• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    QoS Aware Multicast Routing Protocol for Video Transmission in Smart Cities

    2022-08-24 06:58:46KhaledMohamadAlmustafaTaiseerAbdallaElfadilEisaAmaniAbdulrahmanAlbraikanMesferAlDuhayyimManarAhmedHamzaAbdelwahedMotwakelIshfaqYaseenandMuhammadImranBabar
    Computers Materials&Continua 2022年8期

    Khaled Mohamad Almustafa,Taiseer Abdalla Elfadil Eisa,Amani Abdulrahman Albraikan,Mesfer Al Duhayyim,Manar Ahmed Hamza,Abdelwahed Motwakel,Ishfaq Yaseen and Muhammad Imran Babar

    1Department of Information Systems,College of Computer and Information Sciences,Prince Sultan University,Riyadh,11586,Saudi Arabia

    2Department of Information Systems-Girls Section,King Khalid University,Mahayil,62529,Saudi Arabia

    3Department of Computer Sciences,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,Riyadh,11671,Saudi Arabia

    4Department of Natural and Applied Sciences,College of Community-Aflaj,Prince Sattam bin Abdulaziz University,16278,Saudi Arabia

    5Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,AlKharj,16278,Saudi Arabia

    6Department of Computer Science,FAST-National University of Computer and Emerging Sciences,Chiniot,Faisalabad,44090,Pakistan

    Abstract: In recent years,Software Defined Networking (SDN) has become an important candidate for communication infrastructure in smart cities.It produces a drastic increase in the need for delivery of video services that are of high resolution,multiview,and large-scale in nature.However,this entity gets easily influenced by heterogeneous behaviour of the user’s wireless link features that might reduce the quality of video stream for few or all clients.The development of SDN allows the emergence of new possibilities for complicated controlling of video conferences.Besides,multicast routing protocol with multiple constraints in terms of Quality of Service (QoS)is a Nondeterministic Polynomial time (NP) hard problem which can be solved only with the help of metaheuristic optimization algorithms.With this motivation,the current research paper presents a new Improved Black Widow Optimization with Levy Distribution model (IBWO-LD)-based multicast routing protocol for smart cities.The presented IBWO-LD model aims at minimizing the energy consumption and bandwidth utilization while at the same time accomplish improved quality of video streams that the clients receive.Besides,a priority-based scheduling and classifier model is designed to allocate multicast request based on the type of applications and deadline constraints.A detailed experimental analysis was carried out to ensure the outcomes improved under different aspects.The results from comprehensive comparative analysis highlighted the superiority of the proposed IBWO-LD model over other compared methods.

    Keywords: Smart cities;software defined networking;quality of service;video data transmission;multicast routing

    1 Introduction

    In the past few years,the tremendous growth of smart cities has caused a few serious problems like crime tracking,traffic,and public security.Smart city concept exploits big data analytics and data techniques’sensing to collect human activity data from across the city.It analyzes the information and provides smart services to public applications.Especially,the transformation of infrastructures,services,and buildings with Internet of Things (IoT) technology has gained considerable attention from both industry and academia as shown in Fig.1[1].With the help of sensor nodes,IoT produces large amount of information about smart cities such as traffic,earth vibration,air composition,etc.Amongst these data which demonstrates the realistic efficiency of clustering for gathering,video footage quality,taken by surveillance cameras,has improved widely.As per the literature[2],global video surveillance produces over 560 petabytes of information daily [2].In smart city applications,video information produced from IoT possesses certain problems.The cameras distributed in modern cities collect video sources from some restricted zones too,even under compromising situations.Particularly,video surveillance content from multiple cameras for the same scene possesses a problem to the application and unified analyses.E.g.,three cameras deployed in three consecutive streets with totally different environments.Some of the video surveillance applications such as tracking objects get affected apparently due to tracking of multiple scenarios [3].When video information is full of unwanted content,then detection or tracking accuracy gets reduced.A reasonable and efficient fusion system can reduce unnecessary information,filter the video data and increase the accuracy of content analysis applications in smart cities.

    Figure 1:Application of smart cities

    One of the basic criteria to judge a video conference call is its quality of video stream [4].Usually,this stream is highly sensitive to 5-network states and has rigorous Quality of Service(QoS)necessities like low packet loss,high bandwidth,low end-to-end delay,and so on.Additionally,it is susceptible to heterogeneity of user wireless connection features that might reduce the quality of video stream for all or some users [5].The conventional networks find it challenging to handle each QoS requirement in real-time settings.In literature,the researchers attempted to develop novel video codecs like Scalable Video Coding (SVC) which splits the video stream into different layers with different qualities.Therefore,this codec is capable of simply adjusting the bit rate of video streams by dropping redundant layers.This framework 20 provides separations between the data plane and control plane of the system[6].Therefore,it allows a logically-centralized view which enables network management in an effective manner.

    The tremendous growth of Software Defined Networking (SDN),with remarkable industrial support,is a great opportunity to perform Internet Protocol (IP) multicast without any difficulties[7].In fact,it is possible to create and preserve ? 2014 IEEE while the material is allowed for personal usage.It is inevitable to obtain authorization for present or future media from IEEE for other purposes including the creation of new collective works,republishing or reprinting the material for promotional/advertising purpose,for redistribution/resale to lists or servers,or reutilization of any copyrighted content of these works,in any other work [8].Multicast tree between subscribers,its sources and its control applications run on logically-centralized SDN controllers which possess a global network view.SDN possesses programmable features that enable immediate scalability,deployability,updatability,and adaptability traits,which are formerly related to Application-Layer Multicast(ALM),not IP multicast.In this research,an IP multicast application is proposed to run on SDN controller.It also records the subscription activity through a simple northbound interface and illustrates its advantageous performance.

    The current research paper presents a novel Improved Black Widow Optimization with Levy Distribution Model(IBWO-LD)-based multicast routing protocol for application in smart cities.The presented IBWO-LD model aims to minimize the energy consumption and bandwidth utilization in accomplishing improved video stream quality in which the client can receive.Besides,a priority based scheduling and classifier model is designed to allocate the multicast request depending upon the type of applications and deadline constraints.A detailed experimental analysis is carried out to ensure the improved outcomes interms of different aspects.

    Rest of the paper is planned as follows.Section 2 offers literature review while Section 3 introduces the proposed model.Section 4 details about the results of the analysis,while Section 5 draws the conclusion for the study.

    2 Related Works

    Naeem et al.[9]employed an iterative low-complexity probabilistic evolutionary technique to schedule video cameras so as to maximize the throughput in Video Camera Sensor Networks(VCSN)for IoT systems.Video camera scheduling-in-VCSN is a combinatorial optimization problem to increase throughput while the difficulty in computation increases gradually with increasing number of video cameras.Doan et al.[10]provided a scalable IoT video data analytics application for smart cities to end users,who can take advantage of scalability in both data processing as well as storage power to perform analysis on complex/large datasets.This algorithm offers data analytics environment and suite in which the researchers and developers could develop scalable analytical applications and services.Edge or cloud-based automatic video analysis methods process a massive number of video streams.In these methods,the fundamental structure could scale according to the number of camera devices and is easier to incorporate analytical applications.

    Pan et al.[11]addressed the problem by presenting Machine Learning (ML) based Bitrate Estimation (MBE) algorithm for parsing bitrate data from IP packet level.Next,the transmission modes were recognized in this method based on the traffic features of some earlier packets.Then,the resolutions and bitrates of Dynamic Adaptive Streaming and Hypertext Transfer Protocol (HTTP)Live Streaming over HTTP modes were recognized based on the features present in video chunks.Calavia et al.[12]introduced a smart video surveillance method which can detect and classify abnormal and alarming scenarios by investigating object movements.This architecture is developed to mitigate transmission and video processing tasks,thereby enabling a massive number of cameras is positioned on the network.This phenomenon makes it appropriate for its utilization as a ‘combined security and safety solution’in smart city.Alarm detection can be implemented based on the parameters of their trajectories and object movement.Further,it is also implemented by ontologies and semantic reasoning.

    Sodhro et al.[13]proposed two algorithms namely,Delay-tolerant Streaming Algorithm(DSA)and Hybrid Adoptive Bandwidth and Power Algorithm(HABPA)by adapting stored video stream in the name of‘StarWarsIV’.In addition,a new framework was also presented for smart city schemes.Hossain et al.[14]designed a cloud-enabled architecture for a secure video transmission in which the mobile users have limited capacity.However,the user is empowered to share video easily,without compromising on its quality and integrity.In the presented architecture,when videos are taken using smart phones,a key frame is identified.This key frame can be identified with the help of Genetic Algorithm(GA)model.A Discrete Wavelet Transform(DWT)-based watermarking method is utilized for inserting the watermark into key frame.A 2-layer protection system-based error correcting code is employed as an identity/signature of a person to create the watermark i.e.,insert in the videos to protect it from attacks/distortion and transmission loss.

    Jin et al.[15]developed a sequence for scheduling strategies and optimization algorithms-based Unmanned Aerial Vehicles (UAV) clusters.Initially,a complete device coverage network is created with the help of UAV clusters in heterogeneous transmission environments of smart cities.Kang et al.[16]projected a cooperative method for mobile networks which could utilize local memory space and upload bandwidth to release the computation loads for streaming servers.Initially,a statistical distribution of the device’s lifecycle is established vigorously,according to the analyses of departure and random arrival of mobile users.Tian et al.[17]suggested a Block-level Background Modelling(BBM)method for assisting long-term reference architecture for effective video surveillance coding.Also,a rate-distortion optimization system for surveillance source(SRDO)is presented for improving the performance of coding.

    3 The Proposed Model

    3.1 Assumptions Made

    Once the video conference is set for a group of users,then the individuals are named as participants.A participant plays the role of a sender as well as receiver of video streams simultaneously from each of the remaining participants.Consider that a participant is interconnected to every node that belongs to the network whereas many other participants are also interconnected to similar nodes.The participant is assumed to be wirelessly connected to their nodes through 4G cellular technologies like Long Term Evolution (LTE).All the network nodes offer SDN switching function as well as wireless accessing function (like eNode-B).Since the network is an SDN-assisted one,consider that every node within the network contains OpenFlow switches and has the ability to interact with SDN controllers i.e.,accountable for call management.Each switch is capable of adapting Scalable Video Coding(SVC)stream by dropping redundant layers on the path.

    SVC stream is generally controlled in layers based on base layers.Consider that SVC layer consists of base layer L1,and three improved layers such as L2,L3,and L4.But this process could be generalized easily to any number of layers.Furthermore,a provided layer is utilized,once each low layer is received.All the participants accept the maximum number of layers that can be accepted by its downlink ability.The participant obtains low video quality when using the base layer.

    In video conference,the best possible bitrate,allowed by access connection bandwidth,is suggested to achieve an improved Quality of Experience (QoE).Thus,during a video call,all the participants send the highest bitrate streams allowed by other receivers.Then,this stream gets degraded (viz.,highest layer is dropped) to adapt according to the participant with least downlink bandwidth capability[18].After determining the channel condition and network topology with SDN global view,it becomes easy to find the location of switches,where there is a need for degrading the SVC stream.

    This method is implemented in SDN controllers to set up a video conferencing call and build a multi-cast tree from all participants(transmitter)to each other(receiver).It is based on the assumption given herewith.

    ? Each SVC layer belongs to the video stream released by one sender and it follows a similar path.There is a single tree for each layer of the provided video streams.As the adaption is executed in fundamental network,few branches of the tree might bring a subset of layer.

    ? SDN controllers know the network’s comprehensive topology,positions of the participant,and their accessible downlink and uplink accessing bandwidth.

    ? Some SDN switches may degrade(viz.,drops high quality layer)SVC streams.

    3.2 Design of Multicast Routing Protocol

    At this stage,IBWO-LD technique is designed for multicast routing for the purpose of video data transmission in smart cities.BWO stimulates the metaheuristic techniques and is currently used in resolving difficult numerical optimization issues.BWO is assumed to be a part of evolutionary techniques,owing to its operator.BWOA components are same as that of GA,the most essential evolutionary technique.Like every other evolutionary technique,BWO too has few conditions that mimic the procedures found in natural evolution like mutation,reproduction,and selection.These conditional variations differentiates BWO from other evolutionary techniques.BWO is inspired from strange mating behaviour of black widow spider.Further,this technique has few variances against evolutionary techniques and is utilized in achieving optimum efficiency upon difficult issues.BWOA is simulated as the natural chosen Darwin model and is determined as descent with alteration,idea of altering species in time,and generation of novel ones.BWO avoids local optimum entity and delivers rapid convergence owing to which the algorithm is obtained through optimum techniques and can resolve different kinds of optimization issues.With a number of local optima in place,BWO keeps a balance between exploration and exploitation stages.Fig.2 exhibits the block diagram of BWO system.A detailed explanation for the essential steps in BWO are explained herewith.

    Figure 2:Flowchart of BWO

    Step 1:Initialization

    During this phase,the population contains a few number of widows sizedN,where all the widows are demonstrated as an array of 1×Nvarsignifying the solution for the issue.This array is determined aswidow=(x1,x2,...,xNvar),whereNvarrefers to dimensions of the optimized issue.Besides,Nvarrefers to the determined amount of threshold values which are required and can be attained by this technique and finallyxiimplies theith candidate solution.

    The fitness of widow is estimated using fitness function (FF) i.e.,fof all the widows of the set(x1,x2,...,xNvar).Next,fitness=f(widow)is demonstrated as follows;fitness=f(x1,x2,...,xNvar).In the presented technique,fis replaced by FF Otsu in Eq.(8)or Kapur Eq.(14).Optimization procedure is started using an arbitrarily-initialized population of spiders from a matrix sized,Npop×Nvar.Afterward,a pairs of parents is chosen arbitrarily to implement the production step.Then,the mating procedure occurs in which the male black widow is consumed by female during mating or after mating is over[19].

    Step 2:Procreate

    During procreation phase,an array named alphaαis generated by a widow array which is composed of arbitrary values.Afterward,the offspring is created by utilizingα.In Eq.(1),x1andx2represent the parents andy1andy2demonstrate the offspring.The crossover outcome is estimated and saved.

    Step 3:Cannibalism

    Different cannibalism behaviours have been reported earlier such as sibling cannibalism,sexual cannibalism,and a frequently-observed cannibalism in which baby spider eats its mother.After the implementation of cannibalism process,a novel population is estimated and saved based on the variable named pop2.

    Step 4:Mutation

    The procedure of mutation gets completed by the arbitrary-chosenMutepopnumber of individuals in the mutated population.All the solutions are selected arbitrarily with connections containing two elements of array.Then,the mutation is implemented after which a novel population is estimated and saved from the novel population i.e.,pop3.Eventually,a novel population is reached after the migration ofpop3 andpop2 and is sorted out for returning an optimum widow of threshold value withNvardimension.Algorithm 1 illustrates the pseudocode for BWO.

    Algorithm 1:Black Widow Optimization algorithm Initialize:Maximal amount of iterations,rate of Cannibalism,rate of mutation,Rate of procreating;while Stop condition not met do for i=1 to nr do Arbitrarily choose 2 solutions as parents in pop1.Create D children utilizing in Eq.(1).Destroy father.According to the rate of cannibalism,destroy any children(currently attained solutions).Store the residual solutions into pop2.end for According to the mutation rate,compute the amount of mutation children nm.for i=1 to nr do Choose the solution in pop1.Arbitrarily Mutate single chromosome of solution and create a novel solutions.Store a novel one as to pop2.end for Upgrade pop=pop2+pop3.Return the optimum solution.Returning the optimum solution in pop.end while

    To enhance the performance of BWO technique,IBWO-LD technique is derived by integrating Levy flight concept.

    Levy Flight concept was first presented by the French mathematician named Paul Levy,in 1937.Different kinds of natural and artificial phenomena have been defined based on Levy statistics.LF is assumed to be a class of stochastic non-Gaussian walks in which the step length value is assigned based on Levy stable distributions.It is determined as follows.

    βsignifies the vital Levy index for changing the stability.Levy arbitrary amount is estimated using the formula given below.

    whereμ&vsignify the regular distribution,Γdemonstrates the normal Gamma function i.e.,β=1.5,&φare given as follows.

    To attain a trade-off between the exploitation and exploration abilities of metaheuristic technique,LF method is utilized.It also upgrades the location of search agents and is determined as follows.

    whereXlevy irepresents the novel position ofith search agent,Xiafterward upgrading andrdefines the arbitrary vector between 0 and 1 and ⊕signifies the dot product(entry wise multiplication).

    During this case,the purpose of the proposed model is to send the information sizedMin source to target the vehicles at minimal energy cost,without compromising on the deadline and bandwidth constraints.The issue is otherwise known to be Mixed Integer Programming(MIP)and is determined as follows.

    Objective:

    Subject to

    The objective function(6)is to minimize the utilization of energy in multi-casting data,sizedMin source to destination[20].

    Several constraints are taken into account from the chosen optimum multicast path.Following is the list of constraints used.

    ? 1stconstraint (7):The overall amount of information sent by the source vehicle is equivalent to M.

    ? 2ndconstraint(8):The overall amount of information is provided by the most number of target vehicles is equivalent to M.

    ? 3rdconstraint (9):If the flow is sent in nodeitoj,the flow cannot enter nodejtoi.This constraint is utilized to avoid the loops.

    ? 4thconstraint(10):Data flow gets transmitted from nodeitojwhich is lesser than or equivalent to residual bandwidth of the connection in nodeitoj.

    ? 5thconstraint(11):The in-between nodes cannot be taken as the message targets.So,it can be transmitted to an adjacent node once it is received.But,the maximum amount of information transferred from in-between node to every neighboring node is lesser than or equivalent to the amount of data received.

    ? 6thconstraint (12):As the message is separated into distinct packets,all the packets arrive in a distinct path from transmitter node toinode.The delay for total number of messages to reach the nodeiis equivalent to the maximal delay of packets from the path that leads to nodeiwhen data is sent toi.Besides,these delays contain the Queuing Delay(QD)and propagation delay.The QD ofi(qi)node implies the average QD frominode.All the set nodes calculate their average QD regularly (all the 4 s).Afterward,it transmitsqivalues to local controllers that upgrade their data and transmits the values to SDN controllers.During these constraints,(1-λij)*Lis utilized to explain that the deadline constraints are calculated for the nodes,ias well asj,if the flow is fromitojnodes.Else,(1-λij)=1,thereforedj≥di+gij+qi+(fij/bij)remains ineffective.

    ? 7thconstraint(13):There is no QD from both source and target vehicles

    ? 8thconstraint(14):As the message is established from the source nodes initially,the delay for the messages to reach the node is continuously equivalent to 0.

    ? 9thconstraint(15):The delay of messages could not surpass the deadline.

    ? 10thconstraint (16):The dataflow in some nodes to further ones is not ever negative because when the data could not be sent between two nodes,their volume becomes equivalent to 0;else it can be superior to 0.

    ? Last constraint (17):Based on these constraints,the variableλijgets the value one,when the data is sent from nodeito j.Else,their value is zero.

    3.3 Design of Priority Based Scheduling and Classification Model

    This protocol makes use of priority-based scheduling and application-based classification algorithm to reduce the cost and accomplish QoS needs.

    The Closest Fixed Node:This is a fixed node with minimal delay using ithvehicle at timetand is represented as.As per(18),the nearby fixed node transmitted fromjto vehicleiat timetis defined by regular transmission of beacon packet.The fixed nodes that respond to this packet with minimal delay is considered as a nearer one.The respond time to this packet through fixed node is based on traffic load and distance of this node.

    Here,Nrepresents a group of fixed nodes anddenotes the delay at the jthfixed node while ithvehicle at timet.

    Local ControllerCi:All the groups of(Ni)fixed nodes are connected to individual local controllers which is represented asCiin whichi∈{1,2,...,Q}andQdenotes the amount of local controller.

    Where,θsignifies deadline limitation,Tindicates the group of destination vehicle,Mrepresents the output of EEMSFV which denotes multi-cast tree and∏denotes data size.

    Usually,distinct multi-cast session requests are raised towards the controllers (SDN/local controllers)which must serve these requests,according to their priority.Initially,the controller categorizes the request on the basis of every group of same application type and is queued in a certain format.In current study,four application types are considered that denote the type of vehicle i.e.,normal,police,firefighting,and ambulance vehicles.Next,the request inside all the queues is scheduled according to the priority.The priority of the vehicle can be defined based on deadline limitation in which the request with low deadline limitation takes the higher priority.

    After high priority requests are computed,the controllers select individual requests at a time,according to the priorities from the head of this queue.After that,the multi-cast tree is built for it.Such priorities are defined according to two criteria given herewith.

    Application Type:Distinct application types have different priorities.In current work,several values have been allocated to all the application types for representing their priority.The value 14 represents the priority for normal,firefighting,ambulance,and police applications,correspondingly.

    Deadline Constraint:Usually,multi-cast requests with minimal deadline limitation have high priority.

    Next,the fitness value of all the requests is calculated.The requests with the least values are considered as high priority and are elected using the controllers.The fitness values are calculated as follows.

    In whichFitnessisignifies the fitness values of request,i.Aiandθirepresent the standardized value of application types and the deadline limitation of requesti,correspondingly.

    Here,Pi&Pjrepresent the priority ofiand j requests correspondingly.

    4 Performance Validation

    The current section discusses the results achieved from performance analysis of IBWO-LD technique against other techniques under different aspects.

    Tab.1 and Fig.3 shows the results from average bandwidth analysis accomplished by IBWOLD technique and other techniques under varying number of participants.The results show that the proposed IBWO-LD algorithm generated improved performance with maximal average bandwidth compared to other techniques.For instance,with 3 participants,IBWO-LD technique resulted in an increased average bandwidth of 54 Mbps,whereas unicast (UNI),Shortest Path Tree (SPT),Minimizing Spanning Tree(MST),ALM,and Multiple Control Unit(MCU)techniques gained low average bandwidth values such as 47,48,43,46,and 50 Mbps respectively.At the same time,with 12 participants,IBWO-LD technique gained a high average bandwidth of 817 Mbps,whereas UNI,SPT,MST,ALM,and MCU techniques attained reduced average bandwidth values such as 780,420,410,630,and 740 Mbps respectively.

    Table 1:Average bandwidth analysis results of IBWO-LD model against existing approaches

    Figure 3:Average bandwidth analysis results of IBWO-LD technique under varying number of participants

    A brief Average End to End Delay (AETED) analysis was conducted between IBWO-LD and other existing techniques and the results are shown in Tab.2 and Fig.4.The results point out that the proposed IBWO-LD technique accomplished effective outcomes with least AETED.For instance,with MS=5,IBWO-LD technique obtained effective outcomes with least AETED value of 0.15 s,whereas MABC,CVLMS,and EEMSFC techniques attained maximum AETED values such as 0.50,0.40,and 0.20 s respectively.Besides,with MS=25,IBWO-LD method attained effective outcomes with least AETED value i.e.,0.50 s,whereas MABC,CVLMS,and EEMSFC techniques attained the maximum AETED values such as 1.50,1.40,and 0.60 s correspondingly.

    Table 2:AETED analysis results of IBWO-LD model against existing approaches

    Figure 4:AETED analysis results of IBWO-LD techniques under varying MS

    Tab.3 and Fig.5 shows the results for Successfully Transmitted Ratio (STR) analysis accomplished by the proposed IBWO-LD technique against other techniques under varying number of Multicast Session.The outcomes demonstrate that the proposed IBWO-LD method produced high performance with maximum STR compared to other techniques.For instance,MS=5,IBWO-LD technique produced an increased STR of 0.99,whereas Modified Artificial Bee Colony (MABC),Collaborative Vehicle Location Management Service (CVLMS),and Energy Efficient Multicast routing protocol based on SDN and Fog computing for Vehicular networks (EEMSFV) techniques achieved low STR values such as 0.87,0.93,and 0.98 correspondingly.Also,with 25 participants,IBWO-LD technique gained a high STR of 0.94,whereas MABC,CVLMS,and EEMSFV methods attained low STR values such as 0.21,0.60,and 0.94 correspondingly.

    A detailed Packet Loss Ratio (PLR) analysis was conducted between IBWO-LD and existing methods and the results are shown in Tab.4 and Fig.6.The results infer that the presented IBWOLD technique accomplished effective outcomes with minimal PLR.For instance,with MS=5,IBWO-LD technique achieved an effectual outcome with the least PLR of 0.07,whereas MABC,CVLMS,and EEMSFC techniques accomplished maximum PLR values such as 0.20,0.15,and 0.08 correspondingly.In addition,with MS=25,IBWO-LD system obtained effective outcomes with the least PLR of 0.15,whereas MABC,CVLMS,and EEMSFC techniques attained the maximum PLR values such as 0.75,0.60,and 0.15 respectively.

    Table 3:STR analysis results of IBWO-LD model against existing approaches

    Figure 5:STR analysis of IBWO-LD techniques under varying MS

    Table 4:PLR analysis results of IBWO-LD model against existing approaches

    Figure 6:PLR analysis of IBWO-LD techniques under varying MS

    A brief Normalized Overhead Load (NOL) analysis was conducted between IBWO-LD and existing methods and the results are shown in Tab.5 and Fig.7.The results infer that the proposed IBWO-LD technique accomplished effective outcomes with minimal NOL.For instance,with MS=5,the proposed IBWO-LD methodology reached effective outcomes with a decreased NOL of 15,whereas MABC,CVLMS,and EEMSFC techniques attained maximum NOL values such as 35,28 s,and 20 respectively.Likewise,with MS=25,IBWO-LD technique obtained effective outcomes with the least NOL of 50,whereas MABC,CVLMS,and EEMSFC techniques achieved the maximal NOL values such as 135,100,and 58 correspondingly.

    Table 5:NOL analysis of IBWO-LD model with existing approaches

    A comparative Multicast Energy Consumption (MEC) analysis was conducted between the proposed IBWO-LD against existing techniques and the results are shown in Tab.6 and Fig.8.The results showcase that the proposed IBWO-LD approach accomplished effective outcomes with the least MEC.For samples,with MS=5,the proposed IBWO-LD technique has obtained effective outcomes with the least MEC of 285 Joules,whereas MABC,CVLMJOULES,and EEMSFC methods reached maximal MEC values such as 1250,1049,and 586 Joules respectively.Besides,with MS=25,IBWO-LD method obtained effective outcomes with the least MEC of 2819 Joules,whereas MABC,CVLMJOULES,and EEMSFC techniques attained the maximal MEC values namely,5998,5414,and 3885 Joules correspondingly.

    Figure 7:NOL analysis of IBWO-LD techniques under varying MS

    Table 6:MEC analysis results of the proposed model

    Figure 8:MEC analysis of IBWO-LD techniques under varying MS

    5 Conclusion

    Multicast routing protocol with multiple QoS constraints is an NP hard problem.It can only be solved with the help of metaheuristic optimization algorithms.In this background,the current study presented an effective IBWO-LD based multicast routing protocol for smart cities.The presented IBWO-LD model aims at minimizing energy consumption as well as bandwidth utilization,while improved video stream quality is to be accomplished for client end.Besides,a priority-based scheduling and classifier model is designed to allocate multicast request based on the type of applications and deadline constraints.A thorough experimental analysis was conducted to guarantee the improved outcomes under different aspects.The comprehensive comparative analysis results highlighted the superiority of the proposed IBWO-LD model over other compared approaches.As a part of future scope,IBWO-LD technique can be implemented in real-time scenarios and its performance can be fine-tuned.

    Acknowledgement:The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges(APC)of this publication.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP.1/282/42).www.kku.edu.sa.Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R191),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    精品高清国产在线一区| 少妇 在线观看| 啦啦啦啦在线视频资源| 国产日韩欧美在线精品| 精品久久久久久久毛片微露脸 | 精品福利永久在线观看| 亚洲成国产人片在线观看| 免费一级毛片在线播放高清视频 | 最近手机中文字幕大全| 丁香六月天网| 国产亚洲精品久久久久5区| 人人妻人人澡人人看| 黄色怎么调成土黄色| 黄色视频在线播放观看不卡| 午夜福利乱码中文字幕| 久久久亚洲精品成人影院| 爱豆传媒免费全集在线观看| 亚洲中文日韩欧美视频| 99久久人妻综合| 黄色一级大片看看| 国产极品粉嫩免费观看在线| 中文字幕高清在线视频| 丝瓜视频免费看黄片| 看免费成人av毛片| 日本午夜av视频| 两个人看的免费小视频| 一区二区三区激情视频| 国产伦理片在线播放av一区| 成人手机av| 久久久久精品国产欧美久久久 | 老司机深夜福利视频在线观看 | 久久久精品免费免费高清| 免费观看人在逋| 老司机午夜十八禁免费视频| 亚洲中文日韩欧美视频| 飞空精品影院首页| 国产欧美日韩精品亚洲av| 1024视频免费在线观看| 男女高潮啪啪啪动态图| 国产精品国产三级国产专区5o| 久久久精品免费免费高清| 久久中文字幕一级| 桃花免费在线播放| 亚洲欧美清纯卡通| 在线观看一区二区三区激情| 黄频高清免费视频| 日韩av免费高清视频| 欧美人与性动交α欧美软件| videos熟女内射| 天天添夜夜摸| 日韩伦理黄色片| 亚洲色图综合在线观看| 乱人伦中国视频| 国产成人精品在线电影| 国产精品亚洲av一区麻豆| 精品久久久精品久久久| 久久国产精品男人的天堂亚洲| 免费观看av网站的网址| 中文精品一卡2卡3卡4更新| av电影中文网址| videos熟女内射| 国产有黄有色有爽视频| 午夜激情久久久久久久| 美女国产高潮福利片在线看| 国产精品国产av在线观看| 国产女主播在线喷水免费视频网站| 777米奇影视久久| 2021少妇久久久久久久久久久| 亚洲少妇的诱惑av| 大型av网站在线播放| 大片电影免费在线观看免费| 欧美 亚洲 国产 日韩一| 亚洲伊人色综图| 老司机影院毛片| 亚洲伊人久久精品综合| 我要看黄色一级片免费的| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲av日韩在线播放| 国产亚洲欧美精品永久| 亚洲欧美日韩另类电影网站| 久热这里只有精品99| 伊人亚洲综合成人网| 国产成人啪精品午夜网站| 精品福利观看| 99国产精品免费福利视频| 免费高清在线观看视频在线观看| 啦啦啦中文免费视频观看日本| 悠悠久久av| 女性生殖器流出的白浆| 亚洲成国产人片在线观看| 老司机影院成人| 午夜福利乱码中文字幕| 国产精品成人在线| 91精品国产国语对白视频| 好男人电影高清在线观看| 国产在线视频一区二区| 欧美精品一区二区大全| 免费人妻精品一区二区三区视频| 免费女性裸体啪啪无遮挡网站| 伊人亚洲综合成人网| 在线观看免费午夜福利视频| 大片电影免费在线观看免费| 欧美另类一区| 日本av手机在线免费观看| 一区二区三区四区激情视频| 老司机深夜福利视频在线观看 | 韩国高清视频一区二区三区| av线在线观看网站| 精品一区二区三卡| 午夜福利,免费看| 国产男女超爽视频在线观看| 男人操女人黄网站| 国精品久久久久久国模美| 嫩草影视91久久| 国产男女超爽视频在线观看| 国产精品三级大全| 999精品在线视频| videosex国产| √禁漫天堂资源中文www| 欧美成人午夜精品| 国产一卡二卡三卡精品| 精品国产一区二区三区久久久樱花| 另类亚洲欧美激情| 免费在线观看视频国产中文字幕亚洲 | 少妇精品久久久久久久| 国产成人精品在线电影| 老司机午夜十八禁免费视频| 男女边吃奶边做爰视频| 亚洲,一卡二卡三卡| 老司机亚洲免费影院| 久久久精品区二区三区| 亚洲图色成人| www.999成人在线观看| 色网站视频免费| 嫁个100分男人电影在线观看 | 中文字幕制服av| 热99久久久久精品小说推荐| 午夜福利免费观看在线| 电影成人av| 两人在一起打扑克的视频| 久久精品久久精品一区二区三区| 老司机在亚洲福利影院| 中文字幕人妻丝袜一区二区| 国产精品秋霞免费鲁丝片| 精品久久久精品久久久| 欧美激情 高清一区二区三区| 美女主播在线视频| 亚洲精品日本国产第一区| 亚洲视频免费观看视频| 国产麻豆69| 婷婷色综合www| 国产xxxxx性猛交| 又大又爽又粗| 精品久久久精品久久久| 亚洲自偷自拍图片 自拍| 波多野结衣av一区二区av| 久久久亚洲精品成人影院| 亚洲精品久久午夜乱码| 日韩 欧美 亚洲 中文字幕| 十八禁人妻一区二区| 午夜福利视频精品| 日本五十路高清| 人成视频在线观看免费观看| 天堂8中文在线网| 精品亚洲乱码少妇综合久久| 这个男人来自地球电影免费观看| 99九九在线精品视频| 成年动漫av网址| 又大又爽又粗| 中文字幕高清在线视频| 国产欧美日韩一区二区三 | 一级毛片 在线播放| 日韩 亚洲 欧美在线| 国产欧美日韩精品亚洲av| 国产成人免费观看mmmm| 激情视频va一区二区三区| 亚洲人成77777在线视频| 一边亲一边摸免费视频| 妹子高潮喷水视频| 亚洲一码二码三码区别大吗| 久久国产亚洲av麻豆专区| 少妇精品久久久久久久| 美女主播在线视频| 亚洲专区国产一区二区| 99国产综合亚洲精品| 激情五月婷婷亚洲| videos熟女内射| 18在线观看网站| 9191精品国产免费久久| 亚洲国产精品999| 日本vs欧美在线观看视频| 精品福利观看| 美女脱内裤让男人舔精品视频| 国产精品 欧美亚洲| 少妇粗大呻吟视频| 国产伦人伦偷精品视频| 亚洲色图综合在线观看| 赤兔流量卡办理| 亚洲欧美成人综合另类久久久| 女性被躁到高潮视频| 中文字幕人妻丝袜一区二区| 午夜久久久在线观看| 国产一级毛片在线| 大话2 男鬼变身卡| 亚洲成人手机| 国产不卡av网站在线观看| 精品久久久久久电影网| 蜜桃国产av成人99| 天堂中文最新版在线下载| 50天的宝宝边吃奶边哭怎么回事| 亚洲国产看品久久| 老司机午夜十八禁免费视频| 老汉色∧v一级毛片| 精品免费久久久久久久清纯 | 精品国产一区二区三区久久久樱花| 久久久精品94久久精品| 国产在线观看jvid| 国产成人一区二区三区免费视频网站 | 国产精品麻豆人妻色哟哟久久| 这个男人来自地球电影免费观看| 精品卡一卡二卡四卡免费| 久久久精品免费免费高清| 午夜老司机福利片| 一级a爱视频在线免费观看| 亚洲成色77777| 激情五月婷婷亚洲| 97在线人人人人妻| 满18在线观看网站| svipshipincom国产片| 久久精品熟女亚洲av麻豆精品| 两个人免费观看高清视频| 久久中文字幕一级| 日本vs欧美在线观看视频| 日日摸夜夜添夜夜爱| 悠悠久久av| 中文字幕人妻丝袜一区二区| 汤姆久久久久久久影院中文字幕| 国产一区亚洲一区在线观看| 超碰成人久久| tube8黄色片| 国产亚洲精品久久久久5区| 成年女人毛片免费观看观看9 | 亚洲精品av麻豆狂野| 美女中出高潮动态图| 操出白浆在线播放| 婷婷成人精品国产| 日韩大码丰满熟妇| 欧美性长视频在线观看| 人妻一区二区av| 婷婷丁香在线五月| av天堂在线播放| 久久九九热精品免费| 2021少妇久久久久久久久久久| 亚洲国产日韩一区二区| 国产精品一区二区免费欧美 | 国产成人精品无人区| 日日摸夜夜添夜夜爱| 久久久欧美国产精品| 亚洲免费av在线视频| 亚洲国产欧美日韩在线播放| 亚洲五月婷婷丁香| 国产黄色视频一区二区在线观看| 满18在线观看网站| 亚洲自偷自拍图片 自拍| 国产一区二区激情短视频 | 天堂俺去俺来也www色官网| 性色av乱码一区二区三区2| av在线播放精品| 国产欧美日韩一区二区三 | 国产高清国产精品国产三级| 久久亚洲精品不卡| 色综合欧美亚洲国产小说| 纯流量卡能插随身wifi吗| 婷婷色麻豆天堂久久| 国产精品久久久久成人av| 女人久久www免费人成看片| 国产一区二区 视频在线| 日韩电影二区| 99久久精品国产亚洲精品| 亚洲av综合色区一区| 亚洲av欧美aⅴ国产| 欧美乱码精品一区二区三区| 波野结衣二区三区在线| 国产成人av激情在线播放| 久久精品熟女亚洲av麻豆精品| 菩萨蛮人人尽说江南好唐韦庄| 热re99久久精品国产66热6| 永久免费av网站大全| 精品久久久精品久久久| 国产精品一区二区在线观看99| 国产精品一区二区免费欧美 | 麻豆av在线久日| 超碰成人久久| 国产伦人伦偷精品视频| 中文字幕精品免费在线观看视频| 久久中文字幕一级| 国语对白做爰xxxⅹ性视频网站| www.av在线官网国产| 搡老乐熟女国产| 美女中出高潮动态图| 一级毛片 在线播放| 日韩一本色道免费dvd| 亚洲欧美一区二区三区久久| 久久精品人人爽人人爽视色| 欧美日韩视频高清一区二区三区二| 80岁老熟妇乱子伦牲交| 国产成人啪精品午夜网站| tube8黄色片| 国产麻豆69| 中文字幕制服av| 欧美成狂野欧美在线观看| 久久久久国产精品人妻一区二区| 久久天躁狠狠躁夜夜2o2o | 国产精品成人在线| 精品国产超薄肉色丝袜足j| 日韩一本色道免费dvd| 在线 av 中文字幕| 高清黄色对白视频在线免费看| 最近手机中文字幕大全| 日韩熟女老妇一区二区性免费视频| 精品一区二区三区av网在线观看 | 不卡av一区二区三区| 夫妻性生交免费视频一级片| 午夜91福利影院| 日本黄色日本黄色录像| 久久精品久久精品一区二区三区| 啦啦啦 在线观看视频| 9色porny在线观看| 亚洲成av片中文字幕在线观看| 丰满人妻熟妇乱又伦精品不卡| 国产真人三级小视频在线观看| 最新在线观看一区二区三区 | 亚洲人成电影观看| 亚洲成人免费电影在线观看 | 91字幕亚洲| 欧美日韩一级在线毛片| 三上悠亚av全集在线观看| 国产色视频综合| 亚洲成人免费电影在线观看 | 好男人电影高清在线观看| 亚洲熟女精品中文字幕| 亚洲国产成人一精品久久久| 国产极品粉嫩免费观看在线| 丝瓜视频免费看黄片| av福利片在线| 日韩制服丝袜自拍偷拍| 日韩一卡2卡3卡4卡2021年| 亚洲专区中文字幕在线| 国产成人一区二区三区免费视频网站 | 91麻豆精品激情在线观看国产 | 欧美日韩精品网址| 美女大奶头黄色视频| 老司机影院成人| 亚洲欧美一区二区三区黑人| 手机成人av网站| 天天操日日干夜夜撸| 99国产精品一区二区三区| 你懂的网址亚洲精品在线观看| 午夜日韩欧美国产| 国产熟女欧美一区二区| 高清欧美精品videossex| 成在线人永久免费视频| 久久久久久久久免费视频了| 久久狼人影院| 多毛熟女@视频| 在线观看免费视频网站a站| 国产成人一区二区三区免费视频网站 | 午夜免费观看性视频| 欧美日韩亚洲国产一区二区在线观看 | 夫妻性生交免费视频一级片| 人妻人人澡人人爽人人| 亚洲欧美精品自产自拍| 欧美精品啪啪一区二区三区 | 免费人妻精品一区二区三区视频| 蜜桃国产av成人99| 日本一区二区免费在线视频| 18禁观看日本| 国产成人影院久久av| 2021少妇久久久久久久久久久| 中文字幕人妻丝袜一区二区| 亚洲欧洲国产日韩| 成年人午夜在线观看视频| 成年动漫av网址| 日韩大码丰满熟妇| 丰满少妇做爰视频| 尾随美女入室| 亚洲av男天堂| 亚洲精品中文字幕在线视频| 亚洲av日韩在线播放| 丁香六月欧美| 亚洲人成网站在线观看播放| 精品一区二区三区四区五区乱码 | 久久天堂一区二区三区四区| 亚洲av男天堂| 亚洲精品中文字幕在线视频| 永久免费av网站大全| 色播在线永久视频| 精品少妇黑人巨大在线播放| 午夜久久久在线观看| 男女午夜视频在线观看| 可以免费在线观看a视频的电影网站| 亚洲第一av免费看| 国产国语露脸激情在线看| 亚洲图色成人| 久久久久国产一级毛片高清牌| 精品国产一区二区三区四区第35| 欧美另类一区| 999久久久国产精品视频| 亚洲美女黄色视频免费看| 麻豆乱淫一区二区| 中文字幕人妻熟女乱码| 精品人妻1区二区| 首页视频小说图片口味搜索 | 免费av中文字幕在线| 91麻豆精品激情在线观看国产 | 在现免费观看毛片| 伊人亚洲综合成人网| 久久久久国产精品人妻一区二区| 制服诱惑二区| 99久久人妻综合| 一本—道久久a久久精品蜜桃钙片| 美女午夜性视频免费| av又黄又爽大尺度在线免费看| 久久国产精品男人的天堂亚洲| √禁漫天堂资源中文www| 欧美老熟妇乱子伦牲交| 久久国产亚洲av麻豆专区| 成人亚洲欧美一区二区av| 99国产精品一区二区三区| 国产精品 国内视频| 一区二区三区激情视频| 国产国语露脸激情在线看| 精品亚洲成a人片在线观看| 成人国产av品久久久| 五月天丁香电影| 久久免费观看电影| 性色av一级| 男人操女人黄网站| av线在线观看网站| 国产亚洲欧美精品永久| 久久av网站| 久久久久久久精品精品| 天天添夜夜摸| 精品福利观看| 亚洲天堂av无毛| 精品亚洲乱码少妇综合久久| 国产又爽黄色视频| 国产精品秋霞免费鲁丝片| 亚洲国产毛片av蜜桃av| 国产精品 欧美亚洲| 一本一本久久a久久精品综合妖精| 久久青草综合色| 天天添夜夜摸| 黄色视频在线播放观看不卡| 男人操女人黄网站| 久久久国产欧美日韩av| 亚洲欧洲日产国产| 亚洲久久久国产精品| 丝袜美足系列| 高清黄色对白视频在线免费看| 一级黄片播放器| 麻豆国产av国片精品| 丝瓜视频免费看黄片| xxx大片免费视频| 1024香蕉在线观看| 热re99久久国产66热| 亚洲国产精品一区二区三区在线| 一区二区三区激情视频| av福利片在线| 亚洲少妇的诱惑av| 男女高潮啪啪啪动态图| 国产三级黄色录像| 久久精品亚洲熟妇少妇任你| 精品福利永久在线观看| 欧美亚洲日本最大视频资源| 亚洲免费av在线视频| 成人午夜精彩视频在线观看| 日日爽夜夜爽网站| 久久精品国产亚洲av高清一级| 日韩一区二区三区影片| 日韩制服骚丝袜av| 精品人妻在线不人妻| 欧美日韩视频高清一区二区三区二| 国产成人精品在线电影| 777久久人妻少妇嫩草av网站| 成人黄色视频免费在线看| 涩涩av久久男人的天堂| 国产人伦9x9x在线观看| videosex国产| 日韩 亚洲 欧美在线| 中文字幕人妻熟女乱码| 国产xxxxx性猛交| 久久综合国产亚洲精品| 免费高清在线观看日韩| 久热爱精品视频在线9| av福利片在线| 亚洲国产看品久久| av国产精品久久久久影院| 你懂的网址亚洲精品在线观看| 亚洲五月色婷婷综合| 99精品久久久久人妻精品| 亚洲国产毛片av蜜桃av| 欧美日韩视频高清一区二区三区二| 久久国产精品大桥未久av| 水蜜桃什么品种好| 99热国产这里只有精品6| 国产又爽黄色视频| 亚洲精品久久午夜乱码| 亚洲欧美一区二区三区黑人| 婷婷色av中文字幕| 成年女人毛片免费观看观看9 | 大码成人一级视频| 亚洲,欧美,日韩| av电影中文网址| 日韩大码丰满熟妇| 精品人妻一区二区三区麻豆| 久久ye,这里只有精品| 一二三四社区在线视频社区8| 无限看片的www在线观看| 只有这里有精品99| 国产亚洲av片在线观看秒播厂| av天堂久久9| 国产男女超爽视频在线观看| 精品少妇一区二区三区视频日本电影| 国产黄频视频在线观看| 美女视频免费永久观看网站| 操出白浆在线播放| 91国产中文字幕| 丰满饥渴人妻一区二区三| 亚洲五月婷婷丁香| 亚洲三区欧美一区| 如日韩欧美国产精品一区二区三区| 国产成人欧美| 老司机午夜十八禁免费视频| 免费少妇av软件| 国产精品一区二区在线不卡| 一二三四社区在线视频社区8| 日日摸夜夜添夜夜爱| 黄色一级大片看看| 日日摸夜夜添夜夜爱| 老汉色av国产亚洲站长工具| av国产精品久久久久影院| 中文字幕人妻丝袜一区二区| 久久青草综合色| av有码第一页| 中文字幕高清在线视频| 欧美日韩亚洲综合一区二区三区_| 99国产精品一区二区三区| 人成视频在线观看免费观看| 一级a爱视频在线免费观看| 久久99精品国语久久久| 国产欧美日韩一区二区三区在线| 黄色片一级片一级黄色片| 亚洲精品一区蜜桃| 各种免费的搞黄视频| 亚洲国产看品久久| 男女国产视频网站| www.999成人在线观看| 91精品伊人久久大香线蕉| 国产精品av久久久久免费| 中文字幕精品免费在线观看视频| 天天操日日干夜夜撸| 精品少妇一区二区三区视频日本电影| 国产黄频视频在线观看| 狠狠精品人妻久久久久久综合| 亚洲av男天堂| 久久亚洲精品不卡| 黄片播放在线免费| 深夜精品福利| 好男人视频免费观看在线| 国产野战对白在线观看| 久久精品国产亚洲av高清一级| 我要看黄色一级片免费的| 狠狠婷婷综合久久久久久88av| 免费日韩欧美在线观看| 亚洲七黄色美女视频| a 毛片基地| 只有这里有精品99| 美女视频免费永久观看网站| 亚洲av成人精品一二三区| 国产成人系列免费观看| svipshipincom国产片| 欧美黑人欧美精品刺激| 中文字幕高清在线视频| 免费女性裸体啪啪无遮挡网站| 777久久人妻少妇嫩草av网站| 欧美日韩成人在线一区二区| 久久久久久人人人人人| 菩萨蛮人人尽说江南好唐韦庄| 午夜影院在线不卡| 丰满人妻熟妇乱又伦精品不卡| www.999成人在线观看| 男男h啪啪无遮挡| 中文字幕另类日韩欧美亚洲嫩草| 午夜激情av网站| 亚洲熟女精品中文字幕| 亚洲少妇的诱惑av| svipshipincom国产片| 久久精品国产亚洲av涩爱| 99久久99久久久精品蜜桃| 欧美xxⅹ黑人| 午夜两性在线视频| 亚洲欧美成人综合另类久久久| 国产又爽黄色视频| 精品高清国产在线一区| 国产色视频综合| 久久亚洲精品不卡| 一区二区三区乱码不卡18| 日本色播在线视频| 久久毛片免费看一区二区三区| 免费在线观看视频国产中文字幕亚洲 | 交换朋友夫妻互换小说| 精品人妻1区二区| 一级毛片女人18水好多 | 中文字幕亚洲精品专区|