{"title":"K-means clustering algorithm for data distribution in cloud computing environment","authors":"Hailan Pan, Yongmei Lei, Shi Yin","doi":"10.1504/ijguc.2021.117873","DOIUrl":"https://doi.org/10.1504/ijguc.2021.117873","url":null,"abstract":"This study analyses the data structure in cluster analysis. It is a clustering method that randomly selects a known number of points and then continues to expand. Through the comparative experiment...","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method for determining cloth simulation filtering threshold value based on curvature value of fitting curve","authors":"Jialong Sun, Zhengyang Zhang, Bingxin Long, Siyuan Qin, Yonghao Yan, Lize Wang, Jiangtao Qin","doi":"10.1504/ijguc.2021.117849","DOIUrl":"https://doi.org/10.1504/ijguc.2021.117849","url":null,"abstract":"Cloth Simulation Filtering (CSF) is an algorithm that is effectively applied to mobile 3D laser point cloud filtering. The classification threshold in cloth simulation is a key parameter for separa...","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115571989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud workflow scheduling algorithm based on multi-objective hybrid particle swarm optimisation","authors":"Gang Dai, Baomin Xu, Jianfeng Peng, Lei Zhang","doi":"10.1504/ijguc.2021.117850","DOIUrl":"https://doi.org/10.1504/ijguc.2021.117850","url":null,"abstract":"Particle swarm optimisation has been widely used in solving scheduling problems. This paper proposes a hybrid algorithm namely Hill Climbing with Multi-objective Particle Swarm Optimisation called ...","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131051889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An agent-based mechanism to form cloud federations and manage their requirements changes","authors":"Nassima Bouchareb, N. Zarour","doi":"10.1504/ijguc.2021.117851","DOIUrl":"https://doi.org/10.1504/ijguc.2021.117851","url":null,"abstract":"Cloud computing is a business paradigm, where Cloud providers offer computing resources (software and hardware) and Cloud consumers use them. Forming Cloud federations and managing them is a big pr...","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Anasuya Threse Innocent, G. Prakash, K. Sangeeta
{"title":"FastGarble: an optimised garbled circuit construction framework","authors":"A. Anasuya Threse Innocent, G. Prakash, K. Sangeeta","doi":"10.1504/ijguc.2021.117846","DOIUrl":"https://doi.org/10.1504/ijguc.2021.117846","url":null,"abstract":"The emerging field of cryptography, Secure Computation, can be used to solve a number of distributed computing applications without loss of privacy of sensitive/private data. The applications can b...","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modigari Narendra, M. Valarmathi, L. Anbarasi, D. Prasanna
{"title":"A vector-based watermarking scheme for 3D models using block rearrangements","authors":"Modigari Narendra, M. Valarmathi, L. Anbarasi, D. Prasanna","doi":"10.1504/ijguc.2020.10029974","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10029974","url":null,"abstract":"Watermarking schemes help to secure the ownership, authenticity, and copyright-related security issues of electronic data. Digital watermarking is used to enhance the copyright protection of the 3D models thus overcoming the integrity violations. An efficient, robust, semi-blind computationally secure DWT-based watermarking is proposed for 3D models. Firstly, a block segmentation of the vertices is performed on the horizontally or vertically scrambled host 3D model. The secret watermark is embedded into the lower frequency band of each segment using Discrete Wavelet Transform (DWT). The proposed scheme employs block rearrangement to scramble the host 3D model so as to enhance the security and fidelity of the embedded watermark. Reverse scrambling and inverse DWT is accomplished for constructing the watermarked model. Semi-blind extraction process achieved a successful retrieval of the secret watermark from the watermarked 3D model. A simulation study with a variety of 3D models evidenced the performance of the proposed watermarking scheme in terms of geometrical attacks, robustness and degradation affect.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115489084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Silva, José dos Santos Machado, A. Ribeiro, E. Moreno
{"title":"Towards self-optimisation in fog computing environments","authors":"D. Silva, José dos Santos Machado, A. Ribeiro, E. Moreno","doi":"10.1504/ijguc.2020.10029710","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10029710","url":null,"abstract":"In recent years, the number of smart devices has grown exponentially. However, the computational demand for latency-sensitive applications has grown and the traditional model of cloud computing is no longer able to meet alone all the needs of this type of application. In this direction, a new paradigm of computation was introduced, it is called Fog Computing. Many challenges need to be overcome, especially those regarding issues such as security, power consumption, high latency in communication with critical IoT applications, and need for QoS. We have presented a container migration mechanism to Fog and the cloud computing that supports the implementation of optimisation strategies to achieve different objectives and solutions to problems of resources allocation. In addition, our work emphasises the performance and latency optimisation, through an autonomic architecture based on the MAPE-K control loop, and provides a foundation for the analysis and optimisation architectures design to support IoT applications.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu
{"title":"Efficient variant transaction injection protocols and adaptive policy optimisation for decentralised ledger systems","authors":"Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu","doi":"10.1504/ijguc.2020.10032064","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10032064","url":null,"abstract":"For decentralised cryptocurrency systems, it is important to provide users an efficient network. One performance bottleneck is the latency issue. To address this issue, we provide four protocols to utilise the resources based on the traffic in the network to alleviate the latency in the network. To facilitate the verification process, we discuss three variant injection protocols: Periodic Injection of Transaction via Evaluation Corridor (PITEC), Probabilistic Injection of Transactions (PIT) and Adaptive Semi-synchronous Transaction Inject (ASTI). The injection protocols are variants based on the given assumptions of the network. The goal is to provide dynamic injection of unverified transactions to enhance the performance of the network. The Adaptive Policy Optimisation (APO) protocols aim at optimising a cryptocurrency system's own house policy. The house policy optimisation is translated into a 0/1 knapsack problem. The APO protocol is a fully polynomial time approximation scheme for the decentralised ledger system.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125244092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Hamid, Y. Hafeez, Bushra Hamid, M. Humayun, Noor Zaman Jhanjhi
{"title":"Towards an effective approach for architectural knowledge management considering global software development","authors":"M. A. Hamid, Y. Hafeez, Bushra Hamid, M. Humayun, Noor Zaman Jhanjhi","doi":"10.1504/ijguc.2020.10032062","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10032062","url":null,"abstract":"Architectural design is expected to provide virtuous outcomes of quality software products by satisfying customer requirements. A foremost apprehension of the customer is to have a better quality product within a minimal time span. The evaporation of architectural knowledge causes snags for the quality of a system being developed. The research study aims to propose and validate a framework bridging the gaps in architectural knowledge management. A mixed research approach has been employed. In order to align closely with industry practices, action research has been considered as research methodology, while the evaluation has been performed using a multiple case study approach. The results show that the framework enables the architects to cope with complex designs in distributed software development environments. The developed tool enabled to shift the theory into practice by assisting in creation of system architecture, knowledge survival and support architectural evolution with changing requirements.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122434030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kshira Sagar Sahoo, S. Ramasubbareddy, B. Balusamy, B. Deep
{"title":"Analysing control plane scalability issue of software defined wide area network using simulated annealing technique","authors":"Kshira Sagar Sahoo, S. Ramasubbareddy, B. Balusamy, B. Deep","doi":"10.1504/ijguc.2020.10032055","DOIUrl":"https://doi.org/10.1504/ijguc.2020.10032055","url":null,"abstract":"In Software Defined Networks (SDN), the decoupling of the control logic from the data plane provides numerous advantages. Since its inception, SDN is a subject of a wide range of criticism mainly related to the scalability issues of the control plane. To address these limitations, recent architectures have supported the implementation of multiple controllers. Usage of multiple controllers leads to Controller Placement Problems (CPP) particularly in wide area networks. In most of the placement strategies, authors focused on propagation latency, because it is a critical factor in real networks. In this paper, the placement problem has been formulated on the basis of propagation latency as an optimisation problem, and Simulated Annealing (SA) technique has been used to analyse the problem. Further, we investigate the behaviour of SA with four different neighbouring solutions technique. The effectiveness of the algorithms is carried out on TataNld topology and implemented using MATLAB simulator.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130266932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}