Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
1,096
result(s) for
"delivery server"
Sort by:
An Optimization of Home Delivery Services in a Stochastic Modeling with Self and Compulsory Vacation Interruption
by
Anbazhagan, Neelamegam
,
Joshi, Gyanendra Prasad
,
Lee, Soojeong
in
(s,Q) ordering policy
,
Consumer preferences
,
Coronaviruses
2023
This study presents and discusses the home delivery services in stochastic queuing-inventory modeling (SQIM). This system consists of two servers: one server manages the inventory sales processes, and the other server provides home delivery services at the doorstep of customers. Based on the Bernoulli schedule, a customer served by the first server may opt for a home delivery service. If any customer chooses the home delivery option, he hands over the purchased item for home delivery and leaves the system immediately. Otherwise, he carries the purchased item and leaves the system. When the delivery server returns to the system after the last home delivery service and finds that there are no items available for delivery, he goes on vacation. Such a vacation of a delivery server is to be interrupted compulsorily or voluntarily, according to the prefixed threshold level. The replenishment process is executed due to the (s,Q) reordering policy. The unique solution of the stationary probability vector to the finite generator matrix is found using recursive substitution and the normalizing condition. The necessary and sufficient system performance measures and the expected total cost of the system are computed. The optimal expected total cost is obtained numerically for all the parameters and shown graphically. The influence of parameters on the expected number of items that need to be delivered, the probability that the delivery server is busy, and the expected rate at which the delivery server’s self and compulsory vacation interruptions are also discussed.
Journal Article
FL-PMI: Federated Learning-Based Person Movement Identification through Wearable Devices in Smart Healthcare Systems
by
Arikumar, K. S.
,
Pandya, Sharnil
,
Khan, Javed Masood
in
Age groups
,
Artificial Intelligence
,
Cloud Computing
2022
Recent technological developments, such as the Internet of Things (IoT), artificial intelligence, edge, and cloud computing, have paved the way in transforming traditional healthcare systems into smart healthcare (SHC) systems. SHC escalates healthcare management with increased efficiency, convenience, and personalization, via use of wearable devices and connectivity, to access information with rapid responses. Wearable devices are equipped with multiple sensors to identify a person’s movements. The unlabeled data acquired from these sensors are directly trained in the cloud servers, which require vast memory and high computational costs. To overcome this limitation in SHC, we propose a federated learning-based person movement identification (FL-PMI). The deep reinforcement learning (DRL) framework is leveraged in FL-PMI for auto-labeling the unlabeled data. The data are then trained using federated learning (FL), in which the edge servers allow the parameters alone to pass on the cloud, rather than passing vast amounts of sensor data. Finally, the bidirectional long short-term memory (BiLSTM) in FL-PMI classifies the data for various processes associated with the SHC. The simulation results proved the efficiency of FL-PMI, with 99.67% accuracy scores, minimized memory usage and computational costs, and reduced transmission data by 36.73%.
Journal Article
B3Pred: A Random-Forest-Based Method for Predicting and Designing Blood–Brain Barrier Penetrating Peptides
by
Patiyal, Sumeet
,
Sharma, Neelam
,
Raghava, Gajendra Pal Singh
in
Algorithms
,
Alzheimer's disease
,
Amino acids
2021
The blood–brain barrier is a major obstacle in treating brain-related disorders, as it does not allow the delivery of drugs into the brain. We developed a method for predicting blood–brain barrier penetrating peptides to facilitate drug delivery into the brain. These blood–brain barrier penetrating peptides (B3PPs) can act as therapeutics, as well as drug delivery agents. We trained, tested, and evaluated our models on blood–brain barrier peptides obtained from the B3Pdb database. First, we computed a wide range of peptide features. Then, we selected relevant peptide features. Finally, we developed numerous machine-learning-based models for predicting blood–brain barrier peptides using the selected features. The random-forest-based model performed the best with respect to the top 80 selected features and achieved a maximal 85.08% accuracy with an AUROC of 0.93. We also developed a webserver, B3pred, that implements our best models. It has three major modules that allow users to predict/design B3PPs and scan B3PPs in a protein sequence.
Journal Article
COVID-19 Vehicle Based on an Efficient Mutual Authentication Scheme for 5G-Enabled Vehicular Fog Computing
2022
The COVID-19 pandemic is currently having disastrous effects on every part of human life everywhere in the world. There have been terrible losses for the entire human race in all nations and areas. It is crucial to take good precautions and prevent COVID-19 because of its high infectiousness and fatality rate. One of the key spreading routes has been identified to be transportation systems. Therefore, improving infection tracking and healthcare monitoring for high-mobility transportation systems is impractical for pandemic control. In order to enhance driving enjoyment and road safety, 5G-enabled vehicular fog computing may gather and interpret pertinent vehicle data, which open the door to non-contact autonomous healthcare monitoring. Due to the urgent need to contain the automotive pandemic, this paper proposes a COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing. The proposed scheme consists of two different aspects of the special flag, SF = 0 and SF = 1, denoting normal and COVID-19 vehicles, respectively. The proposed scheme satisfies privacy and security requirements as well as achieves COVID-19 and healthcare solutions. Finally, the performance evaluation section shows that the proposed scheme is more efficient in terms of communication and computation costs as compared to most recent related works.
Journal Article
ECDU: an edge content delivery and update framework in Mobile edge computing
2019
Content delivery network (CDN) has gained increasing popularity in recent years for facilitating content delivery. Most existing CDN-based works upload the content generated by mobile users to the cloud data center firstly. Then, the cloud data center delivers the content to the proxy server. Finally, the mobile users request the required content from the proxy server. However, uploading all the collected content to the cloud data center increases the pressure on the core network. In addition, it also wastes a lot of bandwidth resources because most of the content does not have to be uploaded. To make up for the shortcomings of existing CDN-based works, this article proposes an edge content delivery and update (ECDU) framework based on mobile edge computing architecture. In the ECDU framework, we deploy a number of content servers to store raw content collected from mobile users, and cache pools to store content that frequently requested at the edge of the network. Thus, it is not necessary to upload all content collected by mobile users to the cloud data center, thereby alleviating the pressure of the core network. Based on content popularity and cache pool ranking, we also propose edge content delivery (ECD) and edge content update (ECU) schemes. The ECD scheme is to deliver content from cloud data center to cache pool, and the ECU scheme is to mitigate the content to appropriate cache pools in terms of its request frequency and cache pool ranking. Finally, a representative case study is provided and several open research issues are discussed.
Journal Article
Advanced federated ensemble internet of learning approach for cloud based medical healthcare monitoring system
2024
Medical image machines serve as a valuable tool to monitor and diagnose a variety of diseases. However, manual and centralized interpretation are both error-prone and time-consuming due to malicious attacks. Numerous diagnostic algorithms have been developed to improve precision and prevent poisoning attacks by integrating symptoms, test methods, and imaging data. But in today’s digital technology world, it is necessary to have a global cloud-based diagnostic artificial intelligence model that is efficient in diagnosis and preventing poisoning attacks and might be used for multiple purposes. We propose the Healthcare Federated Ensemble Internet of Learning Cloud Doctor System (FDEIoL) model, which integrates different Internet of Things (IoT) devices to provide precise and accurate interpretation without poisoning attack problems, thereby facilitating IoT-enabled remote patient monitoring for smart healthcare systems. Furthermore, the FDEIoL system model uses a federated ensemble learning strategy to provide an automatic, up-to-date global prediction model based on input local models from the medical specialist. This assures biomedical security by safeguarding patient data and preserving the integrity of diagnostic processes. The FDEIoL system model utilizes local model feature selection to discriminate between malicious and non-malicious local models, and ensemble strategies use positive and negative samples to optimize the performance of the test dataset, enhancing its capability for remote patient monitoring. The FDEIoL system model achieved an exceptional accuracy rate of 99.24% on the Chest X-ray dataset and 99.0% on the MRI dataset of brain tumors compared to centralized models, demonstrating its ability for precision diagnosis in IoT-enabled healthcare systems.
Journal Article
A novel cost-based replica server placement for optimal service quality in cloud-based content delivery network
by
Krishnamur, Chethan Bommalingaiahanapalya
,
Channakrishnaraju, Channakrishnaraju
,
Dharmapal, Priyanka
2023
Replica server placement is one of the crucial concerns for a given geographic diversity associated with placement problems in content delivery network (CDN). After reviewing the existing literatures, it is noted that studies are more for solving placement problem in conventional CDN and not much over cloud-based CDN architectures, which some few studies are reported towards replica selection are much in its nascent stages of development. Moreover, such models are not benchmarked or practically assessed to prove its effectiveness. Hence, the proposed study introduces a novel design of computational framework associated with cloud-based CDN which can facilitate cost-effective replica server management for enhanced service delivery. Implemented using analytical research methodology, the simulated study outcome shows that proposed scheme offers reduced cost, reduced resource dependencies, reduced latency, and faster processing time in contrast to existing models of replica server placement.
Journal Article
Smart-Contract Aware Ethereum and Client-Fog-Cloud Healthcare System
by
Thinnukool, Orawit
,
Rashid, Ahmed N.
,
Abdulkareem, Karrar Hameed
in
Algorithms
,
Blockchain
,
Cloud computing
2021
The Internet of Medical Things (IoMT) is increasingly being used for healthcare purposes. IoMT enables many sensors to collect patient data from various locations and send it to a distributed hospital for further study. IoMT provides patients with a variety of paid programmes to help them keep track of their health problems. However, the current system services are expensive, and offloaded data in the healthcare network are insecure. The research develops a new, cost-effective and stable IoMT framework based on a blockchain-enabled fog cloud. The study aims to reduce the cost of healthcare application services as they are processing in the system. The study devises an IoMT system based on different algorithm techniques, such as Blockchain-Enable Smart-Contract Cost-Efficient Scheduling Algorithm Framework (BECSAF) schemes. Smart-Contract Blockchain schemes ensure data consistency and validation with symmetric cryptography. However, due to the different workflow tasks scheduled on other nodes, the heterogeneous, earliest finish, time-based scheduling deals with execution under their deadlines. Simulation results show that the proposed algorithm schemes outperform all existing baseline approaches in terms of the implementation of applications.
Journal Article
Technical analysis of content placement algorithms for content delivery network in cloud
by
Jayakumar, Suman
,
Sheelvanthmath, Prakash
,
Akki, Channappa Baslingappa
in
Algorithms
,
Bandwidths
,
Cloud computing
2022
Content placement algorithm is an integral part of the cloud-based content de-livery network. They are responsible for selecting a precise content to be re-posited over the surrogate servers distributed over a geographical region. Although various works are being already carried out in this sector, there are loopholes connected to most of the work, which doesn't have much disclosure. It is already known that quality of service, quality of experience, and the cost is always an essential objective targeting to be improved in existing work. Still, there are various other aspects and underlying reasons which are equally important from the design aspect. Therefore, this paper contributes towards reviewing the existing approaches of content placement algorithm over cloud-based content delivery network targeting to explore open-end re-search issues.
Journal Article
Centralized Hierarchical Coded Caching Scheme for Two-Layer Network
2025
This paper considers a two-layer hierarchical network, where a server containing N files is connected to K1 mirrors and each mirror is connected to K2 users. Each mirror and each user has a cache memory of size M1 and M2 files, respectively. The server can only broadcast to the mirrors, and each mirror can only broadcast to its connected users. For such a network, we propose a novel coded caching scheme based on two known placement delivery arrays (PDAs). To fully utilize the cache memory of both the mirrors and users, we first treat the mirrors and users as cache nodes of the same type; i.e., the cache memory of each mirror is regarded as an additional part of the connected users’ cache, then the server broadcasts messages to all mirrors according to a K1K2-user PDA in the first layer. In the second layer, each mirror first cancels useless file packets (if any) in the received useful messages and forwards them to the connected users, such that each user can decode the requested packets not cached by the mirror, then broadcasts coded subpackets to the connected users according to a K2-user PDA, such that each user can decode the requested packets cached by the mirror. The proposed scheme is extended to a heterogeneous two-layer hierarchical network, where the number of users connected to different mirrors may be different. Numerical comparison showed that the proposed scheme achieved lower coding delays compared to existing hierarchical coded caching schemes at most memory ratio points.
Journal Article