Edge computing addresses delay-sensitive microservices near applications, supplementing cloud computing. The dynamic nature of resources and workloads in edge clusters challenges traditional machine learning tools for...
详细信息
This study introduces a secure and scalable hybrid trust management system for Vehicular Ad Hoc Networks (VANETs), designed to detect and mitigate diverse malicious activities, including Sybil attacks, Denial of Servi...
详细信息
The library can quickly create and manage its own data center. University library will allow to maintain greater control over applications and data storage that contain sensitive private information about students. Us...
详细信息
Digital information exchange has become commonplace due to the growth of the internet and information technology breakthroughs. Academic institutions are placing a greater emphasis on developing digital campuses, of w...
详细信息
ISBN:
(纸本)9798331540661;9798331540678
Digital information exchange has become commonplace due to the growth of the internet and information technology breakthroughs. Academic institutions are placing a greater emphasis on developing digital campuses, of which digital libraries are an essential part. Though cloud computing is a well-known idea, what matters more are the security precautions performed within the cloud environment. Numerous technologies have been developed in recent years to offer cloud network security. This paper investigates the integration of Virtual Private Networks (VPNs) for improving data security and access control in library management systems, which enables logical separation between public and private clouds, to facilitate remote access to digital library resources securely and effectively. There are undoubtedly many risks to the public cloud because resources within it are accessible to everybody. With the aid of the Amazon Virtual Private Cloud (VPC), these potential risks are effectively avoided. We have presented VPC principles and examples in this article, along with an explanation of the benefits and necessity of VPC. The implementation involves creating a VPC, setting up gateways, configuring route tables, and establishing both private and public subnets. Secure Shell (SSH) keys and EC2 instances are utilized to deploy OpenVPN, followed by RDP connections. This setup provides a secure, encrypted tunnel specifically for the library management website, allowing authorized users to access resources from anywhere.
Affective computing is a critical aspect of human-computer interaction. Electroencephalographic (EEG) signals, which reflect electrical brain activity, are widely used for the understanding of human emotional states. ...
详细信息
Since cloud computing platforms have become an essential component in a range of different industries, it is still challenging to ensure that user data and system resources will remain secure inside these settings. Th...
详细信息
The proceedings contain 94 papers. The topics discussed include: MVGCL: multi-view graph contrastive learning for service recommendation;a knowledge service framework for fault diagnosis of low-earth orbit satellite c...
ISBN:
(纸本)9798350304855
The proceedings contain 94 papers. The topics discussed include: MVGCL: multi-view graph contrastive learning for service recommendation;a knowledge service framework for fault diagnosis of low-earth orbit satellite constellation;secure cross-domain medical data sharing based on distributed cloud and blockchain services;a bidirectional representation recommendation based on relevance information enhancement to solve user interest drift;on the suitability of ai for service-based adaptive supply chains in smart manufacturing;a multiple-path learning neural network model for code completion;ExpoEv: enhancing social recommendation service with social exposure and feature evolution;a novel logic-based adaptive monitoring for composite edge services;a two-stage preference learning method based on graph neural networks for preference service;and FedWM: federated crowdsourcing workforce management service for productive laziness.
Wireless sensor network (WSN), is a collection of sensors that is used for monitoring the activities in a given environment. They are used in the forests for fire detection wherea large number of sensor nodes are plac...
详细信息
This paper presents a decentralised signal classification approach for data acquired using Internet of Things (IoT) wearable sensors. Traditionally, data from IoT sensors are processed in a centralised fashion, and in...
详细信息
ISBN:
(纸本)9798350300246
This paper presents a decentralised signal classification approach for data acquired using Internet of Things (IoT) wearable sensors. Traditionally, data from IoT sensors are processed in a centralised fashion, and in a single node. This approach has several limitations, such as high energy consumption on the edge sensor, longer response times, etc. We present a distributed processing approach for convolutional neural network (CNN) based classifiers where a single CNN model can be split into multiple sub-networks using early exits. To reduce the transfer of large feature maps between sub-networks, we introduced an encoder-decoder pair at the exit points. Processing of inputs that can be classified with high confidence at an exit point will be terminated early, without needing to traverse the entire network. The initial sub-networks can be deployed on the edge to reduce sensor energy consumption and overall complexity. We also experimented with multiple exit point locations and show that the point of exit can be adjusted for trade-offs between complexity and performance. The proposed system can achieve a sensitivity of 98.45% and an accuracy of 97.55% for electrocardiogram (ECG) classification and save 60% of the data transmitted wirelessly while reducing 38.45% of the complexity.
In this paper, in the context of distributed control of heterogeneous battery energy storage systems in a droop control microgrid, based on the consensus theory of multi-agent systems, this paper proposes a distribute...
详细信息
暂无评论