Election plays a foremost part in distributedsystems. The reason behind the Election process in distributed system is to optimize in terms of load and improving the efficiency of the system there by improving the pro...
详细信息
ISBN:
(纸本)9781538678084
Election plays a foremost part in distributedsystems. The reason behind the Election process in distributed system is to optimize in terms of load and improving the efficiency of the system there by improving the process of group communication. Choosing a node to be a leader in a distributed environment is intricate. Over years, there are so much of exploitations in the existing techniques such as ring and bully but these algorithms could not able to provide an appropriate solution in terms of message complexity. In this paper, we proposed a novel method known as "3-Phase Leader Election Algorithm" that consists of three phases. Firstly, it identifies and filters the nodes for election. Secondly, the filtered nodes are been validated for determination of prime node via which the group communication takes place. Finally, the Prime node will be identified and accepted in the acceptance phase. Our approach is based on understanding the complexity involved behind a message and improving the efficiency of the system via following performance metrics such as Time and Communication complexity.
In today39;s world with the ever increasing growth in the population of India, the hygiene of our country is endangered. Our Prime Minister Sir Narendra Modi has introduced "Swath Bharat Abhiyan" Scheme to...
详细信息
ISBN:
(纸本)9781538678084
In today's world with the ever increasing growth in the population of India, the hygiene of our country is endangered. Our Prime Minister Sir Narendra Modi has introduced "Swath Bharat Abhiyan" Scheme to improve cleanliness in the country. Our project will definitely be a help to improve hygiene condition in India. It will create awareness among people in terms of "Toilet Management". The proposed system "Smart Toilet" is based on IoT, smell sensor, IR sensor, sonic sensor, RFID sensor. The smart toilet will take care of opening and closing of the toilet seat, the IR sensor tracks the dirt present on the toilet seat and raise an alarm, The cleanliness of the toilet will be improved by monitoring the sweeper's activity to maintain the hygiene of the toilet, it also will deal with water conservation.
Network coding is considered to be a reliable strategy for boosting the performance of wireless networks by injecting multiple packets into one transmission. It will provide performance improvement in turnout and ener...
详细信息
A new approach to the design of distributed automation systems for controlling the technological processes of natural gas compression is discussed. The concept of embedding unified computing and communication devices ...
详细信息
The Internet of Things (IoT) takes internet advancement to the next level, making devices connected to each other with internet communication network technology and making new services part of the development of legac...
详细信息
The Internet of Things (IoT) has been one of the key disruptive technologies over the last few years, with its promise of optimizing and automating current manual tasks and evolving existing services. From the securit...
详细信息
ISBN:
(纸本)9781728123653
The Internet of Things (IoT) has been one of the key disruptive technologies over the last few years, with its promise of optimizing and automating current manual tasks and evolving existing services. From the security perspective, the increasing adoption of IoT devices in all aspects of our society has exposed businesses and consumers to a number of threats, such as distributed Denial of Service (DDoS) attacks. To tackle this IoT security problem, we proposed ANTIBIOTIC 1.0 In However, this solution has some limitations that make it difficult (when not impossible) to be implemented in a legal and controlled manner. Along the way, Fog computing was born: a novel paradigm that aims at bridging the gap between IoT and Cloud computing, providing a number of benefits, including security. As a result, in this paper, we present ANTIBIOTIC 2.0, an anti-malware that relies upon Fog computing to secure IoT devices and to overcome the main issues of its predecessor (ANTIBIOTIC 1.0). First, we present ANTIBIOTIC 1.0 and its main problem. Then, after introducing Fog computing, we present ANTIBIOTIC 2.0, showing how it overcomes the main issues of its predecessor by including Fog computing in its design.
The proceedings contain 20 papers. The topics discussed include: cloud computing: history and overview;smart grid optimization by means of MapReduce;storage and file structure of a bioinformatics cloud architecture;to...
ISBN:
(纸本)9781728131016
The proceedings contain 20 papers. The topics discussed include: cloud computing: history and overview;smart grid optimization by means of MapReduce;storage and file structure of a bioinformatics cloud architecture;towards reliable IoT: fog-based AI sensor validation;bitcoin systematic trading algorithms in the cloud: challenges and opportunities;KubeSphere: an approach to multi-tenant fair scheduling for kubernetes clusters;on the challenges of executing bioinformatic tools using a distributed cloud platform;and DOCMA: a decentralized orchestrator for containerized microservice applications.
Security is a major concern in wireless sensor network designing which suffers from many stringent hardware and software restrictions. It has attracted a large amount of attention from the research circle as security ...
详细信息
ISBN:
(纸本)9781538679630
Security is a major concern in wireless sensor network designing which suffers from many stringent hardware and software restrictions. It has attracted a large amount of attention from the research circle as security requirements became more and more indispensable in the Internet of Thing (IoT) evolution. An effective security mechanism is essential for deploying sensor networks. This paper proposes a security technique based on MAC behaviors for lightweight digital watermarking which aims to attain confidentiality and authentication for data. Embedded watermark values are constructed by information from MAC layer parameters which are simple to implement and resistant to attack. The numerical results and security analysis show proficiency of the proposed watermark scheme and evaluate the tradeoff between watermark detection probability and energy consumption of the network model.
Energy minimization is becoming a major issue in wireless sensor networks (WSN) and is mostly event based. An energy saving approach or tool is important for extending the life of a sensor node. This study proposes a ...
详细信息
ISBN:
(纸本)9781538678084
Energy minimization is becoming a major issue in wireless sensor networks (WSN) and is mostly event based. An energy saving approach or tool is important for extending the life of a sensor node. This study proposes a cross-approach between access to MAC and the network layer for energy efficiency. Use the LEACH algorithm to select a channel. Broadcasting is carried out only at the cluster head (CH),which saves energy. The simulation results show that the inter level approach provides significant energy savings compared to traditional applications.
As the Power System Network/Infrastructure is continuously growing, so does its complexity. As a result, it is more prone to various adverse events which leads to disruption of power flow or continuity. In this paper ...
详细信息
ISBN:
(纸本)9781665430869
As the Power System Network/Infrastructure is continuously growing, so does its complexity. As a result, it is more prone to various adverse events which leads to disruption of power flow or continuity. In this paper an approach towards the power system resiliency has been tried with the help of betweenness centrality and minimum spanning tree concept of graph theory. Betweenness centrality of a power system network have been considered here to analyze resiliency of the system in order to find the most critical bus(es) or node(s) and along with that minimum spanning tree based on active power flow has been taken to find out the critical lines, so that what are the effects towards its associated transmission line(s) can be observed precisely. Also, the critical transmission lines based on Minimum Spanning Tree have been taken into consideration in order to harden them. In order to implement these simulations have been carried out on ieee 57 Bus System.
暂无评论