As a promising application in WSN, there is an anomaly detection using the sensor information. In the anomaly detection, to the acquired sensor information based on the abnormality of the water quality in rivers, dete...
详细信息
ISBN:
(纸本)9781467394697
As a promising application in WSN, there is an anomaly detection using the sensor information. In the anomaly detection, to the acquired sensor information based on the abnormality of the water quality in rivers, detects weather anomalies as familiar, it is to report to the user. Further, in the WSN, the problem sensor price and power consumption, it is difficult to provide all sensors required for anomaly detection in all nodes. therefore, it is required to share the expensive sensors in the network. We propose an autonomous distributed WSN systems sharing a limited sensor resources at high speed between the nodes, with improved anomaly detection rate by the node in the WSN.
Network complexity is increasing, making network control and orchestration a challenging task. the proliferation of network information and tools for data analytics can provide an important insight into resource provi...
详细信息
ISBN:
(纸本)9781509055661
Network complexity is increasing, making network control and orchestration a challenging task. the proliferation of network information and tools for data analytics can provide an important insight into resource provisioning and optimisation. the network knowledge incorporated in software defined networking can facilitate the knowledge driven control, leveraging the network programmability. We present Seer: a flexible, highly configurable data analytics platform for network intelligence based on software defined networking and big data principles. Seer combines a computational engine with a distributed messaging system to provide a scalable, fault tolerant and real-time platform for knowledge extraction. Our first prototype uses Apache Spark for streaming analytics and open network operating system (ONOS) controller to program a network in real-time. the first application we developed aims to predict the mobility pattern of mobile devices inside a smart city environment.
this paper concerns an important aspect of the problem of designing fault-tolerant distributedcomputing systems. the concepts involved in ″backward error recovery″ , i. e. restoring a system, or some part of a syst...
详细信息
this paper concerns an important aspect of the problem of designing fault-tolerant distributedcomputing systems. the concepts involved in ″backward error recovery″ , i. e. restoring a system, or some part of a system, to a previous state which it is hoped or believed preceded the occurrence of any existing errors are formalised, and generalised so as to apply to concurrent, e. g. distributed, systems. the formalisation is based on the use of ″Occurrence Graphs″ to represent the cause-effect relationships that exist between the events that occur when a system is operational, and to indicate existing possibilities for state restortation. A protocol is presented which could be used in each of the nodes in a distributedcomputing system in order to provide system recoverability in the face even of multiple faults.
Withthe evolution of computing from using personal computers to use of online Internet of things (IoT) services and applications, security risks have also evolved as a major concern. the use of Fog computing enhances...
详细信息
ISBN:
(纸本)9781509030385
Withthe evolution of computing from using personal computers to use of online Internet of things (IoT) services and applications, security risks have also evolved as a major concern. the use of Fog computing enhances reliability and availability of the online services due to enhanced heterogeneity and increased number of computing servers. However, security remains an open challenge. Various trust models have been proposed to measure the security strength of available service providers. We utilize the quantized security of Datacenters and propose a new security-based service broker policy(SbSBP) for Fog computing environment to allocate the optimal Datacenter(s) to serve users' requests based on users' requirements of cost, time and security. Further, considering the dynamic nature of Fog computing, the concept of dynamic reconfiguration has been added. Comparative analysis of simulation results shows the effectiveness of proposed policy to incorporate users' requirements in the decision-making process.
Private information retrieval is an important application of homomorphic encryption. As a hot topic in recent years, homomorphic encryption scheme can operate on the ciphertext and the decryption result is equal to th...
详细信息
ISBN:
(纸本)9781509041237
Private information retrieval is an important application of homomorphic encryption. As a hot topic in recent years, homomorphic encryption scheme can operate on the ciphertext and the decryption result is equal to the same operation on the plaintext. Trivial PIR protocol faces the plaintext retrieval, so it could not guarantee the database privacy. In the cloud environment, it is unsafe to store the plaintext in the server. In order to settle the above problem, based on a somewhat homomorphic encryption scheme, we design a multi-server PIR. It can not only achieves the privacy and resisting the colluding attack, but also reaches the information-theoretic security.
Utilizing desktop grid infrastructures is challenging for parallel discrete event simulation (PDES) codes due to characteristics such as inter-process messaging, restricted execution, and overall lower concurrency tha...
详细信息
ISBN:
(纸本)9781424415595
Utilizing desktop grid infrastructures is challenging for parallel discrete event simulation (PDES) codes due to characteristics such as inter-process messaging, restricted execution, and overall lower concurrency than typical volunteer computing projects. the Aurora2 system uses an approach that simultaneously provides both replicated execution support and scalable performance of PDES applications through public resource computing. this is accomplished through a multi-threaded distributed back-end system, low overhead communications middleware, and an efficient client implementation. this paper describes the Aurora2 architecture and issues pertinent to PDES executions in a desktop grid environment that must be addressed when distributing back-end services across multiple machines. We quantify improvement over the first generation Aurora system through a comparative performance study detailing PDES programs with various scalability characteristics for execution over desktop grids.
Constructing a scientific and effective bank risk forewarning model is an important measure to effectively guard against and defuse risks in commercial banks. this article constructs a bank risk forewarning model usin...
详细信息
ISBN:
(纸本)9781467313261
Constructing a scientific and effective bank risk forewarning model is an important measure to effectively guard against and defuse risks in commercial banks. this article constructs a bank risk forewarning model using BP neural network and principal component analysis method. Meanwhile, being aimed at that it takes a long time while processing the mass data to train the network, it also decomposes the algorithm for MapReduce, running in parallel to reduce the running time. the experiment result shows that the neural network model achieved higher accuracy of rate 88percents.
Without mutation and crossover operators, Particle Optimization Algorithm (PSO) is more liable to converge on a local minimum than genetic algorithm. therefore, a distributed PSO based on multi agent system is propose...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
Without mutation and crossover operators, Particle Optimization Algorithm (PSO) is more liable to converge on a local minimum than genetic algorithm. therefore, a distributed PSO based on multi agent system is proposed to overcome this shortcoming by importing mutation operators in genetic algorithm. In the evolution process, the agent swarms with different mutation operators run independently. Client agent swarms inform their individuals with highest fitness to the host agent swarm so as to replace its worst after certain generations of evolution. therefore, the whole particle swarm enjoys a higher probability of finding the global optimum. Numerical results show the proposed method can find better solutions than other methods. Distributive in nature, it can run concurrently on many platforms scattered over local area network and even Internet for large-scale combinatorial combination problems.
the spacing distance of amino acids is used to study the relationship between the primary structure and structural classification of large proteins. Rescaled-range (R/S) analysis was adopted to examine long-range corr...
详细信息
Within this keynote, selected research topics from the field of inter-organizatioanal elastic processes will be discussed, with a focus on the key challenges maintainability, reliability and correctness of such elasti...
详细信息
暂无评论