• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service

    2022-08-24 03:27:18MuhammadIbrahimFaisalJamilYunJungLeeandDoHyeunKim
    Computers Materials&Continua 2022年5期

    Muhammad Ibrahim,F(xiàn)aisal Jamil,YunJung Lee and DoHyeun Kim,*

    1Big Data Research Center,Department of Computer Science and Statistics,Jeju National University,Korea,Jeju-si,63243,Korea

    2Department of Computer Engineering(and Advanced Technology Research Institute),Jeju National University,Jeju 63243,Korea

    Abstract: In recent times, the evolution of blockchain technology has got huge attention from the research community due to its versatile applications and unique security features.The IoT has shown wide adoption in various applications including smart cities, healthcare, trade, business, etc.Among these applications,fitness applications have been widely considered for smart fitness systems.The users of the fitness system are increasing at a high rate thus the gym providers are constantly extending the fitness facilities.Thus, scheduling such a huge number of requests for fitness exercise is a big challenge.Secondly,the user fitness data is critical thus securing the user fitness data from unauthorized access is also challenging.To overcome these issues,this work proposed a blockchain-based load-balanced task scheduling approach.A thorough analysis has been performed to investigate the applications of IoT in the fitness industry and various scheduling approaches.The proposed scheduling approach aims to schedule the requests of the fitness users in a load-balanced way that maximize the acceptance rate of the users’requests and improve resource utilization.The performance of the proposed task scheduling approach is compared with the state-of-the-art approaches concerning the average resource utilization and task rejection ratio.The obtained results confirm the efficiency of the proposed scheduling approach.For investigating the performance of the blockchain,various experiments are performed using the Hyperledger Caliper concerning latency, throughput,resource utilization.The Solo approach has shown an improvement of 32%and 26% in throughput as compared to Raft and Solo-Raft approaches respectively.The obtained results assert that the proposed architecture is applicable for resource-constrained IoT applications and is extensible for different IoT applications.

    Keywords: Load balancing;resource scheduling;task scheduling;Internet of things;blockchain;fitness applications

    1 Introduction

    For the last few years, the increase in various type of chronic and serious diseases has been witnessed due to tough and stressful routines,unhygienic food,which ultimately lead to various type of disabilities,mortality,and poor physical fitness[1].Several studies have shown that majority of the people utilize their time in doing work or sitting,which resulted in negative health life.On the other hand,people who spend 30 min in various type of light exercises result in a long-life by approximately 13%.The unhealthy lifestyle and low-quality diet imply that one out of three adults cause obesity[2,3].Moreover,various life anxieties are produced due to poor physical health[4–6].Therefore,the doctors always recommend various exercises for maintaining a healthy life.Therefore,the individuals need to spare time for daily fitness activities and keep track of the appropriate diet plan to maintain healthy life.The fitness sports have shown potential growth in the last few years.Several fitness gyms in the world exists[7]where thousands of individuals join and perform exercises on daily basis.Thus,scheduling of the user requests for the exercises like scheduling of other applications is also a big challenge.Various task scheduling approaches[8,9]have been proposed to schedule the user requests on the available resources,improving various metrics like resource utilization,throughput,minimizing task rejections,throughput,and load balancing etc.The resources can be machines or other devices and the user request can be a task,activity or events.

    In last few years,the espousal of Internet of Things(IoT)[10–12]in various domains of life has revolutionized the life of the individuals.In the case of IoT,thousands of small IoT devices monitor various environments,gather important sensory data and then forward the accumulated data to some Central location for further processing, helping in various decisions.Like other applications, the healthcare[13]is considered as one of the most important area.In most of the cases,the doctors always recommend various types of exercises to the patients for maintaining a healthy physique.Technological advancements have been seen in the fitness industry in the last few years.The IoT wearable devices are attached or implanted to the trainees in the fitness centers to keep track of their activities and visualize the impact of the exercises on the trainees.The information gathered from these sensing devices are used for various types of trainings conducted in the gyms.Moreover,IoT fitness sensors found to be useful in addressing various critical issues like muscle imbalance, injury, etc.[13].Like other applications, the fitness IoT data can be used for various data analytics.Based on the data analytics, the trainer can guide the trainees about various types of exercises and improvement in trainee capabilities.In addition, their exists some IoT embedded devices that are useful in ensuring the trainee safety like better workout plan management and notifying the trainees about their stress level.Various approaches have been introduced by the research community relying on the Artificial Intelligence based approaches like DL (Deep Learning), RL (Reinforcement Learning) for various type of decision makings [14,15].The DL-based approaches are powerful data analytic techniques concerning intelligent decision-making,accurate prediction,and classification in the context of IoT.These approaches extract important features from huge sensory data and perform various type of predictions and other decision-making tasks.

    The IoT fitness data of the trainee and trainers are of utmost significance and ensuring the security and integrity of such data is most important requirement.In storing the fitness data outside the user premises on some external storage location including fog,edge,or Cloud computing,the big challenge is to ensure the integrity and unauthorized access of the users’fitness data.It is therefore important to verify that fitness data has not been tampered or altered.In recent times, the blockchain-based approaches are proposed for different security services[11,15].Like other applications,the Blockchain also offer solutions to verify the trustworthiness of information as well.The Blockchain approaches are scalable in nature and have the ability to ensure the security of various transactions in a decentralized manner by providing authority to each participant for transactions verification.Every transaction in the blockchain network is signed and ultimately verified by each legitimate network participant.The cryptographic hash algorithms are used to ensure the integrity of the transactions and the mining nodes are responsible for signing and verifying transactions and maintaining the blockchain ledger consisting of chained blocks of transactions[13,15,16].All these features of the blockchain lead to the transactions that are immutable and altering any transactions is not possible.

    The task scheduling problem is NP-hard in nature thus it is difficult to propose and develop a complete optimal scheduling solution.The first part of this work proposes a load balanced device scheduling approach based on the fuzzy logic that schedule the user requests(also called tasks in this work) over the available fitness devices in a load balanced way.The user fitness data is critical and needs to be secured from unauthorized access.To overcome the security issue, a blockchain-based secured architecture for fitness data security management is proposed.

    The rest of the paper is organized as follows:In Section 2, the discussion about existing work concerning the task scheduling, Machine learning algorithms, and blockchain based solutions is presented.The proposed approach is delineated in Section 3, followed by experimental setup and performance evaluation section.The conclusions and future directions are discussed in Section 5.

    2 Related Work

    The related section is divided into three subsections.In first part of this section, the related work concerning the state-of-the-art task scheduling approaches is discussed.The second subsection delineates the existing machine learning approaches concerning the fitness data management and intelligent decision making.The last part of the related work shed light on the available blockchain based approaches used for the security of fitness data.

    2.1 Task Scheduling

    Task scheduling has been a widely considered research topic in various domains including industry, processing, distributed computing, Cloud computing, user request scheduling over the available resources,etc.The resources in any system are precious thus,efficiently utilizing the resources is always the main focus.The task scheduling approaches are adopted to cope with various challenges including resource utilization,minimizing average response time,execution time,throughput,minimizing SLA violation, and load balancing, etc.The Fist-In-First-Out (FIFO) approach assigns the tasks to the available resources according to their arrival order[17].The FIFO approach is simple to implement and involves less computation overhead.However, the smaller size tasks will face long time wait if larger size task arrived earlier.This will lead to a bad user experience and also the response time is increased for smaller tasks.The Min-Min [18] heuristic picks the task with a smaller size from the available task list and then assigns the task to the resource which completes its execution in the minimum time on the available resources.The Min-Min-based approach is complex and involves high computation overhead as compared to the FIFO approach.This approach penalizes the large-size tasks concerning waiting time and prefers smaller-size tasks.On the other hand,the Max-Min[19]task scheduling approach picks the largest task and then maps it to the device that completes its execution in the minimum possible time.The inputs to this approach are tasks and device lists and it select the large size task and computes the expected finish time on all the devices one by one.The Max-Min assigns the task to the resource having the least expected finish time.This approach favors large-size tasks and the small-size tasks are penalized concerning response time.Thus,the Max-Min approach results in inefficient resource utilization.Authors in[20]have proposed a Dynamic Max-Min approach that is based on the Max-Min heuristic.The dynamic Max-Min approach is provided a list of tasks that selects the largest task from the received task list and assigns it to the device with the least finish time.This approach can update the device status and task status table at different intervals of time.The Dynamic Max-Min approach leads to resources under-utilization and load imbalance.

    2.2 Machine Learning Approaches for Fitness Technology

    Like other applications of IoT, the advancement in IoT technology for fitness applications has shown tremendous progress in the last few years[14].Various fitness devices are implanted or attached to the human body to get an insight into various fitness indexes and health status of the sports fitness players in a ubiquitous way,thus helping in health assessment of the humans and fitness maintenance of the sports players [21].The individuals as well as the trainers in the fitness gyms can monitor and evaluate the trainee fitness progress using the gathered sensor fitness data.The current research on the fitness applications has shown deep insights into how various fitness exercises impact the human body,helping in controlled exercises and diet plans accordingly.The authors in[22]presented the idea of utilizing Mobile sensors and wearable devices for monitoring the athlete muscles and fitness conditions.The authors proposed an approach utilizing the K-Nearest Neighbor approach for monitoring the sports players’fitness during the training and then providing them the feedback based on the analyzed data.The authors proposed an IoT and blockchain integrated approach to create a healthy connection between the IoT applications and human beings to provide insights into the usefulness of IoT for fitnes [23].The proposed architecture is composed of three layers that are; perception, transmission, and application.The IoT sensors continuously monitor and acquire sports and fitness information,aggregate the acquired data and then disseminate it to the system for further analytic processing for useful insights.In Atlam et al.[24] presented the details concerning the applicability of IoT in AI-based applications for various intelligent decision making and analysis.This work also sheds light on some of the challenges associated with the integration of IoT with AI applications.

    Fig.1 depicts a generic blockchain based IoT and AI integrated model for fitness applications.The IoT devices capture human body postures and store in the blockchain for further analytical processing.The data is then used for data analytics by various machine learning models to provide useful insights about the trainees which can be exploited by the trainers in the fitness center or by healthcare professionals for various decision making.

    2.3 Blockchain for Fitness Data Security

    In the last few years,fitness centers utilize various electronic IoT devices to capture,share,digitize,and process fitness data.In this section,we investigated some state-of-the-art blockchain-based fitness applications.In[25],the authors proposed and discussed fitness applications that allow trainee users to perform physical activities and are paid for that based on a pre-defined incentives-based strategy.This work provides an insight into the changes in the user’s physical activities,such as counting daily steps.Th author in [26] discussed and presented a sweatcoin strategy considered as a digital currency that is provided as an incentive to the users for their physical activities.The users are required to gather personal physical information like step counts and are provided sweatcoin as an incentive.In [27],an application called Run2Play is developed for monitoring the user’s physical exercise activities and incentives are provided to the users for each physical activity.In 2017,Martin designed Ethereum based Movement app that incentives the users for physical exercises,such as running,treadmill,jogging,and any other physical activity [28].They also build a marketplace where the users can use their tokens for purchasing fitness devices and also register for online yoga courses.In addition, the users can exchange their tokens with another cryptocurrency.In 2016, a fitness application called Truegymis is developed for educating people about exercise management.This application exploits machine learning-based techniques to analyze the acquired data of the trainee and then recommend a training plan for the user[28].Drake designed an Ethereum based blockchain fitness application called‘The Hustle’for promoting health, wellness, and user fitness data.The Ethereum token is provided as a reward to the user who participates in the fitness exercises.The HUSL token is exchangeable with other currencies,such as BTC,ETH,or USD[29].Most of the existing blockchain-based applications for fitness applications,utilize the crypto-currency that has some computations overhead.

    Figure 1:Generic blockchain based IoT and AI integrated model for fitness applications

    2.4 Summary

    In the light of the aforementioned issues, this work contributed Blockchain based User-Device Scheduling Mechanism.The work is divided into two different parts.In the first part, fuzzy-based device scheduling(also called tasks)is proposed that schedules the request of the fitness users on the available fitness devices in a load-balanced way.The second contribution of this work is related to the security assurance of the fitness data using the blockchain-based approach.

    3 Proposed Work

    In this work,we have proposed Enhanced User-Device Scheduling Mechanism using Fuzzy Logic based on Blockchain for secure smart fitness service.The discussion about the proposed work is presented as follows.

    Figure 2:System architecture of proposed task scheduling fitness service

    3.1 Blockchain Based Secure Fitness Scheduling Service

    This section discusses the system architecture of the proposed fitness scheduling service.As the task scheduling is NP-hard in nature thus optimally scheduling the tasks is always challenging.In large-scale Gyms,thousands of users request the gym at various times and need various fitness devices for exercise.The increase in the number of users and requests for devices leads to the complexity of the scheduling problem.In most of the gyms,the exercise sessions are divided into three shifts(sessions)i.e., morning, evening, and night.Each shift will have different number of slots, each of one hour.Moreover,the users can be either members(who have a membership and frequently join the exercises)or non-member who join the exercise less frequently.Thus,maximizing the user request acceptance and increased resource utilization is ultimately required.Various approaches are in place to improve the resource utilization of the available resources.In this research,a priority-aware,load-balanced device scheduling scheme is proposed.The load-balanced scheduling has two benefits, firstly, to entertain maximum user requests and secondly,to maximize resource(fitness devices)utilization.The proposed approach is comprised of several components as shown in Fig.2.Initially,the user requests for fitness device for exercise and each user request is stored in Task repository.The information about the available fitness devices is stored in device repository.The user requests(Tasks)and the fitness devices are provided as an input to the priority mapping module.The priority mapping module provides user information like age, gender, weight and height to the fuzzy inference controller.Based on the user information,the BMI is calculated to find the health level of the user as given in Eq.(1).

    The fuzzy logic considers BMI(Body Mass Index)parameter for assigning the priority.The task priority is calculated based on the following rules:

    R1.If BMI<18.5 then Health level is Underweight and priority is Low

    R1.If 18.5<BMI ≤24.9 then health level is Normal and priority is Medium.

    R1.If 24.9<BMI ≤29.9 then Health level is Overweight and priority is High

    R1.If BMI ≥30 then Health level is Obese and priority is High

    The tasks are first prioritized using the fuzzy rules and then passed to the task scheduling layer as an input.The task scheduler then considers the tasks priority and map the user requests using the proposed task scheduling approach.Algorithm 1 prioritizes the user requests using fuzzy rules that considers the user health level based on the BMI metric.The health level is categorized into four types that are Underweight,Normal,Overweight,and Obesity.Based on the input of the health status,the priority is calculated using fuzzy rules discussed previously.The available slots are in morning,evening,and night.In Algorithm 1,the priority list is populated using fuzzy logic.

    The next step is to map the user requests to the available fitness devices.Each user request is compared whether in the priority list.If the task is having high priority,then user request is mapped to the requested time in the requested time slot.In case, the priority is low or medium, the requests are mapped into a temporary list.Following are nine inference rules used for mapping the user tasks to the available fitness devices:

    R1.If(task priority is high and arrival time is short then task will be mapped)

    R2.If(task priority is Medium and arrival time is short then task will be mapped)

    R3.If(task priority is Low and arrival time is short then task will wait,and mapped)

    R4.If(task priority is high and arrival time is Medium then task will be wait and mapped)

    R5.If(task priority is Medium and arrival time is Medium then task will wait and mapped)

    R6.If(task priority is Low and arrival time is Medium then task will suspend,wait,and mapped)

    R7.If(task priority is high and arrival time is High then task will be wait and mapped)

    R8.If(task priority is Medium and arrival time is High then task will suspend,wait,and mapped)

    R9.If(task priority is Low and arrival time is High then task will suspend,wait,and mapped)

    Algorithm 1:Priority calculation using fuzzy logic Inputs:Fitness Devices(FD1,F(xiàn)D2,...,F(xiàn)Ni)\where the devices can be of different types,User Tasks(T1,T2,...,Tn)}Each of task having attributes like userID,userType,deviceType,shift Output:PriorityList(Ti,Priority)Shift={morning,evening,night};priorityList=NULL,fdList=getFdList(fdMap),tasksList=getTasksList(taskMap);For(FD fd:FDList){For(uTask uT:tasksList){If(HealthLevel->Underweight)){Priority=Low;priorityList={userID,arrTime,shift,deviceType}}elseIf(HealthLevel->Normal){Priority=Medium;}elseIf(HealthLevel->Overweight or HealthLevel->Obese){Priority=High;}priorityList={userID,arrTime,shift,deviceType,Priority}}}return priorityList;}

    In the last step, the tasks are scheduled on the available devices in a load-balanced way.The scheduling information is forwarded to some central location like Cloud or edge computing platform.

    Moreover,the fitness users perform various exercises and physical activities during the fitness in the gym.This data of the users is of prime importance thus integrity and privacy is of much concern.The IoT wearables collect physical activity information of the user steps and transfer it to the IoT server.The collected information is then forwarded to the blockchain network.Every node in the blockchain carries a replica of the ledger and any alteration in a copy will result in the updation of other copies of the ledger across the blockchain within seconds to minutes.For security insurance,an identity certificate is issued and approved by the network member across the smart contract-based blockchain network.The identity certificate is used by each peer node to store each transaction securely in the blockchain network.In the smart contract-based blockchain network, the inference engine is used to discover useful knowledge, patterns and perceive latent insights from the users’fitness data.The users are provided front-end interfaces to work with secure fitness services and visualize various useful fitness information.

    Algorithm 2:Scheduling user tasks Inputs:Fitness Devices(FD1, FD2, .., FDi) \where the devices can be of different types, User Tasks(T1,T2,,...,Tn).Each of task having attributes like userID,userType,deviceType,shift Output:Scheduling of user Tasks on the available multi-devices Ti to FDj Shift={morning,evening,night};priorityList=getPriorityList(priorityList),normalList=getPriorityList(normalList);fdList=getFdList(fdMap),tasksList=getTasksList(taskMap),tasksList.sortbyarrTimeasc();morningcounter=0,eveningcounter=0,nightcounter=0;moravail=0,eveavail=0,nightavail=0;For(FD fd:FDList){For(uTask uT:tasksList){If(Priority->High&&shift=morning&&morningcounter<mThreshold){map.add(uT,deviceID,deviceType);morning_{counter}=+1;}If(Priority->High&&shift=evening&&evecounter <eThreshold){map.add(uT,deviceID,deviceType)\eve_{counter}r=+1;}(Continued)

    If(Priority->High&&shift=night&&nightcounter <nThreshold){map.add(uT,deviceID,deviceType);nightcounter=+1;}If(userType==non-member){tmpMap.add(uT,deviceID,deviceType,shift);}Else{tmpMap.add(uT,userType,deviceID,deviceType,shift);}}}moravail=mThreshold-morningcounter;eveavail=eThreshold-evening counter;nightavail=nThreshold-night counter;For(uTask ut:tmpMap){condition=max(moravail,eveavail,nightavail);moravail=+1;eveavail=+1;nightavail=+1;If(moravail==condition){map.add(uT,deviceID,deviceType,morning);}If(eveavail==condition){map.add(uT,deviceID,deviceType,evening);}If(nightavail==condition){(Continued)

    map.add(uT,deviceID,deviceType,night);}}execute.schedule(map);return output;

    3.2 System Workflow

    Fig.3 contemplates the flowchart of the proposed task scheduling fitness service.The system user is allowed to connect and access fitness services.The inputs to the fitness service are the user requests for the devices and the fitness devices.Initially,the user requests and device list are provided as an input to the system.The next step is to execute scheduling of the user requests for the fitness devices based on the priority assigned to various user requests.The user requests are prioritized based on BMI.The previous subsection discussed how priority is assigned to the user request and then scheduled.The fuzzy logic inference controller exploits 4 rules to assign the priority.Once the priorities are assigned, the next step is to map the users to the respected fitness devices.For this purpose, the Scheduling module requests the fitness resource manager for reserving the fitness device.The resources are then assigned and the scheduling is then performed in a load-balanced way.The detailed steps about scheduling are provided and discussed in Algorithm 2.The fitness scheduling information is then collected and stored in the blockchain network in a secured way.

    The trainee user then starts exercises according to their defined schedule.The IoT wearable collects physical activity information of the user steps and transferred it to the IoT server.The collected information is then forwarded to the smart contract-based blockchain network.Then, the consensus algorithm is executed and then collected real-time information is archived in the blockchain state database, and every peer in the blockchain network affix the physical activity transactions.Furthermore, the smart contract executes machine learning approach to infer knowledge from the gathered data and perform various decisions.The obtained results and inferred knowledge are then shown to the trainees and trainers through the client application.All successful transactions are then stored and updated by every peer in the blockchain network ledger state.

    4 Experimental Setup and Performance Evaluation

    This section contemplates the details concerning the experimental setup configuration details and the performance analysis of the proposed approach against the contemporary approaches.This section is divided into the following subsections.

    4.1 Experimental Setup

    The performance evaluation can be performed in three different ways that are experimental,analytical,or simulation approaches.The experimental setup is costly and difficult to configure due to the complexities involved in setup and execution.However,experimental approaches provide more real performance evaluation of the underlying approaches.The analytical approaches are easy to deploy;however,they are unable to grasp some of the important characteristics for the performance evaluation.The simulation-based approaches are widely used techniques for an in-depth evaluation of various types of networks.

    Figure 3:Proposed secured fitness system workflow

    In this paper,we have considered the experimental approach for some of the experiments and for other experiments,we have utilized the simulation approach.The objectives of this paper are two folds that are;task scheduling of the user request for fitness devices and security of the user fitness data by using blockchain based network.For the first objective,the simulation experiments are performed by using implementation in the python language.To validate the second objective,the implementation is performed using the hyper-ledger fabric and the result evaluation using hyper-ledger caliper tool.The experiments are executed on a system equipped with 20 GB of RAM and a processing speed of 3.00 GHz core I5.

    4.2 Experimental Evaluation

    Several experiments have been performed to evaluate the performance of the proposed task scheduling approach and evaluating the performance of the blockchain network implemented in this work.The details concerning experiment 1 for evaluating the performance evaluation against the compared approaches is presented in Tab.1.

    The experiments are executed multiple times with three different configurations i.e.,the number of available fitness devices are 50,100,and 200 whereas the number of user requests(Tasks)are 592,1225, and 2460 respectively.The availability of the devices for exercise are divided into three shifts;morning,evening,and night.The time slots are divided into a time of one hour and each of the shift is comprised of 4 slots.Thus,the total number of slots available are 12 and each of the device is available for these 12 hours.The total number of slots available can be calculated using the Eq.(2).

    Table 1:Experimental setup and result discussion

    Fig.4 contemplates the results concerning the average resource utilization(ARUR)for all of the task scheduling approaches.On x-axis,the number of tasks is shown for three different experiments and the y-axis represents the average resource utilization.The highest resource utilization of 95%has been observed for the proposed approach when the number of tasks is 2460 with 200 available devices.The FIFO approach has also shown improved performance and achieved second highest resource utilization of the three compared approaches.The proposed outperformed the other two approaches with an improvement of 20 to 35% in the resource utilization.The obtained results asserts that the proposed approach is suitable for the scheduling of user requests on the available devices.

    Another important metric to evaluate the performance of scheduling approaches is task rejection ratio(TRR)that satisfies the user quality of experience.The results concerning the task rejection ratio for the proposed approach and compared approaches are delineated in Fig.5.When the number of user requests are 585,the proposed approach has been able to reduce the TRC by 25 to 30%against the compared contemporary approaches.With the increase in number of users further,a dramatic decrease in TRR has been observed for the proposed approach while the other two approaches experienced poor performance concerning task rejection ratio.With further increase in the number of user requests,the proposed approach has shown consistent performance while the other two approaches have led to a rejection ratio of 14 to 18%.The obtained results asserts that the proposed approach is best choice for the user requests while considering huge number of user requests for the fitness devices.

    To evaluate the performance of the blockchain network, the Hyperledger fabric is utilized for the implementation and deployment.The experiments are performed several times using Hyperledger caliper and the obtained results are discussed as below.

    In our work,we performed several experiments with a varying number of users,executing queries for data retrieval from the blockchain network to see the impact of the number of users on the query transaction latency.The results concerning the query transaction latency are contemplated in Fig.6.The results are obtained and plotted for minimum,maximum,and average latency with varying numbers of users.A steady behavior is observed in the latency when the number of users is increased from 100 to 1000.When the number of users is increased from 100 to 1000 a total of 29.4%is observed whereas when the users are increased from 1000 to 1200 the latency is increased by 32.3%.Further increase in the number of users leads to an increased query transaction latency.However,the results show scalable behavior of the blockchain network at the cost of approximately 4%increase in latency.

    Figure 4:Average resource utilization comparison

    The Hyperledger Fabric also provides ordering services that order the transactions by using nodes called ordering nodes.To evaluate the performance of the blockchain network,three types of ordering service(i.e.,solo,raft,and solo-raft)with varying transaction rates,such as 50,100,...,300 TPS are considered as given in Fig.7a.The latency for the Raft is higher for 50 TPS and continues to increase to 300 TPS against the other two approaches.The obtained results show that the latency of solo is much lower as compared to the Raft and Solo Raft due to the overhead of transport layer security utilized for peer nodes authentication.The results in Fig.7b.contemplates the throughput for solo,raft,and solo-raft ordering approaches with varying transaction send rates.All three approaches have shown similar behavior when the transaction send rate is 50.An increase in the send rate in transaction leads to a higher increase in the throughput for the Solo approach with an improvement of 32%and 26%against the Raft and Solo-Raft approaches respectively.This behavior is persistent for all the other tested experiments with a further increase in transaction send rate.It can be seen from the obtained results that higher throughput is achieved by the solo order service as compared to the other two ordering services.

    Figure 5:Task rejection ratio comparison

    Figure 6:Impact of varying number of users on query transaction latency

    4.3 Results and Discussion

    The proposed approach has been evaluated concerning the task rejection ratio and resource utilization and compared against two state-of-the-art baseline scheduling approaches.Concerning the task rejection ratio, the proposed approach has dominated the other two approaches by 25%and then reaching to an improvement of 70%.This improvement is due to the reason that proposed approach accept most of the user requests and then employ load balanced approach to satisfy the QoS requirements of the users and distribute the requests in a load balanced way.The other two approaches are simple in nature;however,are unable to deal with quality-of-service requirements of the users and also lead to an imbalance distribution of user requests over the available devices.As the proposed approach keeps the load balanced over the available fitness devices, the resource utilization is also improved while maximizing the user quality of experience.

    Figure 7:(a)Influence of changing orderer nodes with different send rates on Latency;(b)Influence of changing orderer nodes with different send rates on throughput

    5 Conclusions and Future Work

    The users of fitness are increasing at an immense rate and the gymmers are constantly extending the fitness facilities.Thus,handling such a huge number of requests for fitness devices and scheduling these requests is a big challenge.Secondly,the user fitness data is critical and needs to be secured from unauthorized access.This work addressed these issues concerning the fitness data management that are the scheduling of user requests over the available fitness devices in a load-balanced way and then provisioning of security service by implementing and deploying the blockchain-based solution.For this purpose,an in-depth analysis has been performed to investigate the applications of IoT in the fitness industry and various scheduling approaches.The proposed outperformed the other two approaches with an improvement of 20 to 35%in resource utilization.The obtained results assert that the proposed approach is suitable for the scheduling of user requests on the available devices.The security of fitness data is a big concern thus in this work we proposed and employed smart contract enabled blockchain network.The obtained results imply that the proposed blockchain network provides the required security and is extensible for other IoT applications.

    The fitness IoT application involves huge sensory data concerning the user fitness data.This data needs to be stored and evaluated in a timely manner(keeping in view the delay requirements)to obtain useful insights.TAs a future work,we will propose a deadline aware task scheduling approach for edge computing to handle delay constrained fitness data.

    Funding Statement:This research was supported by Energy Cloud R&D Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT(2019M3F2A1073387), and this research was supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government (MSIT)(No.2018-0-01456,AutoMaTa:Autonomous Management framework based on artificial intelligent Technology for adaptive and disposable IoT).Any correspondence related to this paper should be addressed to Do-hyeun Kim.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久青草综合色| 国产精品一二三区在线看| 日韩人妻精品一区2区三区| 国产又色又爽无遮挡免| 欧美黑人精品巨大| 国产淫语在线视频| 极品少妇高潮喷水抽搐| 亚洲专区中文字幕在线| 999久久久国产精品视频| 一级黄色大片毛片| 九色亚洲精品在线播放| 狂野欧美激情性bbbbbb| 亚洲精品第二区| 亚洲精品成人av观看孕妇| 亚洲国产欧美网| 韩国高清视频一区二区三区| 另类亚洲欧美激情| 久久99一区二区三区| 国产成人一区二区三区免费视频网站 | 少妇人妻久久综合中文| 国产1区2区3区精品| 97精品久久久久久久久久精品| 91成人精品电影| 国产一区二区三区综合在线观看| 国产精品一国产av| 天堂8中文在线网| 亚洲欧美中文字幕日韩二区| 波多野结衣av一区二区av| 九草在线视频观看| 一区在线观看完整版| 伦理电影免费视频| 777久久人妻少妇嫩草av网站| 97在线人人人人妻| 日本黄色日本黄色录像| av福利片在线| 亚洲国产精品一区三区| 国产亚洲av高清不卡| 日韩视频在线欧美| 国产成人精品无人区| 性少妇av在线| 午夜日韩欧美国产| 纯流量卡能插随身wifi吗| 久久久久国产精品人妻一区二区| 超碰成人久久| 97在线人人人人妻| 99国产综合亚洲精品| av网站免费在线观看视频| 美女主播在线视频| 久久久久视频综合| 色播在线永久视频| 亚洲自偷自拍图片 自拍| 嫩草影视91久久| 欧美黑人欧美精品刺激| 久久99精品国语久久久| 50天的宝宝边吃奶边哭怎么回事| 国产精品国产三级国产专区5o| 午夜精品国产一区二区电影| 欧美人与性动交α欧美软件| 免费在线观看完整版高清| 久久亚洲国产成人精品v| 久久久精品免费免费高清| 韩国精品一区二区三区| 免费看av在线观看网站| 国产成人欧美| 国产欧美日韩一区二区三区在线| 亚洲图色成人| 国产在线观看jvid| 亚洲国产看品久久| 赤兔流量卡办理| 欧美人与善性xxx| 黄色一级大片看看| 叶爱在线成人免费视频播放| 亚洲激情五月婷婷啪啪| 亚洲av日韩在线播放| 亚洲成色77777| 国产免费现黄频在线看| 国产野战对白在线观看| 亚洲精品美女久久av网站| 一个人免费看片子| 午夜精品国产一区二区电影| 97精品久久久久久久久久精品| 国产成人a∨麻豆精品| 9色porny在线观看| 国产成人精品久久二区二区免费| 人妻人人澡人人爽人人| 一级毛片我不卡| 精品福利观看| 免费在线观看影片大全网站 | 巨乳人妻的诱惑在线观看| 蜜桃在线观看..| 成年人免费黄色播放视频| 国产男女超爽视频在线观看| 亚洲伊人久久精品综合| 亚洲中文日韩欧美视频| 国产精品久久久久成人av| 乱人伦中国视频| 国产亚洲欧美在线一区二区| 美女主播在线视频| 丰满少妇做爰视频| av天堂在线播放| 五月开心婷婷网| 婷婷色综合大香蕉| 欧美日韩国产mv在线观看视频| 国产深夜福利视频在线观看| 日本a在线网址| 十分钟在线观看高清视频www| 国产麻豆69| 热re99久久精品国产66热6| 日韩 亚洲 欧美在线| 老熟女久久久| 亚洲第一av免费看| 国产深夜福利视频在线观看| av在线老鸭窝| a级片在线免费高清观看视频| 成年人免费黄色播放视频| 国产成人精品在线电影| 色精品久久人妻99蜜桃| 精品一区二区三区四区五区乱码 | 50天的宝宝边吃奶边哭怎么回事| 99国产精品一区二区三区| 亚洲精品在线美女| 天天影视国产精品| 国产三级黄色录像| 高清黄色对白视频在线免费看| 国产精品亚洲av一区麻豆| 国产精品久久久久成人av| 欧美av亚洲av综合av国产av| 一级,二级,三级黄色视频| 国产视频首页在线观看| 狠狠精品人妻久久久久久综合| 黄色一级大片看看| 成人国语在线视频| 一级a爱视频在线免费观看| 国产又色又爽无遮挡免| 亚洲av成人精品一二三区| 一级毛片我不卡| 免费少妇av软件| 母亲3免费完整高清在线观看| 欧美少妇被猛烈插入视频| 亚洲欧美激情在线| 国产欧美亚洲国产| 国产精品人妻久久久影院| 国产精品久久久久久精品电影小说| 久久毛片免费看一区二区三区| 在线观看免费日韩欧美大片| 久久99热这里只频精品6学生| 天天躁夜夜躁狠狠躁躁| 亚洲欧美一区二区三区黑人| www.熟女人妻精品国产| 在线观看www视频免费| 亚洲精品美女久久av网站| 国产麻豆69| 免费在线观看视频国产中文字幕亚洲 | 欧美日韩亚洲高清精品| 久久中文字幕一级| 丰满人妻熟妇乱又伦精品不卡| 在线观看www视频免费| 欧美激情极品国产一区二区三区| 色综合欧美亚洲国产小说| 777久久人妻少妇嫩草av网站| 熟女av电影| 欧美日韩福利视频一区二区| 亚洲中文日韩欧美视频| 亚洲三区欧美一区| 久久精品成人免费网站| 国产又爽黄色视频| 韩国精品一区二区三区| 国产免费又黄又爽又色| avwww免费| 宅男免费午夜| 亚洲av电影在线进入| 丝袜人妻中文字幕| 色综合欧美亚洲国产小说| 精品少妇内射三级| 欧美日韩黄片免| 国产午夜精品一二区理论片| 最近中文字幕2019免费版| 日本色播在线视频| 国产亚洲午夜精品一区二区久久| 亚洲av片天天在线观看| 国产亚洲一区二区精品| 久热这里只有精品99| 国产熟女欧美一区二区| 国产精品偷伦视频观看了| 色视频在线一区二区三区| 国产精品99久久99久久久不卡| 丝袜喷水一区| 日本a在线网址| 久9热在线精品视频| 亚洲国产欧美网| avwww免费| 国产精品一国产av| 一边摸一边抽搐一进一出视频| 悠悠久久av| 亚洲第一青青草原| 少妇人妻久久综合中文| 国产在视频线精品| 在线亚洲精品国产二区图片欧美| 久久久久久久久免费视频了| av福利片在线| 久久这里只有精品19| 丰满人妻熟妇乱又伦精品不卡| 国产老妇伦熟女老妇高清| 天堂俺去俺来也www色官网| 国产亚洲av片在线观看秒播厂| 大香蕉久久网| 日本av免费视频播放| av天堂久久9| 曰老女人黄片| 少妇精品久久久久久久| 人体艺术视频欧美日本| 女警被强在线播放| 高潮久久久久久久久久久不卡| 国产精品免费视频内射| 天天影视国产精品| 欧美日韩亚洲综合一区二区三区_| 久久精品久久久久久噜噜老黄| 亚洲色图综合在线观看| 老汉色∧v一级毛片| 国产精品99久久99久久久不卡| 欧美日韩亚洲国产一区二区在线观看 | 人妻人人澡人人爽人人| 久久久久久久国产电影| 免费在线观看完整版高清| 国产精品国产三级专区第一集| 一级毛片电影观看| 亚洲欧美中文字幕日韩二区| 国产精品麻豆人妻色哟哟久久| 成人亚洲欧美一区二区av| 亚洲av成人精品一二三区| 啦啦啦视频在线资源免费观看| 日韩一区二区三区影片| 另类亚洲欧美激情| 只有这里有精品99| 女性被躁到高潮视频| 深夜精品福利| 最新在线观看一区二区三区 | 你懂的网址亚洲精品在线观看| av天堂久久9| av在线app专区| 亚洲av欧美aⅴ国产| 亚洲 欧美一区二区三区| 美女午夜性视频免费| 后天国语完整版免费观看| 青春草亚洲视频在线观看| 亚洲欧美激情在线| 免费看不卡的av| 中文欧美无线码| 免费一级毛片在线播放高清视频 | 少妇精品久久久久久久| 久久国产精品大桥未久av| 国产一区二区在线观看av| 天天躁夜夜躁狠狠久久av| 久久久久久亚洲精品国产蜜桃av| 婷婷色av中文字幕| 天天躁夜夜躁狠狠久久av| 啦啦啦视频在线资源免费观看| 久久狼人影院| e午夜精品久久久久久久| 亚洲熟女毛片儿| 国产三级黄色录像| 免费不卡黄色视频| 男女国产视频网站| 亚洲熟女精品中文字幕| 日日爽夜夜爽网站| 国产片特级美女逼逼视频| 国产高清视频在线播放一区 | 侵犯人妻中文字幕一二三四区| 免费在线观看影片大全网站 | 黄频高清免费视频| 日韩大片免费观看网站| 国产成人a∨麻豆精品| 一区二区三区激情视频| 捣出白浆h1v1| 十八禁人妻一区二区| 成年女人毛片免费观看观看9 | 日韩中文字幕视频在线看片| 黑人欧美特级aaaaaa片| 欧美日韩亚洲高清精品| 国产高清不卡午夜福利| bbb黄色大片| 免费在线观看日本一区| 自线自在国产av| 免费看不卡的av| 欧美日韩视频精品一区| 色播在线永久视频| 乱人伦中国视频| videosex国产| 99久久精品国产亚洲精品| 欧美 亚洲 国产 日韩一| 国产精品麻豆人妻色哟哟久久| 最近中文字幕2019免费版| 一本—道久久a久久精品蜜桃钙片| 日本欧美国产在线视频| 日韩精品免费视频一区二区三区| 交换朋友夫妻互换小说| 伦理电影免费视频| 一区二区三区激情视频| 捣出白浆h1v1| 国产麻豆69| 欧美 亚洲 国产 日韩一| 两个人免费观看高清视频| 久久人人爽av亚洲精品天堂| 日本欧美国产在线视频| 欧美+亚洲+日韩+国产| 亚洲av日韩精品久久久久久密 | 国产国语露脸激情在线看| 纵有疾风起免费观看全集完整版| 亚洲欧美成人综合另类久久久| 亚洲欧美清纯卡通| 国产亚洲av片在线观看秒播厂| 成在线人永久免费视频| 国产精品三级大全| 国产成人欧美| 秋霞在线观看毛片| 国产视频一区二区在线看| 国产精品av久久久久免费| 一边亲一边摸免费视频| 日韩 亚洲 欧美在线| 美女午夜性视频免费| 国产精品偷伦视频观看了| 午夜日韩欧美国产| 亚洲第一av免费看| 汤姆久久久久久久影院中文字幕| 脱女人内裤的视频| 久久久国产欧美日韩av| 伊人亚洲综合成人网| 青春草亚洲视频在线观看| 91字幕亚洲| 大话2 男鬼变身卡| av天堂久久9| 久久人人97超碰香蕉20202| 大话2 男鬼变身卡| 两个人看的免费小视频| 亚洲专区中文字幕在线| 国产免费福利视频在线观看| 激情五月婷婷亚洲| 中文字幕亚洲精品专区| 你懂的网址亚洲精品在线观看| 欧美少妇被猛烈插入视频| 欧美成人精品欧美一级黄| 国产有黄有色有爽视频| 国产一区二区 视频在线| 亚洲国产精品国产精品| 国产成人精品久久久久久| 可以免费在线观看a视频的电影网站| 亚洲成人手机| 亚洲av在线观看美女高潮| 老汉色av国产亚洲站长工具| 99久久精品国产亚洲精品| 亚洲欧美精品综合一区二区三区| www.999成人在线观看| 日韩一卡2卡3卡4卡2021年| 久久国产精品影院| 女人久久www免费人成看片| 啦啦啦在线观看免费高清www| 亚洲三区欧美一区| 老司机影院毛片| 国产成人啪精品午夜网站| 午夜视频精品福利| 亚洲七黄色美女视频| 久久久久久久久免费视频了| 国产野战对白在线观看| 亚洲精品日韩在线中文字幕| 久久青草综合色| 欧美+亚洲+日韩+国产| 国产成人精品久久二区二区91| 男女国产视频网站| 老汉色∧v一级毛片| 亚洲av电影在线进入| 在线观看国产h片| 嫩草影视91久久| 亚洲av日韩在线播放| 脱女人内裤的视频| 成年动漫av网址| 男人操女人黄网站| 五月天丁香电影| 两个人免费观看高清视频| 一级,二级,三级黄色视频| 搡老乐熟女国产| 日韩制服丝袜自拍偷拍| 亚洲黑人精品在线| 久久青草综合色| 巨乳人妻的诱惑在线观看| 久久精品亚洲av国产电影网| 好男人视频免费观看在线| 80岁老熟妇乱子伦牲交| 操出白浆在线播放| 手机成人av网站| 国产三级黄色录像| 一级片'在线观看视频| 黄色 视频免费看| 高清黄色对白视频在线免费看| 脱女人内裤的视频| 国产淫语在线视频| 免费在线观看黄色视频的| 女人被躁到高潮嗷嗷叫费观| 男人操女人黄网站| 亚洲欧美精品综合一区二区三区| 黄色视频不卡| 亚洲国产中文字幕在线视频| 久久久久久免费高清国产稀缺| 91精品三级在线观看| 婷婷色综合大香蕉| 欧美日韩av久久| 女性生殖器流出的白浆| 久久久久精品国产欧美久久久 | 欧美日韩亚洲国产一区二区在线观看 | 亚洲,一卡二卡三卡| 亚洲国产欧美日韩在线播放| 欧美激情高清一区二区三区| 色视频在线一区二区三区| 国产成人系列免费观看| 亚洲美女黄色视频免费看| 亚洲中文日韩欧美视频| 中文字幕人妻丝袜一区二区| 桃花免费在线播放| 久热爱精品视频在线9| av有码第一页| 久久久久精品国产欧美久久久 | 9191精品国产免费久久| 国产欧美日韩一区二区三 | 香蕉丝袜av| 9色porny在线观看| 国产免费又黄又爽又色| 人人妻人人澡人人看| 麻豆乱淫一区二区| 男女之事视频高清在线观看 | 狠狠精品人妻久久久久久综合| 日韩一本色道免费dvd| 一级毛片我不卡| 亚洲久久久国产精品| 久久久久国产一级毛片高清牌| 亚洲国产欧美日韩在线播放| 亚洲国产av新网站| 在线观看一区二区三区激情| 女警被强在线播放| 久久久精品区二区三区| 操出白浆在线播放| 成人国语在线视频| 九色亚洲精品在线播放| 亚洲av日韩精品久久久久久密 | 青草久久国产| 好男人视频免费观看在线| 在线观看免费视频网站a站| 免费在线观看黄色视频的| 久热爱精品视频在线9| 免费观看av网站的网址| 看免费av毛片| 一区二区日韩欧美中文字幕| 欧美黄色淫秽网站| 在线亚洲精品国产二区图片欧美| 人成视频在线观看免费观看| 在线观看免费高清a一片| 久久鲁丝午夜福利片| 国产高清国产精品国产三级| 国产精品香港三级国产av潘金莲 | 久久久久久久国产电影| 久久精品亚洲av国产电影网| 制服人妻中文乱码| 国产一级毛片在线| 亚洲一区二区三区欧美精品| 99国产精品一区二区三区| 国产成人精品在线电影| 青青草视频在线视频观看| 精品视频人人做人人爽| 亚洲av男天堂| 晚上一个人看的免费电影| 亚洲人成电影观看| 五月天丁香电影| 免费观看人在逋| 国产成人精品久久二区二区免费| 一二三四社区在线视频社区8| 久久热在线av| 1024香蕉在线观看| 丰满人妻熟妇乱又伦精品不卡| 男女无遮挡免费网站观看| 亚洲国产欧美在线一区| 精品人妻1区二区| 欧美成狂野欧美在线观看| 久久久久久久大尺度免费视频| 免费观看a级毛片全部| 妹子高潮喷水视频| 大陆偷拍与自拍| 日韩大码丰满熟妇| 2021少妇久久久久久久久久久| 看十八女毛片水多多多| 高潮久久久久久久久久久不卡| 亚洲人成网站在线观看播放| 少妇人妻久久综合中文| 久久精品国产a三级三级三级| 国产成人一区二区三区免费视频网站 | 一本综合久久免费| 一二三四社区在线视频社区8| 两个人看的免费小视频| 18禁国产床啪视频网站| 爱豆传媒免费全集在线观看| 精品人妻1区二区| 日本wwww免费看| 老熟女久久久| 后天国语完整版免费观看| 麻豆乱淫一区二区| 只有这里有精品99| 亚洲精品中文字幕在线视频| 男人操女人黄网站| 悠悠久久av| av福利片在线| 18禁观看日本| 日本一区二区免费在线视频| 亚洲国产成人一精品久久久| 亚洲天堂av无毛| 久久精品久久久久久久性| 一区二区三区精品91| 久热爱精品视频在线9| 国产福利在线免费观看视频| 美女国产高潮福利片在线看| 国产成人精品久久二区二区91| 久久 成人 亚洲| 国产91精品成人一区二区三区 | 丝袜在线中文字幕| 男人操女人黄网站| 曰老女人黄片| 久久久久精品人妻al黑| 一区二区三区四区激情视频| 五月开心婷婷网| 多毛熟女@视频| 欧美+亚洲+日韩+国产| 久久久国产精品麻豆| 啦啦啦在线免费观看视频4| 91精品三级在线观看| 午夜久久久在线观看| 久久久国产欧美日韩av| 欧美黄色淫秽网站| 一级a爱视频在线免费观看| 母亲3免费完整高清在线观看| 美国免费a级毛片| 久久久国产精品麻豆| 91精品伊人久久大香线蕉| 一二三四社区在线视频社区8| 脱女人内裤的视频| 看十八女毛片水多多多| 一级毛片我不卡| 国产福利在线免费观看视频| 黄色视频在线播放观看不卡| 交换朋友夫妻互换小说| 国产精品免费视频内射| 国产精品国产三级专区第一集| 韩国高清视频一区二区三区| 免费观看a级毛片全部| 中文字幕制服av| 日韩伦理黄色片| 纯流量卡能插随身wifi吗| 国产成人av教育| 老熟女久久久| 久久这里只有精品19| 国产日韩欧美亚洲二区| 欧美日韩视频精品一区| 狠狠精品人妻久久久久久综合| 日本一区二区免费在线视频| 伊人久久大香线蕉亚洲五| 国产极品粉嫩免费观看在线| 好男人电影高清在线观看| 精品熟女少妇八av免费久了| 久久精品久久久久久久性| 久久性视频一级片| 婷婷成人精品国产| 精品熟女少妇八av免费久了| 伊人久久大香线蕉亚洲五| 精品久久久久久电影网| videos熟女内射| 久久久久视频综合| 男人添女人高潮全过程视频| 日韩av免费高清视频| 精品人妻在线不人妻| 久久久久久久久免费视频了| 亚洲欧美一区二区三区黑人| 久久久久久久大尺度免费视频| 国产男女内射视频| 国产免费现黄频在线看| 秋霞在线观看毛片| 久久久久久亚洲精品国产蜜桃av| 欧美人与善性xxx| 亚洲精品日本国产第一区| 精品国产乱码久久久久久小说| 亚洲精品久久成人aⅴ小说| 热re99久久国产66热| 男女边摸边吃奶| 精品亚洲成a人片在线观看| 青青草视频在线视频观看| 最近最新中文字幕大全免费视频 | 18禁黄网站禁片午夜丰满| 人妻 亚洲 视频| 9191精品国产免费久久| 青草久久国产| 男人添女人高潮全过程视频| 美女福利国产在线| 汤姆久久久久久久影院中文字幕| tube8黄色片| 啦啦啦在线免费观看视频4| 一级,二级,三级黄色视频| 男女午夜视频在线观看| 日本av手机在线免费观看| 交换朋友夫妻互换小说| 亚洲av在线观看美女高潮| 久久综合国产亚洲精品| 国产成人精品久久二区二区91| 欧美+亚洲+日韩+国产| 国产日韩一区二区三区精品不卡| 国产精品av久久久久免费| a 毛片基地| 国产麻豆69| 丝瓜视频免费看黄片| 首页视频小说图片口味搜索 | 国产国语露脸激情在线看| 日日夜夜操网爽|