Reconfiguration capability in nowadays embedded systems such as Reconfigurable computing (RC) systems improves the execution of applications efficiently. However, the reconfiguration overhead in the mapping process of...
详细信息
In response to the national call of “food safety”, this paper introduces edge computing and block chain technology to design the agricultural super docking traceability system for fresh agricultural products. The sy...
详细信息
ISBN:
(纸本)9781665441506
In response to the national call of “food safety”, this paper introduces edge computing and block chain technology to design the agricultural super docking traceability system for fresh agricultural products. The system employs two-dimensional code, camera, temperature and humidity sensors and other terminal equipment to collect real-time data, including the detection data of fresh agricultural products, the information of processing and packaging fresh agricultural products, the status of fresh agricultural products during transportation. Edge computing technology is used to process edge information, alleviate the network transmission congestion and network delay of the traceability system. Blockchain technology is used to implement the safe storage tamper-resistant of data. Our research also carried out a traceability system construction of fresh agricultural products for a supermarket in Yucheng city.
Recently, the deployment of several exhaust fans for indoor cannot perform smoke suction ditributedly with the different exhaust fan speed according to the spread of smoke concentrations. It is because of the commerci...
详细信息
The past decade has witnessed numerous Routing design proposals for wireless multi-hop network specifically for Wireless sensor Network (WSN) and recently its allied Low Power, Lossy Networks (LLN) in the era of Inter...
详细信息
ISBN:
(纸本)9781728131870
The past decade has witnessed numerous Routing design proposals for wireless multi-hop network specifically for Wireless sensor Network (WSN) and recently its allied Low Power, Lossy Networks (LLN) in the era of Internet of Things (IoT). However, experimentation using sensor motes in real test-bed is limited as majority cater to simulation analysis. This work proposes and implements a Hybrid Opportunistic Routing (OR) design for Low Power, Lossy WSN. The routing protocol adopts opportunistic mode of forwarding as the first and last resort to improve end-to-end packet delivery ratio. The protocol switches to unicast mode for successive transmissions by relying on trust-worthy forwarder(s) until link-level transmission error occurs. The OR phases such as candidate selection, prioritization and coordination are carried out on the fly in a completely distributed online manner by eligible forwarders. These forwarder(s) computes its priority order based on cross-layered routing metrics in a fuzzy manner and collaborate via timer coordination with differentiated Back-off Exponent (BE) parameters assignment for packet forwarding. The real test-bed experimentation using ieee 802.15.4 compliant SENSEnuts platform recorded the lossy-link characteristics during range test measurements. The proposed hybrid OR showed improvement in end-to-end delivery rate with increase in hops and number of forwarding candidates per level compared to level based unicast routing.
In this paper, link selection for half-duplex buffer-aided relay systems is revisited. A new fixed scheduling policy referred as alternate distributed beamforming (ADB) is proposed, in which the relays are divided int...
详细信息
The major usage of a distributed block storage integrated with a cloud computing platform is to provide the storage for VM (virtual machine) instances. Traditional desktop and server applications tend to be written wi...
详细信息
ISBN:
(纸本)9781665408790
The major usage of a distributed block storage integrated with a cloud computing platform is to provide the storage for VM (virtual machine) instances. Traditional desktop and server applications tend to be written with small I/O being dominant, and in limited parallelism. Hence the performance of block storage serving these applications migrated to cloud is largely determined by latency of small I/O. This paper presents IndigoStore, an optimized Ceph backend to implement cloud-scale block storage that provides virtual disks for cloud VMs. The design of IndigoStore aims to optimize Ceph BlueStore backend, the state-of-the-art distributed storage backend, to reduce both average and tail latency of small I/O, meanwhile not waste disk bandwidth serving large I/O. We use both microbenchmarks and our production workloads to demonstrate that IndigoStore achieves 29%∼44 % lower average latency, and up to 1.23×lower 99.99 th percentile tail latency than BlueStore, without any notable negative effects on other performance metrics.
Today's digital forensics software tools mostly do not offer automatic analysis methods to reveal evidences among huge amounts of digital files within hard disk images. It is important that finding evidence in dig...
详细信息
ISBN:
(纸本)9781728162515
Today's digital forensics software tools mostly do not offer automatic analysis methods to reveal evidences among huge amounts of digital files within hard disk images. It is important that finding evidence in digital and cyber forensics investigations as soon as possible by examining hard disk images. E-mails constitute a rich source of information in hard disk images, and they are the most possible data source to obtain an evidence. The analyzers search e-mail files by manually or using traditional methods in order to find an evidence. However, this operation could take a long time due to the size of the e-mail data which can contain a huge number of files and a huge volume of data. This study introduces an end-to-end distributed graph analysis framework for large-scale digital forensic datasets, and evaluates the accuracy of the centrality algorithms and the scalability of the proposed framework in terms of running time performance. The framework is comprised of specific processes to perform pre-processing, graph building, and algorithm activities. An architecture is introduced based on distributed big data techniques. Three different centrality algorithms are implemented to analyze the accuracy of our framework. Further, three implementations are provided to demonstrate the running time performance of our framework. Experiments are performed on Enron e-mail dataset to analyze the centrality algorithms, to evaluate the performance of the framework, and to compare the running times between the traditional approach and our approach. Moreover, the running time performance of the framework is evaluated under various parallelization level. The accuracy of the results is also evaluated and compared between the centrality algorithms. The comparison shows that some certain algorithms provide more accurate results and it is possible to improve the running time by orders of magnitude utilizing our end-to-end distributed graph analysis approach.
Wireless sensor network (WSN) are exponentially used for data accusation and controlled monitoring for IOT applications called IOT-WSN. The major challenge in WSN design is to prolong the latency and overall network l...
详细信息
ISBN:
(纸本)9781665447539
Wireless sensor network (WSN) are exponentially used for data accusation and controlled monitoring for IOT applications called IOT-WSN. The major challenge in WSN design is to prolong the latency and overall network life time. This paper have addressed the parametric constrain optimization approach for enhancing the latency of the distributed clustering (DC) based protocol. This approach may leads to improved energy efficiency (EE) of IOT-WSN communication protocol. The prime goal of the paper is to identifications of the design constrains which can influence the latency performance of various existing WSN protocols. Paper initially aims to review the various data aggregation and clustering based WSN routing protocols. The impact of constrain variations over DEEC protocol are evaluated. The study with clustering and data aggregation based EE protocols viz. LEACH, PEGASIS, SEP, and DC variant are presented. Paper significantly contributes to present the impacts of design constrains for EE protocol in future to serve upcoming generation of IOT sensor networks.
The proceedings contain 6 papers. The topics discussed include: scheduling across multiple applications using task-based programming models;DEMAC: a modular platform for HW-SW co-design;CODIR: towards an MLIR codelet ...
ISBN:
(纸本)9781665422765
The proceedings contain 6 papers. The topics discussed include: scheduling across multiple applications using task-based programming models;DEMAC: a modular platform for HW-SW co-design;CODIR: towards an MLIR codelet model dialect;MENPS: a decentralized distributed shared memory exploiting RDMA;RaDD runtimes: radical and different distributed runtimes with SmartNICs;DEMAC: a modular platform for HW-SW co-design;and CODIR: towards an MLIR Codelet model dialect.
A joint 2-D angle estimation algorithm based on TDOA is proposed in this paper for multi-antenna system, which can solve the problem of using it in tracking system, such as limited estimation accuracy and inapplicabil...
详细信息
暂无评论