This is an outdated version published on 2023-01-03. Read the most recent version.

Generative Boltzmann Adversarial Network in Manet Attack Detection and QOS Enhancement with Latency

Authors

  • Ashok Kumar Yadav
  • Ms. Bhanu Sharma
  • Akash Kumar Bhagat
  • Dr. Harshal Shah
  • Manjunath C R
  • Mr. Aishwary Awasthi

DOI:

https://doi.org/10.17762/ijcnis.v14i3.5607

Keywords:

Edge computing, Quality of service, Resource estimation, Virtualization, Machine learning

Abstract

With the advancement of Internet of Things (IoT), the network devices seem to be raising, and the cloud data centre load also raises; certain delay-sensitive services are not responded to promptly which leads to a reduced quality of service (QoS). The technique of resource estimation could offer the appropriate source for users through analyses of load of resource itself. Thus, the prediction of resource QoS was important to user fulfillment and task allotment in edge computing. This study develops a new manta ray foraging optimization with backpropagation neural network (MRFO-BPNN) model for resource estimation using quality of service (QoS) in the edge computing platform. Primarily, the MRFO-BPNN model makes use of BPNN algorithm for the estimation of resources in edge computing. Besides, the parameters relevant to the BPNN model are adjusted effectually by the use of MRFO algorithm. Moreover, an objective function is derived for the MRFO algorithm for the investigation of load state changes and choosing proper ones. To facilitate the enhanced performance of the MRFO-BPNN model, a widespread experimental analysis is made. The comprehensive comparison study highlighted the excellency of the MRFO-BPNN model.

Downloads

Published

2022-12-31 — Updated on 2023-01-03

Versions

How to Cite

Yadav, A. K. ., Sharma, M. B. ., Bhagat, A. K. ., Shah, D. H. ., C R, M. ., & Awasthi, M. A. . (2023). Generative Boltzmann Adversarial Network in Manet Attack Detection and QOS Enhancement with Latency. International Journal of Communication Networks and Information Security (IJCNIS), 14(3), 214–225. https://doi.org/10.17762/ijcnis.v14i3.5607 (Original work published December 31, 2022)

Issue

Section

Research Articles