scholarly journals Quasi-Mapping and Satisfying IoT Availability with a Penalty-Based Algorithm

Mathematics ◽  
2021 ◽  
Vol 9 (24) ◽  
pp. 3286
Author(s):  
Amir Masoud Rahmani ◽  
Rizwan Ali Ali Naqvi ◽  
Saqib Ali ◽  
Seyedeh Yasaman Hosseini Hosseini Mirmahaleh ◽  
Mehdi Hosseinzadeh

The Internet of things and medical things (IoT) and (IoMT) technologies have been deployed to simplify humanity’s life, which the complexity of communications between their layers was increased by rising joining the applications to IoT and IoMT-based infrastructures. The issue is challenging for decision-making and the quality of service where some researchers addressed the reward-based methods to tackle the problems by employing reinforcement learning (RL) algorithms and deep neural networks (DNNs). Nevertheless, satisfying its availability remains a challenge for the quality of service due to the lack of imposing a penalty to the defective devices after detecting faults. This paper proposes a quasi-mapping method to transfer the roles of sensors and services onto a neural network’s nodes to satisfy IoT-based applications’ availability using a penalty-backwarding approach into the NN’s weights and prunes weak neurons and synaptic weights (SWs). We reward the sensors and fog services, and the connection weights between them when are covered the defective nodes’ output. Additionally, this work provides a decision-making approach to dedicate the suitable service to the requester using employing a threshold value in the NN’s output layer according to the application. By providing an intelligent algorithm, the study decides to provide a service based on its availability and updating initial information, including faulty devices and new joined components. The observations and results prove decision-making accuracy for different IoT-based applications by approximately 95.8–97% without imposing the cost. The study reduces energy consumption and delay by approximately 64.71% and 47.4% compared without using neural networks besides creating service availability. This idea affects deploying IoT infrastructures to decision-making about providing appropriate services in critical situations because of removing defective devices and joining new components by imposing penalties and rewards by the designer, respectively.

2012 ◽  
Vol 11 (1) ◽  
pp. 73-85
Author(s):  
Simona Hašková

Abstract The contribution sets simple mathematic models describing and explaining the way of behavior of various types of investors (the private and institutionalized ones). The models come from the cardinal utility theory which is used for explaining the connection between the subjective relationship towards risk and some pathologic phenomenon of finance theory (for example the moral hazard question of institutionalized investors) and takes into account the decision making of both ordinary people and professional investors. A reliable estimate of the economic surroundings where the investment should run contributes significantly to a quality of the particular investment decisions. The article contributes to a quality of the investment decision by the original and primary approach to pricing information that lowers the uncertainty in occurrences of the relevant scenarios of the project’s development. At the conclusion there is shown how the shift of the decision breaking point shapes the amount of the acceptable price of the information.


Author(s):  
R. I. Minu ◽  
G. Nagarajan

In the present-day scenario, computing is migrating from the on-premises server to the cloud server and now, progressively from the cloud to Edge server where the data is gathered from the origin point. So, the clear objective is to support the execution and unwavering quality of applications and benefits, and decrease the cost of running them, by shortening the separation information needs to travel, subsequently alleviating transmission capacity and inactivity issues. This chapter provides an insight of how the internet of things (IoT) connects with edge computing.


Author(s):  
Rajasekaran Rajkumar

The increasing number of problems that need to be addressed in the hospital sector calls for innovation in this field. It brings us the need to find cost-effective and memory-efficient solutions to handle the vast data and sector it into essential information to operate on the patient. There used to be many systems to manage clinical records which are fixed at a place. It is quite complicated to get the information and make this data available at a patient's bedside. This leads to a considerable amount of wasted time in moving to those storage PCs and also the cost afforded is comparatively high. A computer system that controls and accomplishes all the data in the hospital database to provide effective healthcare is called hospital information system (HIS). The introduction of HIS made billing and inventor easier for the staff. This paper discusses diverse methods that improve the cost, demands of HIS, and provide techniques to function efficiently using wireless networks. Also, the paper gives a comparative study on different aspects such as cost, quality of service, transportation, and security. A new system is proposed by combining the wireless healthcare system along prioritized alert notification.


Author(s):  
F. W. Albalas ◽  
B. A. Abu-Alhaija ◽  
A. Awajan ◽  
A. Awajan ◽  
Khalid Al-Begain

New web technologies have encouraged the deployment of various network applications that are rich with multimedia and real-time services. These services demand stringent requirements are defined through Quality of Service (QoS) parameters such as delay, jitter, loss, etc. To guarantee the delivery of these services QoS routing algorithms that deal with multiple metrics are needed. Unfortunately, QoS routing with multiple metrics is considered an NP-complete problem that cannot be solved by a simple algorithm. This paper proposes three source based QoS routing algorithms that find the optimal path from the service provider to the user that best satisfies the QoS requirements for a particular service. The three algorithms use the same filtering technique to prune all the paths that do not meet the requirements which solves the complexity of NP-complete problem. Next, each of the three algorithms integrates a different Multiple Criteria Decision Making method to select one of the paths that have resulted from the route filtering technique. The three decision making methods used are the Analytic Hierarchy Process (AHP), Multi-Attribute Utility Theory (MAUT), and Kepner-Tregoe KT. Results show that the algorithms find a path using multiple constraints with a high ability to handle multimedia and real-time applications.


2019 ◽  
Vol 7 (4) ◽  
pp. 162-176
Author(s):  
Rajendran N. ◽  
Jawahar P.K. ◽  
Priyadarshini R.

Purpose The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network. Design/methodology/approach It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node. Findings The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches. Research limitations/implications In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA). Practical implications It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time. Social implications When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput. Originality/value The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.


IoT ◽  
2020 ◽  
Vol 1 (1) ◽  
pp. 49-75
Author(s):  
Antonio Oliveira-Jr ◽  
Kleber Cardoso ◽  
Filipe Sousa ◽  
Waldir Moreira

Industry 4.0 and digital farming rely on modern communication and computation technologies such as the Internet of Things (IoT) to provide smart manufacturing and farming systems. Having in mind a scenario with a high number of heterogeneous connected devices, with varying technologies and characteristics, the deployment of Industry 4.0 and digital farming solutions faces innovative challenges in different domains (e.g., communications, security, quality of service). Concepts such as network slicing and Software-Defined Networking (SDN) provide the means for faster, simpler, scalable and flexible solutions in order to serve a wide range of applications with different Quality-of-Service (QoS) requirements. Hence, this paper proposes a lightweight slice-based QoS manager for non-3GPP IoT focusing on different use cases and their varying requirements and characteristics. Our focus in this work is on non-3GPP IoT unlicensed wireless technologies and not specifically the end-to-end network slice perspective as described in 5G standards. We implemented and evaluated different QoS models in distinct scenarios in a real experimental environment in order to illustrate the potential of the proposed solution.


Author(s):  
R. Manjunath

Providing security for the content that gets exchanged between physically and geographically different locations is challenging. The cost and resources to be used to meet this challenge has to be linked to the degree of security demanded by the content. In this chapter, the security associated with the transfer of the content is quantified and treated as a quality of service parameter. The user is free to select the parameter depending up on the content being transferred. As dictated by the demanding situations, a minimum agreed security would be assured for the data at the expense of the appropriate resources over the network.


2018 ◽  
Vol 12 (3) ◽  
pp. 198-201 ◽  
Author(s):  
Eric C. Schneider

Much of the health system’s avoidable spending may be driven by doctors’ decision making. Past studies demonstrated potentially consequential and costly inconsistencies between the actual decisions that clinicians make in daily practice and optimal evidence-based decisions. This commentary examines the “best practices regimen” through the lens of the quality measurement movement.  Although quality measures have proliferated via public reporting and pay-for-performance programs, evidence for their impact on quality of care is scant; the cost of care has continued to rise; and the environment for clinical decisions may not have improved. Naturalistic decision making offers a compelling alternative conceptual frame for quality measurement. An alternative quality measurement system could build on insights from naturalistic decision making to optimize doctors’ and patients’ joint decisions, improve patients’ health outcomes, and perhaps slow the growth of health care spending in the future.


Sign in / Sign up

Export Citation Format

Share Document