Science Publishing Group: Internet of Things and Cloud Computing: Table of Contents
<i> Internet of Things and Cloud Computing (IOTCC) </i> provides a forum for sharing timely and up-to-date publication of scientific research and review articles. The journal publishes original full-length research papers in all areas related to the theory and application of the Internet of Things and Cloud Computing.It aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing,as well as on software and hardware enabling technologies for the Internet of Things, including those related to device miniaturization, energizing, integration, etc.
http://www.sciencepublishinggroup.com/j/iotcc Science Publishing Group: Internet of Things and Cloud Computing: Table of Contents
Science Publishing Group
en-US
Internet of Things and Cloud Computing
Internet of Things and Cloud Computing
http://image.sciencepublishinggroup.com/journal/238.gif
http://www.sciencepublishinggroup.com/j/iotcc
E-Recruitment portal Aided by Cloud Computing
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20130101.11
Ever since cloud computing came into existence, it has progressively become popular and emerged to be an indispensable technology with an unprecedented demand in the contemporary IT field. This paper discusses about fully automated system used by the Human Resource department. Where it brings all of its recruiting and hiring processes
Ever since cloud computing came into existence, it has progressively become popular and emerged to be an indispensable technology with an unprecedented demand in the contemporary IT field. This paper discusses about fully automated system used by the Human Resource department. Where it brings all of its recruiting and hiring processes
E-Recruitment portal Aided by Cloud Computing
doi:10.11648/j.iotcc.20130101.11
Internet of Things and Cloud Computing
2014-01-01
© Science Publishing Group
Gaddam Venkata Manoj
E-Recruitment portal Aided by Cloud Computing
1
1
4
4
2014-01-01
2014-01-01
10.11648/j.iotcc.20130101.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20130101.11
© Science Publishing Group
Processing Intensive Full-Waveform Aerial Laser Scanning Matlab Jobs through Condor
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20130101.12
Full-waveform aerial laser scanning is a laser system that records the entire backscattered signal of the laser pulse and stores it in the system recorder for post-processing. Capturing the complete waveform of the backscatter signal enables distinguishing between neighborhood echoes of a range smaller than the pulse length. Full-waveform has shown potential to better describe land cover features through the additional physical information it can provide alongside the standard geometric information. To fully utilize full-waveform for enhanced object recognition and feature extraction, it is essential to develop an automatic and effective routine to manage and process full-waveform datasets in a manner which requires less human effort and reduces time needed to process large laser datasets efficiently. This research tackled this problem through introducing a novel processing strategy for full-waveform data based on a developed pulse detection methodto run through Matlab environment. The solution adopted a grid computing Condor-based approach, which showed significant potential to reduce the time and effort needed to process large datasets such as full-waveform aerial laser scanning to more than 300% in specific conditions.
Full-waveform aerial laser scanning is a laser system that records the entire backscattered signal of the laser pulse and stores it in the system recorder for post-processing. Capturing the complete waveform of the backscatter signal enables distinguishing between neighborhood echoes of a range smaller than the pulse length. Full-waveform has shown potential to better describe land cover features through the additional physical information it can provide alongside the standard geometric information. To fully utilize full-waveform for enhanced object recognition and feature extraction, it is essential to develop an automatic and effective routine to manage and process full-waveform datasets in a manner which requires less human effort and reduces time needed to process large laser datasets efficiently. This research tackled this problem through introducing a novel processing strategy for full-waveform data based on a developed pulse detection methodto run through Matlab environment. The solution adopted a grid computing Condor-based approach, which showed significant potential to reduce the time and effort needed to process large datasets such as full-waveform aerial laser scanning to more than 300% in specific conditions.
Processing Intensive Full-Waveform Aerial Laser Scanning Matlab Jobs through Condor
doi:10.11648/j.iotcc.20130101.12
Internet of Things and Cloud Computing
2014-01-01
© Science Publishing Group
Fanar Mansour Abed
Processing Intensive Full-Waveform Aerial Laser Scanning Matlab Jobs through Condor
1
1
14
14
2014-01-01
2014-01-01
10.11648/j.iotcc.20130101.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20130101.12
© Science Publishing Group
Improving Streaming Capacity in P2P Live Streaming Systems via Resource Sharing
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20130102.11
Peer-to-Peer (P2P) streaming systems provide a large number of channels to users. The streaming capacity for a channel is defined as the maximum streaming rate that can be received by every user in the channel. In the this paper, we study the streaming capacity problem in both tree-based and mesh-based P2P live streaming systems. In tree-based multi-channel P2P live streaming systems, we propose a cross-channel resource sharing approach to improve the streaming capacity. We employ cross-channel helpers to establish the cross-channel overlay links, with which the unused upload bandwidths in a channel can be utilized to help the bandwidth-deficient peers in another channel, thus improving the streaming capacity. In meshed-based P2P live streaming systems, we formulate the streaming capacity problem into a resource optimization problem. By solving the resource optimization problem, we can optimally allocate the link rates for each peer to improve the streaming capacity. Through simulations, we demonstrate that the proposed resource sharing approaches can significantly improve the streaming capacity compared to the scheme without resource sharing.
Peer-to-Peer (P2P) streaming systems provide a large number of channels to users. The streaming capacity for a channel is defined as the maximum streaming rate that can be received by every user in the channel. In the this paper, we study the streaming capacity problem in both tree-based and mesh-based P2P live streaming systems. In tree-based multi-channel P2P live streaming systems, we propose a cross-channel resource sharing approach to improve the streaming capacity. We employ cross-channel helpers to establish the cross-channel overlay links, with which the unused upload bandwidths in a channel can be utilized to help the bandwidth-deficient peers in another channel, thus improving the streaming capacity. In meshed-based P2P live streaming systems, we formulate the streaming capacity problem into a resource optimization problem. By solving the resource optimization problem, we can optimally allocate the link rates for each peer to improve the streaming capacity. Through simulations, we demonstrate that the proposed resource sharing approaches can significantly improve the streaming capacity compared to the scheme without resource sharing.
Improving Streaming Capacity in P2P Live Streaming Systems via Resource Sharing
doi:10.11648/j.iotcc.20130102.11
Internet of Things and Cloud Computing
2014-01-01
© Science Publishing Group
Yifeng He
Shujjat Ahmed Khan
Improving Streaming Capacity in P2P Live Streaming Systems via Resource Sharing
1
2
22
22
2014-01-01
2014-01-01
10.11648/j.iotcc.20130102.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20130102.11
© Science Publishing Group
A Method to Increase the Computing Speed of 2 on 2 Soccer Robots by Implementing Distributed Computation in Multi-Processor Architecture (Experimental Research)
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140201.11
Due to the competitive nature of soccer robots operations, execution speed of functions in critical actions like shooting, dribbling and positioning has an undeniable importance. In this paper the idea of implementing distributed functions for multi-processor computing in a multi-agent environment and also dividing computational load of functions among agents between teammates, is being presented for the first time. The practical implementation of this method resulted in high speed execution of the critical actions functions. Given that so far in this area of expertise, no research has been done, it is hoped that this technique can provide a practical approach.
Due to the competitive nature of soccer robots operations, execution speed of functions in critical actions like shooting, dribbling and positioning has an undeniable importance. In this paper the idea of implementing distributed functions for multi-processor computing in a multi-agent environment and also dividing computational load of functions among agents between teammates, is being presented for the first time. The practical implementation of this method resulted in high speed execution of the critical actions functions. Given that so far in this area of expertise, no research has been done, it is hoped that this technique can provide a practical approach.
A Method to Increase the Computing Speed of 2 on 2 Soccer Robots by Implementing Distributed Computation in Multi-Processor Architecture (Experimental Research)
doi:10.11648/j.iotcc.20140201.11
Internet of Things and Cloud Computing
2014-05-28
© Science Publishing Group
Yahya Hassanzadeh-Nazarabadi
Sanaz Taheri-Boshrooyeh
Milad Bahrami
Danial Bahrami
A Method to Increase the Computing Speed of 2 on 2 Soccer Robots by Implementing Distributed Computation in Multi-Processor Architecture (Experimental Research)
2
1
5
5
2014-05-28
2014-05-28
10.11648/j.iotcc.20140201.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140201.11
© Science Publishing Group
Data Security and Privacy Concerns in Cloud Computing
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140202.11
Cloud is a latest computing paradigm. Cloud computing means storing and accessing data and programs over the internet instead of computer’s hard disk. Cloud storage makes it easy to access the software, resources and data anytime anywhere when connected to the internet. Now-a-days almost every organization is using cloud to store the data. There is a need to protect that data .Cloud data security goal aims at three main things: Availability, Confidentiality, and Integrity. Cryptography is used to achieve confidentiality. Three types of algorithms are used in Cryptography (1) Symmetric-key algorithms (2) Asymmetric-key algorithms and (3) Hashing. Hashing algorithms ensure integrity of data. Cloud provides three types of services to its users: SaaS – enables users to run applications online through cloud computing techniques PaaS – enables the users to build their own cloud applications using supplier-specific tools and languages through cloud computing techniques.IaaS – enables the users to run any application on supplier’s cloud hardware. This paper discusses the types, service model, deployment methods, data security and privacy concerns in cloud.
Cloud is a latest computing paradigm. Cloud computing means storing and accessing data and programs over the internet instead of computer’s hard disk. Cloud storage makes it easy to access the software, resources and data anytime anywhere when connected to the internet. Now-a-days almost every organization is using cloud to store the data. There is a need to protect that data .Cloud data security goal aims at three main things: Availability, Confidentiality, and Integrity. Cryptography is used to achieve confidentiality. Three types of algorithms are used in Cryptography (1) Symmetric-key algorithms (2) Asymmetric-key algorithms and (3) Hashing. Hashing algorithms ensure integrity of data. Cloud provides three types of services to its users: SaaS – enables users to run applications online through cloud computing techniques PaaS – enables the users to build their own cloud applications using supplier-specific tools and languages through cloud computing techniques.IaaS – enables the users to run any application on supplier’s cloud hardware. This paper discusses the types, service model, deployment methods, data security and privacy concerns in cloud.
Data Security and Privacy Concerns in Cloud Computing
doi:10.11648/j.iotcc.20140202.11
Internet of Things and Cloud Computing
2014-08-17
© Science Publishing Group
Masrat Yousuf Pandith
Data Security and Privacy Concerns in Cloud Computing
2
2
11
11
2014-08-17
2014-08-17
10.11648/j.iotcc.20140202.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140202.11
© Science Publishing Group
Investigating Cloud ERP Challenges in Public Universities in the Middle East “Field Study”
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140203.11
ERP is a concept that has been around for some time, and such as any other field; it is inevitable for ERP to find new ways to cope with the huge changes in Information Systems world. One of the new ideas was to facilitate ERP through cloud computing systems; in order to fulfil the staggering raise in service requests from ERP customers due to infrastructure and technology advancement. Google, SAP, INFOR and other ERP service providers has already adopted the idea of providing ERP services through the cloud, in order to attract more business, in particular the more expanding and demanding segment of small and medium enterprises (SME’s). We, on the other hand would like to study the challenges and opportunities of cloud ERP in educational enterprises; public universities in specific. Hussain (7) has mentioned these challenges; we will expand that by validating the challenges alongside providing an ordered view of them, a survey amongst wide sample of public universities in the Middle East will investigate further challenges that could ascend along application of Cloud ERP, and classify them in orderly fashion. Which eventually we think it will help public universities to further more understand how to benefit from cloud ERP.
ERP is a concept that has been around for some time, and such as any other field; it is inevitable for ERP to find new ways to cope with the huge changes in Information Systems world. One of the new ideas was to facilitate ERP through cloud computing systems; in order to fulfil the staggering raise in service requests from ERP customers due to infrastructure and technology advancement. Google, SAP, INFOR and other ERP service providers has already adopted the idea of providing ERP services through the cloud, in order to attract more business, in particular the more expanding and demanding segment of small and medium enterprises (SME’s). We, on the other hand would like to study the challenges and opportunities of cloud ERP in educational enterprises; public universities in specific. Hussain (7) has mentioned these challenges; we will expand that by validating the challenges alongside providing an ordered view of them, a survey amongst wide sample of public universities in the Middle East will investigate further challenges that could ascend along application of Cloud ERP, and classify them in orderly fashion. Which eventually we think it will help public universities to further more understand how to benefit from cloud ERP.
Investigating Cloud ERP Challenges in Public Universities in the Middle East “Field Study”
doi:10.11648/j.iotcc.20140203.11
Internet of Things and Cloud Computing
2014-10-20
© Science Publishing Group
Hussain Ahmad Awad
Fadi Mohammed Batta
Investigating Cloud ERP Challenges in Public Universities in the Middle East “Field Study”
2
3
16
16
2014-10-20
2014-10-20
10.11648/j.iotcc.20140203.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140203.11
© Science Publishing Group
A Caring Heart Program Enhancement in Ondo State through Augmented E-Government Implementation Code:[S43NH33]
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140204.11
This study appraised e-Government implementation in Ondo state government ministries, agencies and departments. It determined the availability of e-Government resources and infrastructure, the stage of e-government implementation and the challenges. Siau and Long, 2005 five phase of e-Government model was used for analysis. Survey design approach was adopted. Data were collected with a structured questionnaire administered to the Director of IT and administrators in the ministries, agencies and departments, result shows 96.42% participation. Collected data were structured into grouped frequency distributions. Findings revealed that Ondo state had made an entrance into e-Government. Resources and infrastructure for e-Governance were available and the State was found to be at the second phase (interaction) of e-Government process and has not effectively demonstrated its capacity to progress towards the higher phases of e-government. The study indentified factors that inhibit the implementation of e-Government in Ondo state and recommended how e-government implementation can be further improved in order to accomplished various present and future government programs and delivered the present and future expectation of citizen, Ondo state vision 20: 2020 and make it a truly Sunshine state. This research work is done using Ondo state as study case; it can be apply to any state in developing countries.
This study appraised e-Government implementation in Ondo state government ministries, agencies and departments. It determined the availability of e-Government resources and infrastructure, the stage of e-government implementation and the challenges. Siau and Long, 2005 five phase of e-Government model was used for analysis. Survey design approach was adopted. Data were collected with a structured questionnaire administered to the Director of IT and administrators in the ministries, agencies and departments, result shows 96.42% participation. Collected data were structured into grouped frequency distributions. Findings revealed that Ondo state had made an entrance into e-Government. Resources and infrastructure for e-Governance were available and the State was found to be at the second phase (interaction) of e-Government process and has not effectively demonstrated its capacity to progress towards the higher phases of e-government. The study indentified factors that inhibit the implementation of e-Government in Ondo state and recommended how e-government implementation can be further improved in order to accomplished various present and future government programs and delivered the present and future expectation of citizen, Ondo state vision 20: 2020 and make it a truly Sunshine state. This research work is done using Ondo state as study case; it can be apply to any state in developing countries.
A Caring Heart Program Enhancement in Ondo State through Augmented E-Government Implementation Code:[S43NH33]
doi:10.11648/j.iotcc.20140204.11
Internet of Things and Cloud Computing
2014-10-22
© Science Publishing Group
Adegboye Adegboyega
Mamidu Aruna Ishola
Adu Babafemi Ojo
A Caring Heart Program Enhancement in Ondo State through Augmented E-Government Implementation Code:[S43NH33]
2
4
25
25
2014-10-22
2014-10-22
10.11648/j.iotcc.20140204.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140204.11
© Science Publishing Group
Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140204.12
In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and authorization, boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security. In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).
In this era, commercialization of IT and enterprise mobility has been envisaged where corporate employees utilized mobile devices such as laptops, smartphones and tablets, to work at anytime, anywhere and from any-device for personal and business purposes. In this way corporates improved productivity, employee retention, flexible work environment, IT value-added to business and reduced running costs. Nevertheless, it also culminated into critical risks to company’s systems since employees had uncontrolled access to the infrastructure as such vulnerable to security and data abuse. It was in view of that this work envisaged on the Telecom Namibia Enterprise Mobile Architecture (TNEMA), a system developed to enhance security measures, manage and control the use of bring your own device (BYOD) against the company’s infrastructure. The TNEMA architecture composed of five integrated functional components that included: User Interaction, User Mobile Devices, Access Networks, Enterprise Mobility Infrastructure and Enterprise Backend System. The TNEMA architecture security consists of firewalls installed and configured between the components to filter out the malicious and non-corporate operational data. Also, enhanced in the TNEMA are the layers of encryption, authentication and authorization, boundary protection, possible hardening of devices, and mobile device provisioning and management, all contribute to overall security. In addition, TNEMA adequately protects sensitive data using Internet Protocol Security (IPsec) and Virtual Private Network (VPN) that established a secured path between the mobile devices and the Enterprise Mobility Infrastructure and Public Key Infrastructure (PKI) to provide greater control over issuing, renewing, revoking, and managing Secure Sockets Layer (SSL) certificates while still gaining the advantages of using a trusted Certificate Authority (CA).
Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices
doi:10.11648/j.iotcc.20140204.12
Internet of Things and Cloud Computing
2014-10-25
© Science Publishing Group
Valerie Garises
Jameson Mbale
Telecom Namibia Enterprise Mobile Architecture (TNEMA): Bring Your Own Devices
2
4
31
31
2014-10-25
2014-10-25
10.11648/j.iotcc.20140204.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20140204.12
© Science Publishing Group
Fifty Shades of API for Business in New Networked Economy
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20150301.11
Application Programming Interface (API) is increasingly popular and it became one of the critical vehicles of service enablement and IT collaboration in Cloud computing. Several large business enterprises invested a major portion of their IT budget into software redesign, restructuring the application architecture and their application service interfaces to decouple of the application boundary beyond limit. It will cover a detail understanding of API and its essence in the business and enterprise. It will also share a various shades and role of API in IT transformation journey in the networked economy of cloud computing and social media. The article also demonstrates how an enterprise can scale to manage the hyper growth of economy through collaboration of services by various service providers through API.
Application Programming Interface (API) is increasingly popular and it became one of the critical vehicles of service enablement and IT collaboration in Cloud computing. Several large business enterprises invested a major portion of their IT budget into software redesign, restructuring the application architecture and their application service interfaces to decouple of the application boundary beyond limit. It will cover a detail understanding of API and its essence in the business and enterprise. It will also share a various shades and role of API in IT transformation journey in the networked economy of cloud computing and social media. The article also demonstrates how an enterprise can scale to manage the hyper growth of economy through collaboration of services by various service providers through API.
Fifty Shades of API for Business in New Networked Economy
doi:10.11648/j.iotcc.20150301.11
Internet of Things and Cloud Computing
2015-06-25
© Science Publishing Group
Debasis Roy Choudhuri
Biswajit Mohapatra
Fifty Shades of API for Business in New Networked Economy
3
1
7
7
2015-06-25
2015-06-25
10.11648/j.iotcc.20150301.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.20150301.11
© Science Publishing Group
Research on Applying Hierachical Clustered Based Routing Technique Using Artificial Intelligence Algorithms for Quality of Service of Service Based Routing
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.s.2015030601.11
MANET (Mobile Ad-Hoc Network) is autonomous system, not based on existing infrastructure. Nodes usually change their position, network topology changes very fast. Service Based Routing is inherited from the model of Content Based Routing - CBR that manages and classifies many of network services. In order making nodes to communicate quickly and stablely, it requires applying some methodologies to reduce overhead and delay as well as power consumption. Therefore, this paper mentions a hierarchical clustered based routing using R^+Tree. R^+ is a data structure with fast algorithms to establish, insert, update. It has been used in many fields effectively and efficiently such as Google Map, Forwarding technique, computer virtual memory. In combination with some artificial intelligence algorithms to make cluster, find optimized routes, multicast trees for effective communication. Fuzzy logic and genetic al. are proved to be very compatible with Manet. A genetic algorithm is used to choose optimized clusters, Fuzzy logic is applied to choose the cluster head and members of each cluster. Multiple paths routing is very importance for routing in MANET that making Quality of Service by Ant Colony Optimization Algorithm.
MANET (Mobile Ad-Hoc Network) is autonomous system, not based on existing infrastructure. Nodes usually change their position, network topology changes very fast. Service Based Routing is inherited from the model of Content Based Routing - CBR that manages and classifies many of network services. In order making nodes to communicate quickly and stablely, it requires applying some methodologies to reduce overhead and delay as well as power consumption. Therefore, this paper mentions a hierarchical clustered based routing using R^+Tree. R^+ is a data structure with fast algorithms to establish, insert, update. It has been used in many fields effectively and efficiently such as Google Map, Forwarding technique, computer virtual memory. In combination with some artificial intelligence algorithms to make cluster, find optimized routes, multicast trees for effective communication. Fuzzy logic and genetic al. are proved to be very compatible with Manet. A genetic algorithm is used to choose optimized clusters, Fuzzy logic is applied to choose the cluster head and members of each cluster. Multiple paths routing is very importance for routing in MANET that making Quality of Service by Ant Colony Optimization Algorithm.
Research on Applying Hierachical Clustered Based Routing Technique Using Artificial Intelligence Algorithms for Quality of Service of Service Based Routing
doi:10.11648/j.iotcc.s.2015030601.11
Internet of Things and Cloud Computing
2015-05-12
© Science Publishing Group
Nguyen Thanh Long
Nguyen Duc Thuy
Pham Huy Hoang
Research on Applying Hierachical Clustered Based Routing Technique Using Artificial Intelligence Algorithms for Quality of Service of Service Based Routing
3
6
8
8
2015-05-12
2015-05-12
10.11648/j.iotcc.s.2015030601.11
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.s.2015030601.11
© Science Publishing Group
Research on Innovating and Applying Evolutionary Algorithms Based Hierarchical Clustering and Multiple Paths Routing for Guaranteed Quality of Service on Service Based Routing
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.s.2015030601.12
In Service Based Routing (SBR), data is transmitted from a source node to destination nodes are not depended on destination addresses. Hence, it is comfortable with new advanced technology as cloud computing and also flexible and reliable. Genetic and Queen-Bee algorithms (GA, QB) are artificial intelligence techniques for combinatorial optimization problems solving based on some natural rules. In which GA is a branch of the evolutionary strategies that uses some principles of evolution theory, such as natural selection, mutation and crossover. QB is performed based on GA for energy saving. The R^+ tree is an effective data structure that can be used to organize a hierarchical clustering network with fast establishing, updating, tuning algorithms. The usage of the Greedy algorithm to find cyclic routes or multiple paths on each trunk by multiple criterions to transmit data effectively.
In Service Based Routing (SBR), data is transmitted from a source node to destination nodes are not depended on destination addresses. Hence, it is comfortable with new advanced technology as cloud computing and also flexible and reliable. Genetic and Queen-Bee algorithms (GA, QB) are artificial intelligence techniques for combinatorial optimization problems solving based on some natural rules. In which GA is a branch of the evolutionary strategies that uses some principles of evolution theory, such as natural selection, mutation and crossover. QB is performed based on GA for energy saving. The R^+ tree is an effective data structure that can be used to organize a hierarchical clustering network with fast establishing, updating, tuning algorithms. The usage of the Greedy algorithm to find cyclic routes or multiple paths on each trunk by multiple criterions to transmit data effectively.
Research on Innovating and Applying Evolutionary Algorithms Based Hierarchical Clustering and Multiple Paths Routing for Guaranteed Quality of Service on Service Based Routing
doi:10.11648/j.iotcc.s.2015030601.12
Internet of Things and Cloud Computing
2015-05-12
© Science Publishing Group
Nguyen Thanh Long
Nguyen Duc Thuy
Pham Huy Hoang
Research on Innovating and Applying Evolutionary Algorithms Based Hierarchical Clustering and Multiple Paths Routing for Guaranteed Quality of Service on Service Based Routing
3
6
15
15
2015-05-12
2015-05-12
10.11648/j.iotcc.s.2015030601.12
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.s.2015030601.12
© Science Publishing Group
Building Multile Multicast Trees with Guarranteed QOS for Service Based Routing Using Artificial Algorithms
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.s.2015030601.13
In Service Based Routing (SBR), data is transmitted from a source node to destination nodes are not depended on destination addresses. Hence, it is comfortable with new advanced technology as cloud computing and also flexible and reliable. Multicast routing is advanced technique to deliver data simultaneously from one source node to multiple destination nodes with QOS (quality of service). In this paper, we introduce a technique that is extended from multicast technique with multiple multicast trees that are conformed quality of service routing. This technique is based on Greedy, Ant Colony Optimization, and fuzzy logic to get optimal routes to transmit data from one source to multiple destination node very effectively. The usage of the ANT Colony optimization, Greedy, fuzzy logic algorithms to find cyclic or multiple paths routes on each trunk by multiple criterions to transmit data effectively.
In Service Based Routing (SBR), data is transmitted from a source node to destination nodes are not depended on destination addresses. Hence, it is comfortable with new advanced technology as cloud computing and also flexible and reliable. Multicast routing is advanced technique to deliver data simultaneously from one source node to multiple destination nodes with QOS (quality of service). In this paper, we introduce a technique that is extended from multicast technique with multiple multicast trees that are conformed quality of service routing. This technique is based on Greedy, Ant Colony Optimization, and fuzzy logic to get optimal routes to transmit data from one source to multiple destination node very effectively. The usage of the ANT Colony optimization, Greedy, fuzzy logic algorithms to find cyclic or multiple paths routes on each trunk by multiple criterions to transmit data effectively.
Building Multile Multicast Trees with Guarranteed QOS for Service Based Routing Using Artificial Algorithms
doi:10.11648/j.iotcc.s.2015030601.13
Internet of Things and Cloud Computing
2015-06-12
© Science Publishing Group
Nguyen Thanh Long
Nguyen Duc Thuy
Pham Huy Hoang
Building Multile Multicast Trees with Guarranteed QOS for Service Based Routing Using Artificial Algorithms
3
6
19
19
2015-06-12
2015-06-12
10.11648/j.iotcc.s.2015030601.13
http://www.sciencepublishinggroup.com/journal/paperinfo.aspx?journalid=238&doi=10.11648/j.iotcc.s.2015030601.13
© Science Publishing Group