The advances in the areas of microelectronics and telecommunications are helping to materialize the vision of a pervasive computing model through the incorporation of sensors and communication interfaces into objects ...
详细信息
ISBN:
(纸本)9781479984251
The advances in the areas of microelectronics and telecommunications are helping to materialize the vision of a pervasive computing model through the incorporation of sensors and communication interfaces into objects of everyday life. In recent years, there has been a growing interest in crowd assisted sensing applications, in which people serve as the building block that can be exploited to offer pervasive opportunistic sensing at scale. This paper describes a new crowd assisted pervasive opportunistic sensing framework able of exploiting people's mobility to overcome the coverage limitation of sensors and the diversity of devices, expanding the scale of sensing applications.
Cloud offers flexible and cost effective storage for big data but the major challenge is access control of big data processing. CP-ABE is a desirable solution for data access control in cloud. However, in CP-ABE the a...
详细信息
ISBN:
(纸本)9781538644300
Cloud offers flexible and cost effective storage for big data but the major challenge is access control of big data processing. CP-ABE is a desirable solution for data access control in cloud. However, in CP-ABE the access policy may leak user's private information. To address this issue, Hidden Policy CP-ABE schemes proposed but those schemes still causing data leakage problem because the access policies are partially hidden and create more computational cost. In this paper, we propose a New Hidden Policy Ciphertext Policy Attribute Based Encryption (HP-CP-ABE) to ensure Big Data Access control with Privacy-preserving Policy in Cloud. In proposed method, we used Multi Secret Sharing Scheme(MSSS) to reduce the computational overhead, while encryption and decryption process. We also applied mask technique on each attribute in access policy and embed the access policy in ciphertext, to protect user's private information from access policy. The security analysis shows that HP-CP-ABE is more secure and preserve the access policy privacy. Performance evaluation shows that our schemes takes less computational cost than existing scheme.
In this paper we propose a mechanism of an adaptive multimedia stream service that can support continuous data transmissions in mobile computing environment. This mechanism contains an effective buffeting method, an i...
详细信息
ISBN:
(纸本)0769509517;0769509525
In this paper we propose a mechanism of an adaptive multimedia stream service that can support continuous data transmissions in mobile computing environment. This mechanism contains an effective buffeting method, an intelligent filtering and QoS negotiation method, and a playout control method to provide seamless playback of multimedia streams. To implement the mechanisms in the mobile computing environment, we take the concept of proxy It is located in the intermediate place between Two communication endpoints and it plays the role of an agent of the mobile hosts. The proxy uses the buffering method to keep constant transmission rates using feedback so that it can provide an adaptive stream service to the network. If needed, the proxy may transform the streams by applying filters to make mobile hosts' environments more optimal. And it does QoS negotiation with mobile hosts if the network bandwidth cannot support required QoS or if the environment of mobile host was changed.
This article essentially discusses the design of sliding mode control (SMC) for magnetic levitation system for robust positioning of the levitating object. In principle, the magnetic levitation system is oscillatory i...
详细信息
ISBN:
(纸本)9781538638521
This article essentially discusses the design of sliding mode control (SMC) for magnetic levitation system for robust positioning of the levitating object. In principle, the magnetic levitation system is oscillatory in absence of frictional force to the levitating object. However, often practically the displacement of levitating object is guided physically by external means. This offers small amount of friction to the motion. This frictional force can be considered as the disturbance appearing in the input channel. In this article, SMC is designed for positioning of the levitating magnet and implemented on the Maglev experimental setup Model 730 developed by ECP systems.
The concept of SDN enables revolutionary automation and policy based management in the era of networking. In these phenomena, there is no vendor's specification to implement the new features over the network syste...
详细信息
ISBN:
(纸本)9781728151977;9781728151960
The concept of SDN enables revolutionary automation and policy based management in the era of networking. In these phenomena, there is no vendor's specification to implement the new features over the network system. Delay-tolerant networking (DTN) is a type of wireless ad-hoc network. It works when the end to end direct path does not exist between source and destination then it's using the Store and Forwarding routing mechanism. This research study will propose a new architecture with the combination of SDN (Software Defined networking) and DTN (Delay Tolerant Network) which has four layers Victim node, DTN Layer, DTN Tend and control station. Victim nodes are simple DTN enables devices such as PDA, smartphone. DTN layer is the combination of bundle storage and convergence layer. DTN Tend is a monitoring application where it will monitor the whole network and give feedback to the controller so that the controller can decide for better performance. For the simulation of this proposed model was evaluated by using Mininet-WiFi. According to the simulation result on the best case scenario the message delivery rate is 99.540% and packet loss is 0.460%. Though this proposed architecture has few limitations such as no priority has been set between defined services, if all defined service requests come at a time then it will be FCFS based.
Lack of interoperability of traditional networking architecture reduces the network’s speed, reliability, and security. Software-defined networking has decoupled control plane and data plane in order to configure the...
详细信息
In the antilock braking system, nonlinearities and uncertainties are the main challenges. To overcome these challenges, novel sliding surface control with disturbance observer is designed for vehicle model with eight ...
详细信息
Trustworthy personal data access control at a semi-trusted or distrusted Cloud Service Provider (CSP) is a practical issue although cloud computing has widely developed. Many existing solutions suffer from high comput...
详细信息
ISBN:
(纸本)9781479965137
Trustworthy personal data access control at a semi-trusted or distrusted Cloud Service Provider (CSP) is a practical issue although cloud computing has widely developed. Many existing solutions suffer from high computation and communication costs, and are impractical to deploy in reality due to usability issue. With the rapid growth and popularity of mobile social networking, trust relationships in different contexts can be assessed based on mobile social networking activities, behaviors and experiences. Obviously, such trust cues extracted from social networking are helpful in automatically managing personal data access at the cloud with sound usability. In this paper, we propose a scheme to secure personal data access at CSP according to trust assessed in mobile social networking. Security and performance evaluations show the efficiency and effectiveness of our scheme for practical adoption.
ALOHA-based medium access control (MAC) protocols are very popular in long-range wireless networks, where carrier-sense mechanisms are not much effective. In particular, pure or slotted ALOHA is used in many wireless ...
详细信息
ISBN:
(纸本)9781538636527
ALOHA-based medium access control (MAC) protocols are very popular in long-range wireless networks, where carrier-sense mechanisms are not much effective. In particular, pure or slotted ALOHA is used in many wireless technologies designed to support Machine-Type communication (MTC), despite the very well-known scalability limits of the protocol. To mitigate the problem, some MTC technologies feature multiple transmission rates and, more importantly, advanced receivers that can detect the modulation scheme of a packet on the fly, without the need to transmit the packet header at a known basic rate. In this paper we propose two multi-rate MAC protocols, named Multirate-Split Slotted ALOHA (MSSA) and Multirate ALOHA Reservation Protocol (MARP), which are designed to better exploit such multi-rate capabilities of the wireless technologies. By means of extensive simulations, we show that our protocols can substantially improve the performance of the legacy ALOHA protocol in the specific scenario of MTC, characterized by a massive number of nodes, which sporadically transmit short packets.
networking forms an essential part of distributed systems and reliable point-to-point communication is one of the main utilization of distributed networking systems. In this paper, we discuss new techniques for improv...
详细信息
ISBN:
(纸本)0769520235
networking forms an essential part of distributed systems and reliable point-to-point communication is one of the main utilization of distributed networking systems. In this paper, we discuss new techniques for improving networking in distributed systems under a sequence of operations, such as inserting and deleting a link between two nodes. As a result, by simply alternating the insertion and deletion of a link, we can generate a sequence of operations that at each step changes the number of components. It is shown how to rest at any time whether two nodes belong to the same sub-network, and how to insert and delete a link in O(m(2/3)) time in the worst case, where m is the current number of links in the network.
暂无评论