Geo-distributed mobile cloud computing (GMCC) integrates location information into mobile cloud computing, that has high potential for a large variety of applications. In a vehicular environment, a GMCC provides a lar...
详细信息
ISBN:
(纸本)9781509009473
Geo-distributed mobile cloud computing (GMCC) integrates location information into mobile cloud computing, that has high potential for a large variety of applications. In a vehicular environment, a GMCC provides a large number of resources to vehicles that are geographically close to them. However, there are few studies that focus on security and privacy issues in a GMCC scenario. Vehicles need sufficient pseudonyms to periodically change for privacy preservation. In this paper, we focus on pseudonym management in GMCC system for vehicular environment. We design a three-layer on-demand pseudonym system to manage the pseudonyms. Moreover, we propose a secure pseudonym distribution scheme for secure communication among vehicles. As the number of demanded pseudonyms varies with traffic loads in different clouds, we use a newsvendor model to address the optimal on-demand pseudonym distribution problem. Numerical results indicate our proposed schemes not only improve utility of the clouds, but also maximize utilization of the pseudonyms.
The islanding operation of DG usually occurs when the wind plant that is the source in the DG, still makes a section of the page distribution according to this section has been disconnected from the service program so...
详细信息
ISBN:
(纸本)9781467392075
The islanding operation of DG usually occurs when the wind plant that is the source in the DG, still makes a section of the page distribution according to this section has been disconnected from the service program source. Distribution of the feeder islands with power DG are usually not required. In the proposed method, the q-axis current in the inverter is measured and the current controller is modeled with a continuous periodic Reference power from a small value. The possibility of false detection is eliminated through the affirmation of the occurrence of islanding as soon as it is suspected. DG is a islanded from the upstream system, if the frequency variation is occur in a small value due to a change in the inverter current. The proposed algorithm detects the island grid formation in the stable condition of the system. Computer simulation is done with MATLAB.
In today39;s world, safeguarding data has become a major role. Almost all the public and private organization39;s secured data are stored in internet as cloud storage. Attackers have more opportunities for gaining...
详细信息
ISBN:
(纸本)9781509023103
In today's world, safeguarding data has become a major role. Almost all the public and private organization's secured data are stored in internet as cloud storage. Attackers have more opportunities for gaining access to these secured information via internet. Attacking against a network infrastructure becomes easy, because any networks can be reached from anywhere in the world via the internet. Firewall is a must in a corporate for safeguarding system. In this paper, we describe the ways in which hackers tries to get access to a system and the ways by which one can safeguard their system from getting hacked. SonicWALL analyser is used for tracing and blocking the incoming attack within gateway and firewall. Some prevention techniques for safeguarding an individual system are also described.
Investigation of mechanisms of gallium nitride epitaxial growth requires a study of the surface properties by means of computer modeling. An important step in the simulation of diffusion processes on the surface of ga...
详细信息
The development of internet-of-things and mobile application development taking in consideration the increase in number of smart phone users has opened a new horizon for solving one of the significant issues of saving...
详细信息
ISBN:
(纸本)9781467394178
The development of internet-of-things and mobile application development taking in consideration the increase in number of smart phone users has opened a new horizon for solving one of the significant issues of saving life in case of emergencies. We present a novel intelligent Traffic preemption systems that allows the vehicles to preempt and operate the traffic intersections with the help of mobile devices, in case of emergencies on the way to hospitals in order to reduce the delay and improve the response time. In this paper we discuss the design and implementation of a non-obtrusive, cost efficient and a reliable system that helps in traversing the vehicle easily through a congested traffic intersection via a smooth and fluent path. An internet of Things ecosystem is developed that can be preempt traffic signals using a mobile application via internet. The web server has to be configured to accept such connections and store the metadata in a database. Authentication measures have been taken in account so that the system is less vulnerable to get misused. The theory, design procedures, and discussions of the system are presented.
The selection of most informative terms reduces the feature set and speed up the classification process. The most informative terms are highly affected by the correlative association of the terms. The rare terms are m...
详细信息
The ability to provide public eservices has tremendously increased with the rapid advancements and development of the IT infrastructure and the availability of internet. The aim to ensure the scalability, flexibility ...
详细信息
The ability to provide public eservices has tremendously increased with the rapid advancements and development of the IT infrastructure and the availability of internet. The aim to ensure the scalability, flexibility and feasibility to meet the IT infrastructure demands which can be achieved with the Cloud computingtechnology. Therefore, the perspective of the IT personnel, working in Oman public sector organizations, becomes imperative towards understanding the factors that impact the willingness to adopt Cloud computingtechnology. This research aims to understand whether an IT personnel's perspective is an influencing factor in the slowness of the adoption of Cloud computing. And also whether the influencing factors are an outcome of individual characteristics of the IT personnel or an outcome of the characteristics of the technology itself. The authors examine the factors and build a research model that integrates the two types of factors; those that relate to the individual characteristics of IT personnel (Human-related factors) and those that relate to the IT personnel's perception of various characteristics of the Cloud computingtechnology (system-related factors). This study is based on quantitative approach wherein the online survey is applied for collecting the information. The findings of this study will reveal and highlight the IT personnel perspective as a factor faced by Oman public sector organizations in the slow adoption of cloud computingtechnology.
India is an agricultural country. Farmers are the life-blood of the nation. But the current condition of a farmer in India is very pathetic. Today farmers are not able to enjoy the yield produced by them. The farmers ...
详细信息
ISBN:
(纸本)9781467394178
India is an agricultural country. Farmers are the life-blood of the nation. But the current condition of a farmer in India is very pathetic. Today farmers are not able to enjoy the yield produced by them. The farmers should be introduced to the modern farming techniques because upon their well-being depends the welfare of the nation. Here, ICT plays a very important role meeting these challenges. Precision farming and modern society can play important roles in promoting ICT in agriculture. But the adoption is very slow in nature due to the number of yet unresolved issues discussed in earlier developed projects. The paper presents a generic framework for e-agricultural system comprising of knowledge management and monitoring system and also gives a brief description of the application interface.
The process of extraction of interesting patterns or knowledge from the bulk of data refers to the data mining technique. “It is the process of discovering meaningful, new correlation patterns and trends through non-...
详细信息
ISBN:
(纸本)9781467394178
The process of extraction of interesting patterns or knowledge from the bulk of data refers to the data mining technique. “It is the process of discovering meaningful, new correlation patterns and trends through non-trivial extraction of implicit, previously unknown information from large amount of data stored in repositories using pattern recognition as well as statistical and mathematical techniques”. Due to the wide deployment of internet and information technology, storage and processing of data technologies, the ever-growing privacy concern has been a major issue in data mining for information sharing. This gave rise to a new path in research, known as Privacy Preserving Data Mining (PPDM). The literature paper discusses various privacy preserving data mining algorithms and provide a wide analyses for the representative techniques for privacy preserving data mining along with their merits and demerits. The paper describes an overview of some of the well-known PPDM algorithms. Most of the algorithms are usually a modification of a well-known data-mining algorithm along with some privacy preserving techniques. This paper also focuses on the problems and directions for the future research here. The paper finally discusses the comparative analysis of some well-known privacy preservation techniques that are used. This paper is intended to be a summary and an overview of PPDM.
internet of Things [IoT] is an emerging technology today after internet and mobile network. IoT enables the user with several smart applications by connecting millions of devices and sensors. The IoT infrastructure is...
详细信息
ISBN:
(纸本)9781467394178
internet of Things [IoT] is an emerging technology today after internet and mobile network. IoT enables the user with several smart applications by connecting millions of devices and sensors. The IoT infrastructure is larger than the conventional network and thus the security challenges are more while connecting the heterogeneous devices to infer information for smart services anywhere anytime from the integrated smart environment. As the services and applications are realized in Integrated IoT smart services environment, the raising security issues of different nature must be addressed properly. This paper proposes a novel security architecture for integrated IoT Smart Services Environment which could resolve the security problems. The proposed security architecture has four levels of security namely user and device authentication, sensor network security, cloud and internet security, applications and services security. This security architecture will enable the public to access the diversified services and applications anywhere and anytime using the underlying technologies of integrated smart services environment in the protected manner.
暂无评论