4.6 Article

Energy Efficient Clustering Protocol for FANETS Using Moth Flame Optimization

期刊

SUSTAINABILITY
卷 14, 期 10, 页码 -

出版社

MDPI
DOI: 10.3390/su14106159

关键词

FANETS; energy efficiency; clustering; routing; WSN; Cloud; transmission range; bio-inspired

向作者/读者索取更多资源

FANET is a hot research topic, facing challenges such as short flight times and inefficient routing. By employing moth flame optimization algorithm and AI-based clustering methods, routing efficiency can be improved and energy consumption can be reduced.
FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due to low battery power and high mobility. Due to these topological restrictions, FANETS routing is considered more complicated than MANETs or VANETs. Clustering approaches based on artificial intelligence (AI) approaches can be used to solve complex routing issues when static and dynamic routings fail. Evolutionary algorithm-based clustering techniques, such as moth flame optimization, and ant colony optimization, can be used to solve these kinds of problems with routes. Moth flame optimization gives excellent coverage while consuming little energy and requiring a minimum number of cluster heads (CHs) for routing. This paper employs a moth flame optimization algorithm for network building and node deployment. Then, we employ a variation of the K-Means Density clustering approach to choosing the cluster head. Choosing the right cluster heads increases the cluster's lifespan and reduces routing traffic. Moreover, it lowers the number of routing overheads. This step is followed by MRCQ image-based compression techniques to reduce the amount of data that must be transmitted. Finally, the reference point group mobility model is used to send data by the most optimal path. Particle swarm optimization (PSO), ant colony optimization (ACO), and grey wolf optimization (GWO) were put to the test against our proposed EECP-MFO. Several metrics are used to gauge the efficiency of our proposed method, including the number of clusters, cluster construction time, cluster lifespan, consistency of cluster heads, and energy consumption. This paper demonstrates that our proposed algorithm performance is superior to the current state-of-the-art approaches using experimental results.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Energy-efficient polyglot persistence database live migration among heterogeneous clouds

Kiranbir Kaur, Salil Bharany, Sumit Badotra, Karan Aggarwal, Anand Nayyar, Sandeep Sharma

Summary: Cloud computing is a promising technology that functions as a resource provisioning platform without user participation. This paper presents a middleware in .NET Core for live migration of persistent polyglot data in heterogeneous clouds. The suggested technique outperforms offline migration in terms of migration time, energy usage, and throughput.

JOURNAL OF SUPERCOMPUTING (2023)

Article Green & Sustainable Science & Technology

A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks

Edeh Michael Onyema, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, Salil Bharany, Ateeq Ur Rehman, Elsayed Tag Eldin, Muhammad Shafiq

Summary: Due to the latest advancements in networking devices, there is a need to build future intelligent networks. Software-defined networks (SDN) are one of the latest and most trusted technologies. SDN provides network virtualization and has started to replace traditional networks at faster rates. However, SDN also faces security issues.

SUSTAINABILITY (2022)

Article Chemistry, Analytical

Load Balancing Using Artificial Intelligence for Cloud-Enabled Internet of Everything in Healthcare Domain

Ibrahim Aqeel, Ibrahim Mohsen Khormi, Surbhi Bhatia Khan, Mohammed Shuaib, Ahlam Almusharraf, Shadab Alam, Nora A. Alkhaldi

Summary: This paper proposes a novel AI-based load balancing model that utilizes the Chaotic Horse Ride Optimization Algorithm and big data analytics for energy and load optimization in cloud-enabled IoT environments. Experimental results demonstrate that the proposed model outperforms existing models and has the potential to address critical challenges in the IoT domain.

SENSORS (2023)

Article Computer Science, Artificial Intelligence

Cloud data transmission based on security and improved routing through hybrid machine learning techniques

Shamimul Qamar, Mohd Amaan, Mohammed Inamur Rahman, Ibrahim Aqeel, Mohammed Shuaib, Ibrahim Mohsen Khormi, Shadab Alam

Summary: Cloud computing combines a shared environment and the computer paradigm, allowing multiple users to access services and resources. This ecosystem can be globally accessible via the Internet and shared at all levels. This research proposes a novel method in cloud data transmission using hybrid machine learning techniques for security and enhanced routing. The experimental analysis shows that the proposed technique achieves a data transmission ratio of 65%, specificity of 78%, training accuracy of 93%, validation accuracy of 83%, and security analysis of 65%.

SOFT COMPUTING (2023)

Article Green & Sustainable Science & Technology

An Overview of Blockchain and IoT Integration for Secure and Reliable Health Records Monitoring

Shadab Alam, Surbhi Bhatia, Mohammed Shuaib, Mousa Mohammed Khubrani, Fayez Alfayez, Areej A. Malibari, Sadaf Ahmad

Summary: The Internet of Things (IoT) and blockchain (BC) are reliable technologies widely used in various contexts. IoT devices have potential for data sensing and recording, but also face processing and security issues. Traditional cryptographic techniques face challenges in securely transporting and storing medical records. Blockchain technology ensures data immutability, validity, and confidentiality, making it a powerful tool for creating a dependable electronic health record (EHR) system.

SUSTAINABILITY (2023)

Article Computer Science, Information Systems

HCoF: Hybrid Collaborative Filtering Using Social and Semantic Suggestions for Friend Recommendation

Mahesh Thyluru Ramakrishna, Vinoth Kumar Venkatesan, Rajat Bhardwaj, Surbhi Bhatia, Mohammad Khalid Imam Rahmani, Saima Anwar Lashari, Aliaa M. Alabdali

Summary: The emergence of social media platforms has greatly improved social connections. However, finding the right friends remains a challenge. This study proposes a social and semantic-based collaborative filtering approach to enhance personalized recommendations. The results show that this approach improves recommendation accuracy and addresses the issues of sparsity and cold start.

ELECTRONICS (2023)

Article Computer Science, Information Systems

An Optimized, Dynamic, and Efficient Load-Balancing Framework for Resource Management in the Internet of Things (IoT) Environment

Mohammed Shuaib, Surbhi Bhatia, Shadab Alam, Raj Kumar Masih, Nayef Alqahtani, Shakila Basheer, Mohammad Shabbir Alam

Summary: The major problems and challenges in IoT systems include load balancing, reducing operational expenses, and energy efficiency. This study proposes a reliable method called Dynamic Energy-Efficient Load Balancing (DEELB) to address these resource allocation issues. Experimental results show that DEELB outperforms other existing techniques in terms of effectiveness and efficiency.

ELECTRONICS (2023)

Article Computer Science, Information Systems

Intruder Detection in VANET Data Streams Using Federated Learning for Smart City Environments

Monika Arya, Hanumat Sastry, Bhupesh Kumar Dewangan, Mohammad Khalid Imam Rahmani, Surbhi Bhatia, Abdul Wahab Muzaffar, Mariyam Aysha Bivi

Summary: Vehicular networks are crucial to smart city development as they improve quality of life, security, and safety. This article presents an approach to intrusion detection in vehicular ad hoc networks (VANETs) using distributed federated learning of heterogeneous neural networks. The proposed method saves time and resources by using an efficient intruder detection approach that involves local deep learning-based IDS classifiers and communication sharing among vehicles.

ELECTRONICS (2023)

Article Chemistry, Multidisciplinary

Deep Belief Networks (DBN) with IoT-Based Alzheimer's Disease Detection and Classification

Nayef Alqahtani, Shadab Alam, Ibrahim Aqeel, Mohammed Shuaib, Ibrahim Mohsen Khormi, Surbhi Bhatia Khan, Areej A. Malibari

Summary: Dementias in older people, particularly Alzheimer's disease (AD), pose significant challenges to modern medicine. Machine learning techniques applied to MRI can accelerate the diagnosis of AD and predict its progression. This research explores the use of longitudinal brain MRI features and a Deep Belief Network trained with the Mayfly Optimization Algorithm for the AD/non-AD classification of dementia patients. Including information about comorbidities and medication characteristics greatly enhances the predictive power of the models, with the random forest model outperforming others in terms of precision.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

MBAHIL: Design of a Multimodal Hybrid Bioinspired Model for Augmentation of Hyperspectral Imagery via Iterative Learning for Continuous Efficiency Enhancements

Dipen Saini, Rahul Malik, Rachit Garg, Mohammad Khalid Imam Rahmani, Md. Ezaz Ahmed, Deepak Prashar, Sudan Jha, Jabeen Nazeer, Sultan Ahmad

Summary: This study proposes a novel multimodal hybrid bioinspired model for hyperspectral image augmentation, which continuously improves classification performance through iterative learning. The model represents input images in various domains and extracts windowed feature sets via a convolutional filter. It selects high inter-class variance features and reduces intra-class variance levels for improved classification performance. The model intelligently augments the selected images and classifies them using a customized CNN classifier. Through combining these models and incremental accuracy optimizations, the proposed model improves hyperspectral classification accuracy by 10.6% and precision by 10.4% compared to standard deep learning-based augmentation techniques.

IEEE ACCESS (2023)

Article Computer Science, Artificial Intelligence

Forensic analysis and security assessment of IoT camera firmware for smart homes

Akashdeep Bhardwaj, Keshav Kaushik, Salil Bharany, SeongKi Kim

Summary: The ease of flexibility, convenience, and smartness has made IoT a popular choice among industries and users, leading to a growing interest in this technology. With the increasing use of IoT, a large number of endpoints, including devices in our homes, are now connected to external networks. Firmware in IoT devices is typically heterogeneous and closed source, making it challenging to detect and evaluate security vulnerabilities. In recent years, similarity-based firmware security detection techniques have gained attention in research. Security concerns and attacks have become prominent in IoT security equipment, particularly IoT cameras. This research proposes a unique twelve-step process for analyzing and assessing the security of firmware in Smart IoT-based Camera devices.

EGYPTIAN INFORMATICS JOURNAL (2023)

Article Computer Science, Theory & Methods

Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map

Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim, Anas W. Abulfaraj, Wamda Nagmeldin

Summary: This study develops a robust image cryptographic scheme based on Latin Square Matrix and Logistics Map to effectively secure sensitive data. The integration of these algorithms provides a strong and resilient encryption technique. The study addresses issues such as image volume, different sizes, and misplaced pixel positions, making it an effective method for image encryption. Evaluation results show that the algorithm securely protects image data, making it difficult for unauthorized users to decrypt the information, and can be applied in real-time systems.

INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS (2023)

Article Computer Science, Theory & Methods

Imperative Role of Digital Twin in the Management of Hospitality Services

Rajesh Ramnarayan, Rajesh Singh, Anita Gehlot, Kapil Joshi, Ashraf Osman Ibrahim, Anas W. Abulfaraj, Faisal Binzagr, Salil Bharany

Summary: The use of digital twin technologies in the hospitality industry has gained significant attention due to their effectiveness in evaluation, planning, resource utilization, and improving real-time services. These technologies improve production and customer service in the hospitality industry, creating a fast virtual world space for customers.

INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Smart Bubble Sort: A Novel and Dynamic Variant of Bubble Sort Algorithm

Mohammad Khalid Imam Rahmani

Summary: In the present era, the storage of large volumes of data in databases is common. Finding and sorting the data quickly is crucial for optimal performance. This paper proposes a smart variant of the bubble sort algorithm called Smart Bubble sort, which adapts dynamically and outperforms other sorting algorithms in best-case and average-case scenarios.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

暂无数据