Skip to main content

Advertisement

Log in

Exploitation whale optimization based optimal offloading approach and topology optimization in a mobile ad hoc cloud environment

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Widespread availability of network technologies, mobile user request is increased day by day. The larger amount of energy utilization and resource sufficiency of cloud computing is to create the maximum capacity of exploration and exploitation as troublesome. In this paper, we proposed the formation of mobile user behavior based topology and its optimization. During the offloading process, the minimization of response time and the energy consumption is the major goal of this paper. The topology node formations are performed via improved text rank algorithm (ITRA) and neural network (NN) classifiers with Euclidian distance. In this paper, we introduced an effective optimization algorithm of the exploitation whale optimization algorithm (EWOA) and it is the combination of differential evaluation (DE) and whale optimization algorithms (WOA). The offloading process of proposed EWOA produces an optimal outcome of minimized energy consumption and response time. The implementation works of the proposed EWOA are carried out in the VMware platform. The performance of the proposed method is evaluated using different size puzzles, face detection applications, and state-of-art methods. Ultimately, our proposed method produces optimal accuracy and convergence speed with the minimized offloading process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  • Agarwal Y, Jain K, Karabasoglu O (2018) Smart vehicle monitoring and assistance using cloud computing in vehicular ad hoc networks. Int J Transp Sci Technol 7(1):60–73

    Google Scholar 

  • Alonso-Monsalve S, García-Carballeira F, Calderón A (2018) A heterogeneous mobile cloud computing model for hybrid clouds. Future Gener Comput Syst 87:651–666

    Google Scholar 

  • Babaeizadeh M, Bakhtiari M, Maarof MA (2014) Authentication method through keystrokes measurement of mobile users in cloud environment. Int J Adv Soft Comput Appl 6(3):94–112

    Google Scholar 

  • Bashir S, Rauber A (2014) Automatic ranking of retrieval models using retrievability measure. Knowl Inf Syst 41(1):189–221

    Google Scholar 

  • Cao Z, Zhou P, Li R, Huang S, Wu D (2020) Multi-agent deep reinforcement learning for joint multi-channel access and task offloading of mobile edge computing in industry 4.0. IEEE Int Things J 7:6201–6213

    Google Scholar 

  • Ciobanu R-I, Nehru C, Pop F, Dobre C, Mavromoustakis CX, Mastorakis G (2019) Drop computing: ad hoc dynamic collaborative computing. Future Gener Comput Syst 92:889–899

    Google Scholar 

  • Cleveland W, Delvin S (1988) Locally weighted regression: an approach to regression analysis by local fitting. J Am Stat Assoc 83(403):596–610

    MATH  Google Scholar 

  • Das S, Mullick SS, Suganthan PN (2016) Recent advances in differential evolution-an updated survey. Swarm Evol Comput 27:1–30

    Google Scholar 

  • Fernando N, Loke S, Rahayu W (2001) Mobile cloud computing: a survey. Future Gener Comput Syst 29(1):84–106

    Google Scholar 

  • Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172

    Google Scholar 

  • Gong W, Cai Z (2013) Parameter extraction of solar cell models using repaired adaptive differential evolution. Sol Energy 94:209–220

    Google Scholar 

  • Gong Y, Zhang C, Fang Y, Sun J (2018) Protecting location privacy for task allocation in ad hoc mobile cloud computing. IEEE Trans Emerg Top Comput 6(1):110–121

    Google Scholar 

  • Guo X, Sun H, Wang L, Qu Z, Ding W (2015) De-word classification algorithm based on the electric power of large data library retrieval. In: Computer science and its application. pp 591–602

  • Guo X, Liu L, Chang Z, Ristaniemi T (2018) Data offloading and task allocation for cloudlet-assisted ad hoc mobile clouds. Wirel Netw 24(1):79–88

    Google Scholar 

  • Haq A, Faheem Y (2020) A peer-to-peer communication-based content distribution protocol for incentive-aware delay tolerant networks. Wirel Netw 26(1):583–601

    Google Scholar 

  • Hassan BA (2020) CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05474-6

  • Hassan BA, Rashid TA (2020) Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data in Brief 28:105046

    Google Scholar 

  • Hassan BA, Rashid TA (2021) A multidisciplinary ensemble algorithm for clustering heterogeneous datasets. Neural Comput Appl. https://doi.org/10.1007/s00521-020-05649-1

  • Hsu YP, Tu KC, Hsiao CY, Yu SS (2018) The effect of distance function for NN classifier with local binary pattern descriptors. In: International symposium on computer, consumer and control, pp 42–45

  • Jararweh Y, Jarrah M, Alshara Z, Alsaleh MN (2014) Cloud Exp: a comprehensive cloud computing experimental framework. Simul Model Pract Theory 49:180–192

    Google Scholar 

  • Jose J, Gautam N, Tiwari M, Tiwari T, Suresh A, Sundararaj V, Rejeesh MR (2021) An image quality enhancement scheme employing adolescent identity search algorithm in the NSST domain for multimodal medical image fusion. Biomed Signal Proc Control 66:102480

    Google Scholar 

  • Kavitha D, Ravikumar S (2015a) A Survey of different software security attacks and risk analysis based on security threats. Int J Innovat Res Comput Comm Eng 3:3452–3458

  • Kavitha D, Ravikumar (2015b) Enhanced Vulnerability Analysis For Clickjacking Web Attack And Providing Security Using Whitelisting URL Analyzer. Int J Innovat Res Comput Comm Eng 4(6):12652–12657

  • Kavitha D, Ravikumar S (2020) Designing an IoT based autonomous vehicle meant for detecting speed bumps and lanes on roads. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02419-8

  • Kim IK, Wang W, Humphery M (2017) Empirical evaluation of workload forecasting techniques for predictive cloud resource scaling. In: IEEE 9th international conference on cloud computing, pp 1–10

  • Kleinbaum DG, Dietz K, Gail M, Klein M, Klein M (2002) Logistic regression. Springer, New York

    Google Scholar 

  • Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy. Comput Technol 4:51–56

    Google Scholar 

  • Lacuesta R, Sendra S, Lloret J, Peñalver L (2014) Spontaneous ad hoc mobile cloud computing network. Recent Adv Commun Netw 2014:1–19

    Google Scholar 

  • Li C, Liu Y, Luo Y (2017) Multimedia cloud content distribution based on interest discovery and integrated utility of user. Comput Ind Eng 109:1–14

    Google Scholar 

  • Li C, Liye Z, Hengliang T, Youlong L (2019) Mobile user behavior based topology formation and optimization in ad hoc mobile cloud. J Syst Softw 148:132–147

    Google Scholar 

  • Ling Y, Zhou Y, Luo Q (2017) Levy flights trajectory based Whale Optimization Algorithm for global optimization. IEEE Access 5:6168–6186

    Google Scholar 

  • Liu D, Fan Z, Fu Q, Li M, Faiz MA, Ali S, Khan MI (2020) Random forest regression evaluation model of regional flood disaster resilience based on the whale optimization algorithm. J Clean Prod 250:119468

    Google Scholar 

  • Malik SU, Akram H, Gill SS, Pervaiz H, Malik H (2020) EFFORT: energy efficient framework for offload communication in mobile cloud computing. Softw Pract Exp. https://doi.org/10.1002/spe.2850

    Article  Google Scholar 

  • Michalcea R, Tarau P (2004) Text Rank: bringing order into tests. In: Proceedings of the conference on empirical methods in natural language processing, pp 404–411

  • Mohammad AL-R, Elham AL-S, Jararweh Y (2015) AMCC: ad-hoc based mobile cloud computing modeling. Proc Comput Sci 56:580–585

    Google Scholar 

  • Munoz O, Pascual-Iserte A, Vidal J (2015) Optimization of radio and computational resources for energy efficiency in latency-constrained application offloading. IEEE Trans Veh Technol 64(10):4738–4755

    Google Scholar 

  • Noman N, Iba H (2008) Accelerating differential evolution using an adaptive local search. IEEE Trans Evol Comput 12(1):107–125

    Google Scholar 

  • Qin AK, Suganthan PN (2005) Self-adaptive differential evaluation algorithm for numerical optimization. Proc IEEE Congr Evol Comput 2:1785–1791

    Google Scholar 

  • Ravikumar S, Kavitha D (2020) IoT based home monitoring system with secure data storage by Keccak–Chaotic sequence in cloud server. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02424-x

  • Rejeesh MR (2019) Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed Tools Appl 78(16):22691–22710

    Google Scholar 

  • Rejeesh MR, Thejaswini P (2020) MOTF: multi-objective Optimal Trilateral Filtering based partial moving frame algorithm for image denoising. Multimed Tools Appl 79:28411–28430

    Google Scholar 

  • Riasudheen H, Selvamani K, Mukherjee S, Divyasree IR (2020) An efficient energy-aware routing scheme for cloud-assisted MANETs in 5G. Ad Hoc Netw 97:102021

    Google Scholar 

  • Saeed MHR, Hassan BA, Qader SM (2017) An optimized framework to adopt computer laboratory administrations for operating system and application installations. Kurdistan J Appl Res 2(3):92–97

    Google Scholar 

  • Saini TK, Sharma SC (2019) Prominent unicast routing protocols for mobile ad hoc networks: criterion, classification, and key attributes. Ad Hoc Netw 89:58–77

    Google Scholar 

  • Sarker IH, Colman A, Han J, Khan AI, Abushark YB, Salah K (2020) Behavdt: a behavioral decision tree learning to build user-centric context-aware predictive model. Mobile Netw Appl 25(3):1151–1161

    Google Scholar 

  • Satyanarayanan M, Bahl P, Caceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervas Comput 4:14–23

    Google Scholar 

  • Sharma S, Chang V, Tim U, Wong J, Gadia S (2016) Cloud-based emerging services systems, Int J Inf Manag 1–12

  • Sundararaj V (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117–126

    Google Scholar 

  • Sundararaj V (2017) Optimized denoising scheme via opposition based self-adaptive learning PSO algorithm for wavelet based ECG signal noise reduction. Int J Biomed Eng Technol 1(1):1

    Google Scholar 

  • Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277–288

    Google Scholar 

  • Sundararaj V, Anoop V, Dixit P, Arjaria A, Chourasia U, Bhambri P, Rejeesh MR, Sundararaj R (2020) CCGPA-MPPT: cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog Photovolt Res Appl 28(11):1128–1145

    Google Scholar 

  • Tang L, He S, Li Q (2015) Double-sided bidding mechanism for resource sharing in mobile cloud. IEEE Trans Veh Technol 1:99

    Google Scholar 

  • Uijlings JR, Smeulders AW, Scha RJ (2009) Real-time bag of words, approximately. In: Proceedings of the ACM international conference on image and video retrieval, pp 1–8

  • Vinu S (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173–197

    Google Scholar 

  • Walikar GA, Biradar RC (2015) Energy aware multicast routing in mobile ad hoc networks using NS-2. In: IEEE international conference on electrical, computer and communication technologies, pp 1–7

  • Wang Z, Huang D (2018) Privacy-preserving mobile crowd sensing in ad hoc networks. Ad Hoc Netw 73:14–26

    Google Scholar 

  • Wang X, Cao J, Liu Y, Gao S, Deng X (2012) Text clustering based on the Improved TFIDFF by the Iterative Algorithm. In: IEEE symposium on electrical and electronics engineering, pp 140–143

  • Wen Y, Zhang W, Luo H (2012) Energy-optimal mobile application execution: taming resource-poor mobile devices with cloud clones. In: 2012 proceedings IEEE Infocom, pp 2716–2720

  • Xia F, Ding F, Li J, Kong X, Yang L (2014) Phone2cloud: exploiting computation offloading for energy saving on smartphone’s in mobile cloud computing. Inf Syst Front 16(1):95–111

    Google Scholar 

  • Yousafzai A, Chang V, Gani A, Moor RM (2016) Directory-based incentive management services for ad hoc mobile clouds. Int J Inf Manag 36(6):900–906

    Google Scholar 

  • Zeyu X, Qiangqian S, Yijie W, Chenyang Z (2018) Paragraph vector representation based on word to vector and CNN learning. Comput Mater Contin 55(2):213–227

    Google Scholar 

  • Zhang W, Wen Y, Guan K, Kilper D, Luo H, Wu DO (2013) Energy-optimal mobile cloud computing under stochastic wireless channel. IEEE Trans Wirel Commun 12(9):4569–4581

    Google Scholar 

  • Zhang H, Wang M, Yang L, Zhu H (2019) A novel user behaviour analysis and prediction algorithm based on mobile social environment. Wirel Netw 25(2):791–803

    Google Scholar 

  • Zhao T, Zhou S, Song L, Jiang Z, Guo X, Niu Z (2020) Energy-optimal and delay-bounded computation offloading in mobile edge computing with heterogeneous clouds. China Commun 17(5):191–210

    Google Scholar 

  • Zhou L, Wang H (2013) Toward blind scheduling in mobile cloud: fairness, simplicity and asymptotic optimality. IEEE Trans Multimed 15(4):735–746

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Anoop.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anoop, V., Bipin, P.R. Exploitation whale optimization based optimal offloading approach and topology optimization in a mobile ad hoc cloud environment. J Ambient Intell Human Comput 13, 1053–1072 (2022). https://doi.org/10.1007/s12652-021-02945-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-02945-z

Keywords

Navigation