distributed data mining (DDM) has become important research area with the increase in large distributed transactional databases and need to investigate important patterns in such databases. DDM may increase the proces...
详细信息
ISBN:
(纸本)9781467394178
distributed data mining (DDM) has become important research area with the increase in large distributed transactional databases and need to investigate important patterns in such databases. DDM may increase the processing capabilities but it increases communication and storage cost. Many algorithms and tools for mining association rules in distributed databases are proposed in literature. This paper illustrates some of the DDM algorithms and also tools proposed in literature for mining association rules in the distributed environment.
Network Security is one of the important concepts in data security as the data to be uploaded should be made secure. To make data secure, there exist number of algorithms like AES (Advanced Encryption Standard), IDEA ...
详细信息
ISBN:
(纸本)9781467394178
Network Security is one of the important concepts in data security as the data to be uploaded should be made secure. To make data secure, there exist number of algorithms like AES (Advanced Encryption Standard), IDEA (international Data Encryption Algorithm) etc. These techniques of making the data secure come under Cryptography. Involving lnternet of Things (IoT) in Cryptography is an emerging domain. IoT can be defined as controlling things located at any part of the world via internet. So, IoT involves data security i.e. Cryptography. Here, in this paper we discuss how data can be made secure for IoT using Cryptography.
With the explosive development of the internet of things technology in recent years, the internet of things technology is also used more and more widely in modern agricultural production. For mass sensor data was prod...
详细信息
ISBN:
(数字)9783319483542
ISBN:
(纸本)9783319483542;9783319483535
With the explosive development of the internet of things technology in recent years, the internet of things technology is also used more and more widely in modern agricultural production. For mass sensor data was produced by the internet of things in agricultural production, While big data bring many benefits and unprecedented challenges to users. The internet of things in agriculture production produces some complexity problem which are mass sensor data's Scale, sensor data's heterogeneity and mass sensor data's operation, distribution of sensor, high concurrency of data is written etc. In the presence of these problems, this paper put forward a kind solution of agricultural private cloud sensor data Platform, which is named "Sensor PrivateClouds Platform" (SPCP). The Private cloud platform including following modules, All of these are distributed sensor data caching module based on cluster of memercached and Nginx load (SensorCache);heterogeneous data adapter of sensor module (SensorAdpter), distributedcomputing storage module based on hadoop' HDFS (SensorStorage), efficient query module of sensor data warehouse based on the Hive (SensorStore), management module of sensor metadata (SensorManager), parallel sensor data analysis module (SensorNum) based on the map-reduce of the hadoop, cloud service of sensor data module (SensorPublish) based on webservice. The experimental results show that SPCP have had the abilities which are mass sensor data storage, cleaning of heterogeneous sensor data, real-time query and processing of mass sensor data. These abilities provides a feasible solution for the heterogeneous data storage and mass sensor data's query in the internet of things of agriculture production.
The elderly maintain healthy by exercise and friendships connection which not only can reduce the cost of social care but also can contribute their knowledge and experiences to help the younger generation. This study ...
详细信息
ISBN:
(纸本)9783319399485;9783319399492
The elderly maintain healthy by exercise and friendships connection which not only can reduce the cost of social care but also can contribute their knowledge and experiences to help the younger generation. This study is aimed to investigate the usability and functionalities of the fitness platform with multi-user virtual situations on smart TV service content, which was developed by the author. The main modules of the platform include limb movements driven by motion sensing interaction with Kinect, contactless graphical user interface, alternative 3D avatars and situational environments, synchronous interaction of distributed multi-users, and interface of unified computing health data. Group interview and a questionnaire were designed to evaluate the feasibility and usability associated with using the virtual fitness platform. A total of 40 elderly users assess this set of content service. The results of this study showed that most of the users are satisfied by the system functionality and usability. Furthermore, the platform also offers the interface for data connecting the wearable devices which assist in increasing the effectiveness of the real time elderly health maintenance.
Technologies on mobile adhoc networks (MANETs) are the one that support self organizing and infrastructure less networks. The internet Gateway (IGW) within the range of mobile nodes is used to establish the communicat...
详细信息
ISBN:
(纸本)9781467394178
Technologies on mobile adhoc networks (MANETs) are the one that support self organizing and infrastructure less networks. The internet Gateway (IGW) within the range of mobile nodes is used to establish the communication to the internet for having access. The appropriate approach should be selected for gateway discovery and gateway selection for reliable connection between adhoc mobile nodes and the internet. To connect to internet some particular internet gateway nodes are discovered by mobile nodes from MANET domain. Thus the important task is an internet gateway discovery. There are many proposals suggested and implemented by different authors or researchers, but so far there is no unique and powerful solution has been discovered which can work in all the network functionality scenarios. In this work, we critically examine all the gateway discovery approaches and point out their merits and demerits with future directions in this emerging area.
internet of Things (IoT) creates value through data that can be captured from connected assets and can improve the quality of our lives. Organizations can use IoT to gain a better understanding of their customers39;...
详细信息
internet of Things (IoT) creates value through data that can be captured from connected assets and can improve the quality of our lives. Organizations can use IoT to gain a better understanding of their customers' requirements and can also improve processes such as supply chain, inventory management, investments and public safety. The increasing technological intensity of business is driving significant acceptance of IoT.
The concept that helps to interconnect physical objects equipped with sensing, actuating, computing power and thus lends them the capability to collaborate on a task in unison remaining connected to the internet is te...
详细信息
ISBN:
(纸本)9781467394178
The concept that helps to interconnect physical objects equipped with sensing, actuating, computing power and thus lends them the capability to collaborate on a task in unison remaining connected to the internet is termed as the “internet of Things” (IoT). With the help of sensors, actuators and embedded microcontrollers the notion of smart object is realized. The use of smart objects of the IoT framework will soon be found in application areas like home automation, healthcare, transport etc. wherein these smart devices collect data from the environment of deployment, process them and initiate suitable actions. Thus the internet of Things will bring hitherto unimaginable benefits and help humans in leading a smart and luxurious life. But these benefits are accompanied by various challenges and security threats that need to be addressed. This paper discusses about the building blocks of IoT, presents the architectural components of IoT, lists some potential application domains where IoT is applicable, explores the major challenges that have to be addressed along with the security challenges that need attention.
The significant improvements in technology that have been seen in recent years have resulted in a shift in the computing paradigm: from isolated computational tasks to distributed tasks executed in multi-party setting...
详细信息
ISBN:
(纸本)9781509027712
The significant improvements in technology that have been seen in recent years have resulted in a shift in the computing paradigm: from isolated computational tasks to distributed tasks executed in multi-party settings. Secure Multi-Party Computation (MPC) allows for multiple parties to jointly compute a function on their private inputs. Unfortunately, traditional MPC algorithms are inefficient in the presence of a large number of participants. Moreover, in the traditional setting, MPC is only concerned with privacy of the input values. However, there is often a need to preserve the privacy of individuals on the basis of the output of the computation. Techniques proposed by the Trusted computing community have shown promise in the context of new secure and efficient large-scale applications. In this paper, we define and analyse several use cases related to large-scale applications of the MPC paradigm. From these use cases, we derive requirements and criteria to evaluate certain MPC protocols used for large-scale applications. Furthermore, we propose the utilisation of a Trustworthy Remote Entity and privacy-preserving algorithms to achieve confidentiality and privacy in such settings.
Deadlock is defined as a fundamental problem in distributed environment. Its detection and resolution is also a very typical task due to this distributed behavior where resources are spread over different machine. Dea...
详细信息
ISBN:
(纸本)9781467394178
Deadlock is defined as a fundamental problem in distributed environment. Its detection and resolution is also a very typical task due to this distributed behavior where resources are spread over different machine. Deadlock is a situation where one transaction is requesting for a resource which is hold by another transaction and also it itself holding a resource which is needed by another transaction. Deadlock effect the whole performance of the system. The most widely used algorithm for deadlock detection is Edge-chasing and diffusion computation based algorithm. Aprobé which is a special massage, and used for deadlock detection in Edge chasing algorithm, is sent through the outgoing edges. When the originator receives the probe massage back then it indicates that deadlock is recognized. Here we present different deadlock detection technique and different approaches in distributed database system for deadlock detection.
Cloud computing is an unceasing technology emerging as a boon in an IT industry that ensures online, on demand services which are accessible anywhere. Explosive rise of data in cloud computing trends more service requ...
详细信息
ISBN:
(纸本)9781467394178
Cloud computing is an unceasing technology emerging as a boon in an IT industry that ensures online, on demand services which are accessible anywhere. Explosive rise of data in cloud computing trends more service requests and load on cloud impose a challenge on service provider of uniformly directing the load in distributed environment. To overcome this issue of load balancing various load balancing algorithms, models and services have been proposed. In this paper, centralized load balancing algorithm has been proposed that dynamically balance the load and ensures overall performance of the system. This concept focus on achieving high resource utilization, reduced job rejections, improved computational capabilities and building a fault tolerant system by creating backups. The results of this cluster oriented load balancing algorithm shows reduction in response time and improved processing time.
暂无评论