the proceedings contain 111 papers. the topics discussed include: a review of machine learning based recommendation approaches for cricket;operating of a drone using human intent recognition and characteristics of an ...
ISBN:
(纸本)9781728171326
the proceedings contain 111 papers. the topics discussed include: a review of machine learning based recommendation approaches for cricket;operating of a drone using human intent recognition and characteristics of an EEG Signal;role of Indian IT laws in smart healthcare devices in the intensive care unit in India;comparative analysis of different symmetric encryption techniques based on computation time;a study on analyzing the impact of feature selection on predictive machine learning algorithms;TCB minimization towards secured and lightweight IoT end device architecture using virtualization at fog node;a novel perspective to threat modelling using design thinking and agile principles;android malware detection using chi feature selection and ensemble learning method;and prediction and monitoring of air pollution using Internet of things.
the proceedings contain 140 papers. the topics discussed include: coding strategies to avoid data loss in cloud storage systems;reconsidering the cloud approach towards VANET communication;an analytical survey of stat...
ISBN:
(纸本)9781509036684
the proceedings contain 140 papers. the topics discussed include: coding strategies to avoid data loss in cloud storage systems;reconsidering the cloud approach towards VANET communication;an analytical survey of state of the art jellyfish attack detection and prevention techniques;a fault-tolerant energy-efficient computational offloading approach with minimal energy and response time in mobile cloud computing;a survey on security integration in distributed cloud environment;jellyfish reorder attack on hybrid protocol in Manet dissection on variegated parameters;a proposed technique to detect DDoS attack on IPv6 web applications;copy-move forgery detection using lexicographical sort;distributed information systems in group decision making problems;an improved hybrid key management for wireless sensor networks;a fuzzy integrated genetic method for information persistent 3D to 2D graph transformation;a multiobjective genetic algorithm to improve power and performance of heterogeneous multiprocessors;edge preservation based CT image denoising using Wiener filtering and thresholding in wavelet domain;characterisation of radiological imaging biomarkers for the identifications of interstitial lung diseases (ILDs) for developing countries;detection of LDoS attacks using variant of CUSUM and Shiryaev - Roberts's algorithm;and meta-heuristics for relay node placement problem in wireless sensor networks.
the proceedings contain 11 papers. the topics discussed include: dynamic self-scheduling for parallel applications with task dependencies;Cyclotron: a secure, isolated virtual cycle-scavenging grid in the enterprise;a...
ISBN:
(纸本)9781605583655
the proceedings contain 11 papers. the topics discussed include: dynamic self-scheduling for parallel applications with task dependencies;Cyclotron: a secure, isolated virtual cycle-scavenging grid in the enterprise;a group membership service for large-scale grids;Pastrygrid: decentralisation of the execution of distributed applications in desktop;extending XACML authorisation model to support policy obligations handling in distributed applications;a tool for isolating performance in general-purpose operating systems;a new multi-objective optimization scheme for grid resource allocation;resource use pattern analysis for opportunistic grids;heuristic for resources allocation on utility computing infrastructures;exception handling patterns for hierarchical scientific workflows;and using clouds to address grid limitations.
the Router Advertisement (RA) Hooding attack is considered as a major threat to Internet Protocol version 6 (IPv6) networks due to the deliberate intent of attackers to make the vital resources powerless for legitimat...
详细信息
ISBN:
(纸本)9781509036691
the Router Advertisement (RA) Hooding attack is considered as a major threat to Internet Protocol version 6 (IPv6) networks due to the deliberate intent of attackers to make the vital resources powerless for legitimate users. Different attacks have been performed against IPv6 networks. RA Hooding is one of these attacks that aim to exhaust all nodes resources for instance the CPU and memory that attached to routers on the same link.
RPL is one of the candidate routing protocol designed for low power and lossy networks, where devices are constrained in memory, and energy (battery power) and limited processing. Devices in such a network operate at ...
详细信息
ISBN:
(纸本)9781509036691
RPL is one of the candidate routing protocol designed for low power and lossy networks, where devices are constrained in memory, and energy (battery power) and limited processing. Devices in such a network operate at low data rates and experience packet losses. In addition, these devices are also susceptible to several security attacks due to open environment in which they operate. In this paper, we analyse the impact of packet dropping attacks on RPL. We analyse the performance of RPL in terms of number of additional distributed information objects, distributed advertisement objects generated to handle such attacks.
Artificial Intelligence is an interdisciplinary field that combines Machine Learning, Big Data, Cloud computing, and Information theory. the major advantage of machine learning is that it builds on prior experience, s...
详细信息
grid is a distributedcomputing and resource environment. Security is an important issue in the grid environment. In this paper we present a prototype of the grid security architecture. It shows that the architecture ...
详细信息
ISBN:
(纸本)0769524052
grid is a distributedcomputing and resource environment. Security is an important issue in the grid environment. In this paper we present a prototype of the grid security architecture. It shows that the architecture is scalable, and meets the security requirements of the grid.
Security is an important issue in research and appliance of gridcomputing. grid security model is composed of a series of mechanism and strategy to solve various practical security problems. this paper presents a gri...
详细信息
ISBN:
(纸本)0769524052
Security is an important issue in research and appliance of gridcomputing. grid security model is composed of a series of mechanism and strategy to solve various practical security problems. this paper presents a grid security model based on virtual organization referring to GSI (a security component in Globus). the model consists of a logical model and a physical model.
this paper presents a run-time scheduling policy to map tasks to resources in gridcomputing systems based on Multi-Agent System (MAS). this policy schedules tasks in run-time and avoids the waste of resources. A simu...
详细信息
ISBN:
(纸本)0769524052
this paper presents a run-time scheduling policy to map tasks to resources in gridcomputing systems based on Multi-Agent System (MAS). this policy schedules tasks in run-time and avoids the waste of resources. A simulation result is presented to prove the availability of this policy.
By leveraging economic principles, we present the conception about the supply and demand balance of grid resources, and propose a price-adjusting mechanism. the mechanism focuses on adjusting the unreasonable prices o...
详细信息
ISBN:
(纸本)0769524052
By leveraging economic principles, we present the conception about the supply and demand balance of grid resources, and propose a price-adjusting mechanism. the mechanism focuses on adjusting the unreasonable prices of both isolated resources and dependent resources, so as to achieve equilibrium prices and promote the global balance of the supply and demand.
暂无评论