In wireless sensor networks, data gathering and aggregation plays an important role while routinroutingg protocols are used to forward information to the base station. Clustering is the best way so far to do data aggr...
详细信息
In wireless sensor networks, data gathering and aggregation plays an important role while routinroutingg protocols are used to forward information to the base station. Clustering is the best way so far to do data aggregation and routing. In clustered network, cluster heads (CHs) are the special nodes within network where collected data within a cluster are stored. While routing data to the base station, only CHs are used. Most of the clustering techniques follow round mechanism to decide next CHs. In order to maintain fault tolerance, this round mechanism is well suitable as faulty nodes are detected in each round. But, generation of new CHs after each round increases communication overhead in the network. In this paper, we propose a new energy-efficient distributed QoS-aware clustering technique to reduce this increased overhead in clustered wireless sensor networks. Our simulation results show that proposed heuristic outperforms existing methods under various parameters.
Cloud computing is the important form of information service infrastructure and application model in the age of the internet, is a new generation of information technology intensive development inevitable trend, its r...
详细信息
Cloud computing is the important form of information service infrastructure and application model in the age of the internet, is a new generation of information technology intensive development inevitable trend, its resource aggregation and virtualization, application services, and flexible specialization, on-demand supply and use of the service mode provide highly efficient, low cost, low power consumption of computing and data services, support all kinds of information, the application of special financial information. Cloud computingtechnology with its own technological advantage produces a great change for enterprise informatization construction, and the operation mode of the electronic commerce enterprise and other fields. With cloud computing platform as the core business service models, it will also have significant influence on society and internet application mode on the existing business.
Cloud computing concept can easily be described as a system in which multiple computers are attached to a real-time system using the internet and these systems share the resource as per user39;s demand with pay per ...
详细信息
ISBN:
(纸本)9781467394178
Cloud computing concept can easily be described as a system in which multiple computers are attached to a real-time system using the internet and these systems share the resource as per user's demand with pay per use concept. This phenomenal property of cloud computing is responsible for a lot of advantages for the cloud customers. However, with the rapid growth of useful and sensitive information on cloud computing systems, a huge obstacle for cloud computing services still remains. Data security in any system decides the reliability of the processes associated with it, so proper countermeasures should be applied to ensure proper working. In this paper, we analyze complete security outlook of cloud architecture and cloud computing security aspects. The purpose of the study of this paper is to provide a classification based on the Cloud Security. We have studied the various security issues of Cloud computing having “Confidentiality”, “Integrity” and “Availability” as a major concern.
Cloud computing is an emerging technology that have a broad scope to offers a wide range of services to revolutionize the existing IT infrastructure. This internet based technology offers a services like - on demand s...
详细信息
ISBN:
(纸本)9783319466750;9783319466743
Cloud computing is an emerging technology that have a broad scope to offers a wide range of services to revolutionize the existing IT infrastructure. This internet based technology offers a services like - on demand service, shared resources, multitenant architecture, scalability, portability, elasticity and giving an illusion of having an infinite resource by a consumer through virtualization. Because of the elastic nature of a cloud it is very critical of a service provider specially for a small/medium cloud provider to form a viable SLA with a consumer to avoid any service violation. SLA is a key agreement that need to be intelligently form and monitor, and if there is a chance of service violation then a provider should be informed to take necessary remedial action to avoid violation. In this paper we propose our viable SLA management framework that comprise of two time phases - pre-interaction time phase and post-interaction time phase. Our viable SLA framework help a service provider in making a decision of a consumer request, offer the amount of resources to consumer, predict QoS parameters, monitor run time QoS parameters and take an appropriate action to mitigate risks when there is a variation between a predicted and an agreed QoS parameters.
Earlier days, we use to have security cameras for detection. But the main disadvantage was: Absence of mobility and Sophisticated cameras To overcome this disadvantage: We have find a way to detect the door when it is...
详细信息
ISBN:
(纸本)9781467394178
Earlier days, we use to have security cameras for detection. But the main disadvantage was: Absence of mobility and Sophisticated cameras To overcome this disadvantage: We have find a way to detect the door when it is opened and we have to register that through a wifi connection. So the `door detection' module should send data to a mobile over wifi when a door is opened an alarm is also raised. The distance is been measured by the device, if distance is more so that a person can move inside the alarm get raised and a sms is sent to user. By the alert msg user can be aware of any burglary taking place. Basic goal to make this project is to make people more secure in their absence at home. Our project one aim is to make India a IOT based country, to make people's lifestyle more comfortable and easy.
The internet of Things with its enormous growth widens its applications to the living environment of the people by changing a home to smart home. Smart home is a connected home that connects all type of digital device...
详细信息
The internet of Things with its enormous growth widens its applications to the living environment of the people by changing a home to smart home. Smart home is a connected home that connects all type of digital devices to communicate each other through the internet. These devices form a home area network where communications are enabled by different protocols. As these devices are designed by different companies with different standards and technologies there is a problem exists in their connectivity. This paper aims at describing the wireless standards used in home network and how these protocols face the connectivity challenges in the smart home network.
Content distribution, especially the distribution of video content, unavoidably consumes bandwidth resources heavily. internet content providers invest heavily in purchasing content distribution network (CDN) services...
详细信息
Content distribution, especially the distribution of video content, unavoidably consumes bandwidth resources heavily. internet content providers invest heavily in purchasing content distribution network (CDN) services. By deploying tens of thousands of edge servers close to end users, CDN companies are able to distribute content efficiently and effectively, but at considerable cost. Thus, it is of great importance to develop a new system that distributes content at a lower cost but comparable service quality. In lieu of expensive CDN systems, we implement a crowdsourcing-based content distribution system, Thunder Crystal, by renting bandwidth for content upload/download and storage for content cache from agents. This is a large-scale system with tens of thousands of agents, whose resources significantly amplify Thunder Crystal's content distribution capacity. The involved agents are either from ordinary internet users or enterprises. Monetary rewards are paid to agents based on their upload traffic so as to motivate them to keep contributing resources. As far as we know, this is a novel system that has not been studied or implemented before. This article introduces the design principles and implementation details before presenting the measurement study. In summary, with the help of agent devices, Thunder Crystal is able to reduce the content distribution cost by one half and amplify the content distribution capacity by 11 to 15 times.
The internet is a Heterogeneous entity which is constantly changing and evolving. The concept of “internet of Things” (IOT) refers to extending the intelligent sensors in our day to day objects such as televisions, ...
详细信息
ISBN:
(纸本)9781467394178
The internet is a Heterogeneous entity which is constantly changing and evolving. The concept of “internet of Things” (IOT) refers to extending the intelligent sensors in our day to day objects such as televisions, fridge, media players, heating appliances etc. This would help in extending the ability of the objects to provide feedback to the user. This enables the object to have some sort of consciousness. What we have today is the human interacting with the object and not vice-versa, but the IOT would help us to complete this loop. This kind of digitization would mean that our next generation of refrigerators would know more about our diet then our current dieticians. This would help in creating a “system of systems”. Considering a current scenario where the number of digital security threats and attacks are increasing day by day, the notion of IOT would be incomplete if we ignore its security aspects. In this paper, we would be exploring the various security aspects of IOT such as security of remote frequency identifiers(RFID), wireless sensors etc. We have proposed a taxonomy of the security aspects of IOT. We have also explained the basic concepts and motivation behind the evolution of IOT, its architecture, and applications.
Finding location in wireless sensor network (WSN) is a basic and crucial issue because sensed data without location information is useless. Mainly localization algorithms can be categorized into two classes: range-fre...
详细信息
ISBN:
(纸本)9781467394178
Finding location in wireless sensor network (WSN) is a basic and crucial issue because sensed data without location information is useless. Mainly localization algorithms can be categorized into two classes: range-free and range-based. Range-free algorithms are more cost-effective than range based schemes; an additional ranging hardware is needed in range based algorithms. In this paper, we present a distributed range free localization algorithm: Varying Anchor Range Half Normal (VARHN) for WSN, in that connectivity, varying anchor ranges and method of half normal are used for providing a low estimated error than other range free algorithms. In VARHN algorithm, anchor nodes transmit beacon signals in the whole network at different range levels, which make multiple rings and circles of transmission ranges of anchors. The principle of half normal is used for estimating the position of unknown nodes. VARHN is also energy efficient because it doesn't need information exchange between nodes. Simulation results show that the proposed algorithm has more accuracy than Centroid, Weighted Centroid Localization (WCL) and Convex Position Estimation (CPE) localization algorithms.
To fulfill the electrical power demand, reliability, service quality and pollution reduction, smart gird should be developed for the smooth interconnection of DG systems in the existing grid infrastructure. Although w...
详细信息
To fulfill the electrical power demand, reliability, service quality and pollution reduction, smart gird should be developed for the smooth interconnection of DG systems in the existing grid infrastructure. Although with the expansion of renewable energies as distributed generation (DG) has positive impact on voltage profile in Grid system, but interconnection of many distributed generator causes Variation in voltage surpassing the controllable limit. Hence SVC is used in grid connected system to make system stable and more reliable by eliminating the fluctuation in voltage caused by sudden connection of DG in to the grid. But SVC takes more time to gain steady state. Thus to address the issue of time delay in gaining voltage stability, a fuzzy logic controller has been integrated along with SVC. A comparative analysis between SVC and integrated Fuzzy logic controller based SVC (FLCSVC) has been done towards addressing voltage stability issue. It has been found FLCSVC as superior than SVC.
暂无评论