Adaptive-Sunflower Based Grey Wolf Algorithm For Multipath Routing In Iot Network

This paper devises a routing method for providing multipath routing inan IoT network. Here the Fractional Artificial Bee colony(FABC)algorithm is devised for initiating clustering process. Moreover the multipath routing is performed by the newly devised optimization technique, namely Adaptive-Sunflower based grey wolf(Adaptive-SFG)optimization technique which is designed by incorporating adaptive idea in Sunflower based grey wolf technique. In addition the fitness function is newly devised by considering certain factors that involves Context awareness, link lifetime Energy, Trust, and Delay.For the computation of the trust, additional trust factors like direct trust indirect trust recent trust and forwarding rate factor is considered. Thus, the proposed Adaptive SFG algorithm selects the multipath for routing based on the fitness function.Finally, route maintenance is performed to ensure routing without link breakage.The proposed Adaptive-SFG outperformed other methods with high energy of0.185Jminimal delay of 0.765sec maximum throughput of47.690%and maximum network lifetime of98.7%.

Author(s):  
Pooja Arora ◽  
Anurag Dixit

Purpose The advancements in the cloud computing has gained the attention of several researchers to provide on-demand network access to users with shared resources. Cloud computing is important a research direction that can provide platforms and softwares to clients using internet. However, handling huge number of tasks in cloud infrastructure is a complicated task. Thus, it needs a load balancing (LB) method for allocating tasks to virtual machines (VMs) without influencing system performance. This paper aims to develop a technique for LB in cloud using optimization algorithms. Design/methodology/approach This paper proposes a hybrid optimization technique, named elephant herding-based grey wolf optimizer (EHGWO), in the cloud computing model for LB by determining the optimal VMs for executing the reallocated tasks. The proposed EHGWO is derived by incorporating elephant herding optimization (EHO) in grey wolf optimizer (GWO) such that the tasks are allocated to the VM by eliminating the tasks from overloaded VM by maintaining the system performance. Here, the load of physical machine (PM), capacity and load of VM is computed for deciding whether the LB has to be done or not. Moreover, two pick factors, namely, task pick factor (TPF) and VM pick factor (VPF), are considered for choosing the tasks for reallocating them from overloaded VM to underloaded VM. The proposed EHGWO decides the task to be allocated in the VM based on the newly derived fitness functions. Findings The minimum load and makespan obtained in the existing methods, constraint measure based LB (CMLB), fractional dragonfly based LB algorithm (FDLA), EHO, GWO and proposed EHGWO for the maximum number of VMs is illustrated. The proposed EHGWO attained minimum makespan with value 814,264 ns and minimum load with value 0.0221, respectively. Meanwhile, the makespan values attained by existing CMLB, FDLA, EHO, GWO, are 318,6896 ns, 230,9140 ns, 1,804,851 ns and 1,073,863 ns, respectively. The minimum load values computed by existing methods, CMLB, FDLA, EHO, GWO, are 0.0587, 0.026, 0.0248 and 0.0234. On the other hand, the proposed EHGWO with minimum load value is 0.0221. Hence, the proposed EHGWO attains maximum performance as compared to the existing technique. Originality/value This paper illustrates the proposed LB algorithm using EHGWO in a cloud computing model using two pitch factors, named TPF and VPF. For initiating LB, the tasks assigned to the overloaded VM are reallocated to under loaded VMs. Here, the proposed LB algorithm adapts capacity and loads for the reallocation. Based on TPF and VPF, the tasks are reallocated from VMs using the proposed EHGWO. The proposed EHGWO is developed by integrating EHO and GWO algorithm using a new fitness function formulated by load of VM, migration cost, load of VM, capacity of VM and makespan. The proposed EHGWO is analyzed based on load and makespan.


Author(s):  
Subiksha. V

Abstract: Due to the characteristics like limited resources and dynamic topology, wireless sensor networks (WSNs) are facing two major problems such as security and energy consumption. To deal with various improper behaviors of nodes the trust-based solutions are possible but still exist a variety of attacks, high energy consumption, and communication congestion between nodes. Therefore, this paper proposes an advanced and efficient trust-based secure and energy-efficient routing protocol (TBSEER) to solve these network problems and to avoid malicious nodes. Efficient Adaptable Ant Colony Optimization Algorithm (EAACO) calculates the comprehensive trust value through adaptive direct trust value, indirect trust value, and energy trust value, which can be resistant to internal network attacks such as sinkhole, black hole, selective forwarding, and hello flood attacks. In addition, to fast identify the malicious nodes in the WSN, the adaptive penalty mechanism and volatilization factor are used. Moreover, the nodes only need to calculate the direct trust value, and the indirect trust value is obtained by the sink, so as to further reduce the energy consumption caused by iterative calculations. To actively avoid network attacks, the cluster heads find the safest multi-hop routes based on the comprehensive trust value. The simulation results show that the proposed EAACO reduces network energy consumption, speeds up the identification of malicious nodes, as well as resists all common attacks. Keywords: Comprehensive trust value, direct trust value, indirect value, EAACO, network attacks, wireless sensor networks


2021 ◽  
pp. 089270572199320
Author(s):  
Prakhar Kumar Kharwar ◽  
Rajesh Kumar Verma

The new era of engineering society focuses on the utilization of the potential advantage of carbon nanomaterials. The machinability facets of nanocarbon materials are passing through an initial stage. This article emphasizes the machinability evaluation and optimization of Milling performances, namely Surface roughness (Ra), Cutting force (Fc), and Material removal rate (MRR) using a recently developed Grey wolf optimization algorithm (GWOA). The Taguchi theory-based L27 orthogonal array (OA) was employed for the Machining (Milling) of polymer nanocomposites reinforced by Multiwall carbon nanotube (MWCNT). The second-order polynomial equation was intended for the analysis of the model. These mathematical models were used as a fitness function in the GWOA to predict machining performances. The ANOVA outcomes efficiently explore the impact of machine parameters on Milling characteristics. The optimal combination for lower surface roughness value is 1.5 MWCNT wt.%, 1500 rpm of spindle speed, 50 mm/min of feed rate, and 3 mm depth of cut. For lower cutting force, 1.0 wt.%, 1500 rpm, 90 mm/min feed rate and 1 mm depth of cut and the maximize MRR was acquired at 0.5 wt.%, 500 rpm, 150 mm/min feed rate and 3 mm depth of cut. The deviation of the predicted value from the experimental value of Ra, Fc, and MRR are found as 2.5, 6.5 and 5.9%, respectively. The convergence plot of all Milling characteristics suggests the application potential of the GWO algorithm for quality improvement in a manufacturing environment.


2008 ◽  
Vol 571-572 ◽  
pp. 15-20 ◽  
Author(s):  
Yoshiaki Akiniwa ◽  
Hidehiko Kimura

The compressive stress distribution below the specimen surface of a nanocrystalline medium carbon steel was investigated nondestructively by using high-energy X-rays from a synchrotron radiation source, SPring-8 (Super Photon ring-8 GeV) in the Japan Synchrotron Radiation Research Institute. A medium carbon steel plate was shot-peened with fine cast iron particles of the size of 50 μm. By using the monochromatic X-ray beam with three energy levels of 10, 30 and 72 keV, the stress values at the arbitrary depth were measured by the constant penetration depth method. The stress was calculated from the slope of the sin2ψ diagram. Measured stress corresponds to the weighted average associated with the attenuation of the X-rays in the material. The real stress distribution was estimated by using the optimization technique. The stress distribution was assumed by the third order polynomial in the near surface layer and the second order polynomial. The coefficients of the polynomials were determined by the conjugate gradient iteration. The predicted stress distribution agreed well with that measured by the conventional surface removal method.


Author(s):  
Audrey NANGUE ◽  
◽  
Elie FUTE TAGNE ◽  
Emmanuel TONYE

The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on the cooperation between the nodes of this network. Indeed, given the vulnerability of wireless sensor networks to attack, some entities may engage in malicious behavior aimed at undermining the proper functioning of the network. As a result, the selection of reliable nodes for task execution becomes a necessity for the network. To improve the cooperation and security of wireless sensor networks, the use of Trust Management Systems (TMS) is increasingly recommended due to their low resource consumption. The various existing trust management systems differ in their methods of estimating trust value. The existing ones are very rigid and not very accurate. In this paper, we propose a robust and accurate method (RATES) to compute direct and indirect trust between the network nodes. In RATES model, to compute the direct trust, we improve the Bayesian formula by applying the chaining of trust values, a local reward, a local penalty and a flexible global penalty based on the variation of successful interactions, failures and misbehaviors frequency. RATES thus manages to obtain a direct trust value that is accurate and representative of the node behavior in the network. In addition, we introduce the establishment of a simple confidence interval to filter out biased recommendations sent by malicious nodes to disrupt the estimation of a node's indirect trust. Mathematical theoretical analysis and evaluation of the simulation results show the best performance of our approach for detecting on-off attacks, bad-mouthing attacks and persistent attacks compared to the other existing approaches.


Author(s):  
C. Mallika ◽  
S. Selvamuthukumaran

AbstractDiabetes is an extremely serious hazard to global health and its incidence is increasing vividly. In this paper, we develop an effective system to diagnose diabetes disease using a hybrid optimization-based Support Vector Machine (SVM).The proposed hybrid optimization technique integrates a Crow Search algorithm (CSA) and Binary Grey Wolf Optimizer (BGWO) for exploiting the full potential of SVM in the diabetes diagnosis system. The effectiveness of our proposed hybrid optimization-based SVM (hereafter called CS-BGWO-SVM) approach is carefully studied on the real-world databases such as UCIPima Indian standard dataset and the diabetes type dataset from the Data World repository. To evaluate the CS-BGWO-SVM technique, its performance is related to several state-of-the-arts approaches using SVM with respect to predictive accuracy, Intersection Over-Union (IoU), specificity, sensitivity, and the area under receiver operator characteristic curve (AUC). The outcomes of empirical analysis illustrate that CS-BGWO-SVM can be considered as a more efficient approach with outstanding classification accuracy. Furthermore, we perform the Wilcoxon statistical test to decide whether the proposed cohesive CS-BGWO-SVM approach offers a substantial enhancement in terms of performance measures or not. Consequently, we can conclude that CS-BGWO-SVM is the better diabetes diagnostic model as compared to modern diagnosis methods previously reported in the literature.


Sign in / Sign up

Export Citation Format

Share Document