首页 > 最新文献

Journal of High Speed Networks最新文献

英文 中文
Multitier scalable clustering wireless network design approach using honey bee ratel optimization 利用蜜蜂速率优化的多层可扩展集群无线网络设计方法
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-02 DOI: 10.3233/jhs-230086
Amruta Amune, Himangi Pande
Wireless sensor networks (WSNs) have emerged as a one of the most fascinating areas of lookup in the past few years principally due to its massive quantity of workable applications. However limited energy, node deployment strategy, routing techniques has considerable impact on the overall performance of network. This paper proposes sustainable honey bee ratel based hybrid wireless sensor network (SHHWSN) layering framework for improving load balancing and scalability issues in network. In SHHWSN tessellated hexagonal shape clusters are formed to cover entire geographical region without any gaps. Hybrid routing schema constrained with redundant data identification policy used in this, seeks to optimize energy utilization. The proposed SHHWSN was evaluated and validated by simulation, and the results were compared with earlier schematics where mostly one sided stochastic node deployments were followed. The experimental results show that SHHWSN has superior performance in terms of network alive nodes, delay, energy and throughput. The proposed SHHWSN obtained values of 50 nodes is 3, 0.061, 0.14, 0.89, 100 nodes is 3,0.037, 0.19, 0.551, 150 nodes is 13, 0.081, 0.23, 0.415, and 200 nodes is 23, 1.01, 0.25, 0.356, which is significantly more effective than current techniques.
在过去几年里,无线传感器网络(WSN)已成为最吸引人的研究领域之一,这主要归功于其大量可行的应用。然而,有限的能量、节点部署策略和路由技术对网络的整体性能有相当大的影响。本文提出了基于可持续蜜蜂鼠的混合无线传感器网络(SHHWSN)分层框架,以改善网络中的负载平衡和可扩展性问题。在 SHHWSN 中,棋盘格状的六边形簇群可以无间隙地覆盖整个地理区域。其中使用的混合路由模式受冗余数据识别策略的限制,旨在优化能源利用率。通过仿真对所提出的 SHHWSN 进行了评估和验证,并将结果与早期的方案进行了比较,早期的方案大多采用单边随机节点部署。实验结果表明,SHHWSN 在网络存活节点数、延迟、能量和吞吐量方面都有优异表现。所提出的 SHHWSN 在 50 个节点上获得的值分别为 3、0.061、0.14、0.89,100 个节点上获得的值分别为 3、0.037、0.19、0.551,150 个节点上获得的值分别为 13、0.081、0.23、0.415,200 个节点上获得的值分别为 23、1.01、0.25、0.356,明显比现有技术更有效。
{"title":"Multitier scalable clustering wireless network design approach using honey bee ratel optimization","authors":"Amruta Amune, Himangi Pande","doi":"10.3233/jhs-230086","DOIUrl":"https://doi.org/10.3233/jhs-230086","url":null,"abstract":"Wireless sensor networks (WSNs) have emerged as a one of the most fascinating areas of lookup in the past few years principally due to its massive quantity of workable applications. However limited energy, node deployment strategy, routing techniques has considerable impact on the overall performance of network. This paper proposes sustainable honey bee ratel based hybrid wireless sensor network (SHHWSN) layering framework for improving load balancing and scalability issues in network. In SHHWSN tessellated hexagonal shape clusters are formed to cover entire geographical region without any gaps. Hybrid routing schema constrained with redundant data identification policy used in this, seeks to optimize energy utilization. The proposed SHHWSN was evaluated and validated by simulation, and the results were compared with earlier schematics where mostly one sided stochastic node deployments were followed. The experimental results show that SHHWSN has superior performance in terms of network alive nodes, delay, energy and throughput. The proposed SHHWSN obtained values of 50 nodes is 3, 0.061, 0.14, 0.89, 100 nodes is 3,0.037, 0.19, 0.551, 150 nodes is 13, 0.081, 0.23, 0.415, and 200 nodes is 23, 1.01, 0.25, 0.356, which is significantly more effective than current techniques.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"34 7","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139389733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmit antenna selection in M-MIMO system using metaheuristic aided model 利用元启发式辅助模型在 M-MIMO 系统中选择发射天线
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-02 DOI: 10.3233/jhs-230087
Charanjeet Singh, Pawan Kumar Singh
Massive MIMO (M-MIMO) devices are the key tool to meet the performance stards established for 5G-wireless communication. However, more Radio Frequency (RF) chains needed in base station (BS) with a huge count of transmitting antennas, involve expensive hardware and computing complexities. In order to decrease the RF chains needed in BS, this work intended to use the optimal transmit antenna selection (TAS) strategy. This strategy is gaining a lot of interest since the optimization algorithm aids in the ability to enhance the system performance considerably the efficiency and secrecy rate. This work proposes a novel Coati Adopted Pelican Optimization (CA-PO) for choosing the optimal TA by considering efficiency as well as secrecy rate. In addition, the CA-PO algorithm makes the decision on which antenna to be elected. At last, the supremacy of CA-PO-based TAS is proven from the analysis regarding secrecy rate and EE analysis. Accordingly, the proposed CA-PO method for MF for set up 2 has attained a higher EE of 0.976; whereas, the DMOA, COA, MRFO, POA and BEA techniques have got a relatively lower EE of 0.968.
大规模多输入多输出(M-MIMO)设备是满足 5G 无线通信性能标准的关键工具。然而,基站(BS)需要更多的射频(RF)链,发射天线数量庞大,涉及昂贵的硬件和复杂的计算。为了减少基站所需的射频链,这项工作打算采用最佳发射天线选择(TAS)策略。由于优化算法能显著提高系统性能的效率和保密率,因此该策略受到广泛关注。本研究提出了一种新颖的鹈鹕优化算法(Coati Adopted Pelican Optimization,CA-PO),通过考虑效率和保密率来选择最佳发射天线。此外,CA-PO 算法还能决定选择哪种天线。最后,通过对保密率和 EE 的分析,证明了基于 CA-PO 的 TAS 的优越性。因此,针对设置 2 的中频提出的 CA-PO 方法获得了 0.976 的较高 EE;而 DMOA、COA、MRFO、POA 和 BEA 技术获得了 0.968 的较低 EE。
{"title":"Transmit antenna selection in M-MIMO system using metaheuristic aided model","authors":"Charanjeet Singh, Pawan Kumar Singh","doi":"10.3233/jhs-230087","DOIUrl":"https://doi.org/10.3233/jhs-230087","url":null,"abstract":"Massive MIMO (M-MIMO) devices are the key tool to meet the performance stards established for 5G-wireless communication. However, more Radio Frequency (RF) chains needed in base station (BS) with a huge count of transmitting antennas, involve expensive hardware and computing complexities. In order to decrease the RF chains needed in BS, this work intended to use the optimal transmit antenna selection (TAS) strategy. This strategy is gaining a lot of interest since the optimization algorithm aids in the ability to enhance the system performance considerably the efficiency and secrecy rate. This work proposes a novel Coati Adopted Pelican Optimization (CA-PO) for choosing the optimal TA by considering efficiency as well as secrecy rate. In addition, the CA-PO algorithm makes the decision on which antenna to be elected. At last, the supremacy of CA-PO-based TAS is proven from the analysis regarding secrecy rate and EE analysis. Accordingly, the proposed CA-PO method for MF for set up 2 has attained a higher EE of 0.976; whereas, the DMOA, COA, MRFO, POA and BEA techniques have got a relatively lower EE of 0.968.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"54 26","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139390006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison study of two implemented fuzzy-based models for decision of logical trust 两种基于模糊模型的逻辑信任决策比较研究
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-22 DOI: 10.3233/jhs-230189
Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, L. Barolli
In recent years, the human-to-human and human-to-things relationships are becoming complicated and unreliable, which makes harder decisions in a variety of situations. As a result, trust computing is gaining interest in a number of research fields. The Logical Trust (LT) is one of trust computing concepts. In this paper, we design a Fuzzy-based System for Decision of Logical Trust (FSDLT). We implement two models: FSDLTM1 and FSDLTM2. The FSDLTM1 considers three input parameters: Belief (Be), Experience (Ep), Rationality (Ra) and the output parameter is LT. In FSDLTM2, we consider Reliability (Re) as a new parameter. We evaluated the implemented models by computer simulations. The simulation results show that when Be, Ep, Ra and Re are increasing, the LT is increased. For FSDLTM1, when Ep value is 0.9, all LT values are greater than 0.5. While for FSDLTM2, in case when Be is 0.9, for all values of Ra and Re, when Ep is 0.5 and 0.9, all LT values are higher than 0.5. This shows that the person or device is trustworthy. The FSDLTM2 is more complex than FSALTM1 but it makes a better decision for LT by considering four input parameters.
近年来,人与人之间、人与物之间的关系变得越来越复杂和不可靠,这使得在各种情况下做出决策变得更加困难。因此,信任计算越来越受到一些研究领域的关注。逻辑信任(LT)是信任计算概念之一。在本文中,我们设计了一个基于模糊的逻辑信任决策系统(FSDLT)。我们实现了两个模型:FSDLTM1 和 FSDLTM2。FSDLTM1 考虑了三个输入参数:信念(Be)、经验(Ep)和理性(Ra),输出参数为 LT。在 FSDLTM2 中,我们将可靠性 (Re) 作为一个新参数。我们通过计算机模拟对所实施的模型进行了评估。模拟结果表明,当 Be、Ep、Ra 和 Re 增加时,LT 也随之增加。对于 FSDLTM1,当 Ep 值为 0.9 时,所有 LT 值都大于 0.5。而对于 FSDLTM2,当 Be 值为 0.9 时,对于所有 Ra 值和 Re 值,当 Ep 值为 0.5 和 0.9 时,所有 LT 值都大于 0.5。这表明个人或设备是可信的。FSDLTM2 比 FSALTM1 更为复杂,但它通过考虑四个输入参数对 LT 做出了更好的决策。
{"title":"A comparison study of two implemented fuzzy-based models for decision of logical trust","authors":"Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, L. Barolli","doi":"10.3233/jhs-230189","DOIUrl":"https://doi.org/10.3233/jhs-230189","url":null,"abstract":"In recent years, the human-to-human and human-to-things relationships are becoming complicated and unreliable, which makes harder decisions in a variety of situations. As a result, trust computing is gaining interest in a number of research fields. The Logical Trust (LT) is one of trust computing concepts. In this paper, we design a Fuzzy-based System for Decision of Logical Trust (FSDLT). We implement two models: FSDLTM1 and FSDLTM2. The FSDLTM1 considers three input parameters: Belief (Be), Experience (Ep), Rationality (Ra) and the output parameter is LT. In FSDLTM2, we consider Reliability (Re) as a new parameter. We evaluated the implemented models by computer simulations. The simulation results show that when Be, Ep, Ra and Re are increasing, the LT is increased. For FSDLTM1, when Ep value is 0.9, all LT values are greater than 0.5. While for FSDLTM2, in case when Be is 0.9, for all values of Ra and Re, when Ep is 0.5 and 0.9, all LT values are higher than 0.5. This shows that the person or device is trustworthy. The FSDLTM2 is more complex than FSALTM1 but it makes a better decision for LT by considering four input parameters.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"69 9","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139164107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on fault detection and remote monitoring system of variable speed constant frequency wind turbine based on Internet of things 基于物联网的变速恒频风力发电机故障检测与远程监控系统研究
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-01 DOI: 10.3233/jhs-222009
Qiuyu Lu, Haibo Li, Jianping Zheng, Jianru Qin, Yinguo Yang, Li Li, Ke Jiang
In order to study the operating characteristics of variable speed constant frequency wind turbine under different working conditions and the monitoring system of wind turbine. In this paper, the simulation model of each component system of wind turbine is established by MATLAB/Simulink module, and the influence law of different wind speed and ground fault types on the output power of wind turbine is studied. The active power of wind turbines under different short-circuit fault types is compared. At the same time, in order to realize real-time monitoring of wind turbine speed and output power, an online monitoring system for wind turbine operation based on industrial Internet of Things is proposed, and the composition and operation characteristics of this remote monitoring system are given. The practical application shows that the on-line monitoring system can accurately and remotely monitor the running status of the wind turbine and avoid the unstable running of the wind turbine. The research conclusions of this paper can provide reference for the design and construction of wind turbines and the operation of connecting to the power grid.
为了研究变速恒频风力发电机组在不同工况下的运行特性以及风力发电机组的监测系统。本文利用MATLAB/Simulink模块建立了风力机各部件系统的仿真模型,研究了不同风速和接地故障类型对风力机输出功率的影响规律。比较了不同短路故障类型下风力发电机组的有功功率。同时,为了实现对风电机组转速和输出功率的实时监测,提出了一种基于工业物联网的风电机组运行在线监测系统,并给出了该远程监测系统的组成和运行特点。实际应用表明,该在线监测系统能够准确、远程地监测风力发电机组的运行状态,避免了风力发电机组的不稳定运行。本文的研究结论可为风电机组的设计、施工及并网运行提供参考。
{"title":"Research on fault detection and remote monitoring system of variable speed constant frequency wind turbine based on Internet of things","authors":"Qiuyu Lu, Haibo Li, Jianping Zheng, Jianru Qin, Yinguo Yang, Li Li, Ke Jiang","doi":"10.3233/jhs-222009","DOIUrl":"https://doi.org/10.3233/jhs-222009","url":null,"abstract":"In order to study the operating characteristics of variable speed constant frequency wind turbine under different working conditions and the monitoring system of wind turbine. In this paper, the simulation model of each component system of wind turbine is established by MATLAB/Simulink module, and the influence law of different wind speed and ground fault types on the output power of wind turbine is studied. The active power of wind turbines under different short-circuit fault types is compared. At the same time, in order to realize real-time monitoring of wind turbine speed and output power, an online monitoring system for wind turbine operation based on industrial Internet of Things is proposed, and the composition and operation characteristics of this remote monitoring system are given. The practical application shows that the on-line monitoring system can accurately and remotely monitor the running status of the wind turbine and avoid the unstable running of the wind turbine. The research conclusions of this paper can provide reference for the design and construction of wind turbines and the operation of connecting to the power grid.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"101 14","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138607834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient dynamic IP datacasting mobility management based on LRS in mobile IP networks 移动 IP 网络中基于 LRS 的高效动态 IP 数据传送移动性管理
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-29 DOI: 10.3233/jhs-222035
SangYeob Oh, ChulHo Park
IP mobility support is based on terminal behavior, recognizing mobility and maintaining a continuous communication session. The existing mobile IP location registration sends a message to one or more routers during a handoff within a domain by using a multicast address to process messages continuously. This implementation requires persistent message processing among all routers to determine new multicast address assignments. To solve this problem, we propose a method that enables the mobile user to obtain a QoS guarantee when the mobile device moves to an overlapping area under the mobile IP. Therefore, dynamic mobility management includes location updates under the mobile IP, and transmission of packets from the expected access points. When a handoff occurs while the mobile device is connected, the mobile host dynamically adapts to the mobility characteristics of the mobile node and transmits missed packets. In addition, by first using a location router, handoff latency reduction and packet loss requirements between domains in the overlapping mobile network environment are resolved. Second, the proposed algorithm has low-control traffic in the mobile network, allowing quick handoffs. Although instantaneous throughput is reduced during handoffs, tunneling is reduced by 10-30%, even after a handoff, by retransmitting packets missed by the mobile host, while location-registration-update times are reduced by 20-80%.
IP 移动性支持以终端行为为基础,识别移动性并保持连续的通信会话。现有的移动 IP 位置注册通过使用多播地址持续处理信息,在域内切换时向一个或多个路由器发送信息。这种实现方式需要在所有路由器之间持续处理信息,以确定新的组播地址分配。为了解决这个问题,我们提出了一种方法,当移动设备移动到移动 IP 下的重叠区域时,移动用户可以获得 QoS 保证。因此,动态移动管理包括移动 IP 下的位置更新,以及从预期接入点传输数据包。当移动设备连接时发生切换,移动主机会动态适应移动节点的移动特性,并传输遗漏数据包。此外,通过首先使用定位路由器,可以解决重叠移动网络环境中域之间的切换延迟降低和数据包丢失要求。其次,建议的算法在移动网络中的控制流量较低,允许快速切换。虽然在切换期间瞬时吞吐量会减少,但通过重传移动主机错过的数据包,即使在切换后,隧道传输也会减少 10-30%,而位置注册更新时间则会减少 20-80%。
{"title":"Efficient dynamic IP datacasting mobility management based on LRS in mobile IP networks","authors":"SangYeob Oh, ChulHo Park","doi":"10.3233/jhs-222035","DOIUrl":"https://doi.org/10.3233/jhs-222035","url":null,"abstract":"IP mobility support is based on terminal behavior, recognizing mobility and maintaining a continuous communication session. The existing mobile IP location registration sends a message to one or more routers during a handoff within a domain by using a multicast address to process messages continuously. This implementation requires persistent message processing among all routers to determine new multicast address assignments. To solve this problem, we propose a method that enables the mobile user to obtain a QoS guarantee when the mobile device moves to an overlapping area under the mobile IP. Therefore, dynamic mobility management includes location updates under the mobile IP, and transmission of packets from the expected access points. When a handoff occurs while the mobile device is connected, the mobile host dynamically adapts to the mobility characteristics of the mobile node and transmits missed packets. In addition, by first using a location router, handoff latency reduction and packet loss requirements between domains in the overlapping mobile network environment are resolved. Second, the proposed algorithm has low-control traffic in the mobile network, allowing quick handoffs. Although instantaneous throughput is reduced during handoffs, tunneling is reduced by 10-30%, even after a handoff, by retransmitting packets missed by the mobile host, while location-registration-update times are reduced by 20-80%.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"76 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139212700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained load balancing with proactive prediction and adaptive rerouting in data center 数据中心中具有主动预测和自适应重路由的细粒度负载平衡
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-10 DOI: 10.3233/jhs-230003
Weimin Gao, Jiaming Zhong, Caihong Peng, Xinlong Li, Xiangbai Liao
Though the existing load balancing designs successfully make full use of available parallel paths and attain high bisection network bandwidth, they reroute flows regardless of their dissimilar performance requirements. But traffic in modern data center networks exhibits short bursts characteristic, which can easily lead to network congestion. The short flows suffer from the problems of large queuing delay and packet reordering, while the long flows fail to obtain high throughput due to low link utilization and packet reordering. In order to solve these inefficiency, we designed a fine-grained load balancing method (FLB), which uses an active monitoring mechanism to split traffic, and flexibly transfers flowlet to non-congested path, effectively reducing the negative impact of burst flow on network performance. Besides, to avoid packet reordering, FLB leverages the probe packets to estimate the end-to-end delay, thus excluding paths that potentially cause packet reordering. The test results of NS2 simulation show that FLB significantly reduces the average and tail flow completion time of flows by up to 59% and 56% compared to the state-of-the-art multi-path transmission scheme with less computational overhead, as well as increases the throughput of long flow.
虽然现有的负载均衡设计成功地充分利用了可用的并行路径并获得了较高的平分网络带宽,但它们不考虑不同的性能要求而重新路由流。但现代数据中心网络的流量呈现出短突发的特点,容易导致网络拥塞。短流存在排队延迟大、数据包重排序等问题,长流存在链路利用率低、数据包重排序等问题,无法获得高吞吐量。为了解决这些低效率问题,我们设计了一种细粒度负载均衡方法(FLB),该方法利用主动监控机制对流量进行分流,并将流量灵活地转移到非拥塞路径上,有效降低突发流量对网络性能的负面影响。此外,为了避免数据包重排序,FLB利用探测数据包来估计端到端延迟,从而排除可能导致数据包重排序的路径。NS2仿真的测试结果表明,与目前最先进的多路径传输方案相比,FLB在计算开销更小的情况下显著减少了流的平均完成时间和尾流完成时间,分别减少了59%和56%,并提高了长流的吞吐量。
{"title":"Fine-grained load balancing with proactive prediction and adaptive rerouting in data center","authors":"Weimin Gao, Jiaming Zhong, Caihong Peng, Xinlong Li, Xiangbai Liao","doi":"10.3233/jhs-230003","DOIUrl":"https://doi.org/10.3233/jhs-230003","url":null,"abstract":"Though the existing load balancing designs successfully make full use of available parallel paths and attain high bisection network bandwidth, they reroute flows regardless of their dissimilar performance requirements. But traffic in modern data center networks exhibits short bursts characteristic, which can easily lead to network congestion. The short flows suffer from the problems of large queuing delay and packet reordering, while the long flows fail to obtain high throughput due to low link utilization and packet reordering. In order to solve these inefficiency, we designed a fine-grained load balancing method (FLB), which uses an active monitoring mechanism to split traffic, and flexibly transfers flowlet to non-congested path, effectively reducing the negative impact of burst flow on network performance. Besides, to avoid packet reordering, FLB leverages the probe packets to estimate the end-to-end delay, thus excluding paths that potentially cause packet reordering. The test results of NS2 simulation show that FLB significantly reduces the average and tail flow completion time of flows by up to 59% and 56% compared to the state-of-the-art multi-path transmission scheme with less computational overhead, as well as increases the throughput of long flow.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"120 49","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security 使用黑猩猩优化算法优化的训练深度量子神经网络进行物联网设备类型识别,以增强物联网安全性
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-03 DOI: 10.3233/jhs-230028
C.P. Shirley, Jaydip Kumar, Kantilal Pitambar Rane, Narendra Kumar, Deevi Radha Rani, Kuntamukkula Harshitha, Mohit Tiwari
IoT networks can be defined as groups of physically connected things and devices that can connect to the Internet and exchange data with one another. Since enabling an increasing number of internets of things devices to connect with their networks, organizations have become more vulnerable to safety issues and attacks. A major drawback of previous research is that it can find out prior seen types only, also any new device types are considered anomalous. In this manuscript, IoT device type detection utilizing Training deep quantum neural networks optimized with a Chimp optimization algorithm for enhancing IOT security (IOT-DTI-TDQNN-COA-ES) is proposed. The proposed method entails three phases namely data collection, feature extraction and detection. For Data collection phase, real network traffic dataset from different IoT device types are collected. For feature mining phase, the internet traffic features are extracted through automated building extraction (ABE) method. IoT device type identification phase, Training deep quantum neural networks (TDQNN) optimized with Chimp optimization algorithm (COA) is utilized to detect the category of IoT devices as known and unknown device. IoT network is implemented in Python. Then the simulation performance of the proposed IOT-DTI-TDQNN-COA-ES method attains higher accuracy as26.82% and 23.48% respectively, when compared with the existing methods.
物联网网络可以被定义为一组物理连接的事物和设备,它们可以连接到互联网并相互交换数据。由于使越来越多的物联网设备与他们的网络连接,组织变得更容易受到安全问题和攻击。先前研究的一个主要缺点是它只能找到之前看到的类型,而且任何新的设备类型都被认为是异常的。在本文中,提出了利用黑猩猩优化算法优化的训练深度量子神经网络来增强物联网安全性(IoT - dti - tdqnn - coa - es)的物联网设备类型检测。该方法包括数据收集、特征提取和检测三个阶段。数据采集阶段,采集不同物联网设备类型的真实网络流量数据集。在特征挖掘阶段,采用自动化建筑提取(ABE)方法提取互联网流量特征。物联网设备类型识别阶段,利用黑猩猩优化算法(COA)优化的深度量子神经网络(TDQNN)来检测已知和未知物联网设备的类别。IoT网络是用Python实现的。与现有方法相比,本文提出的IOT-DTI-TDQNN-COA-ES方法的仿真性能分别达到26.82%和23.48%。
{"title":"IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security","authors":"C.P. Shirley, Jaydip Kumar, Kantilal Pitambar Rane, Narendra Kumar, Deevi Radha Rani, Kuntamukkula Harshitha, Mohit Tiwari","doi":"10.3233/jhs-230028","DOIUrl":"https://doi.org/10.3233/jhs-230028","url":null,"abstract":"IoT networks can be defined as groups of physically connected things and devices that can connect to the Internet and exchange data with one another. Since enabling an increasing number of internets of things devices to connect with their networks, organizations have become more vulnerable to safety issues and attacks. A major drawback of previous research is that it can find out prior seen types only, also any new device types are considered anomalous. In this manuscript, IoT device type detection utilizing Training deep quantum neural networks optimized with a Chimp optimization algorithm for enhancing IOT security (IOT-DTI-TDQNN-COA-ES) is proposed. The proposed method entails three phases namely data collection, feature extraction and detection. For Data collection phase, real network traffic dataset from different IoT device types are collected. For feature mining phase, the internet traffic features are extracted through automated building extraction (ABE) method. IoT device type identification phase, Training deep quantum neural networks (TDQNN) optimized with Chimp optimization algorithm (COA) is utilized to detect the category of IoT devices as known and unknown device. IoT network is implemented in Python. Then the simulation performance of the proposed IOT-DTI-TDQNN-COA-ES method attains higher accuracy as26.82% and 23.48% respectively, when compared with the existing methods.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"3 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135819195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficiency of cache collaboration in core content distribution networks 核心内容分发网络中缓存协作的能源效率
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-26 DOI: 10.3233/jhs-230018
Niemah Izzeldin Osman
With escalating demands for high-definition video, cache collaboration allows neighbor nodes to share locally stored content in order to reduce download traffic. High energy consumption associated with content delivery remains a concern for Content Distribution Networks (CDNs). Therefore, this paper proposes cluster-based collaborative caching in a core network employing IP over WDM. The aim is to allow sets of core caches to fully share content while minimizing power. A Mixed Integer Linear Programming (MILP) model is used to form energy-efficient cache clusters. The energy consumption of the network is evaluated under different cluster sizes to find the optimum size that minimizes energy. To evaluate the influence of content popularity distribution, a heavy-tailed Zipf distribution and an Equal popularity distribution are evaluated. In addition, the work investigates the influence of downlink traffic behavior and power consumption parameters on optimum cluster sizes. Attained results reveal that maximum savings in energy consumption introduced by cluster-based collaborative caching are up to 34.3% and 21.8% under the Zipf and Equal distribution, respectively. Cache collaboration is not recommended when all core nodes contain fully replicated content servers. Results also show that power consumption parameters do not influence cluster formation. It is recommended keeping cache collaboration in the core network simple, so as to reduce intra-cluster communication.
随着对高清视频的需求不断增加,缓存协作允许相邻节点共享本地存储的内容,以减少下载流量。与内容交付相关的高能耗仍然是内容分发网络(cdn)关注的问题。因此,本文提出了一种基于IP over WDM的核心网集群协同缓存技术。其目的是允许核心缓存集在最小化功耗的同时完全共享内容。采用混合整数线性规划(MILP)模型形成高效节能的缓存簇。通过对不同簇大小下的网络能耗进行评估,找到能量最小的最优簇大小。为了评估内容流行度分布的影响,评估了重尾Zipf分布和等流行度分布。此外,本文还研究了下行流量行为和功耗参数对最优簇大小的影响。所获得的结果表明,在Zipf和Equal分布下,基于集群的协作缓存带来的最大能耗节约分别高达34.3%和21.8%。当所有核心节点都包含完全复制的内容服务器时,不建议使用缓存协作。结果还表明,功耗参数不影响集群的形成。建议将核心网的缓存协作保持简单,以减少集群内的通信。
{"title":"Energy efficiency of cache collaboration in core content distribution networks","authors":"Niemah Izzeldin Osman","doi":"10.3233/jhs-230018","DOIUrl":"https://doi.org/10.3233/jhs-230018","url":null,"abstract":"With escalating demands for high-definition video, cache collaboration allows neighbor nodes to share locally stored content in order to reduce download traffic. High energy consumption associated with content delivery remains a concern for Content Distribution Networks (CDNs). Therefore, this paper proposes cluster-based collaborative caching in a core network employing IP over WDM. The aim is to allow sets of core caches to fully share content while minimizing power. A Mixed Integer Linear Programming (MILP) model is used to form energy-efficient cache clusters. The energy consumption of the network is evaluated under different cluster sizes to find the optimum size that minimizes energy. To evaluate the influence of content popularity distribution, a heavy-tailed Zipf distribution and an Equal popularity distribution are evaluated. In addition, the work investigates the influence of downlink traffic behavior and power consumption parameters on optimum cluster sizes. Attained results reveal that maximum savings in energy consumption introduced by cluster-based collaborative caching are up to 34.3% and 21.8% under the Zipf and Equal distribution, respectively. Cache collaboration is not recommended when all core nodes contain fully replicated content servers. Results also show that power consumption parameters do not influence cluster formation. It is recommended keeping cache collaboration in the core network simple, so as to reduce intra-cluster communication.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"63 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134905983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of six mesh router replacement methods for wireless mesh networks: A comparison study for small and middle scale networks considering two islands distribution of mesh clients 无线网状网络中六种网状路由器替换方法的性能评价:考虑网状客户端两岛分布的中小型网络的比较研究
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-24 DOI: 10.3233/jhs-230093
Leonard Barolli
In this paper, we present a hybrid intelligent simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. We implemented six mesh router replacement methods: CM, RIWM, LDIWM, LDVM, RDVM and FC-RDVM and consider Two Islands distribution of mesh clients. We carry out a comparison study of these router replacement methods for small and middle scale WMNs. We assessed the performance by computer simulations. The simulation results show that six methods have a good performance for connectivity and coverage metrics, for both small and middle scale WMNs. However, they have different behavior for load balancing. For small scale WMNs, the load balancing of LDIWM, RIWM and FC-RDVM is better than CM, LDVM and RDVM. While, comparing LDIWM, RIWM and FC-RDVM, the LDIWM has better load balancing. We found that the load balancing for small scale WMNs is not good, because there is a concentration of mesh routers in some areas. For middle scale WMNs, the CM, LDIWM, LDVM and RDVM have not a good load balancing. While, the RIWM and FC-RDVM have better performance. Comparing RIWM and FC-RDVM, we found that the load balancing of FC-RDVM is better than RIWM.
本文提出了一种用于无线网状网络(WMNs)中网状路由器优化的混合智能仿真系统WMN-PSOHCDGA。我们实现了CM、RIWM、LDIWM、LDVM、RDVM和FC-RDVM六种网格路由器替换方法,并考虑了网格客户端的Two island分布。我们对这些路由器替换方法在小型和中型WMNs上进行了比较研究。我们通过计算机模拟来评估性能。仿真结果表明,对于中小型wmn, 6种方法在连通性和覆盖指标方面都有较好的性能。但是,它们在负载平衡方面有不同的行为。对于小规模wmn, LDIWM、RIWM和FC-RDVM的负载均衡优于CM、LDVM和RDVM。而LDIWM、RIWM和FC-RDVM比较,LDIWM具有更好的负载均衡。我们发现小规模WMNs的负载均衡性能并不好,因为在某些区域存在网状路由器的集中。对于中等规模的wmn, CM、LDIWM、LDVM和RDVM的负载均衡性能不佳。而RIWM和FC-RDVM具有更好的性能。比较RIWM和FC-RDVM,我们发现FC-RDVM的负载均衡优于RIWM。
{"title":"Performance evaluation of six mesh router replacement methods for wireless mesh networks: A comparison study for small and middle scale networks considering two islands distribution of mesh clients","authors":"Leonard Barolli","doi":"10.3233/jhs-230093","DOIUrl":"https://doi.org/10.3233/jhs-230093","url":null,"abstract":"In this paper, we present a hybrid intelligent simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. We implemented six mesh router replacement methods: CM, RIWM, LDIWM, LDVM, RDVM and FC-RDVM and consider Two Islands distribution of mesh clients. We carry out a comparison study of these router replacement methods for small and middle scale WMNs. We assessed the performance by computer simulations. The simulation results show that six methods have a good performance for connectivity and coverage metrics, for both small and middle scale WMNs. However, they have different behavior for load balancing. For small scale WMNs, the load balancing of LDIWM, RIWM and FC-RDVM is better than CM, LDVM and RDVM. While, comparing LDIWM, RIWM and FC-RDVM, the LDIWM has better load balancing. We found that the load balancing for small scale WMNs is not good, because there is a concentration of mesh routers in some areas. For middle scale WMNs, the CM, LDIWM, LDVM and RDVM have not a good load balancing. While, the RIWM and FC-RDVM have better performance. Comparing RIWM and FC-RDVM, we found that the load balancing of FC-RDVM is better than RIWM.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135315423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning trends and future perspectives of web security and vulnerabilities 深度学习趋势和网络安全和漏洞的未来前景
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-20 DOI: 10.3233/jhs-230037
Muhammad Saad Chughtai, Irfana Bibi, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari, Abdullah Ayub Khan
Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.
Web应用程序在现代数字世界中扮演着至关重要的角色。它们的普及主要是由许多技术进步所支撑的,这些技术进步通常会导致错误配置,从而为各种攻击向量开辟了道路。随着电子商务、大数据、云计算等技术的快速发展,企业服务进一步进入互联网世界,越来越成为网络攻击的重点目标。因此,适当的补救措施对于维护数字世界的安全结构至关重要。本文旨在识别这些需要解决的漏洞,以确保网络安全。我们识别并比较了静态、动态和混合工具,这些工具可以对抗通过已识别的漏洞实施的普遍攻击。此外,我们还回顾了人工智能在入侵检测中的应用,并指出了研究差距。最后,我们对各种安全模型进行了交叉比较,并指出了相关的未来研究方向。
{"title":"Deep learning trends and future perspectives of web security and vulnerabilities","authors":"Muhammad Saad Chughtai, Irfana Bibi, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari, Abdullah Ayub Khan","doi":"10.3233/jhs-230037","DOIUrl":"https://doi.org/10.3233/jhs-230037","url":null,"abstract":"Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135569757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of High Speed Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1