scholarly journals SHANN: an IoT and machine-learning-assisted edge cross-layered routing protocol using spotted hyena optimizer

Author(s):  
Gaurav Dhiman ◽  
Rohit Sharma

AbstractIn the case of new technology application, the cognitive radio network (CRN) addresses the bandwidth shortfall and the fixed spectrum problem. The method for CRN routing, however, often encounters issues with regard to road discovery, diversity of resources and mobility. In this paper, we present a reconfigurable CRN-based cross-layer routing protocol with the purpose of increasing routing performance and optimizing data transfer in reconfigurable networks. Recently developed spotted hyena optimizer (SHO) is used for tuning the hyperparameters of machine-learning models. The system produces a distributor built with a number of tasks, such as load balance, quarter sensing and the development path of machine learning. The proposed technique is sensitive to traffic and charges, as well as a series of other network metrics and interference (2bps/Hz/W average). The tests are performed with classic models that demonstrate the residual energy and strength of the resistant scalability and resource.

2021 ◽  
Vol 13 (4) ◽  
pp. 24-36
Author(s):  
Srinivasan Palanisamy ◽  
Sankar S. ◽  
Ramasubbareddy Somula ◽  
Ganesh Gopal Deverajan

Wireless sensor networks (WSN) deployed in open environments make nodes prone to various security attacks due to their resource constrained nature. The compromised nodes are used to mislead the sensed data and disrupt communication, which can affect the entire decision-making system based on the sensed data. It is also possible to drain the sensor nodes energy and reduce the battery life of the networks. Trust models are the preferred mechanism to secure WSN. In this paper, the authors present communication trust and energy aware (CTEA) routing protocol that make use of the proposed trust model to mitigate the effects of badmouth and energy drain attacks. They use Dempster theory to compute communication trust and also consider the energy metric, to establish the route for data transfer. The simulation result shows that the proposed trust model increases the packet delivery ratio, residual energy, and network lifetime by mitigating the nodes misbehaviour in presence of energy drain and bad mouth attacks.


2021 ◽  
Vol 12 (1) ◽  
pp. 73-94
Author(s):  
Pham Quang Huy ◽  
Vu Kien Phuc

Abstract This research ferreted out to inspect the interconnection between emotional intelligence (EI), Blockchain technology application (BLO) and the effectiveness of Accounting information system (AIS). Survey-based data obtained from 412 respondents were applied to validate the model hypotheses. Building on the statistical analysis with the support of SPSS 25.0 and SMART- PLS (partial least squares) 3.2.8 software package, the model results inferred the impact of EI on BLO. Besides, the outputs of the study accentuated on the importance of BLO on the effectiveness of AIS. These significant additions will optimistically inspire other scholars to carry on exploring the relationship between EI and BLO in enhancing the effectiveness of AIS in research settings as well as in explaining the results. On the other hand, taking these results into consideration could promote much better solutions for issues relevant to EI and new technology application among public sector organization (PSO) in term of increasing the performance of AIS.


2011 ◽  
Vol 403-408 ◽  
pp. 2415-2419 ◽  
Author(s):  
Yuan Ming Ding ◽  
Chang Hong Sun ◽  
Lin Song ◽  
Wan Qi Kong

Simulation environment of the mobile Ad Hoc network is built by applying NS2 simulation software. The simulation data indicates that AODV routing protocol is better than DSDV in throughput, fairness and stability. In the underwater network environment where the nodes are in Low-Speed movement, the data transfer rate of AODV routing protocol is higher than AOMDV. To a certain extent, AODV is more suitable for application in underwater environments.


2021 ◽  
Author(s):  
Mihaela Vlaicu ◽  
Vasile Marius Nae ◽  
Patrick Christian Buerssner ◽  
Stefan Liviu Firu ◽  
Natalya Logashova

Abstract Paraffin represents one of the main case of failures and production losses which facing the entire oil industry. Prevention of paraffin deposition on the subsurface/surface equipment can be achieved by keeping the paraffin dissolved in crude oil or minimizing the adhesion or aggregation process of wax crystals. The paraffin problems which occur, conduct to gradual reduction of the tubular and pipelines internal diameter, restriction or valves blockages, and reduce the equipment capacity until the production is stop. Problems due to paraffin deposition varies and is different according with each commercial field, sometime the difference is from a well to well which producing from the same reservoir with different consistency. How we shall proceed? Before or after paraffin is field on the equipment? How could be avoid the future paraffin deposition? How long the selected method is proper for well ? The decision represents a combination based on oil's chemical & physical characteristics, well's behavior, method selected for prevention or elimination and combined with economic analysis and field experience. The paraffin inhibition applying is a common practice in OMV Petrom, which cover majority of the production wells. For the special wells, which the paraffin inhibition didn't provided satisfying results (multiple intervention due to paraffin deposition) was selected the Down Hole Heating technology (DHH) which was successfully tested in our company since 2014 thanks according with the yearly New Technology Program. The operating principle consists in heating the fluid volume from tubing using the heating cable which can be installed inside tubing, for NF and ESP wells or outside tubing for SRP or PCP wells. The cable is designed and located at the interval of wax crystallization appearance and heats the fluid to the temperature higher than the wax crystallization point (WAT). Since then, the DHH technology had an upward course, proven by high run life (highest value 2500 days / average 813 days) of the technology at the total 47 wells equipped, until this moment. Based on the successful results, recorded of 64% of old production wells equipped, it was decided to apply the technology at first completion of the new wells (36%), thus ensuring the protection of the new equipment. The paper offers an overview of DHH technology implementation, achievements, benefits and online monitoring of technology implementation starting with 2014 until today. The total impact shown a decreasing of no.of failures with 73,8%, the cost of intervention with 76,5%. The production losses decreased only with 5%, which certifies the fact that the technology helping production maintaining during the exploitation in comparison with production losses due paraffin issues recorded at wells without equipped with DHH technology. During 6 years of down hole heating technology application were developed candidate selection decision tree, monitoring the electrical efficiency, using the adaptability capacity of the technology from one well to another and integrate the temperature parameters in online monitoring system as part of digitalization concept of OMV Petrom, aspects which will be present in this article.


Cell Cycle ◽  
2018 ◽  
Vol 17 (4) ◽  
pp. 486-491 ◽  
Author(s):  
Nicolas Borisov ◽  
Victor Tkachev ◽  
Maria Suntsova ◽  
Olga Kovalchuk ◽  
Alex Zhavoronkov ◽  
...  

2021 ◽  
Vol 11 (22) ◽  
pp. 10517
Author(s):  
V. Sivasankarareddy ◽  
G. Sundari ◽  
Ch. Rami Reddy ◽  
Flah Aymen ◽  
Edson C. Bortoni

Presently, due to the establishment of a sensor network, residual buildings in urban areas are being converted into smart buildings. Many sensors are deployed in various buildings to perform different functions, such as water quality monitoring and temperature monitoring. However, the major concern faced in smart building Wireless Sensor Networks (WSNs) is energy depletion and security threats. Many researchers have attempted to solve these issues by various authors in different applications of WSNs. However, limited research has been conducted on smart buildings. Thus, the present research is focused on designing an energy-efficient and secure routing protocol for smart building WSNs. The process in the proposed framework is carried out in two stages. The first stage is the design of the optimal routing protocol based on the grid-clustering approach. In the grid-based model, a grid organizer was selected based on the sailfish optimization algorithm. Subsequently, a fuzzy expert system is used to select the relay node to reach the shortest path for data transmission. The second stage involves designing a trust model for secure data transmission using the two-fish algorithm. A simulation study of the proposed framework was conducted to evaluate its performance. Some metrics, such as the packet delivery ratio, end-end delay, and average residual energy, were calculated for the proposed model. The average residual energy for the proposed framework was 96%, which demonstrates the effectiveness of the proposed routing design.


2021 ◽  
pp. medethics-2020-107095
Author(s):  
Charalampia (Xaroula) Kerasidou ◽  
Angeliki Kerasidou ◽  
Monika Buscher ◽  
Stephen Wilkinson

Artificial intelligence (AI) is changing healthcare and the practice of medicine as data-driven science and machine-learning technologies, in particular, are contributing to a variety of medical and clinical tasks. Such advancements have also raised many questions, especially about public trust. As a response to these concerns there has been a concentrated effort from public bodies, policy-makers and technology companies leading the way in AI to address what is identified as a "public trust deficit". This paper argues that a focus on trust as the basis upon which a relationship between this new technology and the public is built is, at best, ineffective, at worst, inappropriate or even dangerous, as it diverts attention from what is actually needed to actively warrant trust. Instead of agonising about how to facilitate trust, a type of relationship which can leave those trusting vulnerable and exposed, we argue that efforts should be focused on the difficult and dynamic process of ensuring reliance underwritten by strong legal and regulatory frameworks. From there, trust could emerge but not merely as a means to an end. Instead, as something to work in practice towards; that is, the deserved result of an ongoing ethical relationship where there is the appropriate, enforceable and reliable regulatory infrastructure in place for problems, challenges and power asymmetries to be continuously accounted for and appropriately redressed.


Author(s):  
Unung Verawardina

In a dynamic routing setting a routing protocol is required to perform the settings to find the shortest and best path. Routing protocols are of two types: vector distance and link state. Use of EIGRP routing that includes long-range vectors and link state OSPF Link link state coverage, peg well to be implemented in complex network because it can adapt well. In this research is the method used for routing and speed of time available EIGRP routing and OSPF routing through simulator GNS3 and wireshark application, then analyze the difference of peformance with speed of routing table and speed of time. While for Quality of Service (QoS) compare network service quality from EIGRP and OSPF routing which include delay, packet loss, and throughput. Based on the results of the research shows the EIGRP routing table is better in the selection path, EIGRP smaller time tansfer data then its data transfer faster than the OSPF. Overall Quality Of Service (Qos) delay, packetloss and throughput on EIGRP and OSPF are well balanced and good.


Sign in / Sign up

Export Citation Format

Share Document