With the remarkable improvement of the internet, there has been an important flow in technologies like cloud and fog computing. Moreover, it is important to identify the associated issues related to resource allocatio...
With the remarkable improvement of the internet, there has been an important flow in technologies like cloud and fog computing. Moreover, it is important to identify the associated issues related to resource allocation and deployment in these technologies. Despite the rapid development of cloud computing (CC), several limitations persist due to inherent features like unreliable delays, limited mobility, and limited support. Fog computing (FC), on the other hand, includes taking the central CC resources nearby to the network edge. It aims to overcome the limitations faced by CC by providing a more distributed method compared to its centralized behavior. The disparities between compute-intensive uses and resource-constrained devices challenge the complete system’s performance. Task scheduling (TS) is important in identifying logical inconsistencies in fog technology. With the proliferation of the IoT, efficiently allocating resources to clients upon request becomes a highly challenging task in fog technology. Different authors survey several methods, which are analyzed in brief. Lastly, a study is made by comparing the demerits of each technique, and recommendations are defined for improved TS and RA in fog. In this article, some heuristic and metaheuristic methods are studied, and the hyper-heuristic scheduling (HHS) method is defined to explore the best distribution with minimum execution time. The implemented technique has enhancements in energy, execution time, etc.
In the internet era, the rapid development of technology has had a profound impact on the development of enterprises. With the rapid changes in the global economy, enterprises are faced with the serious challenges bro...
详细信息
ISBN:
(数字)9798331519032
ISBN:
(纸本)9798331519049
In the internet era, the rapid development of technology has had a profound impact on the development of enterprises. With the rapid changes in the global economy, enterprises are faced with the serious challenges brought about by the uncertainty of market structure and demand. In this case, the innovative behaviour of employees has become a key factor to promote the development of enterprises, which is an important part of their innovative capacity. The study used the questionnaire star platform and offline distribution of questionnaires for enterprise employees with different gender, age, nature of the enterprise, job level and other attributes, and successfully distributed and returned 206 valid questionnaires, using SPSS 27, AMOS 25 and other analytical software to analyse the data for reliability analysis, validity analysis and correlation test, and using machine learning decision tree algorithm -ID3 algorithm to construct the decision tree model. This study can effectively help enterprises to recruit employees, through the comprehensive analysis of the attributes and innovative behaviour of employees, to achieve the accurate identification of employee potential, and then screen out high-quality talents with innovative ability for enterprises.
Connectivity between on-the-ground infrastructure and in-flight drones is made possible by ad hoc networks that fly between them. Using aerial items like unmanned aerial vehicles and drones, researchers in this field ...
Connectivity between on-the-ground infrastructure and in-flight drones is made possible by ad hoc networks that fly between them. Using aerial items like unmanned aerial vehicles and drones, researchers in this field are looking at how they may best integrate their services and advantages into data-centric internet of Things applications. It is one of the most prominent areas of study in aerial ad hoc networks due to the increasing commercial relevance of drone-centric flying networks. Communication between mobile devices and a central base station is heavily relied upon in the relevant literature. As such, this study presents a distributed routing paradigm for the internet of Things that prioritizes service quality and relies on drone assistance (D-IoT). Probabilistic models of mobility and parameters for aerial drones are developed with a particular emphasis on incredibly dynamic flying ad hoc networks. It’s a whole proactive routing system has been built on these drone-centric models. As a result, a brain interfering system has been used to help people make reliable and fruitful travel plans. The advantages of the proposed unmanned aerial vehicles (UAVs routing approach are confirmed by a thorough measuring performance. Several system evaluation criteria for mobile advertising networks show that D-IoT is superior to region-based approaches.
Today, several solutions for cross-blockchain asset transfers exist. However, these solutions are either tailored to specific assets or neglect finality guarantees that prevent assets from getting lost in transit. In ...
详细信息
ISBN:
(纸本)9781665421829
Today, several solutions for cross-blockchain asset transfers exist. However, these solutions are either tailored to specific assets or neglect finality guarantees that prevent assets from getting lost in transit. In this paper, we present a cross-blockchain asset transfer protocol that supports arbitrary assets and adheres to finality requirements. The ability to freely transfer assets between blockchains may increase transaction throughput and provide developers with more flexibility by allowing them to design digital assets that leverage the capacities and capabilities of multiple blockchains.
Advances in technology have provided substantial benefits and innovations to the world in massive ways such as ecommerce, timely business processing, connectivity, easy access to information and fast communication. Su...
详细信息
As global society increasingly transitions towards a comprehensive dependence on computational systems and digitization, the formulation of secure environments and connections emerges as one of the foremost challenges...
详细信息
ISBN:
(数字)9798331522056
ISBN:
(纸本)9798331522063
As global society increasingly transitions towards a comprehensive dependence on computational systems and digitization, the formulation of secure environments and connections emerges as one of the foremost challenges of this decade. The proliferation of threats confronting both individuals and organizations is escalating at an exponential rate, attributable to the burgeoning intricacy of contemporary networks and the ascendance of the internet of Things. Insufficient collaboration engenders a scenario wherein identical attacks are executed against disparate organizations in rapid succession. The dissemination of cyber threat intelligence is frequently proposed as a remedy to this predicament; however, it introduces distinct constraints pertaining to Data Safeguarding, traceability, and Integrity. To address this issue, a novel distributed architecture is put forth to augment the protective measures within the IoT landscape. This solution is predicated on federated learning algorithms aimed at constructing a distributed, self-governing system able to Identify intrusion and breaches through a synergistic SDNCloud Structure. This structural paradigm leverages the potential of SDN and cloud computing for IoT endpoints to enable effective and adaptable data analysis while concurrently maintaining user confidentiality. The adoption of federated learning simplifies a non-centralized model learning workflow, reducing data exposure and infringements by keeping private information confined to the IoT endpoints. Consequently, this methodology not only bolsters security but also promotes interdevice cooperation to confront the challenges in an exponentially interconnected.
As an emerging distributedtechnology, Federated learning enables model training while protecting privacy without sharing local data. However, the heterogeneity of geographic locations and devices leads to response de...
详细信息
ISBN:
(纸本)9798400713231
As an emerging distributedtechnology, Federated learning enables model training while protecting privacy without sharing local data. However, the heterogeneity of geographic locations and devices leads to response delays from stragglers. Client grouping in federated learning can tolerate stragglers from a global perspective, but differences in data distribution within groups may result in local performance bias. To address this issue, we propose a federated learning method called FedSimRep, which selects representative clients based on data distribution similarity. FedSimRep performs group training by collecting readiness signals from topological communications and maintains synchronization tables and graphs to track training progress. Additionally, it selects representative clients by leveraging the relationship between local optimization similarity and data distribution similarity to optimize the global model. Experiments and theoretical analyses on public datasets such as MNIST, CIFAR-10, and UEU-Fed demonstrate that FedSimRep achieves significant advantages in terms of accuracy and efficiency.
Healthcare systems can be simplified and enhanced by integrating digital databases and insurance agencies. However, as healthcare data increasingly travels over the internet, concerns around security and privacy-such ...
详细信息
ISBN:
(数字)9798331528386
ISBN:
(纸本)9798331528393
Healthcare systems can be simplified and enhanced by integrating digital databases and insurance agencies. However, as healthcare data increasingly travels over the internet, concerns around security and privacy-such as data breaches and unauthorized data modifications-become more pressing. The General Data Protection Regulation (GDPR) highlights the importance of secure data management in building trust in the protection of individuals' personal information. Blockchain technology presents an opportunity to make healthcare systems more efficient, secure, and private. This paper examines current security architectures designed to protect electronic health records (EHRs) and proposes the addition of Quantum Cryptography (QC) to reinforce traditional encryption methods. We explore blockchain-based healthcare architectures that integrate role-based access controls and quantum blind signatures within Hyperledger Fabric blockchains. Our findings demonstrate that the proposed framework outperforms existing systems in transaction handling, resource efficiency, and network traffic management while also enhancing scalability and reducing latency.
It's possible to define blockchain technology as the DLT-based technology upon which cryptocurrencies and other distributed ledgers rely. This innovation extends well beyond Bitcoin and other forms of digital mone...
It's possible to define blockchain technology as the DLT-based technology upon which cryptocurrencies and other distributed ledgers rely. This innovation extends well beyond Bitcoin and other forms of digital money. With its help, a new internet era may dawn in which sensitive information can be sent, stored, and managed without fear of tampering or other forms of corruption. Because of its potential to combat corruption and help the impoverished, among other things, this technology is worth investing in. Any kind of transaction, such as the sale of a home or a stock, may be tracked nearly instantly. Sustainable development is at the heart of today's modern world. technology like this may be useful in the pursuit of sustainability, which involves improving the here and now without jeopardizing the future. To be really useful, though, this innovation requires a robust digital governance structure. The purpose of this article is to investigate Blockchain technology as a tool for promoting long-term, environmentally friendly growth in India, and to identify contexts where it may be particularly useful. How the Indian economy may adopt this technology and incorporate it into its system to achieve Sustainable Development is the topic of my paper. Capital market, accountable production and consumption, environmental protection, providing legal identity for everybody, property registration, and transparent philanthropy are all possible applications of this technology in India. The research methods used in this paper are entirely inductive, with a focus on secondary sources of information.
Fully autonomous or 'self-driving' vehicles are emerging mobility technology with potential benefits over conventional motor vehicles. Proponents argue that the widespread adoption of autonomous vehicles may s...
详细信息
暂无评论