-220210","DOIUrl":"https://doi.org/10.3233/mgs-220210","url":null,"abstract":"The data integrity verification process in cloud has become more promising research area in several Internet of Things (IoT) applications. The traditional data verification approaches use encryption in order to preserve data. Moreover, fog computing is considered as extensively employed virtualized platform and it affords various services including storage as well as services interconnected to computing and networking between user and data center based on standard cloud computing. Moreover, fog computing is an extensive description of cloud computing. Thus, fog servers effectively decrease the latency by integrating fog servers. In this paper, novel model for data integrity authentication and protection is designed in IoT cloud-fog model. This method mainly comprises fog nodes, cloud server, IoT nodes, and key distribution center. Here, dynamic and secure key is produced based on the request to key distribution center based on hashing, Exclusive OR (XOR), homomorphic encryption and polynomial. The fog nodes are employed to encrypt the data gathered from IoT nodes as well as allocate the nearby nodes based on Artificial Bee Colony-based Fuzzy-C-Means (ABC FCM) – based partitioning approach. The proposed data integrity authentication approach in IoT fog cloud system outperformed than other existing methods with respect to detection rate, computational time and memory usage of 0.8541, 34.25 s, and 54.8 MB, respectively.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"19 1","pages":"87-105"},"PeriodicalIF":0.7,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79115111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault tolerant data offloading in opportunistic fog enhanced IoT architecture 机会雾增强物联网架构中的容错数据卸载
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-30 DOI: 10.3233/mgs-220211
Parmeet Kaur
Internet of Things (IoT) is characterized by the large volumes of data collection. Since IoT devices are themselves resource-constrained, this data is transferred to cloud-based systems for further processing. This data collected over a period of time possesses high utility as it is useful for multiple analytical, predictive and prescriptive tasks. Therefore, it is crucial that IoT devices transfer the collected data to network gateways before exhausting their storage to prevent loss of data; this issue is referred to as the “data offloading problem”. This paper proposes a technique for fault tolerant offloading of data by IoT devices such that the data collected by them is transferred to the cloud with a minimal loss. The proposed technique employs opportunistic contacts between IoT and mobile fog nodes to provide a fault tolerant enhancement to the IoT architecture. The effectiveness of the proposed method is verified through simulation experiments to assess the reduction in data loss by use of proposed data offloading scheme. It is demonstrated that the method outperforms a state-of-art method.
物联网(IoT)的特点是大量的数据收集。由于物联网设备本身资源有限,因此这些数据被传输到基于云的系统进行进一步处理。在一段时间内收集的数据具有很高的实用性,因为它对多种分析、预测和规定任务很有用。因此,物联网设备在耗尽存储之前将收集到的数据传输到网络网关以防止数据丢失至关重要;这个问题被称为“数据卸载问题”。本文提出了一种由物联网设备进行数据容错卸载的技术,使它们收集的数据以最小的损失传输到云端。所提出的技术利用物联网和移动雾节点之间的机会性接触,为物联网架构提供容错性增强。通过仿真实验验证了所提方法的有效性,评估了采用所提数据卸载方案减少数据丢失的效果。结果表明,该方法优于目前最先进的方法。
{"title":"Fault tolerant data offloading in opportunistic fog enhanced IoT architecture","authors":"Parmeet Kaur","doi":"10.3233/mgs-220211","DOIUrl":"https://doi.org/10.3233/mgs-220211","url":null,"abstract":"Internet of Things (IoT) is characterized by the large volumes of data collection. Since IoT devices are themselves resource-constrained, this data is transferred to cloud-based systems for further processing. This data collected over a period of time possesses high utility as it is useful for multiple analytical, predictive and prescriptive tasks. Therefore, it is crucial that IoT devices transfer the collected data to network gateways before exhausting their storage to prevent loss of data; this issue is referred to as the “data offloading problem”. This paper proposes a technique for fault tolerant offloading of data by IoT devices such that the data collected by them is transferred to the cloud with a minimal loss. The proposed technique employs opportunistic contacts between IoT and mobile fog nodes to provide a fault tolerant enhancement to the IoT architecture. The effectiveness of the proposed method is verified through simulation experiments to assess the reduction in data loss by use of proposed data offloading scheme. It is demonstrated that the method outperforms a state-of-art method.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"13 1","pages":"107-118"},"PeriodicalIF":0.7,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81866023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using default logic for agent behavior testing 使用默认逻辑进行代理行为测试
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-05-23 DOI: 10.3233/mgs-220359
Djamel Douha, A. Mokhtari, Z. Guessoum, Y. M. Berghout
An agent is an autonomous entity that can perform actions to achieve its goals. It acts in a dynamic environment that may engender failures regarding its behavior. Therefore, a formal testing/verification approach of the agent is required to ensure the correctness of its behavior. In this paper, we propose a Default Logic formalism to abstract an agent behavior as knowledge and reasoning rules, and to verify and test the consistency of the behavior. The considered agents are implemented with JADE framework. Also, agent abstraction is translated into Answer Set Programming and solved by Clingo to generate dynamic and adaptive test cases of the agent behavior. The dynamic test cases allow predicting the agent behavior when a new information arises in the system.
代理是一个自主的实体,可以执行操作来实现其目标。它在一个动态的环境中工作,这可能会导致它的行为失败。因此,需要代理的正式测试/验证方法来确保其行为的正确性。在本文中,我们提出了一种默认逻辑形式,将智能体行为抽象为知识和推理规则,并验证和测试行为的一致性。所考虑的代理是用JADE框架实现的。同时,将agent抽象转化为答案集编程,并由Clingo解决,生成agent行为的动态和自适应测试用例。动态测试用例允许在系统中出现新信息时预测代理的行为。
{"title":"Using default logic for agent behavior testing","authors":"Djamel Douha, A. Mokhtari, Z. Guessoum, Y. M. Berghout","doi":"10.3233/mgs-220359","DOIUrl":"https://doi.org/10.3233/mgs-220359","url":null,"abstract":"An agent is an autonomous entity that can perform actions to achieve its goals. It acts in a dynamic environment that may engender failures regarding its behavior. Therefore, a formal testing/verification approach of the agent is required to ensure the correctness of its behavior. In this paper, we propose a Default Logic formalism to abstract an agent behavior as knowledge and reasoning rules, and to verify and test the consistency of the behavior. The considered agents are implemented with JADE framework. Also, agent abstraction is translated into Answer Set Programming and solved by Clingo to generate dynamic and adaptive test cases of the agent behavior. The dynamic test cases allow predicting the agent behavior when a new information arises in the system.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"16 1","pages":"1-20"},"PeriodicalIF":0.7,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80784999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel model to enhance the data security in cloud environment 一种增强云环境下数据安全的新模型
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-05-23 DOI: 10.3233/mgs-220361
G. Verma, Soumen Kanrar
Nowadays cloud computing has given a new paradigm of computing. Despite several benefits of cloud computing there is still a big challenge of ensuring confidentiality and integrity for sensitive information on the cloud. Therefore to address these challenges without loss of any sensitive information and privacy, we present a novel and robust model called ‘Enhanced Cloud Security using Hyper Elliptic Curve and Biometric’ (ECSHB). The model ECSHB ensures the preservation of data security, privacy, and authentication of data in a cloud environment. The proposed approach combines biometric and hyperelliptic curve cryptography (HECC) techniques to elevate the security of data accessing and resource preservations in the cloud. ECSHB provides a high level of security using less processing power, which will automatically reduce the overall cost. The efficacy of the ECSHB has been evaluated in the form of recognition rate, biometric similarity score, False Matching Ratio (FMR), and False NonMatching Ratio (FNMR). ECSHB has been validated using security threat model analysis in terms of confidentiality. The measure of collision attack, replay attack and non-repudiation is also considered in this work. The evidence of results is compared with some existing work, and the results obtained exhibit better performance in terms of data security and privacy in the cloud environment.
如今,云计算提供了一种新的计算范式。尽管云计算有一些好处,但确保云上敏感信息的保密性和完整性仍然是一个巨大的挑战。因此,为了在不损失任何敏感信息和隐私的情况下应对这些挑战,我们提出了一种新颖而强大的模型,称为“使用超椭圆曲线和生物识别技术增强云安全”(ECSHB)。ECSHB模型确保了云环境中数据的安全性、隐私性和身份验证。该方法结合了生物识别技术和超椭圆曲线加密技术(HECC),提高了云数据访问和资源保存的安全性。ECSHB使用更少的处理能力提供了高水平的安全性,这将自动降低总体成本。ECSHB的有效性以识别率、生物特征相似性评分、错误匹配率(FMR)和错误不匹配率(FNMR)的形式进行评估。ECSHB在保密性方面使用安全威胁模型分析进行了验证。同时还考虑了碰撞攻击、重放攻击和不可抵赖性的措施。结果的证据与现有的一些工作进行了比较,得到的结果在云环境下的数据安全和隐私方面表现出更好的性能。
{"title":"A novel model to enhance the data security in cloud environment","authors":"G. Verma, Soumen Kanrar","doi":"10.3233/mgs-220361","DOIUrl":"https://doi.org/10.3233/mgs-220361","url":null,"abstract":"Nowadays cloud computing has given a new paradigm of computing. Despite several benefits of cloud computing there is still a big challenge of ensuring confidentiality and integrity for sensitive information on the cloud. Therefore to address these challenges without loss of any sensitive information and privacy, we present a novel and robust model called ‘Enhanced Cloud Security using Hyper Elliptic Curve and Biometric’ (ECSHB). The model ECSHB ensures the preservation of data security, privacy, and authentication of data in a cloud environment. The proposed approach combines biometric and hyperelliptic curve cryptography (HECC) techniques to elevate the security of data accessing and resource preservations in the cloud. ECSHB provides a high level of security using less processing power, which will automatically reduce the overall cost. The efficacy of the ECSHB has been evaluated in the form of recognition rate, biometric similarity score, False Matching Ratio (FMR), and False NonMatching Ratio (FNMR). ECSHB has been validated using security threat model analysis in terms of confidentiality. The measure of collision attack, replay attack and non-repudiation is also considered in this work. The evidence of results is compared with some existing work, and the results obtained exhibit better performance in terms of data security and privacy in the cloud environment.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"75 1","pages":"45-63"},"PeriodicalIF":0.7,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87381977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-objective secure task scheduling based on SLA in multi-cloud environment 多云环境下基于SLA的多目标安全任务调度
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-05-23 DOI: 10.3233/mgs-220362
P. Jawade, S. Ramachandram
The appliances that are received at a cloud data centre are a compilation of jobs (task) that might be independent or dependent on one another. These tasks are then allocated to diverse virtual machine (VM) in a scheduled way. For this task allocation, various scheduling policies are deployed with the intention of reducing energy utilization and makespan, and increasing cloud resource exploitation as well. A variety of research and studies were done to attain an optimal solution in a single cloud setting, however the similar schemes might not operate on multi-cloud environments. Here, this paper aims to introduce a secured task scheduling model in multi-cloud environment. The developed approach mainly concerns on optimal allocation of tasks via a hybrid optimization theory. Consequently, the developed optimal task allotment considers the objectives like makespan, execution time, security parameters (risk evaluation), utilization cost, maximal service level agreement (SLA) adherence and power usage effectiveness (PUE). For resolving this issue, a novel hybrid algorithm termed as rock hyraxes updated shark smell with logistic mapping (RHU-SLM) is introduced in this work. At last, the superiority of developed approach is proved on varied measures.
在云数据中心接收的设备是作业(任务)的汇编,这些作业(任务)可能是独立的,也可能是相互依赖的。然后将这些任务以调度的方式分配给不同的虚拟机。对于这种任务分配,部署了各种调度策略,目的是减少能源利用率和完工时间,同时增加云资源的利用。为了在单个云设置中获得最佳解决方案,进行了各种研究,但是类似的方案可能无法在多云环境中运行。本文旨在介绍一种多云环境下的安全任务调度模型。该方法主要通过混合优化理论研究任务的最优分配问题。因此,所开发的最优任务分配考虑了完工时间、执行时间、安全参数(风险评估)、使用成本、最大服务水平协议(SLA)依从性和电力使用效率(PUE)等目标。为了解决这一问题,本文提出了一种新的混合算法——岩狸更新鲨鱼气味与逻辑映射(RHU-SLM)。最后,在多种措施上证明了开发方法的优越性。
{"title":"Multi-objective secure task scheduling based on SLA in multi-cloud environment","authors":"P. Jawade, S. Ramachandram","doi":"10.3233/mgs-220362","DOIUrl":"https://doi.org/10.3233/mgs-220362","url":null,"abstract":"The appliances that are received at a cloud data centre are a compilation of jobs (task) that might be independent or dependent on one another. These tasks are then allocated to diverse virtual machine (VM) in a scheduled way. For this task allocation, various scheduling policies are deployed with the intention of reducing energy utilization and makespan, and increasing cloud resource exploitation as well. A variety of research and studies were done to attain an optimal solution in a single cloud setting, however the similar schemes might not operate on multi-cloud environments. Here, this paper aims to introduce a secured task scheduling model in multi-cloud environment. The developed approach mainly concerns on optimal allocation of tasks via a hybrid optimization theory. Consequently, the developed optimal task allotment considers the objectives like makespan, execution time, security parameters (risk evaluation), utilization cost, maximal service level agreement (SLA) adherence and power usage effectiveness (PUE). For resolving this issue, a novel hybrid algorithm termed as rock hyraxes updated shark smell with logistic mapping (RHU-SLM) is introduced in this work. At last, the superiority of developed approach is proved on varied measures.","PeriodicalId":43659,"journal":{"name":"Multiagent and Grid Systems","volume":"56 1","pages":"65-85"},"PeriodicalIF":0.7,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79823617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Multiagent and Grid Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1