E-commerce is a type of businesses or individuals doing transactions through the internet, which continues to be improved to perform its tasks with more features and facilities compared to physical and brick and morta...
详细信息
this paper proposes an intelligent monitoring system for 110 kV power cable pipe wells. the system is mainly composed of intelligent sensing system, monitoring host system and real-time monitoring terminal. the LoRa t...
详细信息
the rise of the internet of things and Fog computing has increased substantially the number of interconnected devices at the edge of the network. As a result, a large amount of computations is now performed in the fog...
详细信息
ISBN:
(纸本)9783031506833;9783031506840
the rise of the internet of things and Fog computing has increased substantially the number of interconnected devices at the edge of the network. As a result, a large amount of computations is now performed in the fog generating vast amounts of data. To process this data in near real time, stream processing is typically employed due to its efficiency in handling continuous streams of information in a scalable manner. However, most stream processing approaches do not consider the underlying network devices as candidate resources for processing data. Moreover, many existing works do not take into account the incurred network latency of performing computations on multiple devices in a distributed way. Consequently, the fog computing resources may not be fully exploited by existing stream processing approaches. To avoid this, we formulate an optimization problem for utilizing the existing fog resources, and we design heuristics for solving this problem efficiently. Furthermore, we integrate our heuristics into Apache Storm, and we perform experiments that show latency-related benefits compared to alternatives.
Low Power Wide Area Network (LPWAN) technology has gained popularity across various internet-of-things (IoT) applications. Among these, the Long Range Wide Area Network (LoRaWAN), primarily used in private outdoor set...
详细信息
the proliferation of internet of things (IoT) devices has led to the generation of vast quantities of data, placing considerable strain on conventional cloud computing infrastructure. Edge computing has emerged as a v...
详细信息
Compared with cloud computing, the architecture adopted by fog computing is more distributed and closer to the edge of the network. Fog computing concentrates data, data processing, and applications in devices at the ...
详细信息
ISBN:
(数字)9781665458641
ISBN:
(纸本)9781665458641
Compared with cloud computing, the architecture adopted by fog computing is more distributed and closer to the edge of the network. Fog computing concentrates data, data processing, and applications in devices at the edge of the network, instead of storing almost all of them in the cloud like cloud computing. Fog computing is implemented as an intermediate platform between terminal equipment and cloud computing data centers. the recent popularity of the internet of things (IoT) has made fog computing a necessary condition for processing various devices. It has been recognized as an important platform for providing efficient, location-aware, and near-edge cloud services. In order to shorten the transmission delay of end-user equipment requesting data, we adopt the idea of greedy algorithm to increase the number of fog nodes in the fog layer. By increasing the number of fog nodes, the storage pressure of each fog node is alleviated, while the transmission delay is shortened, and the data transmission efficiency in the entire cloud center is greatly improved.
Odometry estimation plays a key role in facilitating autonomous navigation systems. While significant consideration has been devoted to research on monocular odometry estimation, sensor fusion techniques for Stereo Vi...
详细信息
the diagnosis, treatment, and prevention of diseases may be revolutionized by integrating neuromorphic computing, artificial intelligence (AI), and machine learning (ML) into medical services. A novel method of proces...
详细信息
the rapid growth of internet of things technology has introduced an era of numerous interconnected devices, transforming the communication withthe physical world. However, the security and privacy of the data generat...
详细信息
ISBN:
(纸本)9798350369441
the rapid growth of internet of things technology has introduced an era of numerous interconnected devices, transforming the communication withthe physical world. However, the security and privacy of the data generated and stored on these devices have become significant concerns due to the potential risks associated with unauthorized access and data exfiltration. this paper presents a comprehensive study on the characterization and evaluation of IoT protocols for data exfiltration, with a focus on Message Queuing Telemetry Transport versions 3.1.1 and 5.0, Constrained Application Protocol version 1.0, and Websocket, owing to their widespread adoption and diverse characteristics. these protocols are chosen to meet the constraints of IoT devices and networks, where minimal bandwidth utilization and low power consumption are crucial. We employed a multifaceted methodology, incorporating a comprehensive literature review and the Chiton data encapsulation and exfiltration software tool, to assess the security features, vulnerabilities, and performance metrics of these protocols for data exfiltration. Performance evaluations on the three selected protocols were conducted using a live Client-Server network. A laptop served as the server for exfiltrated data collection, while a Raspberry Pi 3 device acted as the IoT Client Publisher. the evaluation included Wireshark as a network protocol analyser and the enhancement of the Chiton Software Tool with custom codes to encapsulate and exfiltrate data within the IoT protocol messages, empirically measuring the selected protocols' performance, including overhead, latency, and throughput for different data exfiltration scenarios, providing a versatile platform for protocol evaluation. Comparative analysis revealed the strengths and weaknesses of MQTT, CoAP, and Websocket in various data exfiltration scenarios, facilitating the selection of MQTT and Websocket over the CoAP protocol for IoT applications. Lastly, ideas and recommend
Existing work on multi-camera network mainly focused on centralized systems, the role of the cameras being limited to capture images and send them to the cloud. However, this approach is impractical when the network c...
详细信息
暂无评论