29 research outputs found
A critical review of MANET testbed using mobile robot technology
This paper is a continuation of our previous paper under the same topic, MANET testbed using mobile robot technology. In our previous paper, we studied the topic by scrutinizing all the technical aspects and presented it as a technical review. However in this paper, we study the topic and presents it as a critical review that dwells into four aspect, namely (i) purpose, a ccessibility and s cope of testbed facilities, (ii) usability and c ontrollability of robot mobility in t estbed facilities, (iii) repeatability and r e producibility of real m obility in t estbeds, and (iv) tools for MANET implementation, deployment and d ebugging for experiments. With the wealth of information on the topic provided in this paper, the content of this paper is expected to be a source of reference for MANET researchers who are at a crossroad when selecting the preferred mobi le robot technology and approach to sui t thei r own speci f ic needs
A critical review of MANET testbed using mobile robot Technology
This paper is a continuation of our previous paper under the same topic, MANET testbed using mobile robot technology. In our previous paper, we studied the topic by scrutinizing all the technical aspects and presented it as a technical review. However in this paper, we study the topic and presents it as a critical review that dwells into four aspect, namely (i) purpose, a ccessibility and s cope of testbed facilities, (ii) usability and c ontrollability of robot m obility in t estbed facilities, (iii) repeatability and r e producibility of real m obility in t estbeds, and (iv) tools for MANET implementation, deployment and d ebugging for e xperiments. With the wealth of information on the topic provided in this paper, the content of this paper is expected to be a source of reference for MANET researchers who are at a crossroad when selecting the preferred mobile robot technology and approach to suit their own specific needs
Analyzing Autoencoder-Based Intrusion Detection System Performance
The rise in cyberattacks targeting critical network infrastructure has spurred an increased emphasis on the development of robust cybersecurity measures. In this context, there is a growing exploration of effective Intrusion Detection Systems (IDS) that leverage Machine Learning (ML) and Deep Learning (DL), with a particular emphasis on autoencoders. Recognizing the pressing need to mitigate cyber threats, our study underscores the crucial importance of advancing these methodologies. Our study aims to identify the optimal architecture for an Intrusion Detection System (IDS) based on autoencoders, with a specific focus on configuring the number of hidden layers. To achieve this objective, we designed four distinct sub-models, each featuring a different number of hidden layers: Test 1 (one hidden layer), Test 2 (two hidden layers), Test 3 (three hidden layers), and Test 4 (four hidden layers).We subjected our models to rigorous training and testing, maintaining consistent neuron counts of 30 and 60. The outcomes of our experimental study reveal that the model with a single hidden layer consistently outperformed its counterparts, achieving an accuracy of 95.11% for NSL-KDD and an impressive 98.6% for CIC-IDS2017. The findings of our study indicate that our proposed system is viable for implementation on critical network infrastructure as a proactive measure against cyber-attacks
A Review on mobile SMS Spam filtering techniques
Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable nuisance to the mobile subscribers. This marketing practice also worries service providers in view of the fact that it upsets their clients or even causes them lose subscribers. By way of mitigating this practice, researchers have proposed several solutions for the detection and filtering of SMS spams. In this paper, we present a review of the currently available methods, challenges, and future research directions on spam detection techniques, filtering, and mitigation of mobile SMS spams. The existing research literature is critically reviewed and analyzed. The most popular techniques for SMS spam detection, filtering, and mitigation are compared, including the used data sets, their findings, and limitations, and the future research directions are discussed. This review is designed to assist expert researchers to identify open areas that need further improvement
Energy-efficient Virtual Machine Allocation Technique Using Flower Pollination Algorithm in Cloud Datacenter: A Panacea to Green Computing
Cloud computing has attracted significant interest due to the increasing service demands from organizations offloading computationally intensive tasks to datacenters. Meanwhile, datacenter infrastructure comprises hardware resources that consume high amount of energy and give out carbon emissions at hazardous levels. In cloud datacenter, Virtual Machines (VMs) need to be allocated on various Physical Machines (PMs) in order to minimize resource wastage and increase energy efficiency. Resource allocation problem is NP-hard. Hence finding an exact solution is complicated especially for large-scale datacenters. In this context, this paper proposes an Energy-oriented Flower Pollination Algorithm (E-FPA) for VM allocation in cloud datacenter environments. A system framework for the scheme was developed to enable energy-oriented allocation of various VMs on a PM. The allocation uses a strategy called Dynamic Switching Probability (DSP). The framework finds a near optimal solution quickly and balances the exploration of the global search and exploitation of the local search. It considers a processor, storage, and memory constraints of a PM while prioritizing energy-oriented allocation for a set of VMs. Simulations performed on MultiRecCloudSim utilizing planet workload show that the E-FPA outperforms the Genetic Algorithm for Power-Aware (GAPA) by 21.8%, Order of Exchange Migration (OEM) ant colony system by 21.5%, and First Fit Decreasing (FFD) by 24.9%. Therefore, E-FPA significantly improves datacenter performance and thus, enhances environmental sustainability
Energy-efficient Nature-Inspired techniques in Cloud computing datacenters
Cloud computing is a systematic delivery of computing resources as services to the consumers via the Internet. Infrastructure
as a Service (IaaS) is the capability provided to the consumer by enabling smarter access to the processing, storage,
networks, and other fundamental computing resources, where the consumer can deploy and run arbitrary software including
operating systems and applications. The resources are sometimes available in the form of Virtual Machines (VMs). Cloud
services are provided to the consumers based on the demand, and are billed accordingly. Usually, the VMs run on various
datacenters, which comprise of several computing resources consuming lots of energy resulting in hazardous level of carbon
emissions into the atmosphere. Several researchers have proposed various energy-efficient methods for reducing the energy
consumption in datacenters. One such solutions are the Nature-Inspired algorithms. Towards this end, this paper presents a
comprehensive review of the state-of-the-art Nature-Inspired algorithms suggested for solving the energy issues in the Cloud
datacenters. A taxonomy is followed focusing on three key dimension in the literature including virtualization, consolidation,
and energy-awareness. A qualitative review of each techniques is carried out considering key goal, method, advantages, and
limitations. The Nature-Inspired algorithms are compared based on their features to indicate their utilization of resources
and their level of energy-efficiency. Finally, potential research directions are identified in energy optimization in data centers.
This review enable the researchers and professionals in Cloud computing datacenters in understanding literature evolution
towards to exploring better energy-efficient methods for Cloud computing datacenters
Emergency traffic adaptive MAC protocol for wireless body area networks based on prioritization.
This paper proposes an emergency Traffic Adaptive MAC (eTA-MAC) protocol for WBANs based on Prioritization. The main advantage of the protocol is to provide traffic ranking through a Traffic Class Prioritization-based slotted-Carrier Sense Multiple Access/Collision Avoidance (TCP-CSMA/CA) scheme. The emergency traffic is handled through Emergency Traffic Class Provisioning-based slotted-CSMA/CA (ETCP-CSMA/CA) scheme. The emergency-based traffic adaptivity is provided through Emergency-based Traffic Adaptive slotted-CSMA/CA (ETA-CSMA/CA) scheme. The TCP-CSMA/CA scheme assigns a distinct, minimized and prioritized backoff period range to each traffic class in every backoff during channel access in Contention Access Period (CAP). The ETCP-CSMA/CA scheme delivers the sporadic emergency traffic that occurs at a single or multiple BMSN(s) instantaneously, with minimum delay and packet loss. It does this while being aware of normal traffic in the CAP. Then, the ETA-CSMA/CA scheme creates a balance between throughput and energy in the sporadic emergency situation with energy preservation of normal traffic BMSNs. The proposed protocol is evaluated using NS-2 simulator. The results indicate that the proposed protocol is better than the existing Medium Access Control (MAC) protocols by 86% decrease in packet delivery delay, 61% increase in throughput, and a 76% decrease in energy consumption
A survey of wireless sensor network approaches and their energy consumption for monitoring farm fields in precision agriculture
Precision agriculture (PA) is the use of information and communication technology together with best agricultural practices for farm management. PA requires the acquisition, transmission and processing of large amounts of data from farm fields. A wireless sensor network (WSN) is a system for monitoring agriculture fields. Several researchers have used WSNs to collect the required data from the regions of interest for their intended usages in various applications. In a WSN, the energy consumption of the sensor nodes is the main issue, due to its direct impact on the lifetime of the network. Many approaches have been proposed to address this issue using different power sources and types of nodes. Specifically, in PA, because of the extended time period that is required to monitor fields, using an appropriate WSN approach is important. There is a need for a comprehensive review of WSN approaches for PA. The aim of this paper is to classify and describe the state-of-the-art of WSNs and analyze their energy consumption based on their power sources. WSN approaches in PA are categorized and discussed according to their features
Traffic adaptive MAC protocols in wireless body area networks
In Wireless Body Area Networks (WBANs), every healthcare application that is based on physical sensors is responsible for monitoring the vital signs data of patient. WBANs applications consist of heterogeneous and dynamic traffic loads. Routine patient’s observation is described as low-load traffic while an alarming situation that is unpredictable by nature is referred to as high-load traffic. This paper offers a thematic review of traffic adaptive Medium Access Control (MAC) protocols in WBANs. First, we have categorized them based on their goals, methods, and metrics of evaluation. The Zigbee standard IEEE 802.15.4 and the baseline MAC IEEE 802.15.6 are also reviewed in terms of traffic adaptive approaches. Furthermore, a comparative analysis of the protocols is made and their performances are analyzed in terms of delay, packet delivery ratio (PDR), and energy consumption. The literature shows that no review work has been done on traffic adaptive MAC protocols in WBANs. This review work, therefore, could add enhancement to traffic adaptive MAC protocols and will stimulate a better way of solving the traffic adaptivity problem
Emergency traffic MAC protocols in wireless body area networks
In Wireless Body Area Networks (WBANs), emergency traffic handling is essential for saving human life. The traffic must be delivered instantaneously without loss and with least delay since a delay may endanger human life. Because of the importance of emergency traffic handling, several researchers have explored and proposed different emergency traffic protocols. In this paper, we provide a thematic review of the emergency traffic Medium Access Control (MAC) protocols in WBANs. Zigbee standard and baseline MAC as used in WBANs are also analyzed in terms of emergency traffic handling. Furthermore, a comparative analysis of the existing emergency traffic MAC protocols is made and their performance analysis is performed based on delay, Packet Delivery Ratio (PDR), and energy consumption. Currently, no review work has been done on emergency traffic MAC protocols in WBANs. This paper, therefore, serves as the first, and adds enhancement to the emergency traffic handling at MAC layer in WBANs. We believe the paper will stimulate a better way of solving the emergency traffic handling problem