scispace - formally typeset
Search or ask a question

Showing papers by "Thapar University published in 2018"


Journal ArticleDOI
TL;DR: A novel optimization algorithm, called Emperor Penguin Optimizer (EPO), which mimics the huddling behavior of emperor penguins, which is compared with eight state-of-the-art optimization algorithms.
Abstract: This paper proposes a novel optimization algorithm, called Emperor Penguin Optimizer (EPO), which mimics the huddling behavior of emperor penguins (Aptenodytes forsteri). The main steps of EPO are to generate the huddle boundary, compute temperature around the huddle, calculate the distance, and find the effective mover. These steps are mathematically modeled and implemented on 44 well-known benchmark test functions. It is compared with eight state-of-the-art optimization algorithms. The paper also considers for solving six real-life constrained and one unconstrained engineering design problems. The convergence and computational complexity are also analyzed to ensure the applicability of proposed algorithm. The experimental results show that the proposed algorithm is able to provide better results as compared to the other well-known metaheuristic algorithms.

508 citations


Journal ArticleDOI
TL;DR: This paper proposes a three layer patient-driven Healthcare architecture for real-time data collection, processing and transmission that gives insights to the end users for the applicability of fog devices and gateways in Healthcare 4.0 environment for current and future applications.

332 citations


Journal ArticleDOI
TL;DR: The design of a new secure lightweight three-factor remote user authentication scheme for HIoTNs, called the user authenticated key management protocol (UAKMP), which is comparable in computation and communication costs as compared to other existing schemes.
Abstract: In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical applications including smart home, smart city, smart grid, industrial Internet, connected healthcare, smart retail, smart supply chain and smart farming. The hierarchical IoT network (HIoTN) is a special kind of the generic IoT network, which is composed of the different nodes, such as the gateway node, cluster head nodes, and sensing nodes organized in a hierarchy. In HIoTN, there is a need, where a user can directly access the real-time data from the sensing nodes for a particular application in generic IoT networking environment. This paper emphasizes on the design of a new secure lightweight three-factor remote user authentication scheme for HIoTNs, called the user authenticated key management protocol (UAKMP). The three factors used in UAKMP are the user smart card, password, and personal biometrics. The security of the scheme is thoroughly analyzed under the formal security in the widely accepted real-or-random model, the informal security as well as the formal security verification using the widely accepted automated validation of Internet security protocols and applications tool. UAKMP offers several functionality features including offline sensing node registration, freely password and biometric update facility, user anonymity, and sensing node anonymity compared to other related existing schemes. In addition, UAKMP is also comparable in computation and communication costs as compared to other existing schemes.

310 citations


Journal ArticleDOI
TL;DR: An SDN-based edge-cloud interplay is presented to handle streaming big data in IIoT environment, wherein SDN provides an efficient middleware support and a multi-objective evolutionary algorithm using Tchebycheff decomposition for flow scheduling and routing in SDN is presented.
Abstract: The emergence of the Industrial Internet of Things (IIoT) has paved the way to real-time big data storage, access, and processing in the cloud environment. In IIoT, the big data generated by various devices such as-smartphones, wireless body sensors, and smart meters will be on the order of zettabytes in the near future. Hence, relaying this huge amount of data to the remote cloud platform for further processing can lead to severe network congestion. This in turn will result in latency issues which affect the overall QoS for various applications in IIoT. To cope with these challenges, a recent paradigm shift in computing, popularly known as edge computing, has emerged. Edge computing can be viewed as a complement to cloud computing rather than as a competition. The cooperation and interplay among cloud and edge devices can help to reduce energy consumption in addition to maintaining the QoS for various applications in the IIoT environment. However, a large number of migrations among edge devices and cloud servers leads to congestion in the underlying networks. Hence, to handle this problem, SDN, a recent programmable and scalable network paradigm, has emerged as a viable solution. Keeping focus on all the aforementioned issues, in this article, an SDN-based edge-cloud interplay is presented to handle streaming big data in IIoT environment, wherein SDN provides an efficient middleware support. In the proposed solution, a multi-objective evolutionary algorithm using Tchebycheff decomposition for flow scheduling and routing in SDN is presented. The proposed scheme is evaluated with respect to two optimization objectives, that is, the trade-off between energy efficiency and latency, and the trade-off between energy efficiency and bandwidth. The results obtained prove the effectiveness of the proposed flow scheduling scheme in the IIoT environment.

285 citations


Journal ArticleDOI
TL;DR: This article presents a comprehensive, well-informed examination, and realistic analysis of deploying big data analytics successfully in companies and presents a methodical analysis for the usage of Big Data Analytics in various applications such as agriculture, healthcare, cyber security, and smart city.
Abstract: Big Data Analytics (BDA) is increasingly becoming a trending practice that generates an enormous amount of data and provides a new opportunity that is helpful in relevant decision-making. The developments in Big Data Analytics provide a new paradigm and solutions for big data sources, storage, and advanced analytics. The BDA provide a nuanced view of big data development, and insights on how it can truly create value for firm and customer. This article presents a comprehensive, well-informed examination, and realistic analysis of deploying big data analytics successfully in companies. It provides an overview of the architecture of BDA including six components, namely: (i) data generation, (ii) data acquisition, (iii) data storage, (iv) advanced data analytics, (v) data visualization, and (vi) decision-making for value-creation. In this paper, seven V's characteristics of BDA namely Volume, Velocity, Variety, Valence, Veracity, Variability, and Value are explored. The various big data analytics tools, techniques and technologies have been described. Furthermore, it presents a methodical analysis for the usage of Big Data Analytics in various applications such as agriculture, healthcare, cyber security, and smart city. This paper also highlights the previous research, challenges, current status, and future directions of big data analytics for various application platforms. This overview highlights three issues, namely (i) concepts, characteristics and processing paradigms of Big Data Analytics; (ii) the state-of-the-art framework for decision-making in BDA for companies to insight value-creation; and (iii) the current challenges of Big Data Analytics as well as possible future directions.

274 citations


Journal ArticleDOI
TL;DR: An architecture for patient monitoring health-care system in WMSN is proposed and an anonymity-preserving mutual authentication protocol for mobile users is designed and it is demonstrated that the proposed protocol is efficient and robust.

249 citations


Journal ArticleDOI
TL;DR: The architecture and its security and privacy requirements are studied, and potential solutions to address challenging issues such as privacy leakage, data confidentiality protection, and flexible accessibility are outlined.
Abstract: A recent trend in both industry and research is the Internet of Drones, which has applications in both civilian and military settings. However, drones (also known as unmanned aerial vehicles) are generally not designed with security in mind, and there are fundamental security and privacy issues that need study. Hence, in this article, we study the architecture and its security and privacy requirements. We also outline potential solutions to address challenging issues such as privacy leakage, data confidentiality protection, and flexible accessibility, with the hope that this article will provide the basis for future research in this emerging area.

248 citations


Journal ArticleDOI
Harish Garg1
TL;DR: A new linguistic Pythagorean fuzzy set (LPFS) is presented by combining the concepts of a Pythagorian fuzzy set and linguistic fuzzy set, and a multiattribute decision‐making method is established based on these operators.
Abstract: In this article, a new linguistic Pythagorean fuzzy set (LPFS) is presented by combining the concepts of a Pythagorean fuzzy set and linguistic fuzzy set. LPFS is a better way to deal with the uncertain and imprecise information in decision making, which is characterized by linguistic membership and nonmembership degrees. Some of the basic operational laws, score, and accuracy functions are defined to compare the two or more linguistic Pythagorean fuzzy numbers and their properties are investigated in detail. Based on the norm operations, some series of the linguistic Pythagorean weighted averaging and geometric aggregation operators, named as linguistic Pythagorean fuzzy weighted average and geometric, ordered weighted average and geometric with linguistic Pythagorean fuzzy information are proposed. Furthermore, a multiattribute decision‐making method is established based on these operators. Finally, an illustrative example is used to illustrate the applicability and validity of the proposed approach and compare the results with the existing methods to show the effectiveness of it.

247 citations


Journal ArticleDOI
TL;DR: The tutorial instructs readers how to conceptualize and design electric-field effects on bonds, structures, and reactions, and projects the unity of EEF effects, "giving insight and numbers".
Abstract: This is a tutorial on use of external-electric-fields (EEFs) as effectors of chemical change. The tutorial instructs readers how to conceptualize and design electric-field effects on bonds, structures, and reactions. Most effects can be comprehended as the field-induced stabilization of ionic structures. Thus, orienting the field along the “bond axis” will facilitate bond breaking. Similarly, orienting the field along the “reaction axis”, the direction in which “electron pairs transform” from reactants- to products-like, will catalyse the reaction. Flipping the field's orientation along the reaction-axis will cause inhibition. Orienting the field off-reaction-axis will control stereo-selectivity and remove forbidden-orbital mixing. Two-directional fields may control both reactivity and selectivity. Increasing the field strength for concerted reactions (e.g., Diels–Alder's) will cause mechanistic-switchover to stepwise mechanisms with ionic intermediates. Examples of bond breaking and control of reactivity/selectivity and mechanisms are presented and analysed from the “ionic perspective”. The tutorial projects the unity of EEF effects, “giving insight and numbers”.

246 citations


Journal ArticleDOI
TL;DR: Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats.

241 citations


Journal ArticleDOI
TL;DR: An extension of technique for order of preference by similarity to ideal solution method is developed by combining the proposed connection number for IVIFSs and hence finding the best alternative(s) using relative degree of closeness coefficient.
Abstract: The objective of this paper is to focus on multi-attribute decision-making for interval-valued intuitionistic fuzzy set environment based on set pair analysis (SPA). For it, the major component of the SPA known as connection number has been constructed based on the set pairs between two preference values consists of every attribute and ideal pairs of it. Based on these connection numbers, an extension of technique for order of preference by similarity to ideal solution method is developed by combining the proposed connection number for IVIFSs and hence finding the best alternative(s) using relative degree of closeness coefficient. An illustrative example has been given for demonstrating the approach and compares their performance with some existing measures.

Journal ArticleDOI
TL;DR: A new score function of q‐rung orthopair fuzzy number (q‐ROFN) is presented for solving the failure problems when comparing two q‐ ROFNs and has a great power in distinguishing the optimal alternative.
Abstract: q‐Rung orthopair fuzzy set (q‐ROFS) is a powerful tool that attracts the attention of many scholars in dealing with uncertainty and vagueness. The aim of paper is to present a new score function of q‐rung orthopair fuzzy number (q‐ROFN) for solving the failure problems when comparing two q‐ROFNs. Then a new exponential operational law about q‐ROFNs is defined, in which the bases are positive real numbers and the exponents are q‐ROFNs. Meanwhile, some properties of the operational law are investigated. Later, we apply them to derive the q‐rung orthopair fuzzy weighted exponential aggregation operator. Additionally, an approach for multicriteria decision‐making problems under the q‐rung orthopair fuzzy data is explored by applying proposed aggregation operator. Finally, an example is investigated to illustrate the feasibility and validity of the proposed approach. The salient features of the proposed method, compared to the existing q‐rung orthopair fuzzy decision‐making methods, are (1) it can obtain the optimal alternative without counterintuitive phenomena; (2) it has a great power in distinguishing the optimal alternative.

Proceedings ArticleDOI
01 Dec 2018
TL;DR: A Blockchain-based framework for efficient storage and maintenance of EHRs is proposed that provides the secure and efficient access to medical data by patients, providers, and third parties, while preserving the patient private information.
Abstract: In the present era of smart cities and homes, the private information of the patients such as their names, address, and disease is being breached on a regular basis, which indirectly related to the security of electronic health records (EHRs). The existing state-of-the-art schemes handling the security of EHRs have resulted in data being generally inaccessible to patients. These schemes struggle in providing the efficient balance between the data privacy, need for patients, and providers to regularly interact with data. Blockchain technology resolves the aforementioned issues because it shares the data in a decentralized and transactional fashion. This can be leveraged in the healthcare sector to maintain the balance between privacy and accessibility of EHRs. In this paper, we propose a Blockchain-based framework for efficient storage and maintenance of EHRs. This further provides the secure and efficient access to medical data by patients, providers, and third parties, while preserving the patient private information. The goals of this paper are to analyze how our proposed framework fulfills the needs of patients, providers, and third parties, and to understand how the framework maintains the privacy and security concerns in the healthcare 4.0.

Journal ArticleDOI
TL;DR: A new secure channel-free certificateless searchable public key encryption with multiple keywords scheme for IIoT deployment and demonstrates the security of the scheme in the random oracle model against two types of adversaries.
Abstract: With the widespread adoption of Internet of Things and cloud computing in different industry sectors, an increasing number of individuals or organizations are outsourcing their Industrial Internet of Things (IIoT) data in the cloud server to achieve cost saving and collaboration (e.g., data sharing). However, in this environment, preserving the privacy of data remains a key challenge and inhibiting factor to an even wider adoption of IIoT in the cloud environment. To mitigate these issues, in this paper, we design a new secure channel-free certificateless searchable public key encryption with multiple keywords scheme for IIoT deployment. We then demonstrate the security of the scheme in the random oracle model against two types of adversaries, where one adversary is given the power to choose a random public key instead of any user's public key and another adversary is allowed to learn the system master key. In the presence of these types of adversaries, we evaluate the performance of the proposed scheme and demonstrate that it achieves (computational) efficiency with low communication cost.

Journal ArticleDOI
TL;DR: A multi-objective version of recently developed Spotted Hyena Optimizer (SHO) is proposed called MOSHO, used to optimize the multiple objectives problems and performs better than the others and produces the Pareto optimal solutions with high convergence.
Abstract: This paper proposes a multi-objective version of recently developed Spotted Hyena Optimizer (SHO) called Multi-objective Spotted Hyena Optimizer (MOSHO). It is used to optimize the multiple objectives problems. In the proposed algorithm, a fixed-sized archive is employed for storing the non-dominated Pareto optimal solutions. The roulette wheel mechanism is used to select the effective solutions from archive to simulate the social and hunting behaviors of spotted hyenas. The proposed algorithm is tested on 24 benchmark test functions and compared with six recently developed metaheuristic algorithms. The proposed algorithm is then applied on six constrained engineering design problems to demonstrate its applicability on real-life problems. The experimental results reveal that the proposed algorithm performs better than the others and produces the Pareto optimal solutions with high convergence.

Journal ArticleDOI
TL;DR: Security and performance analysis show that the proposed authentication scheme based on ECC for IoT and cloud servers is more powerful, efficient, and secure with respect to various known attacks.
Abstract: The Internet of Things (IoT) is now a buzzword for Internet connectivity which extends to embedded devices, sensors and other objects connected to the Internet. Rapid development of this technology has led to the usage of various embedded devices in our daily life. However, for resource sharing and communication among these devices, there is a requirement for connecting these embedded devices to a large pool of resources like a cloud. The promising applications of IoT in Government and commercial sectors are possible by integrating cloud servers with these embedded devices. But such an integration of technologies involves security issues like data privacy and authentication of devices whenever information is exchanged between them. Recently, Kalra and Sood proposed an authentication scheme based on elliptic curve cryptography (ECC) for IoT and cloud servers and claimed that their scheme satisfies all security requirements and is immune to various types of attacks. However, in this paper, we show that Kalra and Sood scheme is susceptible to offline password guessing and insider attacks and it does not achieve device anonymity, session key agreement, and mutual authentication. Keeping in view of the shortcomings of Kalra and Sood’s scheme, we have proposed an authentication scheme based on ECC for IoT and cloud servers. In the proposed scheme in this paper, we have formally analyzed the security properties of the designed scheme by the most widely accepted and used Automated Validation of Internet Security Protocols and Applications tool. Security and performance analysis show that when compared with other related schemes, the proposed scheme is more powerful, efficient, and secure with respect to various known attacks.

Journal ArticleDOI
TL;DR: A new authentication scheme for multi-server environments using Chebyshev chaotic map that provides strong authentication, and also supports biometrics & password change phase by a legitimate user at any time locally, and dynamic server addition phase.
Abstract: Multi-server environment is the most common scenario for a large number of enterprise class applications. In this environment, user registration at each server is not recommended. Using multi-server authentication architecture, user can manage authentication to various servers using single identity and password. We introduce a new authentication scheme for multi-server environments using Chebyshev chaotic map. In our scheme, we use the Chebyshev chaotic map and biometric verification along with password verification for authorization and access to various application servers. The proposed scheme is light-weight compared to other related schemes. We only use the Chebyshev chaotic map, cryptographic hash function and symmetric key encryption-decryption in the proposed scheme. Our scheme provides strong authentication, and also supports biometrics & password change phase by a legitimate user at any time locally, and dynamic server addition phase. We perform the formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to show that the presented scheme is secure. In addition, we use the formal security analysis using the Burrows-Abadi-Needham (BAN) logic along with random oracle models and prove that our scheme is secure against different known attacks. High security and significantly low computation and communication costs make our scheme is very suitable for multi-server environments as compared to other existing related schemes.

Journal ArticleDOI
TL;DR: This paper proposes a new biometric-based privacy preserving user authentication (BP2UA) scheme for cloud-based IIoT deployment that consists of strong authentication between users and smart devices using preestablished key agreement between smart devices and the gateway node.
Abstract: Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things (IIoT) becomes popular in recent years. However, as the smart devices share the information with each other using an open channel, i.e., Internet, so security and privacy of the shared information remains a paramount concern. There exist some solutions in the literature for preserving security and privacy in IIoT environment. However, due to their heavy computation and communication overheads, these solutions may not be applicable to wide category of applications in IIoT environment. Hence, in this paper, we propose a new biometric-based privacy preserving user authentication (BP2UA) scheme for cloud-based IIoT deployment. BP2UA consists of strong authentication between users and smart devices using preestablished key agreement between smart devices and the gateway node. The formal security analysis of BP2UA using the well-known real-or-random model is provided to prove its session key security. Moreover, an informal security analysis of BP2UA is also given to show its robustness against various types of known attacks. The computation and communication costs of BP2UA in comparison to the other existing schemes of its category demonstrate its effectiveness in the IIoT environment. Finally, the practical demonstration of BP2UA is also done using the NS2 simulation.

Journal ArticleDOI
TL;DR: In this article, the utilization of industrial byproducts such as ground granulated blast furnace slag (GGBS) and rice husk ash (RHA) for the development of sustainable geopolymer concrete was presented and the effect of adding RHA as partial replacement of GGBS on compressive strength, split tensile strength, chloride permeability and sorptivity were investigated up to the age of 90 days.

Journal ArticleDOI
TL;DR: An attempt is made to enrich the theory of information measure by presented some exponential based distance measures using CNs of the IVIF sets to solve MADM problem under IVIF environment where each of the element is characteristics by IVIF numbers.
Abstract: The objective of this work is to present a novel multi-attribute decision making (MADM) method under interval-valued intuitionistic fuzzy (IVIF) set environment by integrating a Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method. Set pair analysis (SPA) theory is the modern uncertainty theory which is composed by the three components, namely “identity”, “discrepancy” and “contrary” degrees of the connection number (CN) and overlap with the various existing theories for handling the uncertainties in the data. Thus, motivated by this, in the present work, an attempt is made to enrich the theory of information measure by presented some exponential based distance measures using CNs of the IVIF sets. The supremacy of the proposed measure is also discussed. Afterward, a TOPSIS method based on the proposed distance measures is developed to solve MADM problem under IVIF environment where each of the element is characteristics by IVIF numbers. The utility, as well as supremacy of the approach, is confirmed through a real-life numerical example and validate it by comparing their results with the several existing approaches results.

Journal ArticleDOI
TL;DR: In this paper, a literature review on hybrid or composite nanofluids is presented, which are prepared either by dispersing different nanoparticles as individual constituents or by placing them in the base fluid, taking 160 papers published from before 1995 to 2017 into account.

Journal ArticleDOI
TL;DR: This paper has put forwarded an RFID-based authentication architecture for distributed IoT (Internet of Things) applications suitable for the future smart city environments and designed for IoT-based infrastructure in smart city environment.

Journal ArticleDOI
TL;DR: A certificateless public key authenticated encryption with keyword search scheme is proposed, which is provably secure against inside keyword guessing attack (IKGA) and demonstrates that it is more secure and effective compared with other certificatelesspublic key encryption with keywords search schemes.
Abstract: Industrial Internet of Things (IIoT) integrates various types of intelligent terminals, mobile devices, and communication technologies to enable the upgrade of traditional industries to intelligent industries. IIoT relies on the powerful data processing capabilities of cloud computing to reduce the cost of various on-demand services as per the requirements of users. However, the privacy and confidentiality of the outsourced data should be protected in this environment because the data are typically “handled” by a third-party service provider. An encryption technique can guarantee the confidentiality of the data but it limits data retrieval due to its innate “all-or-nothing” decryption feature. To apply encryption to privacy-preserving data retrieval, many public key encryption techniques with keyword search systems have been proposed in the literature. However, most of the existing schemes are vulnerable to inside keyword guessing attack (IKGA), which is caused by a small keyword space. To address this problem, we propose a certificateless public key authenticated encryption with keyword search scheme, which is provably secure against IKGA. A performance analysis of the proposed scheme demonstrates that it is more secure and effective compared with other certificateless public key encryption with keyword search schemes.

Journal ArticleDOI
TL;DR: A software-defined network (SDN) enabled multi-attribute secure communication model for an IIoT environment is designed and the results obtained prove its effectiveness in comparison to the existing solutions.
Abstract: Industrial Internet of things (IIoT) is an emerging technology with a large number of smart connected devices having sensing, storage, and computing capabilities. IIoT is used in a wide range of applications such as transportation, healthcare, manufacturing, and energy management in smart grids. Most of the solutions reported in the literature for secure communications are not suitable for the aforementioned applications due to the usage of traditional TCP/IP-based network infrastructure. So, to handle this challenge, in this paper, a software-defined network (SDN) enabled multi-attribute secure communication model for an IIoT environment is designed. The proposed scheme works in three phases: 1) an SDN-IIoT communication model is designed using a cuckoo-filter -based fast-forwarding scheme, 2) an attribute-based encryption scheme is presented for secure data communication, and 3) a peer entity authentication scheme using a third party authenticator, Kerberos , is also presented. The proposed scheme has been evaluated using different parameters where the results obtained prove its effectiveness in comparison to the existing solutions.

Journal ArticleDOI
TL;DR: A new score function for interval-valued fuzzy number is proposed for tackling the comparison problem, the formulae of information measures are introduced and their transformation relations are pioneered, and the objective weights of various parameters are determined via new entropy method.

Journal ArticleDOI
TL;DR: An extension of TOPSIS method is further developed, based on the proposed connection number of SPA, to calculate relative-closeness of sets of alternatives which are used to generate the ranking order of the alternatives.
Abstract: Intuitionistic fuzzy set plays a significant role to handle the uncertainties in the data during the decision-making process. Keeping the advantage of it in mind, an attempt has been made in the present article for rating the different preferences of the object based on the set pair analysis (SPA). For this, a major component of SPA, known as a connection number, has been constructed based on the preference values and the comprehensive ideal values of the object. An extension of TOPSIS method is further developed, based on the proposed connection number of SPA, to calculate relative-closeness of sets of alternatives which are used to generate the ranking order of the alternatives. A real example is taken to demonstrate the applicability and validity of the proposed methodology.

Journal ArticleDOI
TL;DR: A new lightweight authentication scheme suitable for wearable device deployment that allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and theMobile terminal.
Abstract: Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health-related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly accepted real-or-random model, as well as using the popular formal security verification tool, known as the Automated validation of Internet security protocols and applications. Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.

Journal ArticleDOI
TL;DR: This process model addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (QoS) requirements.

Journal ArticleDOI
Harish Garg1
TL;DR: New exponential operational laws of IVPFS, where bases are crisp values or interval numbers and exponents are interval‐valued Pythagorean fuzzy numbers are introduced and a decision‐making approach is presented based on these operators.
Abstract: In this article, we define two new exponential operational laws about the interval‐valued Pythagorean fuzzy set (IVPFS) and their corresponding aggregation operators. However, the exponential parameters (weights) of all the existing operational laws of IVPFSs are crisp values in IVPFS decision‐making problems. As a supplement, this paper first introduces new exponential operational laws of IVPFS, where bases are crisp values or interval numbers and exponents are interval‐valued Pythagorean fuzzy numbers. The prominent characteristic of these proposed operations is studied. Based on these laws, we develop some new weighted aggregation operators, namely the interval‐valued Pythagorean fuzzy weighted exponential averaging operator and the dual interval‐valued Pythagorean fuzzy weighted exponential averaging. Finally, a decision‐making approach is presented based on these operators and illustrated with some numerical examples to validate the developed approach.

Journal ArticleDOI
TL;DR: A data-driven transportation optimization model where cyber-threat detection in smart vehicles is done using a probabilistic data structure (PDS)- based approach, and the results obtained show that the proposed system requires comparatively less computational time and storage for load sharing, authentication, encryption, and decryption of data in the considered edge-computing-based smart transportation framework.
Abstract: Over the last few years, we have witnessed an exponential increase in the computing and storage capabilities of smart devices that has led to the popularity of an emerging technology called edge computing. Compared to the traditional cloud-computing- based infrastructure, computing and storage facilities are available near end users in edge computing. Moreover, with the widespread popularity of unmanned aerial vehicles (UAVs), huge amounts of information will be shared between edge devices and UAVs in the coming years. In this scenario, traffic surveillance using UAVs and edge computing devices is expected to become an integral part of the next generation intelligent transportation systems. However, surveillance in ITS requires uninterrupted data sharing, cooperative decision making, and stabilized network formation. Edge computing supports data processing and analysis closer to the deployed machines (i.e., the sources of the data). Instead of simply storing data and missing the opportunity to capitalize on it, edge devices can analyze data to gain insights before acting on them. Transferring data from the vehicle to the edge for real-time analysis can be facilitated by the use of UAVs, which can act as intermediate aerial nodes between the vehicles and edge nodes. However, as the communication between UAVs and edge devices is generally done using an open channel, there is a high risk of information leakage in this environment. Keeping our focus on all these issues, in this article, we propose a data-driven transportation optimization model where cyber-threat detection in smart vehicles is done using a probabilistic data structure (PDS)- based approach. A triple Bloom filter PDS- based scheduling technique for load balancing is initially used to host the real-time data coming from different vehicles, and then to distribute/collect the data to/from edges in a manner that minimizes the computational effort. The results obtained show that the proposed system requires comparatively less computational time and storage for load sharing, authentication, encryption, and decryption of data in the considered edge-computing-based smart transportation framework.