2020
DOI: 10.1007/s12652-020-02082-z
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Secure storage allocation scheme using fuzzy based heuristic algorithm for cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…ere are 9 cases of medium-large scale experiments in the paper. We set the small scale experiment as Case 1. e numerical results of medium-large scale numerical examples that are solved by CPLEX, GUROBI, Benders decomposition, ADMM, ACA, and hybrid algorithm are recorded in Tables3 and 4. e total physical nodes of the vehicle assignment and distribution network in the nine medium-large scale cases are 20,25,30,35,35,40,45,50, and 60, respectively. erefore, the total variable size of the vehicle assignment and distribution network in the nine medium-large scale cases are 1175, 2075, 3225, 4600, 6450, 9200, 12500, 16300, and 30825, respectively.…”
Section: Medium-large Scale Experiments: Further Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…ere are 9 cases of medium-large scale experiments in the paper. We set the small scale experiment as Case 1. e numerical results of medium-large scale numerical examples that are solved by CPLEX, GUROBI, Benders decomposition, ADMM, ACA, and hybrid algorithm are recorded in Tables3 and 4. e total physical nodes of the vehicle assignment and distribution network in the nine medium-large scale cases are 20,25,30,35,35,40,45,50, and 60, respectively. erefore, the total variable size of the vehicle assignment and distribution network in the nine medium-large scale cases are 1175, 2075, 3225, 4600, 6450, 9200, 12500, 16300, and 30825, respectively.…”
Section: Medium-large Scale Experiments: Further Comparisonmentioning
confidence: 99%
“…e evolutionary algorithm solves a MILP in accordance with evolutionary rules [19][20][21][22][23][24][25]. However, both decomposition and evolutionary algorithm have their unique shortcomings in the calculation.…”
Section: Introductionmentioning
confidence: 99%
“…The SFLC (Security aware Fuzzy Logic Connection) methodology is used to safeguard the network. The SFLC model is validated in the MANET, which uses a random deployment in the 100 * 100 m region [21]. An effective safe route analysis algorithm for real-time is provided.…”
Section: Literature Surveymentioning
confidence: 99%
“…The miss detection and false alarm probability is mitigated with the best selection of SU, and the coalition game theory approach works on with the [17] [11]. The channel and increased noise rate is also a parameter for the implementation strategy with increased energy conservation [34]. Figure 2 showcase the eavesdropping scenario with the transmission matrix for data transmission in a different scenario with the Eavesdropping scenario, where the source and destination communication happens with PU and SUs.…”
Section: Figurementioning
confidence: 99%