11 research outputs found
A Hybrid Scheduling Approach in the Cloud
The cloud has grown in wide popularity in recent years. It provides metered resources to end-users. The user gets to pay for the resource being utilized. The provision of these resources has become an issue that is to be addressed in the cloud in order to guarantee customer certification. The introduction of task scheduling will assist in curbing this issue. Has scheduling the task to the appropriate resource will guaranty users' quality of service. In this work, a hybrid genetic algorithm is being proposed. Genetic algorithm works on the basis of natural selection. The work is being validated by using computational parameters from both the user desired and provider desired criteria like time, cost, and throughput, and resource utilization. Then the proposed technique is compared to other scheduling techniques like first come first serve, short job first, and round-robin for more validity. The proposed technique has the best execution rate with a rate of 32.47 ms. The results show that the proposed hybrid GA reduces time and cost. This is a convincing technique for cloud computation
Vehicle Price Classification and Prediction Using Machine Learning in the IoT Smart Manufacturing Era
In this paper, machine learning (ML) strategies have been utilized in predicting vehicles’ prices and good deals. Vehicle value prediction has been considered one of the most significant research topics with the rise of IoT for sustainability. This is because it requires observable exertion and massive field information. Towards generating a model that anticipates the vehicles’ price, we applied three ML methods (neural network, decision tree, support vector machine, and linear regression). However, the referenced methods have been applied to function together as a group in a hybrid model. The information utilized was gathered from an information and computer science school that houses different datasets. Separate exhibitions of several ML techniques were contrasted to reveal which one is suitable for the accessible information index. Various difficulties and challenges associated with this design have also been discussed. Moreover, the model was experimented, and a 90% precision was achieved. This potential result can help in providing precise vehicle deals in the emerging Internet of Things (IoT) for the sustainability paradigm
Vehicle Price Classification and Prediction Using Machine Learning in the IoT Smart Manufacturing Era
In this paper, machine learning (ML) strategies have been utilized in predicting vehicles’ prices and good deals. Vehicle value prediction has been considered one of the most significant research topics with the rise of IoT for sustainability. This is because it requires observable exertion and massive field information. Towards generating a model that anticipates the vehicles’ price, we applied three ML methods (neural network, decision tree, support vector machine, and linear regression). However, the referenced methods have been applied to function together as a group in a hybrid model. The information utilized was gathered from an information and computer science school that houses different datasets. Separate exhibitions of several ML techniques were contrasted to reveal which one is suitable for the accessible information index. Various difficulties and challenges associated with this design have also been discussed. Moreover, the model was experimented, and a 90% precision was achieved. This potential result can help in providing precise vehicle deals in the emerging Internet of Things (IoT) for the sustainability paradigm
Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET
As there has been an advancement in avionic systems in recent years, the enactment of unmanned aerial vehicles (UAV) has upgraded. As compared to a single UAV system, multiple UAV systems can perform operations more inexpensively and efficiently. As a result, new technologies between user/control station and UAVs have been developed. FANET (Flying Ad-Hoc Network) is a subset of the MANET (Mobile Ad-Hoc Network) that includes UAVs. UAVs, simply called drones, are used for collecting sensitive data in real time. The security and privacy of these data are of priority importance. Therefore, to overcome the privacy and security threats problem and to make communication between the UAV and the user effective, a competent anonymous mutual authentication scheme is proposed in this work. There are several methodologies addressed in this work such as anonymous batch authentication in FANET which helps to authenticate a large group of drones at the same time, thus reducing the computational overhead. In addition, the integrity preservation technique helps to avoid message alteration during transmission. Moreover, the security investigation section discusses the resistance of the proposed work against different types of possible attacks. Finally, the proposed work is related to the prevailing schemes in terms of communication and computational cost and proves to be more efficient
A hybridized feature extraction for COVID-19 multi-class classification on computed tomography images
COVID-19 has killed more than 5 million individuals worldwide within a short time. It is caused by SARS-CoV-2 which continuously mutates and produces more transmissible new different strains. It is therefore of great significance to diagnose COVID-19 early to curb its spread and reduce the death rate. Owing to the COVID-19 pandemic, traditional diagnostic methods such as reverse-transcription polymerase chain reaction (RT-PCR) are ineffective for diagnosis. Medical imaging is among the most effective techniques of respiratory disorders detection through machine learning and deep learning. However, conventional machine learning methods depend on extracted and engineered features, whereby the optimum features influence the classifier's performance. In this study, Histogram of Oriented Gradient (HOG) and eight deep learning models were utilized for feature extraction while K-Nearest Neighbour (KNN) and Support Vector Machines (SVM) were used for classification. A combined feature of HOG and deep learning feature was proposed to improve the performance of the classifiers. VGG-16 + HOG achieved 99.4 overall accuracy with SVM. This indicates that our proposed concatenated feature can enhance the SVM classifier's performance in COVID-19 detection
Cluster-Based Routing Protocol with Static Hub (CRPSH) for WSN-Assisted IoT Networks
The Internet of Things (IoT) is an evolving concept that has achieved prominence in the modern era. An autonomous sensor-equipped device is the major component of WSN-assisted IoT infrastructure. These devices intelligently sense the environment, automatically collect the data, and deliver the information to paired devices. However, in WSN-assisted IoT networks, energy depletion and hardware faults might result in device failures. Additionally, this might affect data transmission. A reliable route significantly reduces data retransmissions, which can help in congestion reduction and energy conservation. Generally, the sensor devices are typically deployed densely throughout the WSN-assisted IoT networks. A high number of sensor devices covering a monitoring area might result in duplicate data. The clustering method can be used to overcome this problem. The clustering technique reduces network traffic, whereas the multipath technique ensures path reliability. In CRPSH, we used the clustering technique to reduce the duplicate data. Moreover, the multipath approach can increase the reliability of the proposed protocol. CRPSH is intended to minimize the overhead associated with control packets and extend the network’s lifetime. The complete set of simulations is carried out using the Castalia simulator. The proposed protocol is found to reduce energy consumption and increase the lifetime of IoT infrastructure networks
A Survey on Consensus Protocols and Attacks on Blockchain Technology
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchain-based data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus protocols, security features are required to be discussed because these consensus algorithms have recently been attacked by address resolution protocols (ARP), distributed denial of service attacks (DDoS), and sharding attacks in a permission-less blockchain. The existence of a byzantine adversary is perilous, and is involved in these ongoing attacks. Considering the above issues, we conducted an informative survey based on the consensus protocol attack on blockchain through the latest published article from IEEE, Springer, Elsevier, ACM, Willy, Hindawi, and other publishers. We incorporate various methods involved in blockchain. Our main intention is to gain clarity from earlier published articles to elaborate numerous key methods in terms of a survey article
A Novel Approach for Multichannel Epileptic Seizure Classification Based on Internet of Things Framework Using Critical Spectral Verge Feature Derived from Flower Pollination Algorithm
A novel approach for multichannel epilepsy seizure classification which will help to automatically locate seizure activity present in the focal brain region was proposed. This paper suggested an Internet of Things (IoT) framework based on a smart phone by utilizing a novel feature termed multiresolution critical spectral verge (MCSV), based on frequency-derived information for epileptic seizure classification which was optimized using a flower pollination algorithm (FPA). A wireless sensor technology (WSN) was utilized to record the electroencephalography (EEG) signal of epileptic patients. Next, the EEG signal was pre-processed utilizing a multiresolution-based adaptive filtering (MRAF) method. Then, the maximal frequency point at which the power spectral density (PSD) of each EEG segment was greater than the average spectral power of the corresponding frequency band was computed. This point was further optimized to extract a point termed as critical spectral verge (CSV) to extract the exact high frequency oscillations representing the actual seizure activity present in the EEG signal. Next, a support vector machine (SVM) classifier was used for channel-wise classification of the seizure and non-seizure regions using CSV as a feature. This process of classification using the CSV feature extracted from the MRAF output is referred to as the MCSV approach. As a final step, cloud-based services were employed to analyze the EEG information from the subject’s smart phone. An exhaustive analysis was undertaken to assess the performance of the MCSV approach for two datasets. The presented approach showed an improved performance with a 93.83% average sensitivity, a 97.94% average specificity, a 97.38% average accuracy with the SVM classifier, and a 95.89% average detection rate as compared with other state-of-the-art studies such as deep learning. The methods presented in the literature were unable to precisely localize the origination of the seizure activity in the brain region and reported a low seizure detection rate. This work introduced an optimized CSV feature which was effectively used for multichannel seizure classification and localization of seizure origination. The proposed MCSV approach will help diagnose epileptic behavior from multichannel EEG signals which will be extremely useful for neuro-experts to analyze seizure details from different regions of the brain
An Efficient Pareto Optimal Resource Allocation Scheme in Cognitive Radio-Based Internet of Things Networks
The high data rates detail that internet-connected devices have been increasing exponentially. Cognitive radio (CR) is an auspicious technology used to address the resource shortage issue in wireless IoT networks. Resource optimization is considered a non-convex and nondeterministic polynomial (NP) complete problem within CR-based Internet of Things (IoT) networks (CR-IoT). Moreover, the combined optimization of conflicting objectives is a challenging issue in CR-IoT networks. In this paper, energy efficiency (EE) and spectral efficiency (SE) are considered as conflicting optimization objectives. This research work proposed a hybrid tabu search-based stimulated algorithm (HTSA) in order to achieve Pareto optimality between EE and SE. In addition, the fuzzy-based decision is employed to achieve better Pareto optimality. The performance of the proposed HTSA approach is analyzed using different resource allocation parameters and validated through simulation results
Towards a Provably Secure Authentication Protocol for Fog-Driven IoT-Based Systems
The emergence of fog-based Internet of Things (IoT) systems have played a significant role in enhancing the applicability of the IoT paradigm. In such systems, fog-nodes are proficient enough to retain, process and transmit the data coming from IoT devices. Nevertheless, as an extension of cloud computing, inheriting the security and privacy concerns of cloud computing is also inevitable in fog-based IoT systems. To deal with such challenges, a diverse range of security solutions are reported in the literature. However, most of them have several limitations (i.e., vulnerability to known security attacks and high computation overhead) that curtail their practical implementation applicability. Keeping these limitations in mind, this paper propose a privacy-preserving hash-based authenticated key agreement protocol using XOR and concatenation operations for fog-driven IoT systems. Using healthcare as a case study, the security of the novel protocol is evaluated by using informal and formal security analysis. In order to obtain the experimental results, the key cryptographic operations used at the user, fog node and cloud server-side are implemented on a mobile device, Arduino and cloud server, respectively. Findings from the performance evaluation results show that the proposed protocol has the least computation cost compared to several related competing protocols