Microservice architecture is widely adopted among distributedsystems. It follows the modular approach that decomposes large software applications into independent services. Kubernetes has become the standard tool for...
详细信息
ISBN:
(纸本)9798331511425;9798331511432
Microservice architecture is widely adopted among distributedsystems. It follows the modular approach that decomposes large software applications into independent services. Kubernetes has become the standard tool for managing these microservices. It stores sensitive information like database passwords, API keys, and access tokens as Secret Objects. there are security mechanisms employed to safeguard these confidential data, such as encryption, Role Based Access Control (RBAC), and the least privilege principle. However, manually configuring these measures is time-consuming, requires specialized knowledge, and is prone to human error, thereby increasing the risks of misconfiguration. this research introduces K8s Pro Sentinel, an operator that automates the configuration of encryption and access control for Secret Objects by extending the Kubernetes API server. this automation reduces human error and enhances security within clusters. the performance and reliability of the Sentinel operator were evaluated using Red Hat Operator Scorecard and chaos engineering practices.
distributed reconfigurable intelligent surfaces (RISs) provide rich macro-diversity coverage due to different locations of the RISs, which is beneficial to combat coverage holes. However, the system performance relies...
详细信息
ISBN:
(纸本)9798350350920
distributed reconfigurable intelligent surfaces (RISs) provide rich macro-diversity coverage due to different locations of the RISs, which is beneficial to combat coverage holes. However, the system performance relies on the effective coordination of multiple RISs. thus, the resource allocation scheme for distributed RIS-assisted multiuser system is a crucial challenge. To tackle these issues, joint power allocation, phase shifts and communication scheduling design for distributed RIS-assisted systems is investigated in this paper, where all RISs simultaneously and cooperatively serve multiple users. To overcome the formulated nonconvex maximization problem, the original maximization problem is decoupled into three subproblems and solved in an iterative manner. Numerical simulations are conducted to demonstrate that the considered solution outperforms the existing benchmark and achieves a near-optimal sum rate.
distributed machine learning (DML) encounters issues related to privacy and the presence of straggling nodes in smart cloud systems. Lagrange coded computing offers a partial solution to mitigate these concerns. Nonet...
详细信息
Efficient task offloading to fog nodes (FNs) is crucial in Internet of things (IoT)-fog systems to tackle the problems of high computing demands and stringent deadlines of IoT tasks. In order to optimize task offloadi...
详细信息
In this paper, adaptive control strategies for distributed new energy systems are discussed in detail. the capacity of new energy sources is often affected by climate and weather conditions, so traditional control met...
详细信息
Existing weighted fuzzy clustering methods typically use feature weighting techniques to eliminate irrelevant features. However, their emphasis is typically on the initial points, fuzzy parameters, and cluster number ...
详细信息
ISBN:
(纸本)9798350350227;9798350350210
Existing weighted fuzzy clustering methods typically use feature weighting techniques to eliminate irrelevant features. However, their emphasis is typically on the initial points, fuzzy parameters, and cluster number of the original Fuzzy C-Means (FCM). Unfortunately, these approaches do not ensure a solution to the original FCM problem. For certain specialized applications, such as clustering "non-spherical" data, conventional weighted clustering algorithms may not demonstrate satisfactory performance. this paper proposes a weighted fuzzy clustering method based on granular-ball computing. Firstly, the relevant fuzzy granular-ball set is generated through weighted fuzzy iteration, and then the generated fuzzy granular-balls are connected by the adjacent connection rule to form the final clusters, which not only improves the clustering accuracy and other fuzzy clustering indicators, but also adapts to many special data scenarios including "non-spherical".
this paper focuses on the fault detection problem for uncertain linear systems withdistributed sensor networks. the fault detection algorithm is designed by using of distributed interval observer(DIO), which only use...
详细信息
ISBN:
(纸本)9798350322514
this paper focuses on the fault detection problem for uncertain linear systems withdistributed sensor networks. the fault detection algorithm is designed by using of distributed interval observer(DIO), which only uses the outputs of each agent and the communication from its neighbors to estimate the upper and lower bounds (ULBs) of the state of the whole system. the distributed interval estimation would be able, starting from coordinate transformation and vector rearrangement, to detect the fault by monitoring the unreasonable interval in each agent. the effectiveness of the proposed fault detection strategy has been demonstrated theoretically and numerically.
the Budget-based Neighboring Object Group Query (BR-NOGQ) is a novel type of location-based query that considers boththe spatial relationships between objects and the user9;s budget constraints on experiencing the...
详细信息
the proceedings contain 359 papers. the topics discussed include: parallel channel separate attention network for concealed object detection in millimeter-wave images;YOLOv8 detection head improvements for FPGA deploy...
ISBN:
(纸本)9798350376548
the proceedings contain 359 papers. the topics discussed include: parallel channel separate attention network for concealed object detection in millimeter-wave images;YOLOv8 detection head improvements for FPGA deployments;improving the performance of OPTICS on short text clustering by isokernel and UMAP;robust multi-object tracking with CVAE motion model for maritime vessels;molecular property prediction based on graph contrastive learning;a novel design and simulation of band-pass filter for the 5G System based on MEMS;transcending information cocoons: integrating TransR embeddings with tensor decomposition in recommender systems;topic analysis of Chinese documents based on key phrases and latent Dirichlet allocation model;and real-valued beamspace direct position determination for multi-station systems.
the surge in ubiquitous computing resources has propelled the evolution of computing-aware Networking. Nonetheless, the majority of existing computing service discovery and scheduling mechanisms suffer from deficienci...
详细信息
ISBN:
(纸本)9798350350227;9798350350210
the surge in ubiquitous computing resources has propelled the evolution of computing-aware Networking. Nonetheless, the majority of existing computing service discovery and scheduling mechanisms suffer from deficiencies such as suboptimal search efficiency and algorithmic shortcomings, leading to low solution quality and efficiency. In response, this paper proposes a computing service discovery and scheduling mechanism founded on multi-dimensional unified identifier. Initially, a computing service architecture rooted in multi-dimensional unified identifier is outlined. this architecture delineates computing service attributes using multi-dimensional descriptors, enabling service addressing predicated on mapped service identifier. Subsequently, the matching discovery mechanism for computing services is structured around the K-Dimensional Tree (K-D Tree) framework. Moreover, a computing service scheduling mechanism is devised, catering to both single-node and combined service scheduling scenarios. Finally, the experimental test evaluation results show that the discovery delay associated withcomputing services satisfies the requirements across various service request scenarios. Moreover, when contrasted withthe nearby greedy strategy, the proposed computing service scheduling mechanism achieves a superior user satisfaction score.
暂无评论