This paper presents an immune approach for securing different types of devices connected to network. This also applies to the technology, called internet of things (IoT), which growing rapidly from year to year. It wa...
详细信息
ISBN:
(数字)9783319480572
ISBN:
(纸本)9783319480572;9783319480565
This paper presents an immune approach for securing different types of devices connected to network. This also applies to the technology, called internet of things (IoT), which growing rapidly from year to year. It was developed to help people in everyday life, to make our life easier. However, such systems of interrelated computing devices with the ability to transfer data over a network is exposed to various types of attacks. Hacker can take the control over the each device connected to the network. As a result, for example, heating system can be switched on at the summer time, a refrigerator do redundant purchases, etc. To fix this problem, we propose to apply our hybrid immune-based algorithm, called b-v model, embedded in a reprogrammable FPGA. It base on negative selection which is suitable to protect a huge amount of devices.
Varity of appliances have been presented in a house with the development of social economy and rapid increase in the needs of the people. There is a problem in the management and control of these appliances so as to m...
详细信息
ISBN:
(纸本)9789380544199
Varity of appliances have been presented in a house with the development of social economy and rapid increase in the needs of the people. There is a problem in the management and control of these appliances so as to meet the comfort, health and security at home. To overcome this problem a smart control based system has been proposed. When we talk about internet of things (IoT), there are large numbers of distinct devices which are connected throughout different systems. These systems provide open platform to all digital devices accessing data from such systems. So, it becomes quite difficult to design such a system for IoT which can handle large classification of devices and also technologies like link layer associated to it. To connect such a sophisticated network on IoT one need to have central server (server could be created over Wi-Fi network) which can facilitate all smart phones, tablets and other digital devices.
The proceedings contain 31 papers. The special focus in this conference is on internet of Things Technologies for HealthCare. The topics include: A distributed research environment on semantic interoperability;halmsta...
ISBN:
(纸本)9783319512334
The proceedings contain 31 papers. The special focus in this conference is on internet of Things Technologies for HealthCare. The topics include: A distributed research environment on semantic interoperability;halmstad intelligent home - capabilities and opportunities;healthcare needs, company innovations, and research - enabling solutions within embedded sensor systems for health;a case-based classification for drivers’ alcohol detection using physiological signals;towards a probabilistic method for longitudinal monitoring in health care;a classification model for predicting heart failure in cardiac patients;ins and outs of big data;why hackers love ehealth applications;security context framework for distributed healthcare IoT platform;improving awareness in ambient-assisted living systems;a mobile app for technology-enhanced emergency management;remotely supporting patients with obstructive sleep apnea at home;an aggregation plateform for IoT-Based healthcare;an embedded non-contact system for health monitoring at home;a case study on big data analytics;RFID Based telemedicine system for localizing elderly with chronic diseases;design and implementation of Smartphone-based tear volume measurement system;towards an IoT architecture for persons with disabilities and applications and design of IoT solution for Velostat footprint pressure sensor system.
distributed graph computing refers to extract knowledge by performing computations on large graphs. If the data source is continuously input like stream, the system is called streaming graph computing. When computing ...
详细信息
ISBN:
(纸本)9788996865063
distributed graph computing refers to extract knowledge by performing computations on large graphs. If the data source is continuously input like stream, the system is called streaming graph computing. When computing large graphs, a basic and significant step is to distribute the graph over a cluster of nodes, which is called 'partition'. If the graph isn't partitioned properly, the communication will quickly become a limiting factor in scaling the system, especially in streaming graph computing. And inside some cluster, the CPU speed and memory size of different nodes differs from each other. Observing that in this kind of cluster, nodes those has less resource limit the computing speed, we ask if the partition algorithm could be improved. We propose a simple heuristics to do partition in such cluster and compare the performance of some classic algorithms. It makes less cost of communication more efficient, and make better use of nodes those have more resources. Finally, we evaluate the performance gains in imbalance clusters by using our graph partition method to solve standard PageRank computing on a large real-world World-Wide-Web link graph. It shows that in such circumstance, our heuristics are a significant improvement.
The multimedia big data in multimedia sensing and other IoT (internet of Things) systems are high-volume, real-time, dynamic and heterogeneous. These characteristics lead to new challenges of data security. When compu...
详细信息
ISBN:
(纸本)9781509009466
The multimedia big data in multimedia sensing and other IoT (internet of Things) systems are high-volume, real-time, dynamic and heterogeneous. These characteristics lead to new challenges of data security. When computation and power resources in some IoT nodes are very scarce, these challenges become more serious that complex data security process on multimedia data is restricted by the aforementioned limited resources. Hence, the confidentiality of multimedia big data under resources constraints is investigated in this paper. Firstly, the growth trend of data volume compared with computational resources is discussed, and an analysis model for multimedia data encryption optimization is proposed. Secondly, a general-purpose lightweight speed tunable video encryption scheme is introduced. Thirdly, a series of intelligent selective encryption control models are proposed. Fourthly, the performance of proposed schemes is evaluated by experimental analyses and proves that schemes are effective enough to support real-time encryption of multimedia big data. Additionally, in the age of big data and cloud computing, the aforementioned analysis method can also be applied to other systems with limited resources.
The development of internet-of-things and mobile application development taking in consideration the increase in number of smart phone users has opened a new horizon for solving one of the significant issues of saving...
详细信息
ISBN:
(纸本)9789380544199
The development of internet-of-things and mobile application development taking in consideration the increase in number of smart phone users has opened a new horizon for solving one of the significant issues of saving life in case of emergencies. We present a novel intelligent Traffic preemption systems that allows the vehicles to preempt and operate the traffic intersections with the help of mobile devices, in case of emergencies on the way to hospitals in order to reduce the delay and improve the response time. In this paper we discuss the design and implementation of a non-obtrusive, cost efficient and a reliable system that helps in traversing the vehicle easily through a congested traffic intersectionvia a smooth and fluent path. An internet of Things ecosystem is developed that can be preempt traffic signals using a mobile application via internet. The web server has to be configured to accept such connections and store the metadata in a database. Authentication measures have been taken in account so that the system is less vulnerable to get misused. The theory, design procedures, and discussions of the system are presented.
Recent developments in RFID and NFC technologies help manufacturer to find out ways of replacing traditional object identification such as bar code with RFID tags. These RFID tags are passive and cheaper tags that ena...
详细信息
ISBN:
(纸本)9789380544199
Recent developments in RFID and NFC technologies help manufacturer to find out ways of replacing traditional object identification such as bar code with RFID tags. These RFID tags are passive and cheaper tags that enable object tracking a reality. Tags can also help retailers to allow customers to shop in a smarter way allowing customers to purchase items through smart retailers enabled with RFID readers in the shopping cart. C1G2 tags allow tackling against counterfeit items using its minimal cryptography approaches such as XOR, 16 hit PRNG, CRC techniques, and separate memory Or storing secret pins. The proposed model creates secure perimeter to realize smart shopping environment and supply chain management. In this paper, we have extended the application of REID technology to smart shopping environment allowing customer to shop authentic items which lessen counterfeit item sale in the market. Our technique can even strengthen tag based product sale in open market where chance of selling counterfeit items are high.
Groupwise analytics on big data have been widely used in statistics, computer science, parallel computing and many other fields in recent years. At The same time, Aggregation queries is one of the most important analy...
详细信息
ISBN:
(纸本)9781509055210
Groupwise analytics on big data have been widely used in statistics, computer science, parallel computing and many other fields in recent years. At The same time, Aggregation queries is one of the most important analytics techniques. In big data eras, the aggregation queries on the ever-increasing data volumes will consumes much time, the traditional methods of traversing the entire dataset is not acceptable to users. Data sampling is a technique that only process a part of data to get an approximate result, the technique can save a lot of time when dealing with a vast amount of data with the sacrifice of accuracy. This paper will introduce several data sampling algorithms for approximate aggregation queries for big data, and analyze the shortcomings and advantages of each methods. Including the technique apply to the sparse data which meaning data has a limited population but a wide range.
The proceedings contain 79 papers. The topics discussed include: aircycle proof-of-concept: work towards using gamification and IoT to fight the global obesity crisis;exploring RSSI dependency on height in uhf for thr...
ISBN:
(纸本)9781509025763
The proceedings contain 79 papers. The topics discussed include: aircycle proof-of-concept: work towards using gamification and IoT to fight the global obesity crisis;exploring RSSI dependency on height in uhf for throughput optimization;analysis of Bluetooth and Wi-Fi interference in smart home networks;location based analysis of AODV performance in the presence of black hole nodes;semi-autonomous vehicles: towards a conceptual model of compliance with owner manual standards;implementing a compact data format for Bluetooth and 3G communication to monitor remote pipelines;a user scheduling scheme in LTE/LTE-a networks for a mixed traffic environment;design considerations of a topology control prototype for wireless mesh networks;optimized survivability scheme to safeguard end to end QoS in the next generation optical networks;the feasibility of a WLAN based power subsation monitoring platform;pattern recognition technique to eliminate multipath and radio-frequency interference in an automated antenna measurement system;optimal power control strategy of a distributed energy system incorporating demand response;variation of altitude on the variance of angle of arrival fluctuations for optical beam propagation in free space optical communications;an empirical analysis of semantic web mechanisms for storage and query of ontologies in relational databases;the influence of external actors in the formulation of national information and communications technology policies in developing countries: case of Swaziland;and capacity improvement for VOiP based two-tier CRN using space-time spectrum sensing.
The Thirdinternational Symposium on Computer Vision and the internet (VisionNet39;16) brought together leading researchers to share their results, learn about the latest advances in the field, identify key challeng...
详细信息
暂无评论