Cyber-Physical Systems (CPS) have the promise of presenting the next evolution in computing with potential applications that include aerospace, transportation, and various automation systems. These applications motiva...
详细信息
ISBN:
(纸本)9781479950416
Cyber-Physical Systems (CPS) have the promise of presenting the next evolution in computing with potential applications that include aerospace, transportation, and various automation systems. These applications motivate advances in the different sub-fields of CPS such as mobile computing, context awareness, and computer vision. However, deploying and testing complete CPSs is known to be a complex and expensive task. In this paper, we present the design, implementation, and evaluation of Up and Away (UnA): a testbed for Cyber-Physical Systems that use Unmanned Aerial Vehicles (UAVs) as their main physical component. UnA aims to abstract the control of physical system components to reduce the complexity of UAV oriented CPS experiments. UnA provides APIs to allow for converting CPS algorithm implementations, developed typically for simulations, into physical experiments using a few simple steps. We present two scenarios of using UnA's API to bring mobile-camera-based surveillance algorithms to life, thus exhibiting the ease of use and flexibility of UnA.
A compact planner multiband multi-input multi-output (MIMO) antenna is proposed and its performance is studied. This MIMO antenna covers multiple frequency bands of the mobile communication system. The proposed work i...
详细信息
Fog computing enables a multitude of resource-constrained end devices (e.g., sensors and actuators) to benefit from the presence of fog nodes in their close vicinity, which can provide the required computing and stora...
详细信息
ISBN:
(纸本)9781538668313
Fog computing enables a multitude of resource-constrained end devices (e.g., sensors and actuators) to benefit from the presence of fog nodes in their close vicinity, which can provide the required computing and storage facilities instead of relying on a distant Cloud infrastructure. However, guaranteeing stable communication between end devices and fog nodes is often not trivial. Indeed, in some application scenarios such as mining operations, building sites, precision agriculture, and more, communication occurs over Challenged Networks e.g., because of the absence of a fixed and reliable network infrastructure. This paper analyzes the applicability of Fog computing in a real Industrial Internet of Things (IIoT) environment, providing an architecture that enables disruption-tolerant communication over Challenged Networks and evaluating the achieved performance on an open-source prototype implementation.
This project is designed to manage security in workplace and also manage its record. With advanced technologies as RFID cards and readers. Based on the authentication provided at various entry and exits we can control...
详细信息
Social networking sites are acquirement most recognition due to the perfect and well-organized way of contact between two parties. However, during communication between two parties it may perhaps feasible that several...
详细信息
ISBN:
(纸本)9780769547237;9781467319119
Social networking sites are acquirement most recognition due to the perfect and well-organized way of contact between two parties. However, during communication between two parties it may perhaps feasible that several insulting words are to be used with the intention of may be deliberately or involuntarily is referred as Flaming during communication in the computer mediation. This paper mainly made the centre of attention on the Flame detector model, which will incarcerate the status of the user with the help of the web services from social networking sites and store it in to the local host. In this paper the working of the flame detector model had been described by taking the real time status of any user and detecting the flame and also generating the graph according to the intensity of the flame.
The primary bottleneck of blockchain is shifting from consensus to execution due to recent advances in DAG-based consensus algorithms supporting over 100k TPS. Many blockchain systems segregate execution from ordering...
详细信息
ISBN:
(数字)9798350352917
ISBN:
(纸本)9798350352924;9798350352917
The primary bottleneck of blockchain is shifting from consensus to execution due to recent advances in DAG-based consensus algorithms supporting over 100k TPS. Many blockchain systems segregate execution from ordering, missing the opportunity to harness potential parallelism in consensus-produced batches. In this paper, we propose a new deterministically orderable concurrency control algorithm, OptME, which improves the performance of execution phase by exploiting inherent parallelism among transactions. This algorithm analyzes transaction dependencies to extract parallelism, and determines the total order of transaction execution. OptME consists of three steps: (1) building a transaction dependency graph, (2) generating a parallel execution schedule, and (3) executing transactions based on the schedule. We employ several optimizations, including parallel dependency graph construction, early abort detection, and efficient reordering with an optimistic assumption. Our evaluation demonstrates that OptME achieves up to 350k TPS and outperforms a state-of-the-art concurrency control algorithm, even under high contention scenarios.
Wireless communications in high-speed railways presents many challenges to design and implementation. With the recent advances in wireless communication technologies, it is now becoming feasible to focus efforts on de...
详细信息
ISBN:
(纸本)9781538636527
Wireless communications in high-speed railways presents many challenges to design and implementation. With the recent advances in wireless communication technologies, it is now becoming feasible to focus efforts on deployment scenarios in high-speed mobility to address the currently existing challenges. Here, of particular interest is maintaining critical communication while also supporting bandwidth-intensive passenger services. The recent advent of 5G and mm Wave technologies guides efforts in the transition from GSM-R to LTE-R and towards 5G while providing many opportunities to overcome challenges such as the far higher number of handovers within dense 5G deployments. In this paper, we investigate an approach to limit the logical cellular region of 5G cells with equidistant multi-antenna, based on circular First In First Out (FIFO) connection establishment. Our model attains a reliability similar to macro cell by reducing outage probability of 5G small cells to a minimum, while using user and control decoupled architecture (UCDA) at high speed mobility.
IoT middleware is an additional layer between IoT devices and the cloud applications that reduces computation and data handling on the cloud. In a typical IoT system model, middleware primarily connects to different I...
详细信息
ISBN:
(纸本)9781538659069
IoT middleware is an additional layer between IoT devices and the cloud applications that reduces computation and data handling on the cloud. In a typical IoT system model, middleware primarily connects to different IoT devices via IoT gateway. Device data stored on middleware is sensitive and private to a user. Middleware must have built-in mechanisms to address these issues, as well as the implementation of user authentication and access control. This paper presents the current methods used for access control on middleware and introduces Attribute-based encryption (ABE) on middleware for access control. ABE combines access control with data encryption for ensuring the integrity of data. In this paper, we propose Ciphertext-policy attribute-based encryption, abbreviated CP-ABE scheme on the middleware layer in the IoT system architecture for user access control. The proposed scheme is aimed to provide security and efficiency while reducing complexity on middleware. We have used the AVISPA tool to strengthen the proposed scheme.
The evolutionary process of social networking is a transition from one state to another through chaos that features high system sensitivity to external disturbances. Thus, a system may be in a certain stable state cal...
详细信息
ISBN:
(纸本)9783319489230;9783319489223
The evolutionary process of social networking is a transition from one state to another through chaos that features high system sensitivity to external disturbances. Thus, a system may be in a certain stable state called an attractor adversely affected by a potential threat to social networking actors. So let us have synergetic control conceptualized here in terms of social network actors' interactions control to ensure national information security. The design of a synergetic system to control self-organizing virtual communities enables a chaos-control transition thus achieving the predicted result of their actors' interactions. There are some models introduced.
The operation of smart power grids will depend on a reliable and flexible communication infrastructure for monitoring and control. Software defined networking (SDN) is emerging as a promising control platform, facilit...
详细信息
ISBN:
(纸本)9781467385794
The operation of smart power grids will depend on a reliable and flexible communication infrastructure for monitoring and control. Software defined networking (SDN) is emerging as a promising control platform, facilitating network programmability and bandwidth flexibility. We study SDN optical transmission reliability for smart grid applications. We identify the collaboration of the control plane and the data plane in software-defined optical transmission systems as a cyber-physical interdependency where the 'physical' fiber network provides the 'cyber' control network with means to distribute control and signaling messages and in turn is itself operated by these 'cyber' control messages. We examine the robustness of such an interdependent communication system and quantify the advantages of optical layer reconfigurability.
暂无评论