Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
Integration of UAVs and FANETs in Disaster Management: A Review on Applications, Challenges and Future Directions 无人机与 FANET 在灾害管理中的整合:应用、挑战和未来方向综述
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-27 DOI: 10.1002/ett.70023
Sohail Abbas, Manar Abu Talib, Ibtihal Ahmed, Omar Belal
{"title":"Integration of UAVs and FANETs in Disaster Management: A Review on Applications, Challenges and Future Directions","authors":"Sohail Abbas,&nbsp;Manar Abu Talib,&nbsp;Ibtihal Ahmed,&nbsp;Omar Belal","doi":"10.1002/ett.70023","DOIUrl":"https://doi.org/10.1002/ett.70023","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid growth and technological improvement in wireless communication, driven by engineers from various disciplines, have reached significant milestones. Unmanned Aerial vehicles (UAVs) and flying ad hoc networks (FANET) have undergone one of the biggest innovations. UAVs have drawn a lot of attention from research institutions. They are increasingly employed in various application fields, such as real-time monitoring, precision farming, wireless coverage, military surveillance, climate monitoring, disaster surveillance, and monitoring and rescue operations. The primary characteristics of disasters are their unpredictability and the scarcity of resources in the affected areas. To reduce the loss of lives and livelihoods, disaster management has received much attention. Numerous methodologies and technologies have been developed to predict and handle disasters. UAVs are increasingly being used in disaster management. Additionally, artificial intelligence and collaborative machine learning techniques are gaining prominence among researchers, who are investigating the possibility of their use in disaster management tasks to better cope with the severe and frequently devastating effects of natural catastrophes. This paper provides a review of the relevant FANET research activities in disaster management and emerging artificial intelligence techniques, along with several observations and research challenges. The papers are categorized based on the disaster scenario-related problems and their proposed solutions. FANET problems are receiving less attention from the research community, and the main challenges with FANETs are also highlighted. Finally, significant insights are presented that can aid in improving research related to the application of FANETs in disaster management.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-Based Computation-Efficient Offloading and Power Control for UAV-Assisted MEC Networks 基于 DRL 的计算高效卸载和功率控制,适用于无人机辅助的 MEC 网络
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-23 DOI: 10.1002/ett.70027
B. Priya, J. M. Nandhini, S. Uma, K. Anuratha
{"title":"DRL-Based Computation-Efficient Offloading and Power Control for UAV-Assisted MEC Networks","authors":"B. Priya,&nbsp;J. M. Nandhini,&nbsp;S. Uma,&nbsp;K. Anuratha","doi":"10.1002/ett.70027","DOIUrl":"https://doi.org/10.1002/ett.70027","url":null,"abstract":"<div>\u0000 \u0000 <p>Mobile edge computing (MEC) has achieved significant attention due to the availability of computational tasks in specific scenarios such as emergency applications like forest fire and earthquake remedies. The computationally demanding policy and user offloading policy are challenging problems to address in the energy constrained unmanned aerial vehicle (UAV) network. In this work, the computational task offloading, and power management is solved by using the multi-agent deterministic power management algorithm (MADPM) based on deep reinforcement learning. Every UAV works together as a team to understand the actor critic environment and to make decisions that will help achieve the goals. This involves transferring computational tasks from UAVs to more powerful ground stations or other UAVs to save energy and enhance performance. It requires intelligent decision-making to determine which tasks to offload and when. The joint optimization problem is verified with the simulation results and the proposed work is enabled with MEC in achieving the emergence of UAV related applications. Our simulations show that the MADPM algorithm, as suggested, enhances task offloading efficiency by 35% and reduces power consumption by 25% when compared with current methods. These findings underscore the ability of our method to greatly improve the UAV operational capacities.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft Actor-Critic Request Redirection for Quality Control in Green Multimedia Content Distribution 用于绿色多媒体内容分发质量控制的软代理-批评请求重定向
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-20 DOI: 10.1002/ett.70014
Pejman Goudarzi, Jaime Lloret
{"title":"Soft Actor-Critic Request Redirection for Quality Control in Green Multimedia Content Distribution","authors":"Pejman Goudarzi,&nbsp;Jaime Lloret","doi":"10.1002/ett.70014","DOIUrl":"https://doi.org/10.1002/ett.70014","url":null,"abstract":"<p>Nowadays, network resource limitations which are resulted from the increasing interest of greedy users for streaming video services, lead the network operators to use multimedia content distribution/delivery network (CDN) for distribution of user requests to the network edges and hence optimally use their resources. Due to the stochastic and uncertain nature of user request distributions and green energy suppliers (wind, solar, etc.), developing an optimal request redirection methodology that takes into account both maximizing total users' quality of experience (QoE) and energy cost minimization is a challenging issue. In this paper, a model-free soft actor-critic reinforcement learning algorithm has been developed for QoE enhancement of smart grid-enabled (green) content distribution networks. Contrary to the traditional CDNs, the achieved optimal request redirection policy, while maximizing the total QoE of the system, may redirect the users of a regional CDN point of presence to other (non-regional) PoPs due to real-time energy management mechanism associated with energy cost optimization constraints. We have performed extensive simulations on real electricity pricing data for validating the effectiveness of the proposed method and have compared it with similar approaches. The experimental results show that the proposed intelligent request routing method while preserving the same order of computational complexity, can achieve the energy cost savings up to 65% and improve the average total QoE of CDN users in comparison with similar methods.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142692085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Performance of Full-Duplex Space-Air-Ground Integrated Networks in the Presence of Active/Passive Eavesdropper, and Friendly Jammer 存在主动/被动窃听器和友好干扰器时的全双工空地一体化网络的保密性能
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-20 DOI: 10.1002/ett.70024
Ayse Betul Buyuksar, Eylem Erdogan, Ibrahim Altunbas
{"title":"Secrecy Performance of Full-Duplex Space-Air-Ground Integrated Networks in the Presence of Active/Passive Eavesdropper, and Friendly Jammer","authors":"Ayse Betul Buyuksar,&nbsp;Eylem Erdogan,&nbsp;Ibrahim Altunbas","doi":"10.1002/ett.70024","DOIUrl":"https://doi.org/10.1002/ett.70024","url":null,"abstract":"<div>\u0000 \u0000 <p>In this paper, a full-duplex (FD) space-air ground integrated network (SAGIN) system with passive and active eavesdroppers (PE/AE) and a friendly jammer (FJ) is investigated. The shadowing side information (SSI)-based unmanned aerial vehicle relay node (URN) selection strategy is considered to improve signal-to-interference plus noise power ratio (SINR) at the ground destination unit. To quantify the secrecy performance of the considered scenario, outage probability (OP), interception probability (IP), and transmission secrecy outage probability (TSOP) are investigated in the presence of FJ and PE/AE. The results have shown that aerial AE is an important threat since it can severely degrade the OP of the main transmission link. Furthermore, the FJ can decrease the IP of the eavesdropper by causing interference with the cost of power consumption of URNs. Simulations are performed to verify the theoretical findings.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142685242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT-Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing 基于物联网的 5G 无线传感器网络采用利用 DCNN 处理的安全路由方法
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-19 DOI: 10.1002/ett.70025
Yassine Sabri, Adil Hilmani
{"title":"An IoT-Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing","authors":"Yassine Sabri,&nbsp;Adil Hilmani","doi":"10.1002/ett.70025","DOIUrl":"https://doi.org/10.1002/ett.70025","url":null,"abstract":"<div>\u0000 \u0000 <p>The security principles of the fifth generation (5G) are anticipated to include robust cryptography models, information security models, and machine learning (ML) powered Intrusion Detection Systems (IDS) specifically designed for Internet of Things (IoT) based wireless sensor networks (WSNs). Nevertheless, the existing security models fall short in addressing the dynamic network characteristics of WSNs. In this context, the suggested system introduces a secure and collaborative multi-watchdog system through the implementation of deep convolutional neural network (DCNN) and distributed particle filtering evaluation scheme (DPFES). The proposed system utilizes deep learning (DL) techniques to create a dynamic multi-watchdog system that safeguards each sensor node by monitoring its transmissions. Furthermore, the proposed approach includes secure data-centric and node-centric evaluation methods that are crucial for enhancing the security of 5G-based IoT-WSN networks. The network evaluation processes based on DL facilitate the creation of a secure multi-watchdog system within dense IoT-WSN environments. This system enables the deployment of active watchdog IDS agents as needed. The proposed approach includes various components such as a system dynamics model, cooperative watchdog model, Dual Line Minimum Connected Dominating Set (DL-MCDS), and DL-based event analysis procedures. From a technical perspective, the system is driven by the implementation of DPFES, which utilizes particle filtering frameworks to analyze network events and establish a secure 5G environment. The system has been successfully implemented, and its results have been compared with those of other similar works. The performance of the proposed cooperative multi-watchdog system demonstrates a significant improvement of <span></span><math></math> and <span></span><math></math> compared to other techniques.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142679914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Implementation of a Classification Method of Industrial Big Data for Security Management 面向安全管理的工业大数据分类方法研究与实施
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-14 DOI: 10.1002/ett.70021
Haibo Huang, Min Yan, Qiang Yan, Xiaofan Zhang
{"title":"Research and Implementation of a Classification Method of Industrial Big Data for Security Management","authors":"Haibo Huang,&nbsp;Min Yan,&nbsp;Qiang Yan,&nbsp;Xiaofan Zhang","doi":"10.1002/ett.70021","DOIUrl":"https://doi.org/10.1002/ett.70021","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Purpose/Significance</h3>\u0000 \u0000 <p>With the extensive adoption of cloud computing, big data, artificial intelligence, the Internet of Things, and other novel information technologies in the industrial field, the data flow in industrial companies is rapidly increasing, leading to an explosion in the total volume of data. Ensuring effective data security has become a critical concern for both national and industrial entities.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Method/Process</h3>\u0000 \u0000 <p>To tackle the challenges of classification management of industrial big data, this study proposed an Information Security Triad Assessment-Support Vector Machine (AIC-ASVM) model according to information security principles. Building on national policy requirements, FIPS 199 standards, and the ABC grading method, a comprehensive classification framework for industrial data, termed “two-layer classification, three-dimensional grading,” was developed. By integrating the concept of Data Protection Impact Assessment (DPIA) from the GDPR, the classification of large industrial data sets was accomplished using a Support Vector Machine (SVM) algorithm.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Result/Conclusion</h3>\u0000 \u0000 <p>Simulations conducted using MATLAB yielded a classification accuracy of 96.67%. Furthermore, comparisons with decision tree and random forest models demonstrated that AIC-ASVM outperforms these alternatives, significantly improving the efficiency of big data classification and the quality of security management.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Target Detection in Clutter Environment Based on Track Posture Hypothesis Testing 基于轨迹姿态假设检验的杂波环境中的移动目标检测
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-13 DOI: 10.1002/ett.70028
Lixiang Geng, Qinglin Zheng, Chengbao Zhang, Jiao Hou
{"title":"Moving Target Detection in Clutter Environment Based on Track Posture Hypothesis Testing","authors":"Lixiang Geng,&nbsp;Qinglin Zheng,&nbsp;Chengbao Zhang,&nbsp;Jiao Hou","doi":"10.1002/ett.70028","DOIUrl":"https://doi.org/10.1002/ett.70028","url":null,"abstract":"<div>\u0000 \u0000 <p>Moving target detection in a heavy clutter area is a challenging problem in the field of radar automatic target detection. Within the framework of track posture hypothesis testing, the radar-blips-oriented target detection algorithms named ErgSad and RanSaD are proposed for single target and formation targets detection, respectively in this paper. With the assumption that target motion is a linear Gaussian process in a short time, the algorithms use dual blips in different scans to generate the track hypothesis and test the hypothesis with residual blips in other scans to determine the existence of moving targets. To reduce time consumption and minimize the error of model estimation, the sampling rules and the supporting domain related to timestamps of track hypothesis models were designed. Simulation data experiments show that the proposed algorithms have more superior performance to detect targets than the state-of-the-art algorithms in the serious clutter environment.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spiking Quantum Fire Hawk Network Based Reliable Scheduling for Lifetime Maximization of Wireless Sensor Network 基于尖峰量子火鹰网络的可靠调度,实现无线传感器网络的寿命最大化
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-12 DOI: 10.1002/ett.70019
W. S. Kiran, Allan J. Wilson, A. S. Radhamani
{"title":"Spiking Quantum Fire Hawk Network Based Reliable Scheduling for Lifetime Maximization of Wireless Sensor Network","authors":"W. S. Kiran,&nbsp;Allan J. Wilson,&nbsp;A. S. Radhamani","doi":"10.1002/ett.70019","DOIUrl":"https://doi.org/10.1002/ett.70019","url":null,"abstract":"<div>\u0000 \u0000 <p>Managing energy consumption poses a substantial challenge within Wireless Sensor Networks (WSN) due to frequent communication among sensor nodes. A reliable scheduling framework presents a promising solution for maximizing WSN lifetime, minimizing energy consumption, and ensuring robust communication. Despite various proposed methods for reliable scheduling, energy consumption remains high. To address this, a spiking quantum fire hawk network-based reliable scheduling in WSN is introduced. This research incorporates clustering, duty-cycle management, and reliable routing to enhance energy efficiency. An improved Nutcracker Optimization-based Cluster Head (CH) election and Spiking Quantum Fire Hawk Network duty cycling contribute to optimal CH selection and increased network lifetime. Additionally, a Link Quality-based Energy Aware Proficient Trusted Routing Protocol (LQEAP-TRP) minimizes data transmission delay, offering reliable routing. Finally, the data communication is done in the reliable route. The developed approach is executed in Network Simulator and validated with the existing protocols. The results of the simulations indicate that the proposed approach achieves a network lifetime of 99.34% and a packet delivery ratio of 99.95%.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure and Decentralized Using Blockchain and Ring-Based Cryptosystem 使用区块链和环形密码系统的安全去中心化系统
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-12 DOI: 10.1002/ett.70012
Dhanalakshmi Ranganayakulu, Nithisha Jesubert Thangaraj, Sathya Priya Shanmugam, Balasubramani Subbiyan
{"title":"A Secure and Decentralized Using Blockchain and Ring-Based Cryptosystem","authors":"Dhanalakshmi Ranganayakulu,&nbsp;Nithisha Jesubert Thangaraj,&nbsp;Sathya Priya Shanmugam,&nbsp;Balasubramani Subbiyan","doi":"10.1002/ett.70012","DOIUrl":"https://doi.org/10.1002/ett.70012","url":null,"abstract":"<div>\u0000 \u0000 <p>The advancement of Intelligent Transport Systems (ITSs) and the Internet of Vehicles (IoVs) introduces significant security challenges, particularly in ensuring secure communication between vehicles and vehicles (V2V), vehicles and Road Side Units (V2RSU). These vulnerabilities could potentially compromise the integrity of vehicular networks, making robust security measures essential. This paper aims to develop a secure communication framework for IoV environments that addresses these security concerns by enhancing authentication and encryption processes. The proposed approach combines the Ring-Based Degree Truncated Polynomial Cryptosystem (RNTPC) with a Blockchain framework incorporating an enhanced proof-of-authentication (BEPoAuth) consensus algorithm. The approach is initiated from the registration phase and managed by a Trusted Authority (TA), ensuring secure vehicle and RSU registration. Authentication is carried out in two ways: V2V authentication through vehicle signatures and V2RSU authentication via batch verification of cluster members. Group keys are generated using RNTPC for secure communication, and blockchain technology is integrated to secure transactions within the IoV environment. The proposed methodology is evaluated using various performance metrics, demonstrating a 15%–20% improvement in throughput compared to existing techniques such as Practical Byzantine Fault Tolerance (PBFT), Secure and Highly Efficient Blockchain PBFT Consensus Algorithm (SG-PBFT), credit-based PBFT consensus algorithm (CPBFT) and Geographic-PBFT (G-PBFT). The system also exhibited minimal computational and communication latency while enhancing V2V and V2RSU communication efficiency. The RNTPC-BEPoAuth framework offers a robust and secure solution for IoV communications, significantly outperforming existing methods in terms of throughput and efficiency. This approach provides a reliable foundation for secure ITSs, addressing critical security concerns in vehicular networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Data Replication in Cloud Using Hybrid Optimization Approach 使用混合优化方法优化云中的数据复制
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-11-12 DOI: 10.1002/ett.70022
D. Rambabu, A. Govardhan
{"title":"Optimized Data Replication in Cloud Using Hybrid Optimization Approach","authors":"D. Rambabu,&nbsp;A. Govardhan","doi":"10.1002/ett.70022","DOIUrl":"https://doi.org/10.1002/ett.70022","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud computing (CC), in contrast to traditional high-performance computing environments, is a group of imaginary and networked resources of computing that are controlled by one unified maximum-performance computing power. Here, this work aims to develop a novel data replication method in the cloud. The data replication is carried out with a new multi-objective technique that considers constraints like cost, the distance between data centers, trust, and risk. Moreover, for optimal data replication, a new hybrid algorithm termed poor rich strategy assisted grasshopper optimization (PRS-GO) is introduced. To increase the accessibility of the system, the data used continuously should be duplicated in various areas. A minimal mean value of 0.66 is gained with the PRS-GO scheme, whereas Particle Swarm Optimization-Tabu Search (PSO + TS), Receding Horizon Control (RHC), Sun Flower Optimization (SFO), Cat Mouse-Based Optimization (CMBO), Hunger Games Search Optimization (HGSO), Seagull Optimization (SGO), Poor And Rich Optimization (PRO), and Grasshopper Optimization Algorithm (GOA) have got a high mean value of 0.722, 0.71, 0.71, 0.71, 0.7, 0.7, 0.7, and 0.69.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信