The proceedings contain 66 papers. The special focus in this conference is on distributed Systems, Social Networks, and Applications. The topics include: An algorithm for partitioning community graph into sub-communit...
ISBN:
(纸本)9788132225287
The proceedings contain 66 papers. The special focus in this conference is on distributed Systems, Social Networks, and Applications. The topics include: An algorithm for partitioning community graph into sub-community graphs using graph mining techniques;a forensic tool for distributed systems;deterministic transport protocol verified by a real-time actuator and sensor network simulation for distributed active turbulent flow control;improved resource provisioning in hadoop;cuckoo search for influence maximization in social networks;an interactive system for event detection and trend analysis for twitter data;design and implementation of a hierarchical content delivery network interconnection model;solving reliability problems in complex networks with approximated cuts and paths;a correlation analysis for complex real-world network graphs;on solving the multi-depot vehicle routing problem;prediction of crop and intrusions using WSN;ethernet MAC verification by efficient verification methodology for soc performance improvement;a random access registration and scheduling based MAC protocol with directional antennas for improving energy efficiency;a key agreement algorithm based on ECDSA for wireless sensor network;reduction in resource consumption to enhance cooperation in MANET using compressive sensing;AODV and ZRP protocols performance study using OPNET simulator and exata emulator;optimal probabilistic cluster head selection for energy efficiency in WSN;firefly algorithm approach for localization in wireless sensor networks;fuzzy based analysis of energy efficient protocols in heterogeneous wireless sensor networks and bee colony optimization for data aggregation in wireless sensor networks.
Heterogeneous computing systems require efficient task-to-processor mapping for attaining high performance. Scheduling workflows on heterogeneous environments is shown to be NP-Complete. Several heuristics were develo...
详细信息
ISBN:
(纸本)9783319280349;9783319280332
Heterogeneous computing systems require efficient task-to-processor mapping for attaining high performance. Scheduling workflows on heterogeneous environments is shown to be NP-Complete. Several heuristics were developed to attain minimum schedule lengths. However, these algorithms employ level-wise approach of scheduling tasks. This indirectly assigns higher priority to the tasks at lower levels than those at higher levels. Further, the start time of tasks at higher levels is constrained by the completion times of tasks at lower levels. The present work proposes a novel heuristic based global scheduling algorithm namely Minimal Start Time (MST) algorithm for workflows. The proposed approach focuses on minimizing the start times of tasks which are dependent on the tasks at lower levels to generate shorter span schedules. The primary merit of this scheme is due to the elimination of level constraints whenever there are no dependency constraints. The performance of MST algorithm is evaluated in terms of normalized makespan, speedup, efficiency and improvement of 5-20 % in 80 % of the cases is achieved in comparison to the earlier work.
The internet of things (IoT) is the interconnection of physical objects with the internet network using existing technologies and communication protocols. The speed up and massive uses of this network39;s type in a ...
详细信息
作者:
Confais, BastienLebre, AdrienParrein, BenoitCNRS
IRCCyN UMR 6597 1 Rue NoeBP 92101 F-44321 Nantes 3 France INRIA
LINA UMR 6241 Mines Nantes 4 Rue Alfred Kastler F-44300 Nantes France Univ Nantes
IRCCyN UMR 6597 Polytech Nantes Rue Christian PaucBP 50609 F-44306 Nantes 3 France
Fog/Edge computing infrastructures have been proposed as an alternative of current Cloud computing facilities to address the latency issue that prevents the development of several applications. The main idea is to dep...
详细信息
ISBN:
(纸本)9781509014453
Fog/Edge computing infrastructures have been proposed as an alternative of current Cloud computing facilities to address the latency issue that prevents the development of several applications. The main idea is to deploy smaller datacenters at the edge of the backbone in order to bring Cloud computing resources closer to the end-usages. While couple of works illustrated the advantages of such infrastructures in particular for the internet of Things (IoT) applications, the way of designing elementary services that can take advantage of such massively distributed infrastructures has not been yet discussed. In this paper, we propose to deal with such a question from the storage point of view. First, we propose a list of properties a storage system should meet in this context. Second, we evaluate through performance analysis three "off-the-shelf" object store solutions, namely Rados, Cassandra and InterPlanetary File System (IPFS). In particular, we focused (i) on access times to push and get objects under different scenarios and (ii) on the amount of network traffic that is exchanged between the different sites during such operations. Experiments have been conducted using the Yahoo Cloud System Benchmark (YCSB) on top of the Grid' 5000 testbed. We show that among the three tested solutions IPFS fills most of the criteria expected for a Fog/Edge computing infrastructure.
This paper addresses the anonymous communications technology. Multiple hops, self-organization, no fixed facilities and limited computing resources of wireless ad hoc networks (MANET) make it hard to apply high comple...
详细信息
ISBN:
(数字)9783319325576
ISBN:
(纸本)9783319325576;9783319325569
This paper addresses the anonymous communications technology. Multiple hops, self-organization, no fixed facilities and limited computing resources of wireless ad hoc networks (MANET) make it hard to apply high complexity of a traditional network security algorithm. Security mechanisms can better solve the security issues of anonymous communication. This paper mainly studies the existing anonymous technology of traditional networks and MANET, and summarizes its advantages and disadvantages. With this article, readers can have a more thorough understanding of anonymous communication security and research trends in this area.
Indian MST Radar antenna comprises of 1024 three-component Yagi-Uda receiving antennas masterminded in a 32 × 32 matrix over a territory of 130 m × 130 m. The antenna array is fed by 32 distributed transmitt...
详细信息
One Time Password (OTP) is widely used by many online service providers to authenticate the users at the account log-in time. The username and password are fixed;this may be vulnerable for users. To avoid the fake log...
详细信息
ISBN:
(纸本)9789380544199
One Time Password (OTP) is widely used by many online service providers to authenticate the users at the account log-in time. The username and password are fixed;this may be vulnerable for users. To avoid the fake log-in, nowadays service providers are authenticating the users by providing OTP based authentication. The HMAC based OTP (HOTP) and Time based OTP (TOTP) is being used by the online service providers. The combinations used in OTP by the HOTP and TOTP are basically numbers only, due to the minimum resources to generate the OTP. Sometimes numeric OTP had been used by hackers and attackers easily. Request based One Time Passkey (ROTP), created by an OTP is using a combination of numeric value, alphabets in small and capital letters with some permitted special characters. The ROTP Mechanism gives around more than 3 trillion combinations of OTPs. The time to get the validation of ROTP from the users will be fixed same as HOTP and TOTP. Due to more combinations, the hackers and attackers need unexpectable resource to generate and break down the ROTP which were generated and sent to the users for the single time validation purpose. This paper explains about the design and development of Request based One Time Passkey (ROTP) mechanism.
Social Networks are a source of information very use to know what happen around us. While, the internet of Things is a world that tries to measure everything by gathering data from sensors and interconnect different o...
详细信息
In the life cycle of any software system, a crucial phase formalization and validation through verification or testing induces an identification of errors infiltrated during its design. This is achieved through verifi...
详细信息
ISBN:
(纸本)9788132227557;9788132227533
In the life cycle of any software system, a crucial phase formalization and validation through verification or testing induces an identification of errors infiltrated during its design. This is achieved through verification by model checking. A model checking algorithm is based on two steps: the construction of state space of the system specification and the verification of this state space. However, these steps are limited by the state explosion problem, which occurs when models are large. In this paper, we propose a solution to this problem to improve performance in execution time and memory space by performing the exploration of state space in a distributed architecture consisting of several machines.
In this work, the proposed Intelligent Indoor Environment Monitoring System in Cloud (iDEMS) combines environmental sensors with ZigBee wireless sensor network technology to store and process environmental data in HBa...
详细信息
ISBN:
(纸本)9781509035557
In this work, the proposed Intelligent Indoor Environment Monitoring System in Cloud (iDEMS) combines environmental sensors with ZigBee wireless sensor network technology to store and process environmental data in HBase. The environmental data collected by sensors will be stored and processed in the cloud using HBase, which supports storing large amounts of data, free to easily increase storage space. The iDEMS also can compute through Hadoop MapReduce for the HBase database to do distributedcomputing or cloud computing to process environmental records. In this part, we particularly Take great effort to improve the performance of read and write in big data and provide functions, including information searching, data filtering, and basic statistics. In addition, iDEMS integrated with an intelligent control socket to effectively improve the air quality of indoor environment and reduce the concentration of pollutants in the environment to keep people far from pollutants. Finally, IDEMS presents the environmental information by a web-based monitoring platform so that users can use the internet to monitor the environment and adjust the indoor environment at any time, any place as wanted.
暂无评论