The paper achieves the traveling balance control in exploratory behavior by fuzzy logic method,uses the least squares fitting to realize the corner detection and realizes the roadblock detection by designing the Barri...
详细信息
The paper achieves the traveling balance control in exploratory behavior by fuzzy logic method,uses the least squares fitting to realize the corner detection and realizes the roadblock detection by designing the Barrier Predictive Function *** paper designs a distributed system based on block storage and electoral computing model which provides high reliability storage and computing *** paper proposes the BUS communication model,achieves the storage and computing node's selection by LSM merging tree and Bully *** real-time ultrasonic roadblock detection information data obtained by Arduino detector is analyzed based on the distributed system and finally,the detection of environmental map is realized.
The islanding operation of DG usually occurs when the wind plant that is the source in the DG, still makes a section of the page distribution according to this section has been disconnected from the service program so...
详细信息
ISBN:
(纸本)9781467392068
The islanding operation of DG usually occurs when the wind plant that is the source in the DG, still makes a section of the page distribution according to this section has been disconnected from the service program source. Distribution of the feeder islands with power DG are usually not required. In the proposed method, the q-axis current in the inverter is measured and the current controller is modeled with a continuous periodic Reference power from a small value. The possibility of false detection is eliminated through the affirmation of the occurrence of islanding as soon as it is suspected. DG is a islanded from the upstream system, if the frequency variation is occur in a small value due to a change in the inverter current. The proposed algorithm detects the island grid formation in the stable condition of the system. Computer simulation is done with MATLAB.
Virtual network management is a basic component provided by cloud computing system. In cloud environment, the fact that VMs in the same subnet are located in different hosts, the traffic of VMs attached to different u...
详细信息
ISBN:
(纸本)9781509009466
Virtual network management is a basic component provided by cloud computing system. In cloud environment, the fact that VMs in the same subnet are located in different hosts, the traffic of VMs attached to different users should be isolated, the VM would be migrated to other hosts makes network management different from that in physical network. technology like overlay and SDN is usually introduced to establish a reliable and efficient virtual network management scheme. However, there are many drawbacks such as flexibility and hardware costs in most schemes introducing technology above-mentioned. We addressing these problems by designing a scheme on the hyper-visor layer of physical hosts based on overlay and SDN technology, which means the tradition virtual network can be easily transformed to our system without purchasing new devices supported OpenFlow or VXLAN(a kind of technology in overlay) protocol. Besides additional functions like monitor and traffic mirror can be customized by users' needs for the system's flexibility and scalability the SDN technology endowing. We also design a distributed Virtual Router(DVR) on each host to solve the general problem of traffic between internet and Intranet concentrating in most schemes. The experimental evaluation shows that our system has achieve the basic intercommunication under the situation of tenant isolation and its performance of communication between internet and Intranet acts obviously better than that in OpenStack scheme for our DVR design.
Ministry of Research, technology, and Higher Education (MRTHE) is actively improving its information security to enhance public service. Employee39;s awareness on information security requires attention due to their...
详细信息
Ministry of Research, technology, and Higher Education (MRTHE) is actively improving its information security to enhance public service. Employee's awareness on information security requires attention due to their contribution on the improvement. MRTHE should identify characteristics of employees on information security through Information Security Awareness (ISA) level measurement. Such characteristics could provide adequate analysis as consideration to establish feasible programs of ISA for employee. This study concerns to ISA level measurement for MERTHE's employee using seven focus areas of information security (password management, email usage, internet usage, social networking site usage, incident reporting, mobile computing, and information handling) with three variables of KAB model: Knowledge, Attitude, and Behavior. They are expanded into some criteria to examine employee's individual perception using Likert scale. As a result, 13 parameters out of 21 are classified as Good level of ISA General score as representation of all parameters is 81.07 percent. It indicates that MRTHE's employee has performed positive knowledge, attitude, and behavior on information security. To enhance quality of measurement, this study conducts three hypotheses that actualized relationship among each variable. Since their relationships are proven empirically using regression linear examination, these hypotheses are acceptable. It reflects that on information security, knowledge has good influence to attitude and behavior while attitude also has good influence to behavior. Hence, MRTHE can initiate improvement of information security using programs with knowledge-based.
Thermal comfort is one of the important climatic factors that conditions human living hood. The existing primary methods of thermal comfort measurement are inadequate to monitor the comfort level of human body through...
详细信息
ISBN:
(纸本)9781467392068
Thermal comfort is one of the important climatic factors that conditions human living hood. The existing primary methods of thermal comfort measurement are inadequate to monitor the comfort level of human body through computer networks, especially internet like infrastructure. In this paper, an internet of Things based thermal comfort measurement and monitoring technique is proposed. Missenard indexing has been implemented for measuring thermal comfort by IoT cloud assisted architecture. Real-time graphical visualizations of thermal comfort are obtained from Plotly and ThingSpeak cloud platforms. Serial data output is also generated while performing the experiment.
This paper explores Adaptive Fibonacci-based Tuning Protocol for Service and Resource discovery in the internet of Things (AFT). Through using constrained application protocol (CoAP), internet of Things (IoT) can supp...
详细信息
ISBN:
(纸本)9781538628607
This paper explores Adaptive Fibonacci-based Tuning Protocol for Service and Resource discovery in the internet of Things (AFT). Through using constrained application protocol (CoAP), internet of Things (IoT) can support Machines to Machines (M2M) communications. CoAP has centralized and distributed operation modes to discover resources. In the centralized mode, resource directory (rd) is used to maintain and host updated services description of each resource in the network. rd requires periodical updates by other nodes. However, regularly updates resulted in additional signaling overhead, drain the node's battery and reduce the overall network lifetime. Hence, the proposed AFT intelligently varies and adjusts the update frequency of the services using Fibonacci sequence. We evaluated the performance using an inclusive experiments' number performed by employing emulated Tmote Sky motes in the COOJA environment. The results prove that the proposed AFT protocol consistently accomplished the lowest control overhead that ultimately increased the energy saving of the resources. They also confirm that this AFT protocol outperforms its traditional counterpart by 75% regarding the overall network lifetime.
We are looking at the combination of in-body nano communication with the internet of Things (IoT) - especially Body Area Networks (BAN) - and the resulting research challenges in the internet of Nano Things (IoNT). Mo...
详细信息
ISBN:
(纸本)9781450340618
We are looking at the combination of in-body nano communication with the internet of Things (IoT) - especially Body Area Networks (BAN) - and the resulting research challenges in the internet of Nano Things (IoNT). Moreover, our concept for Function Centric Networking presents an approach to deal with these challenges by addressing specific groups of interchangeable and replaceable nano machines.
internet of Things (IoT) paradigm is gaining immense importance in today39;s world of rapid connectivity. Mobile IoT scenario like Smart City is characterized by short and recurrent contact between IoT devices. The ...
详细信息
ISBN:
(纸本)9781467392068
internet of Things (IoT) paradigm is gaining immense importance in today's world of rapid connectivity. Mobile IoT scenario like Smart City is characterized by short and recurrent contact between IoT devices. The existence of contacts between the mobile and infrastructure devices is an enabler for nodes to discover their neighbors to relay data. A recent chapter in research aims at learning the mobility pattern of devices to improve efficiency of discovery. In this paper, various techniques that are available for neighbor discovery are discussed and it is shown that knowledge integration in the process of node discovery leads to efficient scheduling of resources.
One of the challenging issues in a distributedcomputing system is to reach on a decision with the presence of so many faulty nodes. These faulty nodes may update the wrong information, provide misleading results and ...
详细信息
ISBN:
(纸本)9781509029068
One of the challenging issues in a distributedcomputing system is to reach on a decision with the presence of so many faulty nodes. These faulty nodes may update the wrong information, provide misleading results and may be nodes with the depleted battery power. Consensus algorithms help to reach on a decision even with the faulty nodes. Every correct node decides some values by a consensus algorithm. If all correct nodes propose the same value then all the nodes decide on that. Every correct nodes must agree on the same value. Faulty nodes do not reach on the decision that correct nodes agreed on. Binary consensus algorithm and average consensus algorithm are the most widely used consensus algorithm in a distributed system. We apply binary consensus and average consensus algorithm in a distributed sensor network with the presence of some faulty nodes. We evaluate these algorithms for better convergence rate and error rate.
Cloud computing is a collection of distributed services, application, information and infrastructure .Cloud computing may he defined as the set of services that provide infrastructure resources using internet and data...
详细信息
ISBN:
(纸本)9789380544199
Cloud computing is a collection of distributed services, application, information and infrastructure .Cloud computing may he defined as the set of services that provide infrastructure resources using internet and data storage on a third server. It is one of the latest developments in IT industry. It provides its user scalability, reliability, high performance and low cost solution as compared to the other infrastructure. In this paper I am going to review algorithms of cloud computing security.
暂无评论