With the increased connectivity of computer devices including mobile devices to the internet, the volume as well as the type of information that moved through organization network perimeter are also growing significan...
详细信息
With the increased connectivity of computer devices including mobile devices to the internet, the volume as well as the type of information that moved through organization network perimeter are also growing significantly. Consequently, this has heightened information security threats to organizations that rely on the internet to do their businesses. On the other hand, Intrusion Detection System (IDS) being used today to detect these threats is limited by a single threaded application, limiting its capability to cope with the growing network traffic. This research introduced a parallel intrusion detection system based on GPGPU and Open computing Language (OpenCL), that processes incoming packets concurrently, thus increasing system capacity in a high throughput environment. The experiment result shows that performance of GPU-based design is improved on the average of 58.73x against a single-thread central processing unit (CPU) implementation, and on the average of 13.53x against a multi-thread implementation. At the same time, GPGPU-based system has a performance gain of 29.92 compared with CPU-based system implementation.
This paper presents a new cloudlet mesh architecture for security enforcement to establish trusted mobile cloud computing. The cloudlet mesh is WiFi-or mobile-connected to the internet. This security framework establi...
详细信息
This paper presents a new cloudlet mesh architecture for security enforcement to establish trusted mobile cloud computing. The cloudlet mesh is WiFi-or mobile-connected to the internet. This security framework establishes a cyber trust shield to fight against intrusions to distance clouds, prevent spam/virus/worm attacks on mobile cloud resources, and stop unauthorized access of shared datasets in offloading the cloud. We have specified a sequence of authentication, authorization, and encryption protocols for securing communications among mobile devices, cloudlet servers, and distance clouds. Some analytical and experimental results prove the effectiveness of this new security infrastructure to safeguard mobile cloud services.
With the development of the internet, a variety of attack behaviors are emerging, which seriously threaten the security of cyberspace. In order to effectively defend these attacks, the researchers put forward a variet...
详细信息
With the development of the internet, a variety of attack behaviors are emerging, which seriously threaten the security of cyberspace. In order to effectively defend these attacks, the researchers put forward a variety of research methods. During these methods, using simulation software to model the attack behavior and run simulation is one of the effective means. In this paper, it introduces the framework of Nessi2 simulation software, and analyzes the main functions of the software from two aspects of distributed simulation and security simulation.
Cabled ocean observatories, which support continuously deployed underwater sensors, enable an increasing amount of near real-time, high resolution data to be collected from the marine environment. These data can be us...
详细信息
Cabled ocean observatories, which support continuously deployed underwater sensors, enable an increasing amount of near real-time, high resolution data to be collected from the marine environment. These data can be used in the design of intelligent systems to predict and measure properties of the marine environment. One environmental factor that is very important to maritime transportation and safety is sea state, that is, the "roughness" of the sea surface. Sea state is dependent on winds, but can vary significantly with location and over time, based on a wide range of factors. We show how publicly available sensor data can be used to detect and predict local sea state. To do this, we will discuss various techniques that can help us deal with a large set of echo sounder data, and aggregate it in a way that allows basic machine learning techniques to categorize the local sea state at a given time according to the Douglas Sea Scale.
The paper presents two analytical models to study the performance and availability of queueing systems with the hypo exponential service time and finite queue. The analytical results obtained are verified using discre...
详细信息
The paper presents two analytical models to study the performance and availability of queueing systems with the hypo exponential service time and finite queue. The analytical results obtained are verified using discrete-event simulation. A few numerical examples for varying number of service stages, service rates and arrival rates are given. The results presented in the paper can be used for analysis of MapReduce and multi-stage Big Data processing.
With the spread of fast mobile internet connections, such as 3G and LTE and the increasing processor power of mobile devices accessing cloud computing services on-the-go is common among all users. Sharing private info...
详细信息
With the spread of fast mobile internet connections, such as 3G and LTE and the increasing processor power of mobile devices accessing cloud computing services on-the-go is common among all users. Sharing private information with friends and family members are options of popular cloud services, such as storage and social media services. But recent headlines show that the access to private information is often not sufficiently secured on the service level. The approach presented in this paper aims to use attribute-based meta-information to secure data on the level of files without relying on additional functionality of third-party services. A mobile device app is used to access and alter the meta-information. Attribute-based encryption mechanisms secure the private data and define access policies for friends and other users simultaneously.
e-Learning paradigm offers the opportunity of learning to anyone, any where, and any time using different mediums. Many quality factors and aspects have been investigated to measure quality of such learning approach. ...
详细信息
e-Learning paradigm offers the opportunity of learning to anyone, any where, and any time using different mediums. Many quality factors and aspects have been investigated to measure quality of such learning approach. In this paper, students' satisfaction and tutors' satisfaction are used as indicators to evaluate e-Learning approach used at Arab Open University. The Arab Open University (AOU) is the most popular university in Arab region that mainly use e-learning approach to deliver all its courses and programs through a Learning Management System (LMS). The evaluation is conducted in first semester of the academic year 2014 at Jordan branch; results reveal that students are satisfied on their tutors and tutorials more than their satisfaction on their courses. At the same time, tutors are satisfied with university support facilities, duties, and courses. However they found that English level of courses is not competent with students' level of English language. The aim is to contribute on development process of e-learning based on tutors and students' evaluation results.
Recent advancements in the fields of embedded systems, communication technologies and computer science open up to new application scenarios in the home environment. Anyway, many issues raised from the inherent complex...
详细信息
ISBN:
(纸本)9783319264011;9783319264004
Recent advancements in the fields of embedded systems, communication technologies and computer science open up to new application scenarios in the home environment. Anyway, many issues raised from the inherent complexity of this new application domain need to be properly tackled. This paper proposes the Cloud-assisted Agent-based Smart home Environment (CASE) architecture for activity recognition with sensors capturing the data related to activities being performed by humans and objects in the environment. Moreover, the potential of analytics methods for discovering activity recognition in such environment has been investigated. CASE easily allows to implement Smart Home applications exploiting a distributed multi-agent system and the cloud technology. The work is mainly focused on activity recognition albeit CASE architecture permits an easy integration of other kinds of smart home applications such as home automation and energy optimization. The CASE effectiveness is shown through the design of a case study consisting of a daily activity recognition of an elder person in its home environment.
Combining mobile computing and cloud computing has opened the door recently for numerous applications that were not possible before due to the limited capabilities of mobile devices. Computation intensive applications...
详细信息
Combining mobile computing and cloud computing has opened the door recently for numerous applications that were not possible before due to the limited capabilities of mobile devices. Computation intensive applications are offloaded to the cloud, hence saving phone's energy and extending its battery life. However, energy savings are influenced by the wireless network conditions. In this paper, we propose considering contextual network conditions in deciding whether to offload to the cloud or not. An energy model is proposed to predict the energy consumed in offloading data under the current network conditions. Based on this prediction, a decision is taken whether to offload, to execute the application locally, or to delay offloading until detecting improvement in network conditions. We evaluated our approach by extending Think Air, a computation offloading framework proposed in [1], by our proposed energy model and delayed offloading algorithm. Experiments results showed considerable savings in energy with an average of 57% of the energy consumed by the application compared with the original static decision module implemented by Think Air.
Electronic Health (e-Health) technology has brought the world with significant transformation from traditional paper-based medical practice to Information and Communication Technologies (ICT)-based systems for automat...
详细信息
ISBN:
(数字)9783642414282
ISBN:
(纸本)9783642414275
Electronic Health (e-Health) technology has brought the world with significant transformation from traditional paper-based medical practice to Information and Communication Technologies (ICT)-based systems for automatic management (storage, processing, and archiving) of information. Traditionally, e-Health systems have been designed to operate within stovepipes on dedicated networks, physical computers, and locally managed software platforms that make it susceptible to many serious limitations including: (1) lack of on-demand scalability during critical situations, (2) high administrative overheads and costs, and (3) inefficient resource utilization and energy consumption due to lack of automation. In this paper, we present an approach to migrate the ICT systems in the e-Health sector from traditional in-house Client/Server (C/S) architecture to the virtualized cloud computing environment. To this end, we developed two cloud-based e-Health applications (Medical Practice Management System and Telemedicine Practice System) for demonstrating how cloud services can be leveraged for developing and deploying such applications. The Windows Azure cloud computing platform is selected as an example public cloud platform for our study. We conducted several performance evaluation experiments to understand the QoS tradeoffs of our applications under variable workload on Azure. Copyright (c) 2014 John Wiley & Sons, Ltd.
暂无评论