To enable the systematic evaluation of complex technical systems by engineers from various disciplines advanced 3D simulation environments that model all relevant aspects are used. In these Virtual Testbeds real-time ...
详细信息
Fog computing extends the Cloud computing paradigm to the edge of the network, relying on computing services intelligently distributed to best meet the applications needs such as low communication latency, data cachin...
详细信息
Fog computing extends the Cloud computing paradigm to the edge of the network, relying on computing services intelligently distributed to best meet the applications needs such as low communication latency, data caching or confidentiality reinforcement. While P2P is especially prone to implement Fog computing platforms, it usually lacks important elements such as controlling where the data is stored and who will handle the computing tasks. In this paper we propose both a mapping approach for data-locality and a location-aware scheduling for P2P-based middlewares, improving the data management performance on fog environments. Experimental results comparing the data access performances demonstrate the interest of such techniques. (C) 2018 the Authors. Published by Elsevier Ltd.
Linear Feedback shift Registers (LFSRs) are widely used in encoders like Cyclic Redundancy Check (CRC) for generating error detecting codes. In order to achieve high speed communication, parallel processing is perform...
详细信息
ISBN:
(纸本)9781538644300
Linear Feedback shift Registers (LFSRs) are widely used in encoders like Cyclic Redundancy Check (CRC) for generating error detecting codes. In order to achieve high speed communication, parallel processing is performed in the serial CRC. Since this method increases the circuit complexity, the speed gets limited. State space transformation is a method that can be used to reduce the circuit complexity. therefore, an efficient transformation matrix is needed in this method. In this paper, a method to construct a transformation matrix and an approximate searching algorithm to generate certain vectors, which are used in transformation matrix are implemented.
Recently, Node localization has played a vital role in wireless sensor networks (WSN), where the node9;s coordinates have mostly required before sensing operation. Sensor devices are randomly deployed in the networ...
详细信息
At present, the technique of coordinating a team of robots in a manner that is responsive to communication failures, presents itself as an actual challenge. In swarm scenarios where the concept for the teams of robots...
详细信息
the report presents an algorithmic approach to simulate electromagnetic fields in complex environments such as high density cities or areas with irregular topography. Many small reflecting and refracting objects, anis...
详细信息
ISBN:
(纸本)9781538644300
the report presents an algorithmic approach to simulate electromagnetic fields in complex environments such as high density cities or areas with irregular topography. Many small reflecting and refracting objects, anisotropic media of wave propagation may produce complex maps of coverage by electromagnetic signals. Large amounts of these objects may result in large amounts of computations needed to perform an accurate simulation. A common approach of averaging those irregularities into virtual macro objects may not always be applicable when a detailed coverage map is needed, e.g. to study effects of an electromagnetic transmitter to other transmissions or to health of population in urbanized areas. A parallel simulation algorithm was developed to mitigate those issues. Assessment of the efficiency of the algorithm and its implementation also presented in the article shows high occupancy of parallelcomputing units and almost linear speedup of such simulation with an increase of the total processors involved.
In the last few years, the use of Cloud and Internet of things (IoT) technologies is dramatically growing, opening new application possibilities spanning from smart cities to the prevention of natural disasters. A fle...
详细信息
ISBN:
(纸本)9781728118567
In the last few years, the use of Cloud and Internet of things (IoT) technologies is dramatically growing, opening new application possibilities spanning from smart cities to the prevention of natural disasters. A flexible integration of the Cloud and IoT environments allows users and applications to combine the benefits of the two worlds. Specifically, robustness, versatility and high computation power are better supported by the Cloud, while better real-time adaptation and local control are peculiar characteristics of the IoT infrastructure. Even higher flexibility can emerge when the cloud layer combines and integrates a public cloud component, offered by an external provider, and a private cloud, managed internally to the organization, thus giving rise to the so-called hybrid cloud. the integration of a hybrid cloud with an IoT layer opens a wide range of new possibilities and applications but also presents heterogeneity and complexity issues that must be carefully addressed. this paper offers a contribution in this field by presenting a novel three-layered IoT architecture for the Hybrid Cloud, namely IoT-HC, which is devoted to enabling distributed sensing and actuation, controlling IoT networks, elaborating the collected data both at edge and cloud level, and deciding which data has to be sent to private or public cloud components for storage and high-level elaboration.
In the last decade blockchain technology become mainstream research topic because of its decentralized, peer to peer transaction, distributed consensus, and anonymity properties. the blockchain technology overshadows ...
详细信息
ISBN:
(纸本)9781538644300
In the last decade blockchain technology become mainstream research topic because of its decentralized, peer to peer transaction, distributed consensus, and anonymity properties. the blockchain technology overshadows regulatory problem and technical challenges. A smart contract is a set of programs which are self-verifying, self-executing and tamper resistant. Smart contract withthe integration of blockchain technology capable of doing a task in real time with low cost and provide a greater degree of security. this paper firstly, explains the various components and working principle of smart contract. Secondly, identify and analyse the various use cases of smart contract along withthe advantage of using smart contract in blockchain application. Lastly, the paper concludes with challenges lie in implementing smart contract the future real-life scenario.
Data analysis is a highly exploratory task, where various algorithms with different parameters are executed until a solid result is achieved. this is especially evident for cluster analyses, where the number of cluste...
详细信息
ISBN:
(纸本)9783030332464;9783030332457
Data analysis is a highly exploratory task, where various algorithms with different parameters are executed until a solid result is achieved. this is especially evident for cluster analyses, where the number of clusters must be provided prior to the execution of the clustering algorithm. Since this number is rarely known in advance, the algorithm is typically executed several times with varying parameters. Hence, the duration of the exploratory analysis heavily dependends on the runtime of each execution of the clustering algorithm. While previous work shows that the initialization of clustering algorithms is crucial for fast and solid results, it solely focuses on a single execution of the clustering algorithm and thereby neglects previous executions. We propose Delta Initialization as an initialization strategy for k-Means in such an exploratory setting. the core idea of this new algorithm is to exploit the clustering results of previous executions in order to enhance the initialization of subsequent executions. We show that this algorithm is well suited for exploratory cluster analysis as considerable speedups can be achieved while additionally achieving superior clustering results compared to state-of-the-art initialization strategies.
Cloud computing has added new dimensions to the world of computing technology. However, it has various security and privacy concerns. the major threats are Denial of service (DoS) and distributed Denial of Service (DD...
详细信息
ISBN:
(纸本)9781538644300
Cloud computing has added new dimensions to the world of computing technology. However, it has various security and privacy concerns. the major threats are Denial of service (DoS) and distributed Denial of Service (DDoS) attacks to the cloud technology in recent years. In this paper, we design an efficient security framework which is protocol specific Multithreaded Network Intrusion Detection System (PM-NIDS) aiming at detecting DoS/DDoS attacks in the cloud. Here, the incoming packets are separated according to the protocol and queued for further processing. Each queue is handled by a framework thread which extracts the relevant features and applies protocol specific classifiers for each packet in the queue. Finally, it generates the alerts for the detected intrusions. We have performed different experiments for the feasibility analysis and validation of the proposed framework
暂无评论