Blockchain is an emerging technology, which can solve a series of problems of the traditional energy industry and promote its development, such as peer-to-peer transaction of distributed energy, tracking carbon emissi...
详细信息
ISBN:
(纸本)9781665402682
Blockchain is an emerging technology, which can solve a series of problems of the traditional energy industry and promote its development, such as peer-to-peer transaction of distributed energy, tracking carbon emissions et al. At the same time, the application of blockchain technology brings some challenges, such as regulatory difficulties and the privacy problems. In this work, the blockchain technology in the application status of Energy internet was briefly summarized, and the security issue and the lack of privacy protection were pointed out. By analyzing the results of other industries, some methods were summarized and suggested to meet the challenge of blockchain privacy protection in the energy internet.
With the rapid development of the economy, various types of distributed energy are continuously connected to the power system, resulting in the increasing pressure of energy supply in the power system, which poses unp...
详细信息
The existence of bounded data and unbounded data gives a great challenge for data processing in smart cities. The wide application of the internet of things (IoT) makes the data amount rapidly increase. This leads to ...
详细信息
Advances in technology have provided substantial benefits and innovations to the world in massive ways such as ecommerce, timely business processing, connectivity, easy access to information and fast communication. Su...
详细信息
ISBN:
(纸本)9781665417501
Advances in technology have provided substantial benefits and innovations to the world in massive ways such as ecommerce, timely business processing, connectivity, easy access to information and fast communication. Such benefits and innovations have been adopted in the banking sector, for example, mobile banking, credit cards, internet banking as well as agency banking. Although information technology has provided substantial benefits mentioned above it, however, comes with disadvantages such as information security breaches and unsecure Information and Communication technology environments. As a result, end-users are now connected to the internet, and this has resulted in several internet users becoming victims of cybercriminals. This study aimed at evaluating patterns of cybercrimes associated with online transactions in the Namibian banking institutions’ cyberspace and proposes mitigation strategies. To do that, the researcher interviewed six Namibian banking institutions to understand cybersecurity issues, trends and existing solutions. The study found that cybercrimes such as phishing, social engineering, vishing, smishing, spear phishing, spoofing and website compromise, distributed denial-of-service (DDos) are rampant. This is worsened by the fact that Namibia does not have a local cybersecurity framework to guide local banks in curbing these crimes.
This paper focuses on the application of fog computing in the warehouse environment monitoring field to improve the performance of traditional warehouse environment monitoring systems (WEMS) generally based on the Int...
详细信息
ISBN:
(纸本)9783030391621;9783030391614
This paper focuses on the application of fog computing in the warehouse environment monitoring field to improve the performance of traditional warehouse environment monitoring systems (WEMS) generally based on the internet of Things (IoT). For IoT-based WEMS have some flaws in the aspect of security, stability and reliability, as well as real-time processing of transactions, we propose a new architecture for WEMS based on fog computing, and designs the hierarchical model and main functions of the system. In particular, we put forward the solutions of distributed data processing and service provisioning based on fog nodes, which are key issues that influence the application of fog computing in warehouse environment monitoring. Finally, we evaluate the reliability and efficiency of the system based on a physical test platform, and the results show that fog computing can alleviate existing problems in traditional systems greatly.
Peer-to-peer distributed computer architecture are taken into consideration in order to distribute computer assets like storage, comfortable, and CPU cycles openly deprived of consuming a middle scheme or a central se...
详细信息
ISBN:
(数字)9781665474979
ISBN:
(纸本)9781665474986
Peer-to-peer distributed computer architecture are taken into consideration in order to distribute computer assets like storage, comfortable, and CPU cycles openly deprived of consuming a middle scheme or a central server. It can be difficult to Upkeep of load balancing on diverse peer-to-peer networks, and various previous research have provided state balancing algorithms for the demand aspect of load balance. For effective load balancing in dispersed heterogeneous peer networks, the prior work developed Processing Heterogeneous Data using Time - Peer Nodes. Using the Dynamic Time Warping (DTW) technique, load-demand balancing factors for peer servers are determined to a certain degree. The prior work solely discussed the peer node's liveliness in the heterogeneous network. In this work, we will provide the subsequent load-demand element generated as of DTW, peer server giving out cycle requirements are recognized utilizing Appropriation of Duty Cycle Data(ADCD) Technique in order to improve the previous study. In its active state, peer node servers examine their processing cycle needs and distribute data to other nodes in accordance with their duty cycles. If there is a load imbalance, peer node servers are used to distribute the load using a node collection policy created on ADCD abundant demonstration? Performance of the proposed Diverse cycle of a peer node server analyzer with an existing time variant utilizing DCPS-ADCD & NSS and the ADCD approach Using data from diverse peer networks that have been taken from major internet service providers, a P2P network that uses the Dynamic Time Warping algorithm is experimentally assessed. The efficiency is calculated based on the duty cycle count, energy usage, and load.
The modern digital age has seen an exponential growth in internet penetration, which in turn has increased the probability of a denial-of-service attack. When an evil user launches a Denial of Service (DoS) attack, it...
详细信息
Fog computing architectures provide a new platform for distributed stream processing in internet of Things (IoT) applications. In a hierarchical infrastructure, processing of stream data arriving from sensors starts a...
详细信息
The future power system can be considered as an aggregation of controllable distributed systems devices that coordinate with each other through the internet of Things (IoT), energy internet (EI) new paradigms arise. I...
详细信息
The future power system can be considered as an aggregation of controllable distributed systems devices that coordinate with each other through the internet of Things (IoT), energy internet (EI) new paradigms arise. In EI environments, agreement among multiple computers is essential for power generation, transmission, distribution, and consumption etc. applications. Coordinated control and security protection play important roles in the application of a distributedcomputing environment. A consensus approach can provide fault tolerance and prevent system errors and attacks, thereby providing the system with strong security in distributedcomputing environment. In this paper, a distributed Kalman filter with consensus coordinated control algorithm for multiagent systems (MAS) was proposed to investigate the energy internet with links failure by cyber attack. The proposed algorithm is evaluated in the energy internet through a MAS model using MATLAB software.
Heating ventilation and Air Conditioning (HVAC) systems consume a substantial volume of energy within corporate buildings, mainly due to lack of severe monitoring which results in compromising either energy efficiency...
详细信息
暂无评论