A scheme for WSNs(wireless sensor networks) security is given by dividing sensing tetrahedron into clusters and using the symmetric polynomials in this paper. The sensing tetrahedron is divided into a number of small ...
详细信息
A scheme for WSNs(wireless sensor networks) security is given by dividing sensing tetrahedron into clusters and using the symmetric polynomials in this paper. The sensing tetrahedron is divided into a number of small grids. All those sensor nodes, both ordinary sensor nodes and heterogeneous sensor nodes are distributed in the sensing tetrahedron. In a grid, all ordinary sensor nodes and heterogeneous sensor nodes establish their shared keys through using the symmetric polynomials. All the heterogeneous sensor nodes establish their shared keys through using the symmetric polynomials. At last, all sensor nodes establish their keys directly or indirectly in the whole sensing tetrahedron. Analysis and comparison demonstrate this schemeenhances the WSN security, has good network connectivity, saves node storage, reduces network computing load, and extends the network lifetime.
Binaural source localization is a popular technique in various applications, such as hearing aids, mobile robot, video conference, etc. However, robust binaural cues estimate and suitable localization strategy are alw...
详细信息
ISBN:
(纸本)9781479947195
Binaural source localization is a popular technique in various applications, such as hearing aids, mobile robot, video conference, etc. However, robust binaural cues estimate and suitable localization strategy are always limiting its performance. In this paper, a new algorithm for binaural sound source localization is presented, which is a two-layer model. In the first layer, a spectral weighting generalized cross correlation-phase transformation (GCC-PHAT) method is presented for robust time-delay estimation, by which the probabilistic azimuths of sound source are obtained. In the second layer, an improved algorithm is introduced, which is named Compensated Interaural Intensity Difference (CIID). Based on the probabilistic azimuth localization results and CIID features, spatial grid matching (SGM) is presented to provide a Bayesian model for localizing azimuth and elevation. Compared with three other algorithms, experimental results show that the proposed method has a robust result even in noisy environments.
In order to solve the problem of data security in smart grid wide-area measurement system(WAMS),this paper analyzes the characteristics of theexisting data encryption solutions, and combines with the characteristics ...
详细信息
In order to solve the problem of data security in smart grid wide-area measurement system(WAMS),this paper analyzes the characteristics of theexisting data encryption solutions, and combines with the characteristics of massive data as well as high requirement of real time in WAMS, then introduces Storm distributed real-time platform to process real-timeencryption of large-scale data. We design WAMS data storage system based on cloud platform, and on top of this system design AeS algorithm based on Storm. The algorithm is mainly divided into three steps: data collection, fast parallel data encryption and cloud storage of encrypted results. The procedures are implemented in the Storm predefined programming components. Theexperimental comparisons verify that the proposed algorithm has the characteristics of low latency and high encryption efficiency.
Today many applications are developed using distributed technologies such as cluster, cloud and gridcomputing. These applications demand more resources for computation and storage. They demand flexible scaling and im...
详细信息
ISBN:
(纸本)9781479930807
Today many applications are developed using distributed technologies such as cluster, cloud and gridcomputing. These applications demand more resources for computation and storage. They demand flexible scaling and improved performance. Application now days can make use of multiple nodes (machines) to get the tasks completed. In this paper we discuss the, implementation details of a gridcomputing framework known as gridSys. This framework provides a fast and easy way to program a grid. It can easily help the application break the problem to compute intensive tasks. The framework distributes these tasks to different nodes of thegridefficiently and easily aggregate the results of these tasks provide fault tolerance and reliability.
Academic cloud infrastructures are constructed and maintained so they minimally constrain their users. Since they are free and do not limit usage patterns, academics developed such behavior that jeopardizes fair and f...
详细信息
ISBN:
(纸本)9781479927302
Academic cloud infrastructures are constructed and maintained so they minimally constrain their users. Since they are free and do not limit usage patterns, academics developed such behavior that jeopardizes fair and flexible resource provisioning. For efficiency, related work either explicitly limits user access to resources, or introduces automatic rationing techniques. Surprisingly, the root cause (i.e., the user behavior) is disregarded by these approaches. This paper compares academic cloud user behavior to its commercial equivalent. We deduce, that academics should behave like commercial cloud users to relieve resource provisioning. To encourage this behavior, we propose an architectural extension to academic infrastructure clouds. Weevaluate our extension via a simulation using real life academic resource request traces. We show a potential resource usage reduction while maintaining the unlimited nature of academic clouds.
Cloud computing has earned more and more attention for its important role in the modern network development process. It can be seen as a new distributed computing mode based on virtualization process. One of the probl...
详细信息
ISBN:
(纸本)9781479947195
Cloud computing has earned more and more attention for its important role in the modern network development process. It can be seen as a new distributed computing mode based on virtualization process. One of the problems for Cloud computing is load balance. An improved k-subset algorithm is proposed in this paper for this problem. Good performance in experiments on CloudSim platform shows its efficiency
User experience has gained great attention in recent years, and with rapid change in technology, understanding user39;s emotions and whether or not they are happy has become crucial, in order to offer better solutio...
详细信息
ISBN:
(纸本)9781479958139
User experience has gained great attention in recent years, and with rapid change in technology, understanding user's emotions and whether or not they are happy has become crucial, in order to offer better solutions and experience to the user. This paper presents a synthesis of affectivecomputing research on frustration detection in interactive systems. Two tabletop systems for hand gesture frustration detection are introduced, which aim to identify frustration levels in the user's hand gestures using a camera, while interacting with a smart table surface.
This paper proposed a multi-function provable data possession (MF-PDP), which supports public verification, data dynamic, unlimited times verification and sampling verification. The detail design is provided and the t...
详细信息
ISBN:
(纸本)9781479947195
This paper proposed a multi-function provable data possession (MF-PDP), which supports public verification, data dynamic, unlimited times verification and sampling verification. The detail design is provided and the theory analysis about the correctness, security and performance are also described. Theexperiment emulation and compare analysis suggest the feasibility and advantage.
As a new computing model cloud computing provide users with services subversive with the aid of the vast resources on the Internet system. Cloud computing has been used in network storage, web search, e-mail applicati...
详细信息
ISBN:
(纸本)9781479947195
As a new computing model cloud computing provide users with services subversive with the aid of the vast resources on the Internet system. Cloud computing has been used in network storage, web search, e-mail application and other fields. In order to achieve the fairness of data distribution and improve the throughout and transmission rate, the cloud computing model based on multiservice access dynamic detection was researched. First, the fundamental of cloud computing is analysis. Second, the current average dynamic change date based on the date geometry window variable is proposed, and then the dynamic date distribution algorithm is deduced based on current average dynamic change geometry window variable. Finally, combined the multiservice assess, the cloud computing model is obtained based on the dynamic date detection algorithm.
Cloud computing is widely being adopted by many companies because it allows to maximize the utilization of resources. However, the complexity of cloud computing systems with theexistence of many cloud providers makes...
详细信息
ISBN:
(纸本)9781479927302
Cloud computing is widely being adopted by many companies because it allows to maximize the utilization of resources. However, the complexity of cloud computing systems with theexistence of many cloud providers makes infeasible for theend user the optimal or near-optimal resource provisioning and utilization, especially in presence of uncertainty of very dynamic and unpredictableenvironment. Hence, adaptive load balancing algorithms are a fundamental part of the research in cloud computing. We formulate the problem and propose an adaptive load balancing algorithm for distributed computer environments. We also discuss theenergy efficiency of our solution for the domain of VoIP computations on federated clouds.
暂无评论