2018
DOI: 10.1007/s12046-018-0939-2
|View full text |Cite
|
Sign up to set email alerts
|

Second Order Mutual Information based Grey Wolf Optimization for effective storage and de-duplication

Abstract: This paper intends to perform de-duplication for enhancing the storage optimization by utilizing the similarity in mutual information. Hence, this paper contributes by proposing a hybrid fingerprint extracting using SH and HC algorithms. Secondly, the data is clustered using the latest technique called as SOMI-GO to extract the metadata. The extracted metadata is stored in metadata server which provides better storage optimization and de-duplication. SOMI-GO is adopted as it provides maximum second-order mutua… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 46 publications
0
4
0
Order By: Relevance
“…Here, the proposed BU‐SLnO was used to optimize the extracted features and the hidden neurons of CNN, and the spread value of PNN. The proposed BU‐SLnO‐AP‐CNN was compared with several optimization algorithms like PSO‐AP‐CNN (Wang et al, 2018), GWO‐AP‐CNN (Keshtegar & Nehdi, 2020; Malhotra et al, 2018b), FF‐AP‐CNN (Murlidhar et al, 2020), and SLnO‐AP‐CNN (Masadeh et al, 2019), and machine learning algorithms such as CNN (Zarie et al, 2020), PNN (Mahmood et al, 2020), Neural Network (NN) (Beck et al, 2019), support vector machine (SVM) (Borkar et al, 2019), and decision tree (DT) (Shahgoli et al, 2020) concerning Type I or positive measures like, ‘accuracy, sensitivity, specificity, precision, net present value (NPV), F1 score, and Matthews correlation coefficient (MCC)’, as well as Type II or negative measures like, ‘false positive rate (FPR), false negative rate (FNR), and false discovery rate (FDR)’.…”
Section: Resultsmentioning
confidence: 99%
“…Here, the proposed BU‐SLnO was used to optimize the extracted features and the hidden neurons of CNN, and the spread value of PNN. The proposed BU‐SLnO‐AP‐CNN was compared with several optimization algorithms like PSO‐AP‐CNN (Wang et al, 2018), GWO‐AP‐CNN (Keshtegar & Nehdi, 2020; Malhotra et al, 2018b), FF‐AP‐CNN (Murlidhar et al, 2020), and SLnO‐AP‐CNN (Masadeh et al, 2019), and machine learning algorithms such as CNN (Zarie et al, 2020), PNN (Mahmood et al, 2020), Neural Network (NN) (Beck et al, 2019), support vector machine (SVM) (Borkar et al, 2019), and decision tree (DT) (Shahgoli et al, 2020) concerning Type I or positive measures like, ‘accuracy, sensitivity, specificity, precision, net present value (NPV), F1 score, and Matthews correlation coefficient (MCC)’, as well as Type II or negative measures like, ‘false positive rate (FPR), false negative rate (FNR), and false discovery rate (FDR)’.…”
Section: Resultsmentioning
confidence: 99%
“…So scheduling techniques are developed such that the constraints specified by the users should be satisfied. Like a job should be finished in a given amount of time period within specified budget constraints [68] [69]. Optimization criteria can be a combination of various constraints, used when making scheduling decisions and it represents the goal of scheduling process.…”
Section: Optimization In Scheduling Techniquesmentioning
confidence: 99%
“…Alternatively, the network energy, throughput and security of the system should be maximal for the efficient transmission of data. The objective function of the presented CH technique is defined as in Equation ( 14), in which η lies between η 0 < < 1, o m and o n are computed as shown in Equation (15) and Equation (16), respectively. The modules on delay, energy, distance, security, throughput and overhead are explained by γ 1 , γ 2 , γ 3 , γ 4 , γ 5 , and γ 6 .…”
Section: Objective Model For Optimal Cluster Head Selectionmentioning
confidence: 99%
“…[12][13][14] The conventional techniques for modeling networks using layered design may be inefficient and inappropriate. 15,16 Cross-layer design is a promising scenario that helps in optimizing and improving the performance of the wireless system by deploying the interaction among varied protocol layers. 17,18 More benefits can be expected while executing a cross-layer design along with an optimization framework.…”
Section: Introductionmentioning
confidence: 99%