Int. J. Distributed Syst. Technol.最新文献

筛选
英文 中文
International Journal of Distributed Systems and Technologies (IJDST): IFACS-Q3S- A New Admission Control System for 5G Wireless Networks Based on Fuzzy Logic and Its Performance Evaluation 国际分布式系统与技术学报(IJDST):基于模糊逻辑的5G无线网络新接入控制系统IFACS-Q3S及其性能评价
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/ijdst.300339
Phudit Ampririt, Ermioni Qafzezi, Kevin Bylykbashi, Makoto Ikeda, Keita Matsuo, L. Barolli
{"title":"International Journal of Distributed Systems and Technologies (IJDST): IFACS-Q3S- A New Admission Control System for 5G Wireless Networks Based on Fuzzy Logic and Its Performance Evaluation","authors":"Phudit Ampririt, Ermioni Qafzezi, Kevin Bylykbashi, Makoto Ikeda, Keita Matsuo, L. Barolli","doi":"10.4018/ijdst.300339","DOIUrl":"https://doi.org/10.4018/ijdst.300339","url":null,"abstract":"In our previous work, we proposed an Integrated Fuzzy-based Admission Control System (IFACS) for admission control in 5G wireless networks. In this paper, we present a new system by considering Service Level Agreement (SLA) as a new parameter. We call this system IFACS-Q3S. We also implemented a new scheme for Slice Overloading Cost (SOC), called Fuzzy-based Scheme for SOC (FSSOC). The SOC is used as a new input for the IFACS-Q3S system. The other input parameters for IFACS-Q3S are Quality of Service (QoS), Slice Priority (SP) and SLA. From simulation results, we conclude that the considered parameters have different effects on the acceptance decision. The increase of QoS, SP, and SLA caused an increase in the AD value, whereas the increase in SOC resulted in a decrease in the AD value. For SOC 0.3, when the QoS value is 0.1 and the SP value is 0.1, in the case when SLA is increased from 0.1 to 0.5 and 0.5 to 0.9, the AD is increased by 5% and 11%, respectively. On the other side, when the SLA value is 0.9, we see that AD is decreased 14% by increasing the SOC values from 0.3 to 0.8.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130243499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comprehensive Survey on Sentiment Analysis in Twitter Data 推特数据中情感分析的综合调查
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/IJDST.300352
Hema Krishnan, M. Elayidom, T. Santhanakrishnan
{"title":"A Comprehensive Survey on Sentiment Analysis in Twitter Data","authors":"Hema Krishnan, M. Elayidom, T. Santhanakrishnan","doi":"10.4018/IJDST.300352","DOIUrl":"https://doi.org/10.4018/IJDST.300352","url":null,"abstract":"The literature scrutinizes on diverse techniques that are associated with sentiment analysis in twitter data. It reviews several research papers and states the significant analysis. Initially, the analysis depicts various schemes that are contributed in different papers. Subsequently, the analysis also focuses on various features and it also analyses the sentiment analysis in twitter data that is exploited in each paper. Furthermore, this paper provides the detailed study regarding the performance measures and maximum performance achievements in each contribution. Finally, it extends the various research issues which can be useful for the researchers to accomplish further research on sentiment analysis in twitter data.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluation of Chi-Square and Normal Distributions of Mesh Clients for WMNs Considering Five Router Replacement Methods 考虑五种路由器替换方法的WMNs网格客户端卡方分布和正态分布性能评价
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/ijdst.296247
Admir Barolli, Kevin Bylykbashi, Ermioni Qafzezi, Shinji Sakamoto, L. Barolli
{"title":"Performance Evaluation of Chi-Square and Normal Distributions of Mesh Clients for WMNs Considering Five Router Replacement Methods","authors":"Admir Barolli, Kevin Bylykbashi, Ermioni Qafzezi, Shinji Sakamoto, L. Barolli","doi":"10.4018/ijdst.296247","DOIUrl":"https://doi.org/10.4018/ijdst.296247","url":null,"abstract":"In our previous work, we implemented a simulation system to solve the node placement problem in WMNs considering Particle Swarm Optimization (PSO) and Distributed Genetic Algorithm (DGA), called WMN-PSODGA. In this paper, we compare Chi-square and Normal distributions of mesh clients for different router replacement methods. The router replacement methods considered are Constriction Method (CM), Random Inertia Weight Method (RIWM), Linearly Decreasing Inertia Weight Method (LDIWM), Linearly Decreasing Vmax Method (LDVM) and Rational Decrement of Vmax Method (RDVM). The simulation results show that for both distributions, the mesh routers cover all mesh clients for all router replacement methods. In terms of load balancing, Normal distribution shows better results than Chi-square. The best router replacement method for this distribution is LDIWM. Thus, the best scenario is the Normal distribution of mesh clients with LDIWM as a router replacement method.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks 基于对立寻鹿优化的无线传感器网络入侵检测混合分类器
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/IJDST.300356
Mohan V. Pawar, Anuradha Jagadeesan
{"title":"Opposition-Based Deer Hunting Optimization-Based Hybrid Classifier for Intrusion Detection in Wireless Sensor Networks","authors":"Mohan V. Pawar, Anuradha Jagadeesan","doi":"10.4018/IJDST.300356","DOIUrl":"https://doi.org/10.4018/IJDST.300356","url":null,"abstract":"This paper tempts to implement a new machine-learning algorithm for detecting attacks in WSN. The developed model involves three main phases (a) Data Acquisition, (b) Feature Extraction, and (c) Detection. Next to the data acquisition from different benchmark datasets, the attributes in the form of features are extracted. Further, a new hybrid machine learning algorithm with the integration of Neural Network (NN), and Fuzzy Classifier is used for detection, and it is termed as FNN. As an improvement to the developed hybrid model, the number of hidden neurons in NN, and the membership function of Fuzzy Classifier is optimized by a modified optimization algorithm called Opposition-based Deer Hunting Optimization Algorithm (O-DHOA). Finally, the experiment analysis of our proposed model provides an effective solution to solve the problem of IDS detection and improves the performance of intrusion detection.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116027135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Q-Network Eith Experience Optimization (DQN-EO) for Atari's Space Invaders and Its Performance Evaluation 雅达利《太空入侵者》的深度q -网络体验优化(DQN-EO)及其性能评估
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/ijdst.296249
Elis Kulla
{"title":"A Deep Q-Network Eith Experience Optimization (DQN-EO) for Atari's Space Invaders and Its Performance Evaluation","authors":"Elis Kulla","doi":"10.4018/ijdst.296249","DOIUrl":"https://doi.org/10.4018/ijdst.296249","url":null,"abstract":"During recent years, the deep Q-Learning is used to solve different complex problems in different fields. However, Deep Q-Learning does not have a unified method for solving certain problems because different problems require specific settings and parameters. This paper proposes a Deep Q-Network with Experience Optimization for Atari’s “Space Invaders” environment called DQN-EO. Training and testing results are presented. The performance evaluation results show that while using the proposed algorithm the agent is better at avoiding enemy bullets by 37.7% (longer lifetime) and destroying enemy ships by 14.5% (higher score).","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121262534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Grid-Based Framework for Supporting Range Aggregate Queries Over Big Sensor Network Readings: Overview, Management, and Applications 迈向支持大传感器网络读数范围聚合查询的基于网格的框架:概述、管理和应用
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/ijdst.296248
A. Cuzzocrea, F. Furfaro, D. Saccá
{"title":"Towards a Grid-Based Framework for Supporting Range Aggregate Queries Over Big Sensor Network Readings: Overview, Management, and Applications","authors":"A. Cuzzocrea, F. Furfaro, D. Saccá","doi":"10.4018/ijdst.296248","DOIUrl":"https://doi.org/10.4018/ijdst.296248","url":null,"abstract":"The problem of representing and querying sensor network readings issues new research challenges, as traditional techniques and architectures used for managing relational and object oriented databases are not suitable in this context. In this paper, we present a Grid-based framework that supports aggregate query answering on sensor network data, and uses a summarization technique to efficiently accomplish this task. In particular, Grid nodes are used for collecting, compressing and storing sensor network readings, as well as extracting information from stored data. Grid nodes can exchange information among each other, so that the same piece of information can be stored (with a different degree of accuracy) into several nodes. Queries are evaluated by locating the Grid nodes containing the needed information (either compressed or not), and choosing (among these nodes) the most convenient ones, according to a cost model. We complete our contribution with a case study that focuses the attention on the management and querying of Grid-based GIS databases.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114687175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Diabetes Diagnosis System Using Machine Learning Algorithms 利用机器学习算法开发糖尿病诊断系统
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/ijdst.296246
Victor I. Chang, Keerthi Kandadai, Q. Xu, Steven Guan
{"title":"Development of a Diabetes Diagnosis System Using Machine Learning Algorithms","authors":"Victor I. Chang, Keerthi Kandadai, Q. Xu, Steven Guan","doi":"10.4018/ijdst.296246","DOIUrl":"https://doi.org/10.4018/ijdst.296246","url":null,"abstract":"This paper describes how to develop diabetes diagnosis through the combined use of the support vector machine, the Decision Tree, Naive Bayes, K-nearest and finally, Random Forest (RF) algorithms. These methods are useful to predict diabetes jointly. The appropriateness of ML-depended techniques to tackle this issue has been revealed. This diabetes diagnosis system using machine-learning algorithms is used to review papers. This project was based on developing python-based code for machine learning algorithms to perform large scales of diabetes analysis. The hardware requirement of machine learning is RAM that is 128 GB DDR4 2133 MHz and 2 TB Hard Disk and needs 512 GB SSD. One standard library is NumPy that uses to support multi-dimensional arrays objects, various components, and matrices. The Random Forest Prediction representing the pictorial visualization of the model and the accuracy for the data analysis using the Random Forest is 76%.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network 基于自适应Taylor Harris Hawks优化的深度卷积神经网络的恶意JavaScript检测方法
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/IJDST.300354
Scaria Alex, T. Rajkumar
{"title":"An Approach for Malicious JavaScript Detection Using Adaptive Taylor Harris Hawks Optimization-Based Deep Convolutional Neural Network","authors":"Scaria Alex, T. Rajkumar","doi":"10.4018/IJDST.300354","DOIUrl":"https://doi.org/10.4018/IJDST.300354","url":null,"abstract":"JavaScript has to become a pervasive web technology that facilitates interactive and dynamic Web sites. The extensive usage and the properties permit the authors to simply obfuscate the code and make JavaScript an interesting place for hackers. JavaScript is usually used for adding functionalities and improving the usage of web applications. Despite several merits and usages of JavaScript, the major issue is that several recent cyber-attacks like drive-by-download attacks utilized the susceptibility of JavaScript codes. This paper devises a novel technique for detecting malicious JavaScript. Here, JavaScript codes are fed to the feature extraction phase for extracting the noteworthy features that include execution time, function calls, conditional statements, break statements, and Boolean. The extracted features are further subjected to data transformation wherein log transformation is adapted to normalize the data. Then, feature selection is performed using mutual information.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data Obfuscation Method Using Ant-Lion-Rider Optimization for Privacy Preservation in the Cloud 一种基于蚁狮骑士优化的云环境下隐私保护数据混淆方法
Int. J. Distributed Syst. Technol. Pub Date : 2022-01-01 DOI: 10.4018/IJDST.300353
Nagaraju Pamarthi, N. N. Rao
{"title":"A Data Obfuscation Method Using Ant-Lion-Rider Optimization for Privacy Preservation in the Cloud","authors":"Nagaraju Pamarthi, N. N. Rao","doi":"10.4018/IJDST.300353","DOIUrl":"https://doi.org/10.4018/IJDST.300353","url":null,"abstract":"In this paper, a obfuscation-based technique namely, AROA based BMCG method is developed for secure data transmission in cloud. Initially, the input data with the mixed attributes is provided to the privacy preservation process directly, where the data matrix and bilinear map coefficient generation co-efficient is multiplied through Hilbert space-based tensor product. Here, bilinear map co-efficient is the new co-efficient proposed to multiply with original data matrix and the OB-MECC Encryption is utilized in the privacy preservation phase to maintain the security of the data. The derivation of bilinear map co-efficient is used to handle both the utility and the sensitive information. The new algorithm called, AROA is developed by integrating the ALO with ROA. The performance and the comparative analysis of the proposed AROA based BMCG method is done using the metrics, such as accuracy and information loss. The proposed AROA based BMCG method obtained a maximal accuracy of 94% and minimal information loss of 6% respectively.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Contact Abnormal Physiological Status Detection During Sport and Training 运动训练中非接触性异常生理状态检测
Int. J. Distributed Syst. Technol. Pub Date : 2021-10-01 DOI: 10.4018/ijdst.287860
Jinlin Yang
{"title":"Non-Contact Abnormal Physiological Status Detection During Sport and Training","authors":"Jinlin Yang","doi":"10.4018/ijdst.287860","DOIUrl":"https://doi.org/10.4018/ijdst.287860","url":null,"abstract":"In sport and training, it is necessary to continue monitoring the physiological parameters of athletes to ensure that they can maintain a high level of competitive state. The previous monitoring physiological status methods mainly are contactable by sensors that are worn on body. This paper adopts a non-contact physiological parameter monitoring method by using imaging photoplethysmography (iPPG). In order to eliminate the noises in iPPG signals, the correlation energy entropy threshold adaptive denoising and variance characterization sereies are introduced to resist the noises from external conditions. The noises are remove by a threshold which is estimated by noise energy entropy. The constructed signals after denoising are used to estimate physiological parameters, such as heart rate and respiratory rate. The experimental results demonstrate that it estimates the physiological parameters better by usng iPPG based physiological parameter monitoring method than previous methods.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122672643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信