With the increasing demand of cloud computing, energy consumption has drawn enormous attention in business and research community. This is also due to the amount of carbon footprints generated from the information and...
详细信息
ISBN:
(纸本)9783319280349;9783319280332
With the increasing demand of cloud computing, energy consumption has drawn enormous attention in business and research community. This is also due to the amount of carbon footprints generated from the information and communication technology resources such as server, network and storage. Therefore, the first and foremost goal is to minimize the energy consumption without compromising the customer demands or tasks. On the other hand, task consolidation is a process to minimize the total number of resource usage by improving the utilization of the active resources. Recent studies reported that the tasks are assigned to the virtual machines (VMs) based on their utilization value on VMs without any major concern on the processing time of the tasks. However, task processing time is also equal important criteria. In this paper, we propose a multi-criteria based task consolidation algorithm that assigns the tasks to VMs by considering both processing time of the tasks and the utilization of VMs. We perform rigorous simulations on the proposed algorithm using some randomly generated datasets and compare the results with two recent energy-conscious task consolidation algorithms, namely random and MaxUtil. The proposed algorithm improves about 10 % of energy consumption than the random algorithm and about 5 % than the MaxUtil algorithm.
The proceedings contain 301 papers. The topics discussed include: a cloud computing resource allocation model based on combinatorial double auction;a component business model-based approach for business architecture i...
ISBN:
(纸本)9781509025350
The proceedings contain 301 papers. The topics discussed include: a cloud computing resource allocation model based on combinatorial double auction;a component business model-based approach for business architecture integration of C4ISR system;a framework of e-learning education clouds to efficiency and personalization;a framework of multi-index modeling for similarity-based remaining useful life estimation;a fused multi-feature based co-training approach for document clustering;a kind of efficient data archiving method for historical sensor data;a manycore processor based multilayer perceptron feedforward acceleration framework for embedded system;a method for cracking the password of WPA2-PSK based on SA and HMM;a new cuckoo search and its application of spread spectrum radar polly phase code design;a new image processing enabled approach for detection of scratch defects for wire-type objects;a subnetting mechanism with low cost deadlock-free design for irregular topologies in NoC-based Manycore processors;a uniform identity authentication method based on cookie ticket;access features analysis of things in the internet of things;acquisition of hovering by actual UAV using reinforcement learning;and computer-aided design, manufacturing and test of a ferrite toroidal planar transformer integrated in a printed circuit.
Cloud computing delivers digital services over the internet by using various applications which were carried out at distributed datacenters by computer systems. It provides protocol based high performance computing wh...
详细信息
ISBN:
(数字)9783319309330
ISBN:
(纸本)9783319309330;9783319309323
Cloud computing delivers digital services over the internet by using various applications which were carried out at distributed datacenters by computer systems. It provides protocol based high performance computing which permits shared storage and computation over long distances. This proposed work bridges the efficient computation and secure storage in cloud environment. Secure cloud storing includes receiving the data by cloud server for storage after applying security steps like authentication, encryption of data and allocation of storage space. In cloud computing, a secured computing infrastructure is provided to cloud user through computing request and commitment generation. Dynamic server stipulation by cuckoo algorithm is utilized after the completion of successful user access. The uncheatable computation, secure access and storage of proposed work achieve confidentiality. It improves the efficiency and manages concurrent users' requests.
Secure routing is vital in wireless ad-hoc networks for establishing reliable networks and secure data transmission. However, most routing security solutions in wireless ad-hoc networks make assumptions about the avai...
详细信息
ISBN:
(数字)9783319480572
ISBN:
(纸本)9783319480572;9783319480565
Secure routing is vital in wireless ad-hoc networks for establishing reliable networks and secure data transmission. However, most routing security solutions in wireless ad-hoc networks make assumptions about the availability of key management infrastructures that are against the very nature of ad-hoc networks. In this paper, we propose DASSR scheme, a new secure routing approach based on a fully distributed authentication and self-organized public key management scheme without any central authorizing entity. In DASSR, routing messages are authenticated between neighboring nodes (hop-by-hop) and between source and destination nodes (end-to-end) by using nodes' signatures. Once authenticated, messages are guaranteed for integrity and non-repudiation, hence the scheme could prevent potential routing attacks from malicious nodes. We evaluate our proposed scheme DASSR by applying it to the AODV routing protocol, a representative of reactive ad-hoc routing protocols, and demonstrate the effectiveness and security properties of the proposed approach. A comprehensive review of related secure routing protocols is presented and compared with the proposed scheme DASSR.
Despite recent efforts and important results already achieved, the reduction of energy consumption and carbon emissions by Information and Communication Technologies is still far from the expected goals. As the annual...
详细信息
The proceedings contain 36 papers. The special focus in this conference is on Innovations in Computer Science and Engineering. The topics include: Secure ATM door locking system using RFID;analysis of various paramete...
ISBN:
(纸本)9789811004179
The proceedings contain 36 papers. The special focus in this conference is on Innovations in Computer Science and Engineering. The topics include: Secure ATM door locking system using RFID;analysis of various parameters for link adaptation in wireless transmission;n-gram classifier system to filter spam messages from OSN user wall;a recent study of emerging tools and technologies boosting big data analytics;registration plate recognition using dynamic image processing and genetic algorithm;comparing the capacity, NCC, and fidelity of various quantization intervals on DWT;enhancing cloud computing server to use cloud safely and to produce infrastructure of high performance computing;3-D array pattern distortion analysis;high-security pipelined elastic substitution box with embedded permutation facility;an integrated approach to high-dimensional data clustering;performance analysis of network virtualization in cloud computing infrastructures on openstack;a shoulder-surfing resistant graphical password authentication scheme;a proposal for searching desktop data;low-power analog bus for system-on-chip communication;text clustering and text summarization on the use of side information;assessment of reusability levels on domain-specific components using heuristic function;reliable propagation of real-time traffic conditions in VANETS to evade broadcast storm;hybrid multi-objective optimization approach for neural network classification using local search;effectiveness of email address obfuscation on internet;how massive online data breaches impacts personal data in web;a survey on challenges in software development during the adoption of agile environment and data fusion approach for enhanced anomaly detection.
The proceedings contain 24 papers. The topics discussed include: spoofed video detection using histogram of oriented gradients;new approach for advanced cooperative learning algorithms using RL methods (ACLA);extracti...
ISBN:
(纸本)9781450343015
The proceedings contain 24 papers. The topics discussed include: spoofed video detection using histogram of oriented gradients;new approach for advanced cooperative learning algorithms using RL methods (ACLA);extraction of roads from remotely sensed images using a multi-angled template matching technique;RISA: rotation illumination scale and affine invariant face recognition;preserving confidentiality and integrity of DICOM images using cryptographic algorithms;selfie search: image retrieval and face recognition in iOS;spam and sentiment analysis model for twitter data using statistical learning;and computing correlative association of terms for automatic classification of text documents.
Digital Forensic Investigations is explained as aresponse to an event that has already occurredin relation to information which is highly classified or is of prime importance to a criminal incident. The case is consid...
详细信息
ISBN:
(纸本)9789380544199
Digital Forensic Investigations is explained as aresponse to an event that has already occurredin relation to information which is highly classified or is of prime importance to a criminal incident. The case is considered when the suspect's electronic gadgetsare seized. The related investigation proceeds to search for the traces in the image of the actual evidence. The traces of deleted, overwritten and archived files could also be found in forensic software's like EnCase, FTKetc. To ensure the evidence is well represented in the court of law, the examination is conducted in a sequential and legal manner. Soft-wares used in forensic investigations e.g. Encase, FTK etc. gives the entire details of the case, date and time, investigationsinvolved and information on the computer itself. The process mainly lays emphasis on four main stages: i) Investigation Preparation, ii)Evidence Acquisition, iii) Analysis of Evidence and iv) Result Dissemination. The most essential component in DFI is the proper acquisition of the evidence. The DFI is preferably never performed on the actual exhibits that are seized from the crime scene. Hence, evidence acquisition holds huge importance. Although various forensic methods have been proved for their reliability and credibility in the criminal justice system, their main problem lies in the necessityof highly qualified investigators. The investigators should be vigilant right from the preparation required for investigating a crime scene till the dissemination of the result. The paper mainly lays emphasis on the most influential methods involved in the DFI and the effective results obtained.
The internet of Things (IoT) has been a hot topic of discussion in the technology sphere. IoT allows objects or “things” to be sensed and controlled across an existing network infrastructure mainly the internet. In ...
详细信息
ISBN:
(纸本)9781467394178
The internet of Things (IoT) has been a hot topic of discussion in the technology sphere. IoT allows objects or “things” to be sensed and controlled across an existing network infrastructure mainly the internet. In many ways, IoT is really an evolution of Machine to Machine (M2M) technology that has existed for many decades. Given JavaScript's ubiquitous nature, it's natural that it has been deemed fit as “the” language for “internet of Things” or IoT. [7].
Today39;s society and organizations rely on large-scale and ultra-large scale IT systems. Large-scale IT systems drive social and organizational change. We find them as the backbone of what we call the digital socie...
详细信息
ISBN:
(数字)9783319480572
ISBN:
(纸本)9783319480572;9783319480565
Today's society and organizations rely on large-scale and ultra-large scale IT systems. Large-scale IT systems drive social and organizational change. We find them as the backbone of what we call the digital society, the digital economy, the fourth industrial revolution and so forth. Large scale-systems show as systems of systems or IT system landscapes. They show as data-intensive systems, workflow-intensive systems, massively resource-intensive systems, highly distributed systems. How to deal with the complexity of large-scale systems? How to approach architecture, design, realization and management of large-scale systems in systematic and rigorous ways? In this talk we attempt a foundational review of modeling and engineering techniques available for large-scale systems. From this, we try to understand possible pathways, both short-term and long-term, of large-scale systems modeling and engineering.
暂无评论