Research Article  Open Access
Ashutosh Sharma, Rajiv Kumar, "A Framework for RiskEnergy Aware ServiceLevel Agreement Provisioning (RESP) for Computing the Quickest Path", Journal of Computer Networks and Communications, vol. 2019, Article ID 4109453, 8 pages, 2019. https://doi.org/10.1155/2019/4109453
A Framework for RiskEnergy Aware ServiceLevel Agreement Provisioning (RESP) for Computing the Quickest Path
Abstract
This paper involved the computation of quickest paths with the help of servicelevel agreement (SLA) and energy constraints. The consideration of these constraints helps to propose a novel system model which computes the path to strengthen the continuity and criticality of the data transmission. The proposed riskenergy aware SLA provisioning (RESP) system model incorporates the research gaps of the existing risk assessment models in the literature without any increase in time complexity. The formulation of RESP shows the usefulness in the critical applications. The results show that the computation of riskprovisioned path gives the SLA satisfied paths and has a great impact of variations in the data traffic. The performance of the proposed algorithm has been indicated in terms of different performance parameters such as mean paths, average hop counts, and average energy efficiency. Simulation result implies that as data traffic increases, the number of the risk‐provisioned paths decreases whereas corresponding average hop counts and average energy efficiency increases.
1. Introduction
Due to the advancements in the technology of the computer networks, the applications associated with network have been provided by the service providers. These applications have a great impact on the life of human beings [1]. Therefore, a dependable network has to be requested for the network applications [2, 3]. In this regard, the concerns of environmentalists have been raised for the consumption of minimum energy for the design of dependable network [4]. Recently, the concept of dependability and energy has been considered together to address performability engineering [5]. The performance of a computer network relies mainly on the reliability, bandwidth, delay, and energy of the links which participate during data transmission. In this paper, an attempt has been performed to consider these parameters for computing the quickest path problem between two specific ends, i.e., source and destination.
With evolution of network services, quickest path problem (QPP) was proposed by the authors in [6] for the data transmission. A polynomial algorithm was proposed for the data transmission to find a solution for QPP in the generalized computer network. Later, this problem got attention from several researchers, and authors in [7] modified the problem by considering the idea of bicriterion for the range of different data. This problem extends for the singlepair QPP to allpair QPP as shown by the authors in [8]. Several extensions have been made for the QPP as the kQPP was introduced in [9–12]. For general network, it is very important to design a routing protocol for high availability so that critical services may get completed. To design a routing protocol for high availability, the parameters like energy, delay, and bandwidth are the major factors which play an important role [13, 14]. This QPP model was also extended toward the building evacuation problem by Hamacher and Tjandra [15] who propose a building evacuation problem. The QPP model was also extended toward the continuity of critical applications where it has been considered as an important figure of merit [16].
The network is associated with certain uncertainties which may lead to service failure, and to deal with these failures, reliability theory has been used in [17] and the reliable QPP model has been proposed. This model was later extended for different models in [12, 18–20]. Also, authors in [19] extend the reliable QPP by considering a threshold value of reliability for qualityofservice (QoS) routing. Later, the reliable model was extended for risk analysis by considering servicelevel agreement (SLA) [21–25].
Recently, QoS routing has been provided by considering the amount of energy used for the data transmission services by considering parameters like reliability, risk, and availability. [26, 27]. The reliable QPP problem further extended with energy constraint for the continuity of data transmission [28]. The discussion made in the above paragraphs leads us to work for continuity of critical data transmission services by provisioning SLA and energy. Recently, riskenergy problem in data transmission services has been discussed for minimization in the risk and energy consumption [29].
1.1. Research Significance
Here, in this paper, the authors have made an attempt to provision the riskfree path computation model with consideration of SLA and energy constraints. The main contributions of this paper are presented as follows: (i) A novel system model has been presented with the riskprovisioned mechanism which is the upgraded version of the existing REQPP risk assessment system model in the existing literature. (ii) The contribution can also be seen with the reference to SLA violation factor. The proposed system model gives the full SLA satisfaction as compared to the existing REQPP system model.
The rest of the paper is organized into sections. Section 2 presents the preliminaries to develop the strong base for the development of the system model. A novel system model is proposed in Section 3. To implement the proposed system model, an algorithm and its complexity analysis are presented in Section 4. Section 5 presents the results and discussion of the proposed problem. In Section 6, conclusion is presented.
2. Preliminaries
To explain the QPP model, let us consider the directed loopless graph , where and are the set of number of nodes and set of number of links , respectively. This network is associated with several resources such as link delays and link capacities . Assume a data σ transmission has been considered between two consecutive links with a connectionoriented approach having no buffer, i.e., seamless flow of data. To aid the seamless flow, capacity of a path has to be least and is defined as the data sent over a link per unit time.
Let us assume that amount of data is being transmitted between two specific ends, namely, source s and destination (t). While data are being transferred between these two specific ends, a path is formed with the sequence of the number of links without any loop to manage the resources efficiently.
To transmit unit’s data over a path, the delay experienced at a link can be expressed as . Let a path where and be the loopfree path. Therefore, the minimum transmission delay experienced to transmit unit’s data along a path iswhere first term in the right hand side is known as the delay of path calculated as and the numerator of the second term is known as the minimum capacity for the path .
Hence, the minimum transmission time is given as
The quickest path problem (QPP) is formulated as
In the beginning, when QPP was conceptualized [6–11, 14, 15, 30, 31], no special care was maintained for the energy consumption during data transmission. Nowadays, without the consideration of energy [26], any one cannot afford transmission [27, 28, 32]. In addition to this, the bar on usage of energy resources put a constraint for data transmission [33–39]. To consider the concept energy consumption, the topic of green computing was explored in [40, 41] for data transmission.
To deal with energy, various authors tried to incorporate them in QPP. Let us assume that each link is allied with energy rate to transmit unit data from node along with the link . In networks, each node is endowed with limited amount of power which is available at nodes for data transmission. The amount of energy required at the node is calculated as .
To compete with successful data transmission, the following has to be proved:
For data transmission without any disruption, find minimum link capacity used for transmission of σ unit data between nodes and having energy rate . The minimum capacity of link is given as follows:
In the given network, each link follows the following equation for the path capacity path :
The residual energy of path is
Hence, constrained QPP has been formulated by using above equations as
The abovediscussed model has been proposed by several authors [28, 42, 43] to incorporate energy in QPP.
The availability of sufficient amount of energy is not only the factor for the continuity in data transmission. The link reliabilities are also helpful for the continuity of data transmission [44, 45].
Recently, the authors in [42] tried to adopt the above constraints in their proposed model, but they have incorporated these parameters for the assessment of risk unless provisioning for the risk. In the proposed framework, the authors have made an attempt to deal with the provisioning of risk.
3. Proposed System Model
3.1. Assumptions
The proposed system model for the RESP required some assumptions for better understanding and they are given as follows:(1)There are no parallel and duplicate links in the network graph [46](2)Capacities of links are generated randomly with the uniform distribution and are statistically independent [47](3)Bifurcation of data is not allowed, and also, flow of conservation is followed by data transmission [47]
Let us take the performance reliability which constitutes the link reliability and performance factor of a link . The reliability of a link is related to the failure in the connectivity (i.e., hard failure), and the performance factor of a link is related to the performance parameters such as delay and capacity (i.e., soft failure) [42].
Let us assume that link reliability is ideal, i.e., and performance of data transmission depends mainly on the performance factor. The requested servicelevel agreement (SLA) is drawn for the critical data transmission. The requested SLA is defined as where is the requested SLA availability and is the penalty period. By using these SLA parameters, the allowed time has been computed as [21, 42]
The link performance factor constitutes the servicelevel agreements (SLAs) and link delays; therefore, along a path, the performance factor is calculated as
Equation (10) is known as the performance reliability due to delay , and by expanding equation (10), performance reliability is calculated as
In equation (11), if minimum transmission delay is very large as compared to , then the value of performance delay is equal to zero and if minimum transmission delay is small as compared to , then the value of performance delay is equal to 1. The above study shows that the minimum transmission delay has a great impact on the performance of the data transmission.
Here, in this paper, the authors have tried to incorporate the research gaps of the existing risk assessment REQPP model proposed in [42]. In the REQPP model, the authors performed only the assessment of risk and not the provisioning. In the present paper, following this research gap, the authors have tried to incorporate risk provisioning by satisfying the SLAs and proposed the novel system model for risk provisioning.
A path is formed either by combination of several links or a single link. Therefore, it is more realistic to satisfy the SLA piecewise or between two consecutive links other than satisfying the SLA after completion of data transmission service among the path. The SLAs are considered for missioncritical applications; therefore, each node is endowed with the requested amount of reliability . To deal with SLA constraint, the following expression has to follow:where is the reliability at nodes and has to be maintained equal or more to this value.
The minimum SLA aware link capacity is shown as follows:
To incorporate both parameters (energy and SLA) for sorting, the minimum link capacity has been given as follows:where is the capacity lying between the minimum energy cooperative capacity and link capacity. The capacity lies between the minimum SLA cooperative capacity and link capacity Equation (14) provides the label of minimum link capacity to support the continuity and criticality in data transmission if and . A path is feasible if . The above equations sort the minimum capacity which incorporates both the critical and continuous data transmission by considering the AND rule.
The remaining value of performance reliability is termed as residualrequested performance reliability. along the path gives feasibility of path , i.e., as
The SLAenergy awareness allows us to combine the characteristics of the both models (energy and SLA) and formulate the constraint model of the riskenergy aware SLA provisioning (RESP) given as follows:Here, problem has been used to transmit the data with continuity and criticality using shortest path problem (SPP). The energy and SLA have been used as a constraint for the SPP. The working of SPP lies on Dijkstra’s algorithm with the link delay as a cost value in the different subnetworks [48]:
By following this, Algorithm 1 has been proposed in Section 4 to perform the computations.

4. Algorithm
4.1. Algorithm for RiskEnergy Aware SLA Provisioned (RESP) Route
4.2. Complexity Analysis
Theorem 1. The time complexity of the proposed RESP algorithm is .
Proof. The complexity of RESP is explained using the time complexity of [49] which has been run for times.
5. Results and Discussion
5.1. Experimental Setup
The experiment for the performance evaluation of the proposed RESP algorithm has been performed over the personal computer having the configuration of Intel(R) Core^{TM}i5–7400, CPU@ 3.00 GHz, 8 GB RAM, and Windows 10 operating system. All simulations have been performed in MATLAB R2010a environment platform. The simulations show that the proposed RESP algorithm is solvable in polynomial time using Dijkstra’s algorithm which used binary heap data structure. The illustrations of results have been explained with the help of standard network topologies as shown in Figure 1(a) and 1(b).
(a)
(b)
The associated values of link parameters like delay and capacities are taken from the uniform distribution range [1, 1000]. As discussed in the previous sections, the amount of fixed powers at each node and amount of energy rate at each link is given by and , respectively. The requested reliability at nodes is generated uniformly within the range [0, 1]. For the risk provisioning, requested SLA is defined by considering the availability and the penalty time . The value of requested availability is taken as , and the penalty time is considered as (secs). To visualize the performance of the proposed algorithm, three different amounts of data are taken. This variation in the amount of data to be transmitted shows the trend in the various SLAs and energyprovisioned shortest paths.
5.2. Performance Analysis
The quantitative performance analysis of the proposed algorithm has been shown in Tables 1 and 2. The different simulations have been performed for different data sizes. The set of different number of paths has been commutated from the different subgraphs which are equal to distinct capacities present in the network. Further, from the set of paths, the shortest path has been computed. The performance of proposed RESP algorithm has been seen in other parameters also such as average hop counts, average capacity, and energy efficiency of riskprovisioned shortest path. The results for both standard topologies have been taken for the discussion to show the effectiveness of the RESP.


5.2.1. 24Node US Network
The results for the standard topology as shown in Figure 1(a) show the mean number of shortest paths computed for the ten runs. Table 1 shows the results for riskprovisioned paths in second, third, and fourth columns for different data traffics , and . The mean value of riskprovisioned paths shows that as data traffic is varied, the number of paths got reduced. This trend has been shown because for the large amount of data, the links in the network topology are not capable to provide the energy and SLA provisioning. Also, hop counts in fifth, sixth, and seventh columns of Table 1 shows very little variation with respect to different data traffics.
The trend in the adopted capacity of path is increased as the data traffic increases as shown in the eighth, ninth, and tenth columns of Table 1, respectively. This trend has been found because for the large amount of data, the capacity of link should be maintained maximum.
5.2.2. 14Node NSF Network
The experiment conducted for the Figure 1(a) has been repeated for the Figure 1(b) also to see the performance of the proposed RESP algorithm. The results for the 14node NSF topology are shown in Table 2. The results for this topology depict that the same trend of the performance has been followed.
The variation of data traffic has high impact on the energy efficiency () of path in the given topology. The results for the energy efficiency have been shown in the eleventh to thirteenth columns. The value of energy efficiency increased as data traffic increases. This is because the energy constraints have to be qualified to be part of a subnetworks, so as data traffic increases, energy efficiency also increases.
The illustrative results show that the proposed RESP algorithm is outperforming over the REQPP algorithm [42] with reference to risk provisioning, resource wastage, and computation time.
6. Conclusion and Future Work
This paper has proposed the concept of riskenergy aware SLA provisioning (RESP) for the planning of critical routing where continuity of data transmission is given utmost priority. Continuity of transmission in this paper has been quantified in terms of performance of the link in a data transmission path considered as energy required for the link connectivity. The link delay has also been considered for the risk provisioning. The result shows an improvement in energy efficiency and capacity of path. The proposed RESP algorithm is able to compute the paths without any risk in terms of SLA. Present work is considering only energy of the link in path computation. In future work, the proposed algorithm can be extended with incorporating the security paradigms which enable the computation of paths in presence of any malicious activities.
Data Availability
No data have been used separately for the presentation of the work. Each and every detail of the results has been included already in the Results section.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
The authors are thankful for the financial grant for this paper from the research project titled “Reliability Modeling and Optimized Planning of RiskBased Resilient Networks” sponsored by IndoPolish Program under grant DST/INT/POL/P04/2014.
References
 C. R. Kalmanek, S. Misra, and Y. R. Yang, Guide to Reliable Internet Services and Applications, Springer Science & Business Media, Berlin, Germany, 2010.
 L. Norros, I. Norros, M. Liinasuo, and K. Seppänen, “Impact of human operators on communication network dependability,” Cognition, Technology & Work, vol. 15, no. 4, pp. 363–372, 2013. View at: Publisher Site  Google Scholar
 A. Arroyo and T. Grisham, Leading Extreme Projects: Strategy, Risk and Resilience in Practice, Taylor & Francis, Abingdon, UK, 2017.
 P. E. Heegaard, B. E. Helvik, and V. B. Mendiratta, “Achieving dependability in softwaredefined networking—a perspective,” in Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling (RNDM), pp. 63–70, Munich, Germany, October 2015. View at: Google Scholar
 K. B. Misra, Handbook of Performability Engineering, Springer Science & Business Media, Berlin, Germany, 2008.
 Y. L. Chen and Y. H. Chin, “The quickest path problem,” Computers & Operations Research, vol. 17, no. 2, pp. 153–161, 1990. View at: Publisher Site  Google Scholar
 E. D. Q. V. Martins and J. L. E. Dos Santos, “An algorithm for the quickest path problem,” Operations Research Letters, vol. 20, no. 4, pp. 195–198, 1997. View at: Publisher Site  Google Scholar
 J. B. Rosen, S.Z. Sun, and G.L. Xue, “Algorithms for the quickest path problem and the enumeration of quickest paths,” Computers & Operations Research, vol. 18, no. 6, pp. 579–584, 1991. View at: Publisher Site  Google Scholar
 M. M. B. Pascoal, M. E. V. Captivo, and J. C. N. Clı́maco, “An algorithm for ranking quickest simple paths,” Computers & Operations Research, vol. 32, no. 3, pp. 509–520, 2005. View at: Publisher Site  Google Scholar
 M. M. B. Pascoal, M. E. V. Captivo, and J. C. N. Clímaco, “A comprehensive survey on the quickest path problem,” Annals of Operations Research, vol. 147, no. 1, pp. 5–21, 2006. View at: Publisher Site  Google Scholar
 M. Pascoal, M. E. Captivo, and J. C. Clímaco, “Computational experiments with a lazy version of a K quickest simple path ranking algorithm,” TOP, vol. 15, no. 2, pp. 372–382, 2007. View at: Publisher Site  Google Scholar
 S. Ruzika and M. Thiemann, “Minmax quickest path problems,” Networks, vol. 60, no. 4, pp. 253–258, 2012. View at: Publisher Site  Google Scholar
 J. Rak, Resilient Routing in Communication Networks, Springer, Berlin, Germany, 2015.
 D. Eppstein, “Finding the k shortest paths,” SIAM Journal on Computing, vol. 28, no. 2, pp. 652–673, 1998. View at: Publisher Site  Google Scholar
 H. W. Hamacher and S. A. Tjandra, “Mathematical modelling of evacuation problems: a state of art,” in Pedestrian and Evacuation Dynamics, Springer, Berlin, Germany, 2001. View at: Google Scholar
 P. H. Pathak and R. Dutta, Designing for Network and Service Continuity in Wireless Mesh Networks, Springer Science & Business Media, Berlin, Germany, 2012.
 G. Xue, “Endtoend data paths: quickest or most reliable?” IEEE Communications Letters, vol. 2, no. 6, pp. 156–158, 1998. View at: Publisher Site  Google Scholar
 S. Tragoudas, “The most reliable datapath transmission,” IEEE Transactions on Reliability, vol. 50, no. 3, pp. 281–285, 2001. View at: Publisher Site  Google Scholar
 H. I. Calvete, L. delPozo, and J. A. Iranzo, “Algorithms for the quickest path problem and the reliable quickest path problem,” Computational Management Science, vol. 9, no. 2, pp. 255–272, 2012. View at: Publisher Site  Google Scholar
 Y.K. Lin, “Extend the quickest path problem to the system reliability evaluation for a stochasticflow network,” Computers & Operations Research, vol. 30, no. 4, pp. 567–575, 2003. View at: Publisher Site  Google Scholar
 M. Xia, M. Tornatore, C. U. Martel, and B. Mukherjee, “Riskaware provisioning for optical WDM mesh networks,” IEEE/ACM Transactions on Networking, vol. 19, no. 3, pp. 921–931, 2011. View at: Publisher Site  Google Scholar
 K. Vajanapoom and D. Tipper, “Risk based incremental survivable network design,” in Proceedings of the 6th International Workshop on Design and Reliable Communication Networks, pp. 1–9, La Rochelle, France, October 2007. View at: Google Scholar
 K. Vajanapoom, RiskBased Survivable Network Design, University of Pittsburgh, Pittsburgh, PA, USA, 2008.
 K. Vajanapoom, D. Tipper, and S. Akavipat, “Risk based resilient network design,” Telecommunication Systems, vol. 52, no. 2, pp. 799–811, 2013. View at: Publisher Site  Google Scholar
 A. J. Gonzalez and B. E. Helvik, “SLA success probability assessment in networks with correlated failures,” Computer Communications, vol. 36, no. 6, pp. 708–717, 2013. View at: Publisher Site  Google Scholar
 P. Chołda and P. Jaglarz, “Optimization/simulationbased risk mitigation in resilient green communication networks,” Journal of Network and Computer Applications, vol. 59, pp. 134–157, 2016. View at: Publisher Site  Google Scholar
 P. Chołda and P. Jaglarz, “Energyefficiency versus resilience: risk awareness view on dimensioning of optical networks with a sleep mode,” Photonic Network Communications, vol. 30, no. 1, pp. 43–58, 2015. View at: Publisher Site  Google Scholar
 H. I. Calvete, L. delPozo, and J. A. Iranzo, “The energyconstrained quickest path problem,” Optimization Letters, vol. 11, no. 7, pp. 1319–1339, 2017. View at: Publisher Site  Google Scholar
 Y. Wu, M. Tornatore, C. U. Martel, and B. Mukherjee, “Green and lowrisk content placement in optical content delivery networks,” in Proceedings of the IEEE International Conference on Communications (ICC), pp. 1–6, Kuala Lumpur, Malaysia, May 2016. View at: Google Scholar
 S. Ruzika and M. Thiemann, “Reliable and restricted quickest path problems,” in Network Optimization, pp. 309–314, Springer, Berlin, Germany, 2011. View at: Google Scholar
 T. Gomes and J. Craveirinha, “Efficient calculation of the most reliable pair of link disjoint paths in telecommunication networks,” European Journal of Operational Research, vol. 181, no. 3, pp. 1055–1064, 2007. View at: Publisher Site  Google Scholar
 J. Chabarek, J. Sommers, P. Barford, C. Estan, D. Tsiang, and S. Wright, “Power awareness in network design and routing,” in Proceedings of the IEEE INFOCOMThe 27th Conference on Computer Communications, pp. 457–465, Phoenix, AZ, USA, April 2008. View at: Google Scholar
 N. C. Nguyen, P. Wang, D. Niyato, Y. Wen, and Z. Han, “Resource management in cloud networking using economic analysis and pricing models: a survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 954–1001, 2017. View at: Publisher Site  Google Scholar
 L. Zhang, K. Li, C. Li, and K. Li, “Biobjective workflow scheduling of the energy consumption and reliability in heterogeneous computing systems,” Information Sciences, vol. 379, pp. 241–256, 2017. View at: Publisher Site  Google Scholar
 Y. Liu, H. S. Seah, and G. Shou, “Constrained energyefficient routing in timeaware road networks,” GeoInformatica, vol. 21, no. 1, pp. 89–117, 2017. View at: Publisher Site  Google Scholar
 J. Rak, M. Pickavet, K. S. Trivedi et al., “Future research directions in design of reliable communication systems,” Telecommunication Systems, vol. 60, no. 4, pp. 423–450, 2015. View at: Publisher Site  Google Scholar
 Y. Cui, S. Xiao, X. Wang et al., “Performanceaware energy optimization on mobile devices in cellular network,” IEEE Transactions on Mobile Computing, vol. 16, no. 4, pp. 1073–1089, 2017. View at: Publisher Site  Google Scholar
 K. Wang, J. Yu, Y. Yu et al., “A survey on energy internet: architecture, approach, and emerging technologies,” IEEE Systems Journal, vol. 12, no. 3, pp. 2403–2416, 2017. View at: Publisher Site  Google Scholar
 H. Bast, D. Delling, A. Goldberg et al., “Route planning in transportation networks,” in Algorithm Engineering, pp. 19–80, Springer, Berlin, Germany, 2016. View at: Google Scholar
 F. Wu, “Integration of software reliability engineering, risk management and safety assurance case,” in Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 169–192, Pasadena, CA, USA, November 2013. View at: Google Scholar
 V. Balasubramanian, M. Aloqaily, F. Zaman, and Y. Jararweh, “Exploring computing at the edge: a multiinterface system Architecture enabled mobile device cloud,” in Proceedings of the IEEE 7th International Conference on Cloud Networking (CloudNet), pp. 1–4, Tokyo, Japan, October 2018. View at: Google Scholar
 A. Sharma and R. Kumar, “Riskenergy aware service level agreement assessment for computing quickest path in computer networks,” International Journal of Reliability and Safety, vol. 13, no. 12, p. 96, 2019. View at: Publisher Site  Google Scholar
 H. I. Calvete, L. delPozo, and J. A. Iranzo, “Dealing with residual energy when transmitting data in energyconstrained capacitated networks,” European Journal of Operational Research, vol. 269, no. 2, pp. 602–620, 2018. View at: Publisher Site  Google Scholar
 A. Chen, H. Yang, H. K. Lo, and W. H. Tang, “A capacity related reliability for transportation networks,” Journal of Advanced Transportation, vol. 33, no. 2, pp. 183–200, 1999. View at: Publisher Site  Google Scholar
 V. Kounev, M. Lévesque, D. Tipper, and T. Gomes, “Reliable communication networks for smart grid transmission systems,” Journal of Network and Systems Management, vol. 24, no. 3, pp. 629–652, 2016. View at: Publisher Site  Google Scholar
 R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications, MIT Sloan School of Management, Cambridge, MA, USA, 1993.
 W.C. Yeh and M. El Khadiri, “A new universal generating function method for solving the single $(d,\tau) $quickpath problem in multistate flow networks,” IEEE Transactions on Systems, Man, and CyberneticsPart A: Systems and Humans, vol. 42, no. 6, pp. 1476–1484, 2012. View at: Publisher Site  Google Scholar
 A. Sharma and R. Kumar, “Servicelevel agreement—energy cooperative quickest ambulance routing for critical healthcare services,” Arabian Journal for Science and Engineering, vol. 44, no. 4, pp. 3831–3848, 2019. View at: Publisher Site  Google Scholar
 M. L. Fredman and R. E. Tarjan, “Fibonacci heaps and their uses in improved network optimization algorithms,” Journal of the ACM, vol. 34, no. 3, pp. 596–615, 1987. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2019 Ashutosh Sharma and Rajiv Kumar. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.