International Journal of Ad Hoc and Ubiquitous Computing (59 papers in press)
Real-time road object segmentation using improved light-weight convolutional neural network based on 3D LiDAR point cloud
by Guoqiang Chen, Bingxin Bai, Zhuangzhuang Mao, Jun Dai
Abstract: It is critical that autonomous navigation systems can segment objects captured by their sensors (cameras or LiDAR scanners) in real time. A convolutional neural networks (CNN) is proposed for real-time semantic segmentation of road objects (pedestrians, cars, cyclists) in this paper. The proposed network structure is based on the light-weight network SqueezeNet, which is small enough to be stored directly in the embedded deployment of an autonomous vehicle. The input of the proposed CNN is the transformed 3D LiDAR point cloud, and the domain transform (DT) makes the segmentation object precisely align its boundary, which results in the preferable point-wise label map as the output. In addition to comparing our segmentation results with the pipelines based on deep learning, the visual comparison with the traditional 3D point cloud segmentation pipelines is also made. Experiments show that the proposed CNN can achieve faster running time (6.2ms per frame) and realize real-time semantic segmentation for objects in autonomous driving scenes while ensuring the comparable segmentation accuracy.
Keywords: Road object segmentation; convolutional neural network; 3D LiDAR point cloud; domain transform.
A method to constructing connected dominating set for consensus in ad hoc wireless network
by Qingdong Huang, Yun Zhou, Qing Liu
Abstract: This paper proposes a concise-connected dominating set (C-CDS) algorithm of constructing connected dominating set (CDS) for ad hoc wireless networks. By introducing the eigenvector centrality value related to topology-information as unique id number of node, this method can reduce the omitted nodes caused by randomness of node numbering, retain the dominant node with high influence and remove more dominating nodes with small influence. In addition, adding and perfecting reduction rules further simplify the CDS after the reduction of original two rules, which can significantly reduce the size of connected dominating set compared with the existing methods at a small computational cost. Finally, we also propose a fast method for consensus which can reach consensus in one round based on CDS, the non-dominated node of the entire network is allocated to each dominating set node without duplication as the independent neighbor node of the dominating set node, and each node calculates its state value making use of the CDS, then the final consensus result is shared to the entire network. Simulation results verify that there is better performance in generating C-CDS and consensus than the existing algorithm.
Keywords: Ad hoc wireless network; Connected dominating set; Eigenvector centrality; Consensus.
Reliability Improvement of Frame Based Equipment for Ultra-Reliable and Low Latency Communication in Unlicensed Spectrum
by Hsueh-Yi Chen, Sheng-Shih Wang, Shiann-Tsong Sheu
Abstract: Based on frame based equipment (FBE), the 3GPP Release-17 has considered user equipment-initiated channel occupancy time to enhance ultra-reliable and low latency communication (URLLC) under the controlled environment, where all devices operating on the unlicensed spectrum and unexpected coexisting interference only sporadically happens. However, as the presence of interference sources (e.g., Wi-Fi) increases accidentally, the URLLC reliability rapidly decreases. This paper proposes a transmit/receive switching scheme which considers the busy tone transmission to reduce the coexisting interference. We also introduce four policies based on channel quality to balance the URLLC reliability and the impact on Wi-Fi. Moreover, this paper proposes a fixed frame period offset adjustment scheme to increase the spectrum efficiency and further enhance the FBE reliability. Simulation results showed that, compared to the method only using the legacy FBE, the technique using the proposed schemes significantly achieves a higher reliability for URLLC transmissions, especially in the high interference environment.
Keywords: Busy tone; Frame based equipment (FBE); Reliability; Ultra-reliable and low latency communication (URLLC); Unlicensed spectrum.
Collaborative Editing over Opportunistic Networks
by Noha Alsulami, Asma Cherif, Abdessamd Imine
Abstract: Fostered by the high availability of mobile devices and the maturity of wireless
communications, Opportunistic Networks (OppNets) raise a challenging issue on how
to share data efficiently without relying on fixed network infrastructure.
Most of the current research works focus only on message routing and data dissemination. However, few research works consider the deployment of collaborative applications over opportunistic networks specifically for sharing immutable data (e.g., photos/video files).
Thus, sharing mutable data in collaborative editing works with opportunistic communication
remains an open issue. Collaborative Editors rely on protocols that allow many users to concurrently edit replicated shared documents (e.g., text and multimedia documents) while enforcing the convergence of all replicas.
In this paper, we investigate the adaptation of an existing operational
transformation-based synchronization protocol to be deployed over OppNets.
For the message delivery between communicating users/nodes, we
compare the efficiency of the most known routing protocols in OppNets, PRoPHET, and Epidemic,
through simulations in terms of data convergence preservation.
We show how the behavior of each routing protocol impacts the convergence of shared data. From our experimental evaluation, it turns out that PRoPHET outperforms Epidemic in achieving convergence.
Keywords: Collaborative editors; Convergence; Operational transformation; Opportunistic networks.
Fuzzy Independent Circular Zones Protocol for Heterogeneous Wireless Sensor Networks
by Djamal Djabour, Wided Abidi, Tahar Ezzedine
Abstract: Wireless Sensor Networks (WSNs) are a set of sensor nodes. They are used in various area monitoring applications; the nodes communicate to obtain data collected by the base station or a receiving node. Nodes have two roles. The first is to detect the data, and the second is to act as relay nodes. The latter function is considered for intermediate nodes, where this role is more costly for nodes that are closed to the base station due to high traffic load. In this paper, we proposed a Fuzzy Independent Circular Zones Protocol (FICZP). In our protocol, cluster heads election is based on two different measures, one representing by nodes number of neighbours and the second representing by nodes remaining energy. These two metrics are merged by the fuzzy logic approach for
defining nodes lifetime cost-values. Fuzzy Independent Circular Zones Protocol compared to Stable Election Protocol (SEP), Zonal-Stable Election Protocol (Z-SEP), and other recent proposed protocols. Simulation results prove that the proposed protocol performs better than its predecessors in network lifetime extension, first and last dead node and network stability.
Keywords: Wireless Sensor Networks; Fuzzy Independent Circular Zones Protocol;
cluster heads’ election; lifetime; number of neighbours; remaining energy; Fuzzy logic.
Resource provisioning optimization for cloud computing systems serving multi-class requests
by Rohit Sharma, Prateek Gupta, Raghuraj Singh
Abstract: With a large number of organizations switching to cloud-based systems, the variety of domains using cloud services is increasing steadily. Often, companies own private cloud computing systems to cater to their own needs and reduce dependency on third-party services. These systems serve a multitude of requests of different classes that often require different types of resources. We present a model to optimize the cost of such a cloud computing system serving multi-class requests. The system has been modeled as a queuing network. A cost model has been employed to quantify the economics of the system, and an optimization problem has been set up. The assumption of having only linear and constant terms for the cost function has been forgone, and higher-order terms have been used. These terms account for the diminishing marginal productivity. The law of diminishing marginal productivity is used in microeconomics to study the behavior of cost of individual service-producing entities i.e. firms. This model provides a realistic scenario where the cost of the system needs to be minimized to maintain profitability. In this study the cost of the system has been optimized by calculating the optimal quantity of resources provisioned to the cloud system and the behavior of the cost of maintaining a profitable cloud computing system has been discussed.
Keywords: cloud computing; request phase; queuing theory; multi-class.
RCAPChA: RSU Controlled AHP-based Prioritized Channel Allocation Protocol for Hybrid VANETs
by Bidisha Bhabani, Judhistir Mahapatro
Abstract: Restricted geographical scope and bounded time relevance are two main attributes of emergency and non-emergency messages in Vehicular Ad Hoc Networks (VANETs). Therefore, a suitable Medium Access Control (MAC) protocol is required explicitly for VANETs which can deliver timely and reliably these sort of messages over a wireless collaborative environment. However, channel allocation remains as a challenging problem in VANETs, in fact, in any broadcast networks. The channel
allocation among the vehicles in hybrid VANETs is normally done by a RSU (Road Side Unit). In this paper, we propose a RSU controlled prioritized channel allocation strategy named as RCAPChA to minimize waiting time of the most deserving vehicle wanting to disseminate a message in the network. It is also realized that the prioritization of the vehicles is necessary in this process of channel allocation. Though there are some existing works which really acknowledge the necessity of a single-criterion based priority scheme, very few uses multi-criteria decision making approaches. In this context, our proposed algorithm
RCAPChA uses a multi-criteria based decision making model named as Analytic Hierarchy Process (AHP). RCAPChA enables the RSU to compute the priority values for all the vehicles requesting for channels, and ranks them accordingly based on the calculated priority values. We present a case study of a network of vehicles involving three criteria including severity of the message to be disseminated, vehicle speed, and channel occupancy time to compare our proposed scheme with the existing. Our simulation results show that RCAPChA performs better in minimizing the overall delay for 60% of the deserving vehicles in the network. It also defeats the existing schemes regarding delay, PSR, PDR and Throughput at the expense of more energy in saturated data traffic condition.
Keywords: VANET; channel assignment; AHP; prioritization; RSU.
An Adaptive Algorithm for Performance Enhancement of Long-Haul MMW/RoF System for Next Generation Mobile Communications
by Tuan Nguyen Van, Dien Nguyen Van, Nhat Nguyen Dong, Son Tran The, Duy-Tuan Dao, Toan Nguyen Khanh, Hung Nguyen Tan
Abstract: The performance of high-speed and long-haul Millimeter Wave/Radio-over-Fiber (MMW/RoF) system is investigated both analytically and numerically for use in next generation mobile communications (5G and beyond 5G). By applying the proposed adaptive algorithm, corresponding to any given transmission distance in advance from 200 km to 300 km, we can accurately determine optimal values of 5 essential system parameters including laser power (PLaser), local oscillator power (PLO) at coherent receiver, optical amplifier (OA) gains (G1, G2) and OA's position on optical fiber link (L1) so that BER at the receiver is maintained in the given range of (10-11-10-9). For example, numerical results show that with the adaptive algorithm, BER of 10 Gb/s QPSK signal corresponding to 300 km-transmission distance satisfies properly in the range of (10-11-10-9) with PLaser, PLO, G1, G2, and L1 of 1 dBm, 5 dBm, 20 dB, 33 dB, and 18 km, respectively.
Keywords: Radio access networks; Radio over Fiber; Millimeter Wave; Advanced modulation formats.
Co-operative Evolution of SVM-Based Resource Allocation for 5G Cloud-Radio Resource Network System with D2D Communication
by NAVEEN KUMAR, Anwar Ahmad
Abstract: In Fifth Generation (5G) communication networks, the Cloud-Radio Access Network (CRAN) is a new technique, where baseband processing units are decoupled from remote radio heads and a remote cloud-based centralized pool of baseband processing units is established. However, as the systems capacity grows, managing interference between Cellular Users (CUs) and Device-to-Device (D2D) users becomes a critical issue. This paper proposes a multi-class classification resources allocation scheme based on the co-operative evolution of Support Vector Machine (SVM) to assign Macrocellular Users (MUs) spectrum resources to Remote-head Users (RUs) and D2D pairs, allowing sub channels to be reused without compromising Quality of Service (QoS). First, the key resource allocation sets are determined, and a C-RAN resource allocation model is created. Because CUs and D2D nodes are allowed to access the same sub-channel, the ultimate challenge is described as a many-to-one matching sub-game. The 5G C-RAN system allocates resources via a co-operative evolution of an SVM-based multi-class classification algorithm based on user position estimates, with intercell and intracell interference utilized to build the training dataset. The training data set is prepared based on inter-cell and intra-cell interference. Finally, the results show that the proposed cooperative evolution
Keywords: 5G; C-RAN; machine learning; resource allocation; support vector machine.
Learning Automata and Lexical Composition Method for Optimal and Load Balanced RPL Routing in IoT
by ANITA C S, SASIKUMAR R
Abstract: Low power and lossy network, Internet of Things (IoT) motivates energy-efficient and load-balanced routing in the network layer to extend network lifetime. IoT application scenarios exploit the Routing protocol for low-power and lossy networks (RPL) due to the significant potentials. The core components of RPL are the trickle algorithm and Objective Functions (OF) for creating Destination Oriented Directed Acyclic Graph (DODAG) and data forwarding. The RPL needs more attention to avoid hotspot problems and unnecessary energy depletion. Most of the existing routing protocols take a single either hop count or ETX, or multiple routing decision metrics. However, the RPL cannot select appropriate link metrics efficiently against the dynamic and lossy environment without considering the relationship between those metrics. Thus, the proposed methodology takes important routing metrics, such as hop count, expected transmission count, and traffic-related metric, and composites the metrics using learning automata and lexical composition method. The special attention on network energy balancing through Expected Transmission Energy (ETT) avoids a hotspot issue and inefficient routing energy. The proposed work supports multiple metrics-based OF with considerable routing overhead by tuning the Trickle parameter. Moreover, the proposed work is evaluated to show its advantages over the dynamic and lossy network, IoT.
Keywords: IoT; Energy Efficient Routing; Hotspot Problem; Learning Automata; and Lexical Composition technique.
A Simulation Study on the Necessity of Working Breakdown in a State Dependent Bulk Arrival Queue with Disaster and Optional Re-service
by C.K. Deena Merit, M. Haridass
Abstract: Sudden increase in service requests immediately after an occurrence of a disaster due to the scarcity of resources creates congestion in service. Effective queue management should ensure that the services are available for every request with an acceptable delay. Unfortunately, the unexpected breakdowns causing huge delays were observed many times in real-life scenarios. Server utilization and waiting time of a customer are the primary factors in analyzing the breakdown of the queueing system. The working break-down is introduced in this paper to address this issue in an M^X/G/1 disaster queueing system wherein an occurrence of a disaster at the main server is handled immediately by replacing a substitute server with a different or same service rate. State-dependent arrival and optional re-service are also included to make the model more realistic and robust. Various performance indices of the model such as the probability of server indifferent states, expected number of customers in the system, effects of repair time, optional re-service, etc., are established using the supplementary variable technique. Numerical illustration is carried out for the analytical approach. Further, this concept was simulated and the results are interpreted after validation and verification. It has been proved in a real-time scenario that the working breakdown is effective when the arrival rate is tremendously larger immediately after the disaster.
Keywords: bulk arrival; state dependent; disaster; working breakdown; re-service,rnsubstitute server; simulation.
Identity based secure data aggregation in big data wireless sensor networks
by Radhakrishnan Maivizhi, Palanichamy Yogesh
Abstract: Secure data aggregation (SDA) is an inherent paradigm in big data wireless sensor networks (WSNs) to reduce data transmissions, maximize the network lifetime and provide security. However, SDA protocols that use elliptic curve suffer from mapping and reverse mapping functions. Currently, there is no known mapping function which is both homomorphic and effective in reverse mapping. In addition, SDA protocols that use public key infrastructure incurs high computation and communication cost. To overcome these challenges, this paper proposes a novel identity based secure data aggregation (ISDA) protocol for big data wireless sensor networks. This protocol is based on bilinear pairing and combines identity based homomorphic encryption scheme with identity based signature to achieve end-to-end security. In WSNs, this is the first SDA protocol that employs both identity based encryption and identity based signature scheme. ISDA shares the same public/private keys during encryption and signature generation, which significantly reduces the complexity of the protocol. Security analysis reveals that ISDA is secure against various internal and external attacks and proves the correctness of the proposed protocol. Performance evaluation shows that ISDA incurs less overhead than state-of-the-art bilinear pairing based SDA schemes, thereby it minimizes the energy consumption and increases the lifetime of wireless sensor networks.
Keywords: Big Data; Secure Data Aggregation; Wireless Sensor Networks; Confidentiality; Integrity.
A Concurrent Prediction of Criminal Law Charge and Sentence Using Twin Convolutional Neural Networks
by Tong-Ying Juang, Chih-Shun Hsu, Yuh-Shyan Chen, Wan-Chun Chen
Abstract: An intelligent law article prediction scheme, which solves the law articles imbalance problem and the missing value problem of the judgement, is proposed in this paper. This paper applies the law article description as the label attribute. Based on the property of the vector space, the missing value problem can be got over by learning a representative embedding vector through the vector similarity weighted mechanism. For the imbalance problem, we use a weight sharing classification layer which classifies the label according to the relevance between the fact vector and the law article vector of the vector space. We also used the transfer learning to train the model by the high-frequency law articles first, then sharing the weight as the prior knowledge to the low-frequency one to improve the classification performance. The proposed approach outperforms the performance on few-shot law article prediction.
Keywords: Natural language processing; deep learning; few-shot learning; law article prediction; legal intelligent.
Hierarchical Capacity Management and Load Balancing for HetNets Using Multi-Layer Optimization Methods
by Khodadad Jalali Rad, Abbas Mirzaei
Abstract: This paper proposes a dynamic optimization model which maximizes the overall network capacity of IoT-based heterogeneous networks in addition to providing the essential coverage and capacity. IoT cellular networks usually adopts the replication strategy to guarantee the reliability of data streams. This mechanism can significantly reduce data access time, and evidently, more replicas of data increase the data storage cost. So, in this paper we propose an multi-layer optimization approach based on the optimal transmission strategy to allocate replicas to the IoT data in the cloud computing environment in order to mitigate the data access cost. The proposed algorithm was also employed to determine the best location for data replication in the cloud computing environment. Based on the fundamental tradeoff between spectral efficiency and ergodic capacity, we study the joint spectral efficiency and resource optimization problem in cellular IoT networks with small cells on/off control. Turning on/off cells will change the inter-cell interference pattern and user association, resulting in smart resource reallocation for users to achieve optimal tradeoff between spectral efficiency, power utility and ergodic capacity in the network, based on the QoS requirements. Extensive simulation results prove that the proposed approach is able to achieve better tradeoff between spectral efficiency and total ergodic capacity with lower outage probability compared with the existing algorithms under various scenarios.
Keywords: Hierarchical Capacity Management; Power Control; NB-IoT; Multi-layer Optimization.
A Novel Optimized Apnea Classification with AA-CNN Method by Utilizing the EDR and ECG Features
by Smruthy A, Suchetha M
Abstract: Convolution Neural Network (CNN) has shown a promising growth in recent years. The main reason for the above growth is the highest classification accuracy achieved within short span of time. However, the traditional CNN architecture limits on the fixed window size of the convolution filter. Therefore the architecture fails to learn multiple features properly. In this scenario, we propose an Adaptive Attention Convolution Neural Network (AA-CNN), which is able to learn multi-features. The proposed work is divided into two stages. In the first stage, Electrocardiogram (ECG) and ECG derived respiratory signal (EDR) were extracted using a novel two-level Variational Mode Decomposition algorithm. In the next stage, the optimal convoluted features were derived using the AA-CNN architecture. To validate our proposed work, we have developed an apnea classification system by using the concept of AA-CNN and Support Vector model. An overall accuracy of 98.18% is obtained for our proposed work.
Keywords: Two-level Variational Mode Decomposition; ECG Derived Respiratory Signal; Electrocardiogram; Support Vector Machine; Convolution Neural Network; Multi-features.
A State-of-the-Art Review on Person Re-identification with Deep Learning
by Peng Gao, Xiao Yue, Wei Chen, Weidong Fang, Zijian Tian, Fan Zhang
Abstract: Person re-identification (ReID), as a sub-direction of computer vision, has attracted more and more attention. Recent years, we have witnessed significant progress of person ReID driven by deep neural network architectures. In this paper, we introduce the progress of person ReID based on deep learning in recent years, including representation learning methods, metric learning methods, part-based methods, GAN-based methods, and video-based methods, the class of methods are summarized and analyzed, then we introduce the image-based datasets and the video-based datasets. We further discuss some of the current challenges and introduce some potential solutions in person ReID. Finally, we present the possible future directions of person ReID, such as collecting more abundant pedestrian datasets, adopting semi-supervised or unsupervised methods in person ReID. The purpose of this paper is to provide insights for the research on the person ReID and to present different methods of person ReID based on deep learning.
Keywords: Person Re-identification; Computer Vision; Deep Learning; Review.
Research on Optimization of Energy Efficient Routing Protocol Based on LEACH
by HaiBin Sun, DiJing Pan
Abstract: Wireless Sensor Networks (WSNs) are information transmission networks\r\ncomposed of numerous sensor nodes with data acquisition, data processing, data\r\nstorage, and communication functions in a self-organized manner. However, the nodes require battery power and cannot be recharged easily. Therefore, the life cycle can be challenging extremely. This paper starts from the routing protocol, and performs thorough optimization works based on the low energy adaptive clustering hierarchy (LEACH).Aiming at the drawbacks of LEACH and considering various factors that affect node energy, a new low-power efficient routing protocol based on LEACH (LPE-LEACH) is proposed. Firstly, the optimal number of cluster heads (CHs) is analyzed. Besides, the thresholds of determining the CH and the backup CH, the measure of entering the cluster of ordinary nodes, and the means of data transmission are studied. MATLAB simulation experiments show that the life cycle is prolonged compared with other protocols.
Keywords: Data transmission; CH; Life cycle; Routing protocol; LEACH; WSN; energy;sensor nodes; communication; clustering.
Performance and Communication Energy constrained Embedded Benchmark for Fault Tolerant Core Mapping onto NoC architectures.
by ARURU S.A.I. KUMAR, T. V. K. Hanumantha Rao, Beechu Naresh Kumar Reddy
Abstract: Due to the rapid growth of the components encapsulated on the On-chip architecture, the performance degradation and communication issues between the cores significantly impact NoC architecture. It also increases the possibility of core failures encountered in an application, leading to a faulty network. This research implemented FTMAP (Fault-tolerant mapping algorithm) that focuses predominantly on replacing the faulty cores andrnassessing the communication and the execution time of the network by employing it on various multimedia benchmarks. The experimental outcomes reveal that it reduces the communication energy by 8%, 12%, 14% with respect to NFT, 1FT, 2FT compared to FTTG and 6%, 9%, 10% with respect to NFT, 1FT, 2FT when compared to K-FTTG. The reduction of the execution time has also outperformed by 18%, 24%, 26% with respect to NFT, 1FT, 2FT compared to FTTG and 13%, 19%, 21% with respect to NFT, 1FT,2FT when compared to K-FTTG.
Keywords: System on Chip (SoC); Network on Chip (NoC); Core; Core Mapping; CorernFailure; Fault Tolerance (FT); Multimedia benchmarks; Communication energy; System Performance; Execution time.
Color image encryption using an improved version of stream cipher and chaos
by Subhrajyoti Deb, Bubu Bhuyan, Nirmalya Kar, Reddy S K
Abstract: This paper proposes a novel image cryptosystem based on chaos theory and a modified version of Grain-128 cipher. Pixel and bit-level permutation of the plain image is performed by Hilbert curve and Henon map to disrupt high correlation. The wellknown Grain-128 cipher is modified by replacing its Boolean function and reducing its state size. Output of modified Grain-128 cipher is bitwise XORed with randomized image data to produce cipher image. The modifications in the Grain-128 cipher is done in order to achieve higher encryption decryption efficiency. However, the proposed nonlinear function of the cipher shows superior performance compared to nonlinear functions used in several cryptographic algorithms in terms of nonlinearity value. Experimental result from statistical tests and efficiency analysis confirms the superiority of the
Keywords: Hilbert curve; Henon map; Stream cipher; Security; Image encryption; Grain cipher.
Lattice Based Lightweight Cryptosystem
by Shivani Jain, R. Padmavathy
Abstract: The lattice based cryptographic constructions are emerging as a major contender of post quantum cryptography. The power-of-2 cyclotomic rings are widely used in lattice based solutions but these rings have limitations in choice and are scarce. In our proposed work, prime cyclotomic rings are considered for investigation as they enjoy the same security and benefits as power-of-2 rings. In todays world of resource constraint devices, cryptographic constructions are expected to be simpler and lightweight, compared to conventional cryptography. The major concern in deployment of lattice based constructions is the size of the payloads. The byte modulus, which is an adaption of LAC scheme is used to overcome this problem. Our results show that the proposed scheme is more compact but reasonably secure and relatively efficient in comparison to other popular solutions like LAC. Further, to withstand with decryption failure, the popular BCH and Turbo Code are used as error correction with proposed scheme.The performance of BCH and Turbo code along with prime cyclotomic rings with or without byte modulus is studied and reported.
Keywords: Prime cyclotomic rings; Ring- Learning with errors; byte modulus; lattice based cryptography.
Hybrid Meta-heuristic-based Inventory Management using Block Chain Technology in Cloud Sector
by Chinnaraj Govindasamy, Arokiasamy Antonidoss
Abstract: Nowadays, the authenticity and accuracy of data regarding inventory is one of the key problems faced in supply chain industry. Throughout the years, many inventory management processes and tools have been adopted. Accurate record-keeping and hassle-free systems are maintained by streamlining the workflow with the inventory management system business. In such circumstances, cloud with block chain provides something that businesses have never asked for and bridges the chasm in this sector. This paper plans to develop an inventory management model in supply chain with the assistance of cloud and block chain. The supply chain is at the middle of a successful enterprise with the increase of competition in market economy. It is a predictable trend to optimize the inventory cost of supply chains in todays world. The inventory cost is controlled by delaying the complete system with traditional approaches by separating all aspects of the supply chain. This paper considers the inventory management of supply chain that involves multiple suppliers, a manufacturer and multiple distributors. Initially, the data to be supplied to the distributers are stored in the block chain in cloud. Here, the data management is done by the block chain technology, where each distributer holds a hash function to store its data, which cannot be restored by the other distributers. The proposed model intends to reduce the multi-objective inventory cost involving transaction cost, inventory holding cost, shortage cost, transportation cost, and time cost. The hybridization of two meta-heuristic algorithms like Spider Monkey Optimization (SMO) and Sea Lion Optimization (SLnO) termed as spider Monkey Local Leader based Sea Lion Optimization Algorithm (SMLL-SLnO) is used to improve the inventory management model. Finally, the feasibility and effectiveness of the proposed optimization model are validated by comparing over the other traditional models.
Keywords: Inventory Management; Supply Chain Management; Block Chain Technology; Cloud Computing; Meta-heuristic Algorithm; Spider Monkey Local Leader based Sea Lion Optimization.
Intercept Analysis With Threshold-Based Diversity Reception for Cognitive Network
by Khyati Chopra
Abstract: In this study, we have investigated the threshold-based intercept performance of rn decode-and-forward (DF) underlay cognitive network.rn The secondary users have been restricted by primary users due to interference curtailment. It has been presupposed that the secondary relays are inadequate to do correct decoding always. Therefore, only when the predetermined threshold value is realized by the relays, they can propitiously decode the message. We have explored the worst case scenario where diversity reception schemes have been applied only at the eavesdropper or adversary. Asymptoticrn and diversity analysis are conferred in our study for both the balanced and the unbalanced cognitive system. It has been extensively manifested that how factors like eavesdropper link quality, predetermined threshold and interference power restrictions affect intercept performance of cognitive system. Also, it is graphically demonstrated that intercept performance is enhanced by utilizing the optimal relayrn selection scheme (OS) with surge in the number of relays.rn
Keywords: Cognitive system; DF relay; Diversity combining; Intercept probability; Threshold-based; Optimal relay selection.
A Location-based Multi-factor Authentication scheme for Mobile devices
by Bimal Meher, Ruhul Amin
Abstract: Mobile devices are becoming amazingly smart, portable, and ubiquitous in recent times. Several sectors like Banking, Insurance, Healthcare, Retail chain, Corporate houses provide numerous services for the benefit of their customers through mobile devices. Keeping in view the threat scenario, both the customer and service provider should mutually authenticate before facilitating a service or undertaking any transaction. In this paper, we propose a robust and user-friendly multi-factor authentication scheme without using a smart card. It reduces the operational overhead and hardware cost incurred due to the card reader. It also eliminates the issues when the smart card is lost/stolen. Secondly, we delegate a part of the computational load of the RAC to the Server to balance the load between RAC and Server. Thirdly, we introduce the location information of the users device as another factor without using the GPS service of the mobile device. It helps to authenticate a user with a single sign-on to receive several related services without entering his user-id, password and biometric data again and again. Our scheme uses elliptic curve-based cryptography (ECC) with three-factor authentication. It makes the system robust with less memory consumption and low-cost implementation. We have analysed our authentication scheme from several online security threats and verified it to be safe using the popular Scyther Tool. Therefore, our proposed authentication scheme provides a robust, practical and cost-effective mutual authentication solution to the user and the service provider with better security.authentication scheme from several online security threats and verified it to be safe using the popular Scyther Tool. Therefore, our proposed authentication scheme provides a robust, practical and cost-effective mutual authentication solution to the user and the service provider with better security.
Keywords: Authentication; Multifactor; Location; ECC.
Users Interests Profiling using Fuzzy Regression Tree
by Abd El Heq Silem, Hajer Taktak, Faouzi Moussa
Abstract: User modelling is an essential process for recommender systems. In user interests modelling, two kinds of approaches can be found: The first uses the text extracted from the users browsing history to predict his interest degree, while the second, besides the extracted text, adds the user actions as input. Both groups predict an incorrect interest degree due to the use of text-only or an incorrect assessment of the users actions. In this paper, we propose an architecture that employs a fuzzy regression tree algorithm to model the users interests. The architecture detects the users interests by evaluating his behaviour based on these factors: scrolling speed, time spent, location, number of visits, and clicked links. It also uses fuzzy logic to ensure the correct interpretation of each factor value according to the users habits. Finally, the results show that the proposed architecture has the minimum RMSE (? 0.06) compared to the existing solutions.
Keywords: User Modelling; Human-Computer Interaction; Ubiquitous Computing; User Profiling; User Modelling; Context-Awareness; Machine Learning; Regression Tree; Fuzzy Logic; User Behaviour.
Efficient Hardware Architectures of Lilliput Lightweight Algorithm for Image Encryption
by Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, Rahul Kumar Chaurasiya
Abstract: With the advancement of communication networks, information security has become extremely crucial in storage and transmission. As images are used in most of the networks, hence image security is becoming a challenging task. This paper proposes two hardware architectures of Lilliput lightweight block cipher. These hardware architectures are implemented on FPGA and ASIC platforms compared with state-of-the-art designs. In these architectures, first, 8-bit and then 16-bit serial structures are designed to implement. The serialized designs of 8-bit and 16-bit imply low area by consuming less number of slices. Finally, these serialized architectures are utilized for image encryption with the help of a controller. The simulation results and security analysis for hardware generated encrypted images show the better performance of proposed architectures and stronger resistance against entropy attack, differential attack, and statistical attacks.
Keywords: Security; Lightweight cryptography; FPGA; ASIC; Image encryption.
Special Issue on: Artificial Intelligence for Edge Computing in the Internet of Things
Artificial Intelligence Technology in Internet Finance and Analysis of Security Risk
by Qi Sun, Hong Wu, Binglong Zhao
Abstract: Due to the characteristics of Internet finance, borderlessness, technical specialization, and the lack of relevant laws and regulations, its characteristics have exacerbated the complexity of risk management and also put forward new requirements for Internet financial security. This research focuses on the application of artificial intelligence technology in Internet finance and the analysis of security risks. This research regards the impact and specific application of artificial intelligence in Internet finance as a system, and analyzes the relationship between various elements within the system to find out the countermeasures that can solve or mitigate the negative effects it brings. The study found that the external technical risk score was 0.118, the industry-level risk score was 0.258, and the financial business risk score was 0.407. According to the \"maximum affiliation\" principle of the fuzzy comprehensive evaluation method, the maximum value is 0.407, that is, the overall score of China\'s Internet financial risk level is at a relatively high level. The results show that the risks and response strategies based on artificial intelligence technology in Internet finance can not only supplement and improve the existing theoretical knowledge of Internet financial risk prevention and control, but also provide full disclosure of Internet financial risks, improve laws and regulations and regulatory policies, and achieve regulatory innovation. A more intuitive reference basis and realistic basis.
Keywords: Artificial Intelligence; Internet Finance; Financial Risk; Logit Regression Model; Coping Strategies.
Application of Artificial Intelligence Technology in CNC System
by Chunhui Dong, Cheng Zhong
Abstract: Since the development of computer numerical control technology from hardware numerical control to software numerical control, computer numerical control technology is still in a period of continuous improvement of functions. Although some novel numerical control technologies have been proposed, on the whole, it has not yet broken through the traditional framework. And because of the reliability research process of CNC machine tools, it is difficult to collect reliability data, which makes the reliability distribution model not unique. Based on the above background, the purpose of this article is to study the application of artificial intelligence technology in numerical control systems. The main method is to use the ANN model to expand the small amount of reliability data collected, and then use the Since the development of computer numerical control technology from hardware numerical control to software numerical control, computer numerical control technology is still in a period of continuous improvement of functions. Although some novel numerical control technologies have been proposed, on the whole, it has not yet broken through the traditional framework. And because of the reliability research process of CNC machine tools, it is difficult to collect reliability data, which makes the reliability distribution model not unique. Based on the above background, the purpose of this article is to study the application of artificial intelligence technology in numerical control systems. The main method is to use the ANN model to expand the small amount of reliability data collected, and then use the KS test to analyze the expanded data to determine the reliability data model. At the same time, in the process of determining the parameters of the reliability distribution model, the mixed Particle Swarm Optimization (HPSO) algorithm is introduced into the maximum likelihood estimation to solve the problems of easy to fall into the local optimal solution and low efficiency when solving some complex distribution models with small sample data. The experimental results show that the reliability distribution model of CNC machine tools is not unique in the case of a small sample. The reliability model of CNC machine tools can be uniquely determined after analyzing the data using the ANN model and the KS test method. Achieve a good balance between solution efficiency and convergence performance. Comparing the results of all the solving models, the relative mean square error of the 2-fold 3-parameter Weibull distribution after the ANN model expansion is the smallest, with a value of 0.0428, which shows that using this method to solve the reliability distribution model of CNC machine tools is feasible and can obtain More accurate results.
Keywords: CNC Machine Tools; Artificial Intelligence; ANN Model; HPSO Algorithm.
Functional feature-aware APP recommendation with personalized PageRank
by Yueyue Xia, Xiangliang Zhong, Yiwen Zhang, Yuanting Yan
Abstract: With the explosive growth of mobile Apps and the widespread deployment of Internet of Things (IoT) services, how to recommend applications that users are interested in has become an urgent problem to be solved. And most of the current mobile APP recommendation methods are based on the user\'s behaviour data or context-aware information, to some extent, ignoring the user\'s preference for APP functional features. Therefore, a functional feature-aware mobile APP recommendation method, named S-AppRank, is proposed in this paper. S-AppRank first extracts the functional features of mobile applications and their internal association through weight calculations, then constructs a directed graph of user functional features with the association rules, and then adds user ratings to the traditional PageRank algorithm, incorporating explicit feedback into recommendation personally. Finally, the user\'s interests in the overall APP is predicted, and a recommendation list is generated. The experiments on the real dataset of Huawei application market show that the S-AppRank proposed in this paper is better than other comparison methods.
Keywords: functional feature-aware; APP recommendation; PageRank; user preference.
Development of Internet Finance Industry with the Core of E-commerce Platform Services Optimized by the Edge Computing of the Internet of Things Based on Artificial Intelligence
by Baojun Yu, Anni Zhao
Abstract: E-commerce is one of the important modes of modern commerce. This paper discusses how the logistics service of the Internet of things optimized by the edge computing of the Internet of things based on artificial intelligence affects the satisfaction of online shoppers. The purpose of this paper is to determine the importance of the Internet of things logistics service based on the edge computing optimization of the Internet of things based on artificial intelligence to affect the satisfaction of online shoppers. In this paper, a total of 178 respondents with online shopping experience were interviewed face-to-face using structured questionnaire. Pearson correlation and multiple regression were used to analyze the data. The results show that service recovery, delivery service and customer service are the positive factors that affect the satisfaction of e-commerce shoppers. The significant level of service recovery (P = 0.000) and delivery service (P = 0.001) was 1% of the importance. The significance level of customer service (P = 0.024) was 5%. Service recovery (? = 0.399) has the largest weight in influencing the satisfaction of e-commerce shoppers, followed by delivery service (? = 0.343) and customer service (? = 0.244). The results of this study show that the Internet of things based on the edge computing optimization of artificial intelligence is important to the service-oriented optimization of e-commerce platform. The Internet of things technology supported by edge computing can promote the service-oriented optimization of e-commerce platform.
Keywords: E-Commerce Platform; Internet of Things; Edge Computing; Logistics Services.
Reducing the Internet traffic in the IoT based monitoring and control system through a combination of WSN and LoRaWAN networks
by S. Bhavatharangini
Abstract: Lora is a wireless communication technology with a long transmission distance, low power consumption, low transmission speed, low complexity, and low cost. Through the comparison and analysis of several wireless communication technologies, a temperature monitoring platform based on LoRa spread spectrum and wireless sensors are proposed. Thus a low-cost and battery-supplied wireless sensor network (WSN) for fine-grained, flexible, and data-centric temperature monitoring system is proposed. The proposed system uses localized LoRa based communication among the nodes of a Wireless Sensor Network and IoT based monitoring and control through a single LoRaWAN Gateway. Thus, the proposed system offers several advantages over a conventional IoT based monitoring and control system, namely; (i) Reduced Internet Traffic (ii) Low-cost end devices with simple LoRa transceivers and a single coordinator per cluster with LoRaWAN gateway (iii) Remote monitoring and control of end devices through the Gateway.
Keywords: LoRa; LoRaWAN; Wireless sensor network(WSN); Internet of Things (IoT); Remote control; Energy Efficient Protocol; Internet Traffic.
Special Issue on: Distributed Secure Computing for Smart Mobile IoT Networks
Privacy-Preserving smart contracts for Fuzzy WordNet Based Document Representation and Clustering using Regularized K-Means Method
by Venkata Nagaraju Thata, Sudhir Babu A, Haritha D
Abstract: Key technology for unsupervised intelligent classification of any textual content is the clustering of documents. Prior document knowledge is not required for document clustering, which is an unsupervised method of learning as compare with document classification. For clustering rather than classification, little prior knowledge of the data is needed. The crucial challenges of document clustering are the high dimensionality, measurability, preciseness, extraction of semantic relationships from texts, and meaningful cluster labels. Fuzzy wordnet based document representation and clustering using the regularized k-means method as an efficient framework is introduced in the present paper with the purpose of improving the quality of document clustering.To estimate the performance of this framework we carried out experiments on different datasets. Experimental results show that this framework improves the quality of document clustering when compared to other existing methods. Furthermore, this system gives generalized and concrete labels for documents and improves the speed of clustering by reducing their size.
Keywords: Document Clustering; Regularized K-Means; WordNet; Fuzzy Weighting Score,TF-IDF.
Design and Implementation of a Mobility Support Adaptive Trickle (MSAT) Algorithm for RPL in Vehicular IoT Networks
by N. V. R. SWARUP KUMAR JAVVADI, Suresh D
Abstract: With the development of the "Internet of Things," the scope and research for stable mobile assistance in Low-Power Wireless Networks (LPWNs) are growing. The components like single radio transceivers have been included in the low-power and low-cost products, interacting at very low TX / RX power to make basic electronics and antennas. These features result in insecure, asymmetric, and poor wireless communications, which affects the LPWN's quality of operation. In specific application to risk-benefit mobility nodes, vehicular networks, and preventive/corrective maintenance in manufacturing settings, this operation level is often harder to obtain. In this context, the proposed paper ensures efficient and timely contact in LPWNs under node mobility. RPL as a routing protocol is used in wireless low-power networks (LPWNs). This protocol is intended for the static wireless sensor network, so RPL needs to be changed to suit with Vehicular Networks' extremely dynamic topology. In the RPL protocol, the Trickle algorithm establishes routes between nodes in the network at different intervals. The Trickle algorithm is designed to reduce RPL's disadvantages. This paper proposes the vehicle's location as the RPL metric (MSAT-RPL), enabling RPL to be respond timely and propose RPL tuning trickle algorithm strategies in vehicular networks. A simulation was set up, "Cooja 3.0," is used to show the output of MSAT-RPL and compare it with existing models. MSAT-RPL has a high Packet Delivery Ratio (PDR), fair OverHead (OH), low latency (EED), and less power consumption (PC) as a result of the simulation.
Keywords: IoT; Vehicular Networks; RPL; DODAG; Trickle; Cooja 3.0; Listen Only Period; Adaptive DIO Period; Mobility Support Adaptive Trickle.
An optimized machine learning algorithm for classification of Epileptic Seizures using EMD based dynamic features of EEG
by Sateesh Kumar Reddy Ch, Suchetha M
Abstract: The electrical activity in the brain will establish the seizure due to unexpected change in neurons, which leads to the second most common disease of the brain called epilepsy. An automatic seizure detection technique is essential for primary diagnosis and treatment because the traditional methods of seizure detection are time-consuming and inaccurate. In this regards, this proposal shows a novel seizure detection technique centred on two unique features of time-frequency analysis. The proposed two novel features based on empirical mode decomposition (EMD) such as relaxation time (RT) and dynamic bandwidth (DB) to distinguish seizure movements in EEG. The study was carried out on two different data sets. Then the two novel features are used to classify healthy and seizure subjects by Support Vector Machine (SVM) with Marginal Sampling approach. The efficiency of the proposed method has compared with different classification methods such as K-Nearest Neighbours (KNN), Decision Tree (DT), andrnNaive Bayes (NB) respectively. The MATLAB platform is used to carry the process of the proposed method, and the performance results are calculated in terms of accuracy, sensitivity, specificity, precision, and F-measure. We observed that the proposed two novel features withrnSVM marginal sampling combined with k-fold cross validation achieve the best average performance with an accuracy of 99.23% with less computational time. The result analysis shows that the proposed method is an efficient and suitable method for the classification of seizure data than existing techniques in electroencephalogram signal processing
Keywords: Empirical mode decomposition;Seizure detection; Electroencephalogram (EEG) Support vector machine (SVM); Epilepsy.
Secured Personal Health Records using Pattern Based Verification and 2-Way Polynomial Protocol in Cloud Infrastructure
by DNVSLS Indira, R. Abinaya, Ch Suresh Babu, Ramesh Vatambeti
Abstract: This present research proposes the digitalized healthcare systems enable patients to generate, aggregate and store in the form of Personal Health Records (PHR). This requires more attention on cost effectiveness and less response time on public cloud platform. The emerging need of PHR monitoring and data collection on dynamic data sets, the companies need to adapt the open framework analyzing and effective storage tuples. Unfortunately, the third-party companies are failed to implement the systemic approach for immediate verification and correction models on increasing data sets. The storage and computation are two prime factors. Moreover, cloud systems need more attention on security and privacy breaches. In this proposed model the publisher-observer pattern-based healthcare systems allow the patients to verify and correct the PHR before any type of computations. The cloud system act as backend framework that offers openness and easy accessibility. The experimental segment ensures the computational cost and response time for multiple polynomial PHR variations. The details evaluation also ensures the security and privacy preservation on sensitive healthcare data sets.
Keywords: Privacy; Security; Patient Health Records; Correctness; Healthcare; 2-way polynomial.
An Energy and Delay Aware Routing Protocol for Wireless Sensor Network assisted IoT to maximize network lifetime
by Vinmathi M S, Josephine M.S, Jeyabalaraja V.
Abstract: IoT is a technology where different devices are connected and integrated to provide solutions. This is otherwise in digital world called the Internet of everything which comprises of components from web which is the ultimate source of gathering and processing a large data obtained from the respective ecosystems by making use of the sensors and various other communication devices. In this research article, A protocol for routing is proposed which is aware of the delay and energy is a WSN (EDAR- WIoT) for the maximization of the lifetime of a network. The proposed EDAR-WIoT protocol enhances and compromises the energy and delay without affecting network lifetime. The IoT network is composed by serving nodes and end users. Here, the optimal clustering is performed by the chaotic spiral dynamic (CSD) algorithm, which reduces the chaotic in nature of energy utilization. Then, a queue based swarm optimization (QSO) algorithm is utilized to next optimal node for inter cluster routing. The proposed EDAR-WIoT protocol preserves the energy efficiency and network lifetime in high density sensor networks. The proposed EDAR-WIoT protocol is experimented using the NS-2 simulator tool. It is observed from the experiments that the proposed protocol outperformed the other existing protocols in terms of Energy Consumption, lifetime of the network , throughput , rotational frequency of the head and end-end delay.
Keywords: Routing Protocol; internet of things; dynamic algorithm; optimization algorithm; network security.
Architecture and Routing Protocols for Internet of Vehicles: A Review
by Farhana Ajaz, Mohd. Naseem, Sparsh Sharma, Gaurav Dhiman, Mohammad Shabaz, S. Vimal
Abstract: Modern vehicles should be able to commute a tremendous amount of data and information within their neighborhood. To incorporate the requirements of modern vehicles, the conventional Vehicular Ad-hoc Network (VANETs) are emerging to the Internet of Vehicles. IoV keeps all the smart vehicles connected with the help of Sensors, GPS, Entertainment System, Brakes and throttles. These devices send and store their data with the help of cloud. This paper intends to contribute to the review of IoV, its challenges, characteristics and application. A detailed discussion on architectures and routing protocols along with its classification is also discussed. This paper ought to guide and motivate researchers working in the area of IoV to develop scalable and efficient routing protocols.
Keywords: Internet of Vehicles; Internet of Things; Routing protocols; Architecture; VANETs; MANETs; Cloud Computing; FOG Computing.
SLIDING WINDOWING ASSISTED MUTUAL REDUNDANCY BASED FEATURE SELECTION FOR INTRUSION DETECTION SYSTEM
by THOTAKURA VEERANNA, Kiran Kumar R
Abstract: Due to the widespread utilization of intent, the computer systems are more prone to several kinds of security threats that have led to the invention of Intrusion Detection Systems (IDSs). However, the major issue in IDSs is the presence of huge redundant and duplicate features which cause a larger processing time. These features not only slow down the process and also make the classifier to take inaccurate decision and consequences to an insertion of serious attacks into the system. To solve these problems, we propose a Sliding Windowing Assisted Mutual Redundancy Based Feature Selection (MRFS) algorithm that finds the duplicate features analytically and selects optimal feature for detection. This MRFS evaluates the mutual redundancy between as well as within network traffic connections and then selects an optimal feature subset to represent each connection attribute. After feature selection, they are fed to Multi-Class Support Vector Machine (MC-SVM) based IDS for classification. The performance of MRFS-IDS is evaluated using a standard intrusion dataset, i.e., NSL-KDD and performance is measured in terms of accuracy and false alarm rate. The simulation results demonstrate that the proposed MRFS-IDS model has gained an accuracy of 95% approximately and false alarm rate of 0.70% which is much better than the counterpart methods.
Keywords: Intrusion Detection; Data redundancy; Mutual Redundancy; Sliding Windowing; Mutual Information; MC-SVM.
An Approach Using Heuristic Pheromones-Based ACO Modeling for Green Vehicle Routing Optimization
by Ravi Prakash, Shashank Pushkar
Abstract: A mathematical heuristic-based method was introduced for addressing the issue in Green Vehicle Routing Optimization (GVRO). It analyzes a large number of vehicles along with a limited refueling network. A standard solution to this problem is given in this paper. GVRO seeks to minimize travel time renewable fuel sources while ensuring fewer emissions from greenhouse gases. An effective algorithm relies on a branch/slice optimization algorithm that combines a variety of valid inequalities in exams to increase lower limits. Implementation of an optimization algorithm based on heuristic Ant Colony Optimization (ACO) to obtain the best routes. In addition, the GVRO is better able to handle an accident and eliminates pollution by using the best alternatives.
Keywords: Green vehicle routing; Greenhouse gases; Heuristic approach; Environmental pollution; Pheromones; Ant colony optimization.
Secure Exchange and Effectual Verification of Educational Academic Records Using Hyperledger Fabric Block chain System
by Suresh Babu Erukala, Srinu Mekala, Naganjaneyulu Satuluri, Srinivasa Sesha Sai M., RAJENDRA KUMAR G
Abstract: Education plays a vital role in the countrys economic development. It improves the quality of people lives and leads to broad social benefits to individuals and society. Education raises peoples productivity and creativity, and promotes entrepreneurship and technological advances. Academic certificates in education are the documents that serve as proof of an individuals achievements or skill sets. These certificates are the symbol of excellence and vouch for professional skill sets of an individual in various numerous fields of the education sector. However, traditional academic certificates disconnect lifelong learning records, an increase of frauds, and the fake certificates that pose a serious problem in todays world. Existing centralized certificate verification process creates difficulty in verifying the authenticity, and lack of transparency in issuance of the certificates. Blockchain is a promising technology that claims to provide distributed, transparent, secure and reliable solutions to various business use-cases, which are having multiple participants with transparency and enhance trust among them. In this paper, we provide a solution to the educational certification problem by employing the blockchain network. The proposed network is a permissioned blockchain infrastructure, which is implemented in hyperledger fabric. The proposed system provides various services to issuing institutions, verifying organization, identification and authentication of the issuer, verifier and securely share academic records to the recipients, stores the academic records in the blockchain in a distributed manner, ensuring the privacy of stored records of the recipient. When compared to Ethereum,hyperledger fabric provides additional functionalities like efficient parallelism, concurrency, multiple transaction executions, and efficient commitments of the transaction into the ledger. The proposed system is a secure and trusted system that can be applied to any education sector, which provides the learners and education institutions to safeguard their brands and reputations, transparent sharing of certificates, and easyverification of academic achievements. The experimental analysis of the proposed system has been executed to test the performance of invoking and query transactions (certificates) using Hyperledger Caliper. We analyze the throughput and transaction latency of the proposed work as well. The experimental results exhibit that the proposed system achieves better transaction processing power and security compared to existing systems.
Keywords: Permissioned Blockchain; Academic Certificates; Hyperledger Fabric; Distributed Ledger.
A Novel Bio-Inspired Approach for VM Load Balancing and Efficient Resource Management in Cloud
by Purshottam J. Assudani, Balakrishanan P
Abstract: In cloud, balancing the load on Virtual machines and Efficient utilization of resources is very crucial and challenging, which becomes complex due to heterogeneous nature of virtual machines and users tasks in distributed environment. To maintain the service quality, it is mandatory that users tasks should be scheduled efficiently with immediate response, while satisfying QoS needs mentioned in SLA (Service Level Agreement). Concerning these issues, researchers have designed bio-inspired algorithms to solve optimization problems for resource scheduling. In this paper, we have proposed a bio-inspired method namely Inventive Particle Swarm Optimization (IPSO), which not only schedules users task efficiently, but also uniformly distributes the load among different VMs. Additionally, we have also designed another algorithm named as Merge Sort with Divide and Conquer (MSDC) approach to allocate the resources in cloud dynamically in an efficient manner. The experimentation is done on CloudSim simulator, which shows that proposed algorithms give better response time, VM utilization and execution time.
Keywords: Bio-Inspired Algorithms;Cloud Manager; VM Load Balancing; Scheduling of Resources; Resource Utilization; Dynamic Resource Allocation.
Efficiency Evaluation of HRF mechanism on EDoS attacks in Cloud Computing Services
by Rajendra Kumar G, Veeraiah Duggineni, Suneetha Bulla, Nageswara Rao Jarapala, J. Sunny Deol . G.
Abstract: Cloud computing is one of the most notable innovations in the IT Industry. It gives computing resources, software, web benefits for all cloud users on a rent basis. Security on the cloud is a blend of virtual assets, specialized and informational security issues. Denial of Service is one of the renowned compared to other known assaults and it produces from many sources contradicted to one single victim, these are called Distributed Denial of Service (DDoS) assaults. The conventional DDoS assaults can be transformed into EDoS (Economic Denial of Sustainability) assaults because of cloud elasticity. This EDoS assault uses the cloud assets for creating administration inaccessibility to the clients. There is a mandate to diminish EDoS assaults. HRF is the most suitable and effective mechanism to identify and diminish such assaults, in which assailant requests are recognized and dropped preceding arriving at the webserver. This paper assesses and examines the cost and performance sway using queuing theory and assesses the experimental model in terms of key performance metrics which incorporate QoS and cost metrics. Different scenarios appropriate to the HRF mechanism are taken into consideration and examined. Performance is compared with existing approaches using the game-theoretical methodology. To get the systematic solution and calculation of game value, various probabilities of defending techniques and assaulting strategies through numerical outlines are done lastly conclusions are drawn.
Keywords: HRF mechanism; Queuing theory; Game theory; Web Application Firewalls; EDoS attacks.
A DYNAMIC PRIVACY PRESERVING BASED WSN FRAMEWORK FOR MEDICAL DISEASE PREDICTION
by B. Madhuravani, Murthy DSR, ViswanadhaRaju S
Abstract: Wireless sensor networks (WSNs) play a vital role in the real-time data communication process. Cloud based WSNs is used to improve the processing speed and the storage capacity in the real-time applications. Most of the conventional approaches are based on sensor resources with limited cloud services due to high computational cost. Also, these models are not efficient in processing large volumes of data in real-time applications due to computational memory and time. In order to improve these limitations, a hybrid machine learning based sensor network is developed to predict the medical disease patterns using the cloud servers. In this work, a hybrid PSO, support vector machine and sensor security algorithms are implemented on the real-time medical sensor devices. Experimental results show that the machine learning based sensor framework has better efficiency in terms of sensor processing time, accuracy and error rate than the conventional approaches.
Keywords: Machine learning; medical disease prediction; sensor network.
A Secure New HRF Mechanism for Mitigate EDoS Attacks
by Suneetha Bulla, Basaveswararao B, Gangadhara Rao K, Chandan K
Abstract: This paper proposes HTTP Request Filtering (HRF) mechanism to detect and mitigate EDoS attacks and compare the performance with existing mechanism through game theoretical approach. The HRF mechanism was implemented with three stages and hosted on Web Application Firewalls (WAF). The performance of these mechanisms with cost analysis is done using finite queuing model. The efficiencies are compared with the formation of two player non cooperative zero-sum game and gains are calculated based on loss probability as a QoS metric. To obtain the analytical solution and computation of game value, different probabilities of defending strategies and attacking strategies through numerical illustrations are carried out. The results are discussed and finally conclusions are drawn.
Keywords: HTTP Request Filtering; Cloud Security; Web Application Firewalls; Honeypot; Game Theory.
Improving QOS in flow controlled CR-Adhoc Network with Multi criteria Routing assisted with cooperative Caching and information redundancy
by Subaskar Reddy C V, Subramanyam M V, Ramana Reddy P
Abstract: Cognitive Radio Adhoc Network with intrinsic capabilities of Cognitive Radio solves the problem in wireless network caused due to limited available spectrum and inefficiency in spectrum usage. Due to spectrum availability, the network topology changes frequently and routing is disrupted. Packet delivery becomes a big problem due to frequent routing disruptions in Cognitive Radio Networks. In this work, a flow controlled multi criteria routing assisted with cooperative caching and packet reconstruction with information redundancy in packet is proposed to improve the QOS in Cognitive Radio adhoc network. The multi path routing path selection is guided with four parameters of current buffer occupancy in nodes, predicted link availability time, spectrum availability and cumulative path delay. Different from conventional multipath path routing, in this work propagation is controlled in proportion to the prediction based on observed channel quality thereby packet delivery ratio is increased without causing additional network overhead and at lower delay. The performance of the solution is tested against different speed and compared with state of art existing solutions.
Keywords: CR-Adhoc Network; QOS in flow control; Secure computing; IoT.
Analytical Review on Secure Communication Protocols for 5G and IoT Networks
by Premalatha J, Iwin Thanakumar Joseph S, Harshavardhanan Pon, Anandaraj S.P, JeyaKrishanan V
Abstract: Internet of Things (IoT) provides an exciting future for the interaction of devices utilizing computing and sensorial capabilities. Among the existing technologies, fifth generation (5G) schemes is expected to be the motivating force for the realization of IoT concept. This research paper reviews existing state of art on the secure communication for 5G and IoT networks. We have created taxonomy and categorized the research works based on the protocols such as Light weight authentication protocol, trust-aware routing protocol, service-oriented authentication protocol, and application-oriented protocol. The research gaps and the challenges faced for secure communication in 5G and IoT networks are listed for further enhancement in the security protocols. We further analyzed the research work based on the classification methods, performance metrics, and the year of publication. Our analysis reveals that the most commonly used classification technique is Trust-aware routing protocols, and the most frequently used performance metrics is execution time, the execution time of most of the research work lies between 10ms to 300ms, and the communication overhead ranges from bits to bits.
Keywords: Authentication Protocol; Internet of Things; Privacy Preservation; and Secure Communication.
F-CHILS MAPS - A NOVEL ENCRYPTION SCHEME FOR SECURED MEDICAL DATA TRANSMISSION USING FOG-BAN ENVIRONMENT
by Swaminathan Amudha, Murali M
Abstract: With an Internet of Things, remote health monitoring has significantly increased and playing an effective role in human disease diagnosis. Patients clinical data are collected from variety of tiny sensors and are transmitted to the medical physician, Care givers and medical center in remotely. Different solutions have been proposed to monitor health condition in wireless Body Area Network. To prevent security issues, malicious users involvement, timely delivery and also to ensure data integrity, a high-end security algorithms are needed. Internet of things is now integrated with secured Fog Gateways to provide high end security solution with less latency. Many traditional algorithms were incorporated in the IoT network, due to its light weight, low power and low memory requirements. But these algorithms can be easily broken and affected by several attacks due to the poor mathematical operations. This research work propose a new hybrid chaotic maps FoG based Chaotic Henon Integrated Logistic-Tents Schemes which uses the 3D-Chaotic maps for key generation and used as symmetric key for crypto graphical operations. These 3D hybrid chaotic maps are hard and have been evaluated by extensive experimentations which show the impact of the proposed 3D chaotic maps has significantly increased the security of the clinical data when compared with the other conventional algorithms.
Keywords: AES; ECC; F-CHIL Map;3D-Chaotic Maps; Logistics Tent algorithms; Lorenz algorithms; Bifurcation; Diffusion and Permutation.
A FEATURE RANKING BASED DEEP LEARNING SECURE FRAMEWORK FOR MULTI-CLASS LEAF DISEASE DETECTION
by Nagageetha M
Abstract: Multi-class leaf disease prediction is one of the challenging tasks in large image databases due to uncertainty and high dimensional feature space. Most of the traditional deep learning framework are used to classify a single class disease prediction with limited feature space. However, these frameworks have high false positive rate and error rate due to various background, noisy appearance and semantic high- and low-level features for classification problem. Also, feature extraction and classification are the major problems in traditional convolution neural network (CNN) on multi-class leaf datasets. In this work, a novel image feature extraction based deep learning classifier is designed and implemented on large multi-class leaf datasets. In this framework, a hybrid statistical leaf shape extraction method is used to find the essential features in the conditional probability based principal component analysis (BPCA) approach. A novel deep learning classifier is proposed to improve the leaf disease prediction rate with high true positivity and accuracy on the multi-class leaf disease datasets. Experimental results show that the present framework has high computational performance than the traditional deep learning frameworks for multi-class classification.
Keywords: Leaf disease classification;extreme learning; bayesian estimators; principal component analysis.
A Filter based Machine learning classification framework for cloud based medical databases
by Devi Satya Sri Velivela, Srikanth Vemuru
Abstract: Machine learning tools and techniques play a vital role in the medical field and cloud computing applications. Most of the traditional machine learning models use static metrics, limited data size and limited feature space due to high computational processing time. In this work, a hybrid outlier detection and data transformation approaches are implemented on the cloud based medical databases. Proposed data filtering module is applicable to high dimensional data size and feature space for classification problem. In the classification problem, an advanced boosting classifier is implemented on the filtered data in order to improve the true positive and error rate. Experimental results are simulated on different medical datasets such as tonsil and trauma databases with different feature space size and data size. Simulation results proved that the proposed boosting classifier has better error rate and statistical accuracy than the conventional approaches.
Keywords: Cloud computing Medical databases; Machine learning.
CUCKOO SEARCH ASSISTED FUZZY LOGIC ALGORITHM FOR SMART WSN ROUTING SYSTEM
by Mohana Sundaram K, Nageswari D, Prakash J
Purpose This paper aims to provide the secured communication between the networks of WSN and this security is provided by creating the secrete keys between the neighboring keys. In this paper, the location based key (LBK) management is utilized. This paper also addresses the performance of the network more efficiently by cuckoo search assisted Fuzzy logic algorithm.
Design/Methodology/approach In this paper, each node is analyzed to find the occurred threats and to find the security levels. This paper uses the cuckoo search assisted fuzzy logic algorithm to improve the network performance and the security level is enhanced by location based key (LBK) management. By this method, the load at each node is balanced with the improved security level and also the lifespan of the network is improved.
Findings This proposed method demonstrates the level of security in communication between the nodes. By using this algorithm the delay, performance, error and the security level of the network are identified.
Originality The Cuckoo search assisted fuzzy logic algorithm is the novel method, which is used to get better performance of the network and to improve the communication security.
Key words: WSN, Fuzzy logic, Cuckoo search algorithm, LBK.
Keywords: WSN; Fuzzy logic; Cuckoo search algorithm; LBK.
FORECASTING THE DECISION MAKING PROCESS OF SUPREME COURT USING HIERARCHICAL CONVOLUTIONAL NEURAL NETWORK
by SIVARANJANI NAMASSIVAYAM BALAS, Jayabharathy J
Abstract: Artificial Intelligence is one of the most energizing innovations applied in many fields like text processing, image processing. Every case, which is present in the courtroom, is inspired to get justice. Since every individual has their own view on a particular topic, the irregularities in the views of the people lead to the conflict and make them seek justice. In this paper, we propose a decision forecasting model of cases in the Supreme Court of India. The model interprets the legal cases in a similar fashion as a lawyer and forecasts a decision based on the information given. The model aims to predict whether the filed case in the Supreme Court of India will win or not by considering the past similar cases from the years 2000-2019. The proposed model does not only considers the cases filed in the Supreme Court but also the cases with an unsatisfied decision from the lower court. This is to be able to better predict if the current case will win if an appeal is chosen.
In this paper, two algorithms have been proposed (i) Bi-SVM, it is used to classify the nature of the cases as civil or criminal. (ii) C-XGB is used to predict the chances of whether the case will win or not. When an out-of-sample case, for which a decision is to be made is given as input, the model yields 96% of accuracy which is higher than the accuracy of the existing models.
Keywords: Neural Networks; Machine Learning; Feature Engineering; chi2 (?2); CNN; error metrics.
Special Issue on: Machine Learning and Deep Learning Methods for the Applications in Ad Hoc and Ubiquitous Computing
A Compact GBMO Applied to modify DV-Hop based on layers in wireless sensor network
by Jeng-Shyang Pan, Min Gao, Jian-po Li, Shu-Chuan Chu
Abstract: Gases Brownian Motion Optimization (GBMO) has been shown a useful optimization method. The compact concept is implemented to the GMBO named Compact Gases Brownian Motion Optimization (CGMBO) so as to improve the efficiency and effectiveness of the GMBO. Simulation results based on the 23 test functions consisting of the unimodal, multimodal, fixed-dimensional functions and composite multimodal functions demonstrate the superior of the proposed CGMBO. The idea of layer concept is also proposed to implement the Distance Vector-Hop (DV-Hop) by modifying the original average distance of each hop called Layer DV-Hop (LDV-Hop), experimental results also show the proposed LDV-Hop really improve the average positioning accuracy of each node for wireless sensor network. Finally, the proposed CGMBO is combined with the proposed LDV-Hop so as to greatly reduce the position error compared with the DV-Hop. The actual error per-hop distance between nodes is large. When the calculated average hop distance of the nodes does not reach the ideal value, the actual distance between the nodes and the calculated distance will have a large deviation.
Keywords: Gases Brownian Motion Optimization; Wireless Sensor Network; Compact Gases Brownian Motion Optimization; LDV-Hop.
A reliable transmission scheme for 3D point cloud based on partial decode-and-forward relay over burst error fading channel
by Jianjun Hao, Luyao Liu, Wei Chen
Abstract: A reliable and efficient transmitting scheme based on partial decode-and-forward (PDF) relaying for UAV-Ground wireless communication system is proposed in this article. In a multi-UAVs to ground case, we implement a 3D point cloud transmission system based on: (1) Polar-RS concatenated channel coding; (2) a relay adopt partial decode-and-forward strategy. Hence simulations for point cloud transmitting over a burst jamming channel and a burst deep fading channel are performed respectively. The simulation results show that Polar-RS code achieves higher reliability against burst error channel than RS-Polar scheme does under the same codeword length and code rate, also the proposed PDF relay reduces the time delay and implementation complexity compared to the fully decode-and-forward (FDF) scheme.
Keywords: PDF relay; Polar-RS coding; burst error channel; 3D point cloud.
An Adaptive Stochastic Central Force Optimization Algorithm for Node Localization in Wireless Sensor Networks
by Pei-Cheng Song, Shu-Chuan Chu, Jeng-Shyang Pan, Tsu-Yang Wu
Abstract: Node localization in wireless sensor networks is a common and important practical application problem. Among the many localization algorithms, the MDS-MAP algorithm is a more effective one. However, the positioning effect of the MDS-MAP algorithm is not accurate in some cases, so the metaheuristic algorithm is implemented to further optimize the estimation results of the MDS-MAP algorithm in this paper. The improved central force optimization algorithm uses adaptive parameters to achieve randomness, while adding the restart strategy and accelerate strategy so as to avoid getting stuck in a local optimum. The CEC2013 and CEC2014 benchmark test suites used to verify the proposed algorithm are more competitive than some other existing algorithms. The improved central force optimization algorithm is applied to the MDS-MAP localization algorithm. The experimental results show that the improved central force optimization algorithm has a further optimization effect on the position estimation results of MDS-MAP.
Keywords: Central Force Optimization; Restart strategy; Adaptive; Stochastic; MDS-MAP; WSN.
Auto Insurance Fraud Identification Based on CNN-LSTM Fusion Deep Learning Model
by Huosong Xia, Yanjun Zhou, Zuopeng (Justin) Zhang
Abstract: The traditional auto insurance fraud identification method relies heavily on feature engineering and domain knowledge, making it difficult to accurately and efficiently identify fraud when the amount of claim data is large and the data dimension is high. Deep learning models have strong generalization abilities and can automatically complete feature extraction. This paper proposes a deep learning model for auto insurance fraud identification by combining Convolutional Neural Network (CNN), Long Short Term Memory (LSTM), and Deep Neural Network (DNN). Our proposed method can extract more abstract features and help avoid the complex feature extraction process that is highly dependent on domain experts in traditional machine learning algorithms. Experiments demonstrate that our method can effectively improve the accuracy of auto risk fraud identification.
Keywords: auto insurance fraud; deep learning; CNN-LSTM.
Optimal Dense Convolutional Network Model for Image Classification in Unmanned Aerial Vehicles based Adhoc Networks
by Hephzi Punithavathi, Dhanasekaran S, Duraipandy P, Laxmi Lydia E, Sivaram M, K. Shankar
Abstract: Unmanned aerial vehicles (UAVs) has the potential of generating an ad hoc communication network on the fly. They are presently employed in different application areas like security, surveillance, rescue operations, and so on. Aerial image classification gains more importance in the remote sensing community and several studies have been carried out in recent days. On the other hand, deep learning (DL) is currently exhibiting excellent performance in several processes namely object detection, tracking, image classification, and so on. In this view, this paper presents an optimal Dense Convolutional Network (DenseNet) with bidirectional long short term memory (Bi-LSTM) based image classification model called optimal DenseNet (ODN)-BiLSTM for UAV based adhoc networks. The proposed model involves two major processes namely feature extraction and classification. Firstly, DenseNet model is applied as a feature extractor, where the hyperparameters of DenseNet are tuned by the use of Adagrad optimizer. Secondly, the Bi-LSTM model is applied as a classifier, which classifies the aerial images captured by UAV. Detailed performance analysis of the proposed model takes place using UCM aerial dataset and the results are investigated under several dimensions. The experimental outcome ensured the goodness of the presented ODN-BiLSTM model on the applied UCM aerial dataset over the compared methods. The ODN-BiLSTM model has provided effective image classification results over the other methods with the maximum accuracy of 98.14% and minimum execution time of 80s.
Keywords: Adhoc networks; Deep learning; Image classification; Unmanned aerial vehicle;.
Two-Stage Adaptive Weight Vector Design Method for Decomposition Based Many-Objective Evolutionary Algorithm
by Xiaofang Guo, Yuping Wang, Xiaozhi Gao
Abstract: For many-objective problems, in which the Pareto Front (PF) is complex, e.g., incomplete and degenerate, it is challenging to use the conventional weight vector method to obtain a set of uniformly distributed weight vectors on the target PF. In order to acquire the searching information of the irregular shape of the PF accurately, this paper proposes a two stage adaptive weight vector design approach for decomposition based many objective evolutionary algorithms. Firstly, a preset initial weight vector generation strategy based on the crowding information is proposed to capture the effective area of the distribution of population. Next, the Self-Organized Mapping (SOM) weight vector design method using the feedback of weight vectors in the first stage as the initial weight neurons is adopted to generate weight vectors to capture the topological structure of the distribution of PF. An external archive is further employed to store the newly generated cumulative offspring and update the weight vectors of the SOM, which can help to adaptively adjust the weight vectors. In addition, a new composite aggregation function combined metric distance with angle-distance is proposed to improve both convergence and diversity in dealing with the many objective optimization problems. The performance of our algorithm is examined using a total of 10 test problems with both regular and irregular PF. The experimental results show that the proposed method can significantly improve the convergence and diversity performance with irregular shape of PF.
Keywords: Many-objective evolutionary algorithm; two stage; crowding; self-organized mapping; Lp-metric.
Behavior-based Grey Wolf Optimizer for Wireless Sensor Network Deployment Problem
by Yu Qiao, Hung-Yao Hsu, Jeng-Shyang Pan
Abstract: The existing Grey wolf optimizer doesnt perform well in convergence and diversity of population. This paper investigates the grey wolf optimizer and proposes a behavior-based grey wolf optimizer (BGWO) based on the real behaviors of the wolf pack. In BGWO, it mainly consists of two strategies: Lost wolf strategy and mating strategy. Lost wolf strategy benefits from the phenomenon that wolves with weak adaptability will get lost during the migration of wolves. The mating strategy comes from the competition in the wolf pack for mating. In the BGWO strategy, abandoning the low-adapted individuals in the wolf pack and competing with the wolf pack for mating behavior not only increases the population diversity in wolf pack, but also reduce the possibility of getting stuck in a local solution during optimization. Eighteen benchmark functions in CEC2017 are used to test the performance of BGWO and the result shows that the performance of BGWO is better than existing algorithms in the literature such as GWO, PSO, FA and PSOGWO. Moreover, In the WSN problem, a combination of coverage rate, connectivity rate and total network energy consumption is proposed as the objective function and optimized by BGWO. The experimental results show that BGWO perform well than other algorithms.
Keywords: BGWO; Lost Wolf Strategy; Mating Strategy; WSN Deployment.
Learning Stereo Disparity with Feature Consistency and Condence
by Liaoying Zhao, Jiaming Li, Jianjun Li, Yong Wu, Shichao Cheng, Zheng Tang, Guobao Hui, Chin-chen Chang
Abstract: Most of the existing stereo matching methods have been formulated into four regular parts: feature extraction (FE), cost calculation (CC), cost aggregation (CA), and disparity refinement (DF). They can obtain high precision results in most regions through modifying parts of the four methods, but still have problems in some ill-posed regions. This paper focuses on feature consistency and confidence (FCC), discovers the new attributes of the feature, and proposes a novel neural network structure for stereo matching by measuring the consistency and confidence of features. Base on this method, the paper fuses the cost volume and calculates the pixel confidence map for cost calculation and cost aggregation. The experimental results show the proposed method outperforms most of the state-of-the-art methods on both SceneFlow and Kitti benchmarks and lowers the estimation error of stereo matching down to 1.82\% ranking at the 7th position in the Kitti 2015 scoreboard six months ago. http://www.cvlibs.net/datasets/kitti/.
Keywords: depth estimation; stereo matching ,confidence measure; feature consistency; multi-distance metrics.
Research on Multi-feature Fusion Entity Relation Extraction Based on Deep Learning
by Shiao Xu, Shuihua Sun, Zhiyuan Zhang, Fan Xu
Abstract: Entity relation extraction aims to identify the semantic relation category between the target entity pairs in the original text and is one of the core technologies of tasks such as automatic document summarization, automatic question answering system, and machine translation. Aiming at the problems in the existing relation extraction model that the local feature extraction of the text is insufficient and the semantic interaction information between the entities is easily ignored, this paper proposes a novel entity relationship extraction model. The model utilizes a multi-window convolutional neural network (CNN) to capture multiple local features on the shortest dependency path (SDP) between entities, applies segmented bidirectional long short-term memory (BiLSTM) attention mechanism extracts the global features in the original input sequence, and merges the local features with the global features to extract entity relations. The experimental results on the SemEval-2010 Task 8 dataset show that the model's entity relation extraction performance is further improved than existing methods.
Keywords: deep learning; multi-feature fusion; entity relation extraction; shortest dependency path; attention mechanism.