In this paper, we are going to discuss about big data processing for Internet of Things (IOT) based data. Our system extracts information within specified time frame. Data tracker or interface tracks information direc...
详细信息
ISBN:
(纸本)9789811016783;9789811016776
In this paper, we are going to discuss about big data processing for Internet of Things (IOT) based data. Our system extracts information within specified time frame. Data tracker or interface tracks information directly from big data sources. Data tracker transfers data clusters to data controller. Data controller processes each data cluster and makes them smaller after removing possible redundancies. Big data processing is a challenge to maintain data privacy-related protections. Data controller processes big data clusters and sends them through secure and/or hidden channels maintaining data privacy.
The present study's primary objective is to try to determine whether gender, combined with the educational background of the Internet users, have an effect on the way online privacy is perceived and practiced with...
详细信息
New technologies are changing the way we learn and teach. Emerging technologies such as social semantic web, cloud computing, and the growing popularity of mobile devices, embedded devices and adaptive context-aware t...
详细信息
ISBN:
(纸本)9781450348935
New technologies are changing the way we learn and teach. Emerging technologies such as social semantic web, cloud computing, and the growing popularity of mobile devices, embedded devices and adaptive context-aware technologies are leading to a paradigm shift in the way educational services are provided. Through technologies and approaches such as ubiquitous and adaptive learning, learning becomes personalized, flexible, and suitable to meet diverse and rapidly changing technologies, environments and learner needs, while opening unprecedented possibilities for education. The aim of the "intelligent Interfaces for Ubiquitous and Smart Learning" workshop has been to bring together researchers from industry and academia to address the challenges of the intelligent user interfaces and smart learning fields, discuss new ideas and present their research to the scientific community in order to enhance the methodologies and techniques for intelligent learning environments for the 21st century. The workshop program, program committee and further details are available on the website (http://***/). Copyright is held by the owner/author(s).
In recent years, the scale of RDF datasets is increasing rapidly, the query research on RDF datasets in the transitional centralized environment is unable to meet the increasing demand of data query field, especially ...
详细信息
In recent years, the scale of RDF datasets is increasing rapidly, the query research on RDF datasets in the transitional centralized environment is unable to meet the increasing demand of data query field, especially the top-k query. Based on the Spark distributedcomputing system and the HBase distributedstorage system, a novel method is proposed for top-k query. A top-k query plan stA ( Spark Threshold Algorithm) is proposed to reduce the connection operation of RDF data. Furthermore, a better algorithm SSJA (Spark Simple Join Algorithm) is presented to reduce the sorting related operations for the intermediate data. A cache mechanism is also proposed to speed up the SSJA algorithm. The experimental results show that the SSJA algorithm performs better than the stA algorithm in term of the cost and applicability, and it can significantly improve the SSJA's performance by introducing the cache mechanism.
A pair of node is said to be connected if they lie in communication range of each other or more precisely in terms of graph theory, we can say that a pair of node is said to be connected if at least, there is a single...
详细信息
ISBN:
(纸本)9789811016783;9789811016776
A pair of node is said to be connected if they lie in communication range of each other or more precisely in terms of graph theory, we can say that a pair of node is said to be connected if at least, there is a single path exist between them. This connectivity is affected by displacement, dying node, and communication blockage. Due to this reason, the network topology also changes dynamically. Disconnection results in nonfunctional WSN, although other nodes remain operational. Even owing to one node failure can results in end of whole network and we have to deploy the whole WSN again. We will show an improvement in connectivity and increase in lifetime of WSN and better quality signal by using master-slave architecture of distributive beamforming, if a node failure occurs. This approach requires no receiver feedback, other approaches such as one-bit feedback requires feedback from receiver for correctly superimposition of signals from two or more sources on receiver and therefore not an energy-efficient approach. The simulations of the proposed approach are performed and the acquired results highlight the benefits of this proposal.
The 14th international Symposium on distributedcomputing and Artificial Intelligence 2017 (DCAI 2017) provided a forum for presenting the application of innovative techniques to study and solve complex problems. The ...
ISBN:
(纸本)9783319624099
The 14th international Symposium on distributedcomputing and Artificial Intelligence 2017 (DCAI 2017) provided a forum for presenting the application of innovative techniques to study and solve complex problems. The exchange of ideas between scientists and technicians from both the academic and industrial sector is essential to advancing the development of systems that can meet the ever-growing demands of todays society. The book brings together past experience, current work and promising future trends in distributedcomputing, artificial intelligence and their applications to efficiently solve real-world problems. It combines contributions in well-established and evolving areas of research, including the content of the DCAI 17 Special Sessions, which focused on multi-disciplinary and transversal aspects, such as AI-driven methods for multimodal networks and processes modeling, and secure management towards smart buildings and smart grids. The symposium was jointly organized by the Polytechnic of Porto, the Osaka Institute of technology and the University of Salamanca. The latest event was held in Porto, Portugal, from 21st to 23rd June 2017.
Security is an important attribute of software, some of the current software security testing methods are often based on the accurate parameters or on the basis of functional structure, and cannot adapt to the complex...
详细信息
Nowadays Cloud computing is an emerging technology in the area of parallel and distributedcomputing. Task scheduling is one of the major issues in cloud computing, which plays an important role to improve the overall...
详细信息
ISBN:
(数字)9783319529417
ISBN:
(纸本)9783319529417;9783319529400
Nowadays Cloud computing is an emerging technology in the area of parallel and distributedcomputing. Task scheduling is one of the major issues in cloud computing, which plays an important role to improve the overall performance and services of the cloud. Task scheduling in cloud computing means assign best suitable resources for the task to be executed with the consideration of different parameters like execution time, user priority, cost, scalability, throughput, makespan, resource utilization and so on. In this paper, we address the challenge of task scheduling, and we consider one of most critical issues in scheduling process such as the task priorities. The goal of this paper is to propose an efficient Dynamic Priority-Queue (DPQ) algorithm based on Analytic Hierarchy Process (AHP) with Particle Swarm Optimization (PSO) algorithm. The proposed algorithm DPQ-PSO gives full consideration to the dynamic characteristics of the cloud computing environment. Further, the proposed algorithm has been validated through the CloudSim simulator. The experimental results validate that the proposed approach can effectively achieve good performance, user priority, load balancing, and improve the resource utilization.
Cognitive radio technology was first introduced by J. Mitola in 1999 to solve the problem of spectrum scarcity for wireless communication. A Cognitive Radio Ad hoc Network (CRAHN) is one of the cognitive radio-based a...
详细信息
ISBN:
(纸本)9789811024719;9789811024702
Cognitive radio technology was first introduced by J. Mitola in 1999 to solve the problem of spectrum scarcity for wireless communication. A Cognitive Radio Ad hoc Network (CRAHN) is one of the cognitive radio-based architectures in which wireless unlicensed nodes communicate in infrastructureless environment. Each node in CRAHN has the cognitive capability of sensing the surrounding radio environment for accessing the underutilized licensed spectrum in an opportunistic manner. But those unlicensed users (secondary users) should not make any interference to the communication of licensed users (primary users). In CRAHNs, each node operates as an end system and also as a router to forward packets for multi-hop communication. Due to the dynamic topology, time and space-varying spectrum availability and lack of centralized system, CRAHNs are vulnerable to various security attacks. Hello flood attack is a network layer attack in CRAHNs which can drain off the limited resources of CRAHN nodes by making excessive flooding of hello messages in the network. The proposed distributed cooperative algorithm mitigates the hello flood attack in CRAHNs.
In this paper we have discussed the approaches and complexity of big data analytics issues in the perspective of cloud computing. Big data and cloud computing are novel methods of distributing computational resources....
详细信息
ISBN:
(纸本)9783319512075;9783319512068
In this paper we have discussed the approaches and complexity of big data analytics issues in the perspective of cloud computing. Big data and cloud computing are novel methods of distributing computational resources. Currently big data and cloud computing has engrossed romantic behavior, which needs handling huge quantity of data quickly and securely. In the modern era the size of data is dramatically increasing due to cloud computingtechnology, which poses various challenges with the variety, security, and size of data. Cloud computing is the newest and the main kind of distributedcomputing systems and it wraps most of their features. It has already been broadly employed for its huge merits and its capability to handle large amount of data like workflows and big data applications. We have identified some gaps in technology, its challenges, limitation, and applications of big data and cloud computing from theoretical perspective. Moreover, this paper give recommendations to the researchers on future direction sand suggests different solutions to the challenges and limitations.
暂无评论