Most recent issue published online in the International Journal of Autonomic Computing.
International Journal of Autonomic Computing
http://www.inderscience.com/browse/index.php?journalID=110&year=2020&vol=3&issue=3/4
Inderscience Publishers Ltd
en-uk
support@inderscience.com
International Journal of Autonomic Computing
1741-8569
1741-8577
© 2021 Inderscience Enterprises Ltd.
© 2020 Inderscience Publishers Ltd
editor@inderscience.com
International Journal of Autonomic Computing
https://www.inderscience.com/images/files/coverImgs/ijac_scoverijac.jpg
http://www.inderscience.com/browse/index.php?journalID=110&year=2020&vol=3&issue=3/4
-
A comparative analysis of metaheuristic-based clustering schemes for improving the network lifetime in flying ad hoc networks
http://www.inderscience.com/link.php?id=114372
Communication among the unmanned aerial vehicles (UAVs) in flying ad hoc network (FANET) is a vital design aspect. This is ascribed to the highly dynamic nature of the UAVs, along with the constraints in the battery resources encountered. Devising a technique that can improve the efficiency in routing along with a stable topology in FANETs is essential. In order to do this, the paper attempts to provide a comparative analysis of two different clustering methodologies for improving the lifetime of operation of FANETs. The paper implements a clustering methodology, which employs a hyper heuristic method for selecting optimal clusters and cluster heads (CHs) using glowworm swarm optimisation (GSO) and firefly algorithm (FA). Secondly, a hybrid algorithm based on particle swarm optimisation (PSO) and firefly algorithm (FA) is applied. Connectivity, distance, energy, and neighbourhood degree are the key factors considered for the optimal selection purpose. Extensive simulations were carried out over different network areas and node densities to evaluate and compare the performances of the methods. The evaluation was based on the cluster building time (CBT), energy consumption by the network, alive node analysis and overall improvement in the network lifetime. Results largely validated the better performance of the hybrid PSOFA-based clustering scheme.
A comparative analysis of metaheuristic-based clustering schemes for improving the network lifetime in flying ad hoc networks
Meghna Goswami; Kundan Kumar; Rajeev Kr. Arya
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 176 - 194
Communication among the unmanned aerial vehicles (UAVs) in flying ad hoc network (FANET) is a vital design aspect. This is ascribed to the highly dynamic nature of the UAVs, along with the constraints in the battery resources encountered. Devising a technique that can improve the efficiency in routing along with a stable topology in FANETs is essential. In order to do this, the paper attempts to provide a comparative analysis of two different clustering methodologies for improving the lifetime of operation of FANETs. The paper implements a clustering methodology, which employs a hyper heuristic method for selecting optimal clusters and cluster heads (CHs) using glowworm swarm optimisation (GSO) and firefly algorithm (FA). Secondly, a hybrid algorithm based on particle swarm optimisation (PSO) and firefly algorithm (FA) is applied. Connectivity, distance, energy, and neighbourhood degree are the key factors considered for the optimal selection purpose. Extensive simulations were carried out over different network areas and node densities to evaluate and compare the performances of the methods. The evaluation was based on the cluster building time (CBT), energy consumption by the network, alive node analysis and overall improvement in the network lifetime. Results largely validated the better performance of the hybrid PSOFA-based clustering scheme.]]>
10.1504/IJAC.2020.114372
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 176 - 194
Meghna Goswami
Kundan Kumar
Rajeev Kr. Arya
Department of Electronics and Communication Engineering, National Institute of Technology Patna, Patna, Bihar, India ' Department of Electronics and Communication Engineering, National Institute of Technology Patna, Patna, Bihar, India ' Department of Electronics and Communication Engineering, National Institute of Technology Patna, Patna, Bihar, India
clustering
optimal cluster head
glowworm swarm optimisation
GSO
firefly
particle swarm optimisation
PSO
energy consumption
network lifetime
2021-04-20T23:20:50-05:00
Copyright © 2021 Inderscience Enterprises Ltd.
3
3/4
176
194
2021-04-20T23:20:50-05:00
-
Design of high speed multistream free space optics link under clear weather conditions
http://www.inderscience.com/link.php?id=114373
Free space optics (FSO) is a line of sight communication technology. FSO has several advantages in terms of high bandwidth, fast deployment and licensed free operation. FSO link performance is limited by the different weather conditions like clear weather, fog and haze. The critical challenge for an FSO link is to maximise the performance in terms of data rate and range. The available long-range WDM systems for very clear weather conditions are working at the maximum data rate of 2.5 Gbps with an overall link capacity of 10 Gbps (2.5 Gbps × 4 channels) for a link range of 150 km. In this paper, four-channel multistream optimised high-speed wavelength division multiplexing (WDM) link with transmitter operating in O, E, L and U bands is proposed to enhance the data rate up to 40 Gbps (10 Gbps × 4 channels) for the very clear weather condition for a range of 150 km. The four-channel designed WDM system is optimised in terms of multiplexer and demultiplexer bandwidth. The observed system performance measure values of the Q factor are 38.61, and BER is 1.40989e–313.
Design of high speed multistream free space optics link under clear weather conditions
Shantanu Jagdale; Brijesh Iyer; Sanjay L. Nalbalwar; Shankar B. Deosarkar
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 195 - 208
Free space optics (FSO) is a line of sight communication technology. FSO has several advantages in terms of high bandwidth, fast deployment and licensed free operation. FSO link performance is limited by the different weather conditions like clear weather, fog and haze. The critical challenge for an FSO link is to maximise the performance in terms of data rate and range. The available long-range WDM systems for very clear weather conditions are working at the maximum data rate of 2.5 Gbps with an overall link capacity of 10 Gbps (2.5 Gbps × 4 channels) for a link range of 150 km. In this paper, four-channel multistream optimised high-speed wavelength division multiplexing (WDM) link with transmitter operating in O, E, L and U bands is proposed to enhance the data rate up to 40 Gbps (10 Gbps × 4 channels) for the very clear weather condition for a range of 150 km. The four-channel designed WDM system is optimised in terms of multiplexer and demultiplexer bandwidth. The observed system performance measure values of the Q factor are 38.61, and BER is 1.40989e–313.]]>
10.1504/IJAC.2020.114373
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 195 - 208
Shantanu Jagdale
Brijesh Iyer
Sanjay L. Nalbalwar
Shankar B. Deosarkar
Department of E&TC Engineering, Dr. Babasaheb Ambedkar Technological University, Lonere, 402103, India ' Department of E&TC Engineering, Dr. Babasaheb Ambedkar Technological University, Lonere, 402103, India ' Department of E&TC Engineering, Dr. Babasaheb Ambedkar Technological University, Lonere, 402103, India ' Department of E&TC Engineering, Dr. Babasaheb Ambedkar Technological University, Lonere, 402103, India
bit error rate
BER
free space optics
FSO
wavelength division multiplexing
WDM
2021-04-20T23:20:50-05:00
Copyright © 2021 Inderscience Enterprises Ltd.
3
3/4
195
208
2021-04-20T23:20:50-05:00
-
Performance analysis of a 10 Gbps-60 GHz high speed RoF transmission system
http://www.inderscience.com/link.php?id=114374
Radio over fibre (RoF) is a revolutionary technology, which integrates radio and optical networks with a substantial bandwidth for wireless communication systems with minimum distortion and low cost. This paper investigates the performance of a radio over fibre system for high speed, moderate data of 10 Gbps encoded by RZ and NRZ code. The Mach-Zehnder modulator (MZM) is used to modulate the encoded data using 60 GHz radio frequency (RF). The results are obtained for the RoF system for the optical fibre of various lengths of 30, 45, 60 and 70 km. The performance of RZ and NRZ encoding is discussed using BER, Q factor, eye diagram and output power. It is observed that NRZ performs better than RZ for long haul communication.
Performance analysis of a 10 Gbps-60 GHz high speed RoF transmission system
Deepak Jain; Brijesh Iyer
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 209 - 218
Radio over fibre (RoF) is a revolutionary technology, which integrates radio and optical networks with a substantial bandwidth for wireless communication systems with minimum distortion and low cost. This paper investigates the performance of a radio over fibre system for high speed, moderate data of 10 Gbps encoded by RZ and NRZ code. The Mach-Zehnder modulator (MZM) is used to modulate the encoded data using 60 GHz radio frequency (RF). The results are obtained for the RoF system for the optical fibre of various lengths of 30, 45, 60 and 70 km. The performance of RZ and NRZ encoding is discussed using BER, Q factor, eye diagram and output power. It is observed that NRZ performs better than RZ for long haul communication.]]>
10.1504/IJAC.2020.114374
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 209 - 218
Deepak Jain
Brijesh Iyer
Department of E&TC Engineering, Dr. Babasaheb Ambedkar Technological University, Lonere, 402103, India ' Department of E&TC Engineering, Dr. Babasaheb Ambedkar Technological University, Lonere, 402103, India
avalanche photo diode
APD
bit error rate
BER
lithium niobate
LiNb
Mach-Zehnder modulator
MZM
non-return to zero
NRZ
pseudo random binary sequence
PRBS
return to zero
RZ
radio over fibre
RoF
2021-04-20T23:20:50-05:00
Copyright © 2021 Inderscience Enterprises Ltd.
3
3/4
209
218
2021-04-20T23:20:50-05:00
-
Service priority queuing model-based internet of things middleware for load balancing among fog computing centres
http://www.inderscience.com/link.php?id=114376
The fog computing architectural component meets the major requirements of the internet of things (IoT) applications. Fog computing nodes are mainly used to handle delay sensitive requests generated by IoT devices. An increase in the service arrival rate at the fog computing centre leads to an overload of fog nodes. Offloading delay sensitive requests from the overloaded fog node to the cloud introduces significant communication delays. This may lead to a violation of the service deadline in the service level agreement (SLA). This paper proposes horizontal collaborative load balancing among fog nodes in close geographical proximity. The authors use the preemptive priority queuing model for the processing of delay sensitive requests. The paper introduces an efficient message exchange among fog nodes to reduce computational overhead. These messages are used for load balancing. The result of the simulation shows that the proposed approach demonstrates the superiority of the proposed mechanism in minimising the response time of delay sensitive requests. Moreover, 11% reduction in the offloading of delay sensitive requests to neighbouring fog nodes is a significant improvement over existing methods.
Service priority queuing model-based internet of things middleware for load balancing among fog computing centres
Dilip Rathod; Girish Chowdhary
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 219 - 244
The fog computing architectural component meets the major requirements of the internet of things (IoT) applications. Fog computing nodes are mainly used to handle delay sensitive requests generated by IoT devices. An increase in the service arrival rate at the fog computing centre leads to an overload of fog nodes. Offloading delay sensitive requests from the overloaded fog node to the cloud introduces significant communication delays. This may lead to a violation of the service deadline in the service level agreement (SLA). This paper proposes horizontal collaborative load balancing among fog nodes in close geographical proximity. The authors use the preemptive priority queuing model for the processing of delay sensitive requests. The paper introduces an efficient message exchange among fog nodes to reduce computational overhead. These messages are used for load balancing. The result of the simulation shows that the proposed approach demonstrates the superiority of the proposed mechanism in minimising the response time of delay sensitive requests. Moreover, 11% reduction in the offloading of delay sensitive requests to neighbouring fog nodes is a significant improvement over existing methods.]]>
10.1504/IJAC.2020.114376
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 219 - 244
Dilip Rathod
Girish Chowdhary
Department of Computer Science and Engineering, P.E.S. College of Engineering, Aurangabad, Maharashtra, India ' School of Computational Science, Swami Ramanand Teerth Marathwada (SRTM) University, Nanded, Maharashtra, India
fog computing
internet of things
IoT
IoT devices
load balancing
IoT middleware
priority queuing
resource management
edge computing
task offloading
resource allocation
resource provisioning
resource scheduling
2021-04-20T23:20:50-05:00
Copyright © 2021 Inderscience Enterprises Ltd.
3
3/4
219
244
2021-04-20T23:20:50-05:00
-
Load balancing of fog computing centre and its security using elliptic curve cryptography
http://www.inderscience.com/link.php?id=114379
The internet of things (IoT) and the fog computing paradigm are the next wave in the era of computing and have been emerging technologies in the fields of computer science and information technology. Prior research concentrates on the integration of IoT and fog computing but is limited because it cannot be extended to all applications due to inadequate security architecture. In this paper, we propose a biocryptography approach using biometric key generation for elliptic curve cryptography (ECC) based on the authentication of fog computing. In biometric-based ECC, a private key is generated via the fingerprint of the user ensures complete protection against security risks such as confidentiality, authentication, integrity, and privacy. The security strengths of various public key cryptosystems are analysed, and ECC is one of the best cryptosystems for fog-based IoT middleware.
Load balancing of fog computing centre and its security using elliptic curve cryptography
Yogita Pagar; Dilip Rathod; Girish Chowdhary
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 245 - 260
The internet of things (IoT) and the fog computing paradigm are the next wave in the era of computing and have been emerging technologies in the fields of computer science and information technology. Prior research concentrates on the integration of IoT and fog computing but is limited because it cannot be extended to all applications due to inadequate security architecture. In this paper, we propose a biocryptography approach using biometric key generation for elliptic curve cryptography (ECC) based on the authentication of fog computing. In biometric-based ECC, a private key is generated via the fingerprint of the user ensures complete protection against security risks such as confidentiality, authentication, integrity, and privacy. The security strengths of various public key cryptosystems are analysed, and ECC is one of the best cryptosystems for fog-based IoT middleware.]]>
10.1504/IJAC.2020.114379
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 245 - 260
Yogita Pagar
Dilip Rathod
Girish Chowdhary
Department of Computer Science and Engineering, P.E.S. College of Engineering, Aurangabad, Maharashtra, India ' Department of Computer Science and Engineering, P.E.S. College of Engineering, Aurangabad, Maharashtra, India ' School of Computational Science, Swami Ramanand Teerth Marathwada (SRTM) University, Nanded, Maharashtra, India
internet of things
IoT
fog computing
load balancing
elliptic curve cryptography
ECC
biometric
authentication
2021-04-20T23:20:50-05:00
Copyright © 2021 Inderscience Enterprises Ltd.
3
3/4
245
260
2021-04-20T23:20:50-05:00
-
Content-based retrieval system for surgery videos
http://www.inderscience.com/link.php?id=114391
There has been tremendous growth of laparoscopic surgical video archives in the past few years. Finding the surgical videos manually from the database is very troublesome and time consuming. As a consequence, efficient methods for retrieval of such videos from a database are needed. In this paper, a content-based video retrieval (CBVR) system is presented using average intensity, colour and shape feature. In the proposed retrieval system, average intensity, colour and shape feature are used. The ordinal measure introduced by Bhat and Nayar, which is based on ranks rather than of their values is used in this work. This is important in the laparoscopic videos because adjacent frames can be distinguished on the basis of ranking of their average intensities. Experimental results reveal that mean average precision of the proposed technique is better than the existing motion intensity and direction descriptor (MIDD) approach. This reflects the effectiveness of proposed method.
Content-based retrieval system for surgery videos
M.R. Banwaskar; A.M. Rajurkar
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 261 - 273
There has been tremendous growth of laparoscopic surgical video archives in the past few years. Finding the surgical videos manually from the database is very troublesome and time consuming. As a consequence, efficient methods for retrieval of such videos from a database are needed. In this paper, a content-based video retrieval (CBVR) system is presented using average intensity, colour and shape feature. In the proposed retrieval system, average intensity, colour and shape feature are used. The ordinal measure introduced by Bhat and Nayar, which is based on ranks rather than of their values is used in this work. This is important in the laparoscopic videos because adjacent frames can be distinguished on the basis of ranking of their average intensities. Experimental results reveal that mean average precision of the proposed technique is better than the existing motion intensity and direction descriptor (MIDD) approach. This reflects the effectiveness of proposed method.]]>
10.1504/IJAC.2020.114391
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 261 - 273
M.R. Banwaskar
A.M. Rajurkar
MGM's College of Engineering, Near Air Port, Nanded, India ' MGM's College of Engineering, Near Air Port, Nanded, India
content-based video retrieval
laproscopic surgery video
ordinal measure
motion intensity and direction descriptor
MIDD
Bhattacharya distance
feature vector
2021-04-20T23:20:50-05:00
Copyright © 2021 Inderscience Enterprises Ltd.
3
3/4
261
273
2021-04-20T23:20:50-05:00
-
An approach towards hybrid feature selection for detection of DDoS attack
http://www.inderscience.com/link.php?id=114399
Even though the organisation uses various security measures the attacks over the internet are increasing day by day. This paper proposes a hybrid feature selection model for the detection of a DDoS attack. In this paper, the two-step hybrid feature selection method is used. The CICIDS2017 dataset with 84 features is used for the implementation. Information gain, gain ratio, and correlation filter-based algorithms are used for the ranking of features and then the forward selection approach is used to reduce the features up to 32. The system gives higher accuracy of 88.7373% for the correctly classifying DDoS attack.
An approach towards hybrid feature selection for detection of DDoS attack
Anuja Patil; Deepak Kshirsagar
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 274 - 289
Even though the organisation uses various security measures the attacks over the internet are increasing day by day. This paper proposes a hybrid feature selection model for the detection of a DDoS attack. In this paper, the two-step hybrid feature selection method is used. The CICIDS2017 dataset with 84 features is used for the implementation. Information gain, gain ratio, and correlation filter-based algorithms are used for the ranking of features and then the forward selection approach is used to reduce the features up to 32. The system gives higher accuracy of 88.7373% for the correctly classifying DDoS attack.]]>
10.1504/IJAC.2020.114399
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 274 - 289
Anuja Patil
Deepak Kshirsagar
Department of Computer Engineering, College of Engineering, Pune, India ' Department of Computer Engineering, College of Engineering, Pune, India
feature selection
information gain
DDoS attack
2021-04-20T23:20:50-05:00
Copyright © 2021 Inderscience Enterprises Ltd.
3
3/4
274
289
2021-04-20T23:20:50-05:00
-
AIR-IA: an analogous image removal approach using the intelligent archive
http://www.inderscience.com/link.php?id=114357
Deduplication is maturing as a standard attribute on backup and archives, whereby the aim is to free the storage space by removing the duplicates. Considering the storage room demand and justifiable deletion, this paper proposes a multi-container intelligent deduplication image archive system; where analogous images are disposed from the system based on the similarity approach. Similarity-aware image deduplication is achieved by calculating image fingerprints and the images are deleted when their hamming distance matches the predefined threshold. A probability model is addressed for the overall probability of getting similar images on the respective containers based on their relative storage and similarity scores of the images. In addition, the linear optimisation model is formulated to target data minimisation and storage space maximisation; which is further verified with the dataset. We perform experimentation of our work on the existing as well as synthesised datasets and various accuracy metrics are calculated in terms of precision, recall, f-score and deduplication ratio. It is observed that binary hashes used in our system give the fair contribution in removing similar images.
AIR-IA: an analogous image removal approach using the intelligent archive
Jyoti Malhotra; Jagdish Bakal
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 290 - 307
Deduplication is maturing as a standard attribute on backup and archives, whereby the aim is to free the storage space by removing the duplicates. Considering the storage room demand and justifiable deletion, this paper proposes a multi-container intelligent deduplication image archive system; where analogous images are disposed from the system based on the similarity approach. Similarity-aware image deduplication is achieved by calculating image fingerprints and the images are deleted when their hamming distance matches the predefined threshold. A probability model is addressed for the overall probability of getting similar images on the respective containers based on their relative storage and similarity scores of the images. In addition, the linear optimisation model is formulated to target data minimisation and storage space maximisation; which is further verified with the dataset. We perform experimentation of our work on the existing as well as synthesised datasets and various accuracy metrics are calculated in terms of precision, recall, f-score and deduplication ratio. It is observed that binary hashes used in our system give the fair contribution in removing similar images.]]>
10.1504/IJAC.2020.114357
International Journal of Autonomic Computing, Vol. 3, No. 3/4 (2020) pp. 290 - 307
Jyoti Malhotra
Jagdish Bakal
Department of CSE, G.H. Raisoni College of Engineering, RTM University Nagpur, India; MIT School of Engineering, MIT ADT University, Pune, India ' Department of CSE, G.H. Raisoni College of Engineering, RTM University Nagpur, India; S.S. Jondhale College of Engineering, Mumbai, India
deduplication
image
fingerprints
similarity
storage space
optimisation
2021-04-20T23:20:50-05:00
Copyright © 2021 Inderscience Enterprises Ltd.
3
3/4
290
307
2021-04-20T23:20:50-05:00