期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Automated Controller Placement for Software-Defined Networks to Resist DDoS Attacks 被引量:4
1
作者 Muhammad Reazul Haque Saw Chin Tan +8 位作者 Zulfadzli Yusoff Kashif Nisar Lee Ching Kwang Rizaludin Kaspin Bhawani Shankar Chowdhry Rajkumar Buyya Satya Prasad Majumder Manoj Gupta Shuaib Memon 《Computers, Materials & Continua》 SCIE EI 2021年第9期3147-3165,共19页
In software-defined networks(SDNs),controller placement is a critical factor in the design and planning for the future Internet of Things(IoT),telecommunication,and satellite communication systems.Existing research ha... In software-defined networks(SDNs),controller placement is a critical factor in the design and planning for the future Internet of Things(IoT),telecommunication,and satellite communication systems.Existing research has concentrated largely on factors such as reliability,latency,controller capacity,propagation delay,and energy consumption.However,SDNs are vulnerable to distributed denial of service(DDoS)attacks that interfere with legitimate use of the network.The ever-increasing frequency of DDoS attacks has made it necessary to consider them in network design,especially in critical applications such as military,health care,and financial services networks requiring high availability.We propose a mathematical model for planning the deployment of SDN smart backup controllers(SBCs)to preserve service in the presence of DDoS attacks.Given a number of input parameters,our model has two distinct capabilities.First,it determines the optimal number of primary controllers to place at specific locations or nodes under normal operating conditions.Second,it recommends an optimal number of smart backup controllers for use with different levels of DDoS attacks.The goal of the model is to improve resistance to DDoS attacks while optimizing the overall cost based on the parameters.Our simulated results demonstrate that the model is useful in planning for SDN reliability in the presence of DDoS attacks while managing the overall cost. 展开更多
关键词 SDN automated controller placement SBC ILP DDoS attack
在线阅读 下载PDF
Metaheuristics Algorithm for Tuning of PID Controller of Mobile Robot System
2
作者 Harsh Goud Prakash Chandra Sharma +6 位作者 Kashif Nisar Muhammad Reazul Haque Ag.Asri Ag.Ibrahim Narendra Singh Yadav Pankaj Swarnkar Manoj Gupta Laxmi Chand 《Computers, Materials & Continua》 SCIE EI 2022年第8期3481-3492,共12页
Robots in the medical industry are becoming more common in daily life because of various advantages such as quick response,less human interference,high dependability,improved hygiene,and reduced aging effects.That is ... Robots in the medical industry are becoming more common in daily life because of various advantages such as quick response,less human interference,high dependability,improved hygiene,and reduced aging effects.That is why,in recent years,robotic aid has emerged as a blossoming solution to many challenges in the medical industry.In this manuscript,meta-heuristics(MH)algorithms,specifically the Firefly Algorithm(FF)and Genetic Algorithm(GA),are applied to tune PID controller constraints such as Proportional gain Kp Integral gain Ki and Derivative gain Kd.The controller is used to control Mobile Robot System(MRS)at the required set point.The FF arrangements are made based on various pre-analysis.A detailed simulation study indicates that the proposed PID controller tuned with Firefly Algorithm(FF-PID)for MRSis beneficial and suitable to achieve desired closed-loop system response.The FF is touted as providing an easy,reliable,and efficient tuning technique for PID controllers.The most suitable ideal performance is accomplished with FF-PID,according to the display in the time response.Further,the observed response is compared to those received by applying GA and conventional off-line tuning techniques.The comparison of all tuning methods exhibits supremacy of FF-PID tuning of the given nonlinear Mobile Robot System than GA-PID tuning and conventional controller. 展开更多
关键词 Metaheuristic algorithm genetic algorithm PID controller mobile robot system firefly algorithm
在线阅读 下载PDF
PSO Based Multi-Objective Approach for Controlling PID Controller 被引量:4
3
作者 Harsh Goud Prakash Chandra Sharma +6 位作者 Kashif Nisar Ag.Asri Ag.Ibrahim Muhammad Reazul Haque Narendra Singh Yadav Pankaj Swarnkar Manoj Gupta Laxmi Chand 《Computers, Materials & Continua》 SCIE EI 2022年第6期4409-4423,共15页
CSTR(Continuous stirred tank reactor)is employed in process control and chemical industries to improve response characteristics and system efficiency.It has a highly nonlinear characteristic that includes complexities... CSTR(Continuous stirred tank reactor)is employed in process control and chemical industries to improve response characteristics and system efficiency.It has a highly nonlinear characteristic that includes complexities in its control and design.Dynamic performance is compassionate to change in system parameterswhich need more effort for planning a significant controller for CSTR.The reactor temperature changes in either direction from the defined reference value.It is important to note that the intensity of chemical actions inside the CSTR is dependent on the various levels of temperature,and deviation from reference values may cause degradation of biomass quality.Design and implementation of an appropriate adaptive controller for such a nonlinear system are essential.In this paper,a conventional Proportional Integral Derivative(PID)controller is designed.The conventional techniques to deal with constraints suffer severe limitations like it has fixed controller parameters.Hence,A novel method is applied for computing the PID controller parameters using a swarm algorithm that overcomes the conventional controller’s limitation.In the proposed technique,PID parameters are tuned by Particle Swarm Optimization(PSO).It is not easy to choose the suitable objective function to design a PID controller using PSO to get an optimal response.In this article,a multi-objective function is proposed for PSO based controller design of CSTR. 展开更多
关键词 Particle swarm optimization multi-objective PSO continuous stirred tank reactor proportional integral derivative controller
在线阅读 下载PDF
Analytical Model for Underwater Wireless Sensor Network Energy Consumption Reduction 被引量:2
4
作者 Huma Hasan Rizvi Sadiq Ali Khan +2 位作者 Rabia Noor Enam Kashif Nisar Muhammad Reazul Haque 《Computers, Materials & Continua》 SCIE EI 2022年第7期1611-1626,共16页
In an Underwater Wireless Sensor Network(UWSN),extreme energy loss is carried out by the early expiration of sensor nodes and causes a reduction in efficiency in the submerged acoustic sensor system.Systems based on c... In an Underwater Wireless Sensor Network(UWSN),extreme energy loss is carried out by the early expiration of sensor nodes and causes a reduction in efficiency in the submerged acoustic sensor system.Systems based on clustering strategies,instead of each node sending information by itself,utilize cluster heads to collect information inside the clusters for forwarding collective information to sink.This can effectively minimize the total energy loss during transmission.The environment of UWSN is 3D architecture-based and follows a complex hierarchical clustering strategy involving its most effecting unique parameters such as propagation delay and limited transmission bandwidth.Round base clustering strategy works in rounds,where each round comprises three fundamental stages:cluster head selection,grouping or node association,and data aggregation followed by forwarding data to the sink.In UWSN,the energy consumed during the formation of clusters has been considered casually or completely evaded in the previous works.In this paper,the cluster head setup period has been considered the main contributor to extra energy utilizer.A numerical channel model is proposed to compute extra energy.It is performed by using a UWSN broad model.The results have shown that extra maximum energy consumption is approximately 12.9 percent of the system total energy consumed in information transmissions. 展开更多
关键词 Analytical model submerged acoustic sensor systems energy loss round base clustering UWSN extra energy
在线阅读 下载PDF
New Modified Controlled Bat Algorithm for Numerical Optimization Problem 被引量:3
5
作者 Waqas Haider Bangyal Abdul Hameed +7 位作者 Jamil Ahmad Kashif Nisar Muhammad Reazul Haque Ag.Asri Ag.Ibrahim Joel J.P.C.Rodrigues M.Adil Khan Danda B.Rawat Richard Etengu 《Computers, Materials & Continua》 SCIE EI 2022年第2期2241-2259,共19页
Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching... Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching behavior.BA faces premature convergence due to its local search capability.Instead of using the standard uniform walk,the Torus walk is viewed as a promising alternative to improve the local search capability.In this work,we proposed an improved variation of BA by applying torus walk to improve diversity and convergence.The proposed.Modern Computerized Bat Algorithm(MCBA)approach has been examined for fifteen well-known benchmark test problems.The finding of our technique shows promising performance as compared to the standard PSO and standard BA.The proposed MCBA,BPA,Standard PSO,and Standard BA have been examined for well-known benchmark test problems and training of the artificial neural network(ANN).We have performed experiments using eight benchmark datasets applied from the worldwide famous machine-learning(ML)repository of UCI.Simulation results have shown that the training of an ANN with MCBA-NN algorithm tops the list considering exactness,with more superiority compared to the traditional methodologies.The MCBA-NN algorithm may be used effectively for data classification and statistical problems in the future. 展开更多
关键词 Bat algorithm MCBA ANN ML Torus walk
在线阅读 下载PDF
Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack 被引量:3
6
作者 Muhammad Reazul Haque Saw Chin Tan +11 位作者 Zulfadzli Yusoff Kashif Nisar Rizaludin Kaspin Iram Haider Sana Nisar J.P.C.Rodrigues Bhawani Shankar Chowdhry Muhammad AslamUqaili Satya Prasad Majumder Danda B.Rawat Richard Etengu Rajkumar Buyya 《Computers, Materials & Continua》 SCIE EI 2022年第1期875-894,共20页
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th... In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire network.Nevertheless,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack straightforwardly.Furthermore,recently a Distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been detected.However,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem.Moreover,recently the high frequencies of DDoS attacks have increased dramatically.In this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed.Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence.The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN. 展开更多
关键词 SDN smart algorithm RTZLK-DAASCP DDoS attack DRDOS
在线阅读 下载PDF
Modeling heterogeneous behaviors with different strategies in a terrorist attack
7
作者 Le BI Tingting LIU +3 位作者 Zhen LIU Jason TEO Yumeng ZHAO Yanjie CHAI 《Virtual Reality & Intelligent Hardware》 EI 2023年第4期351-365,共15页
Existing simulations of terrorist attacks do not consider individual variations.To overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist attacks.We constructe... Existing simulations of terrorist attacks do not consider individual variations.To overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist attacks.We constructed an emotional model that integrated personality and visual perception for pedestrians.The emotional model was then integrated with pedestrian relationship networks to establish a decision-making model that sup-ported pedestrians’altruistic behaviors.A mapping model has been developed to correlate antisocial personality traits with attack strategies employed by terrorists.Experiments demonstrate that the proposed algorithm can generate practical heterogeneous behaviors that align with existing psychological research findings. 展开更多
关键词 Terrorist attack simulation Computer animation Big Five personality Intelligent decision making Heterogeneous behaviors
在线阅读 下载PDF
Comparative Analysis Using Machine Learning Techniques for Fine Grain Sentiments
8
作者 Zeeshan Ahmad Waqas Haider Bangyal +2 位作者 Kashif Nisar Muhammad Reazul Haque M.Adil Khan 《Journal on Artificial Intelligence》 2022年第1期49-60,共12页
Huge amount of data is being produced every second for microblogs,different content sharing sites,and social networking.Sentimental classification is a tool that is frequently used to identify underlying opinions and ... Huge amount of data is being produced every second for microblogs,different content sharing sites,and social networking.Sentimental classification is a tool that is frequently used to identify underlying opinions and sentiments present in the text and classifying them.It is widely used for social media platforms to find user’s sentiments about a particular topic or product.Capturing,assembling,and analyzing sentiments has been challenge for researchers.To handle these challenges,we present a comparative sentiment analysis study in which we used the fine-grained Stanford Sentiment Treebank(SST)dataset,based on 215,154 exclusive texts of different lengths that are manually labeled.We present comparative sentiment analysis to solve the fine-grained sentiment classification problem.The proposed approach takes start by pre-processing the data and then apply eight machine-learning algorithms for the sentiment classification namely Support Vector Machine(SVM),Logistic Regression(LR),Neural Networks(NN),Random Forest(RF),Decision Tree(DT),K-Nearest Neighbor(KNN),Adaboost and Naïve Bayes(NB).On the basis of results obtained the accuracy,precision,recall and F1-score were calculated to draw a comparison between the classification approaches being used. 展开更多
关键词 Machine learning neural network sentiment analysis system support vector machine
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部