The proceedings contain 118 papers. The topics discussed include: MIC: enabling efficient concurrent use of multiple network interfaces on mobile systems;improving always-on gesture recognition power efficiency for an...
ISBN:
(纸本)9781509035939
The proceedings contain 118 papers. The topics discussed include: MIC: enabling efficient concurrent use of multiple network interfaces on mobile systems;improving always-on gesture recognition power efficiency for android devices using sensor hubs;request-size aware flash translation layer based on page-level mapping;ruleset minimization in multi-tenant smart buildings;optimal multiprocessor real-time scheduling based on RUN for practical imprecise computation with harmonic periodic task sets;DockerCap: a software-level power capping orchestrator for docker containers;a partitional approach for genomic-data clustering combined with K-means algorithm;and a multi-sensor process for in-situ monitoring of water pollution in rivers or lakes for high-resolution quantitative and qualitative water quality data.
This research introduces the design and implementation of an advanced IoT-based home security system aimed at improving both convenience and safety for homeowners. The system integrates a smart doorbell with a mobile ...
详细信息
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of...
详细信息
ISBN:
(纸本)9789819776023
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of different services to customers, and that have the potential to do so. Customers are required to pay for the cost of using the Services in accordance with the company's "pay-for-use only" policy. However, there are certain firms, such as Google Inc, that provide customers with particular free storage space even though the services provided by the company are limited, specifically with regard to the public cloud. A third-party service provider frequently owns and maintains the infrastructure required to run cloud computing services. But because more and more data and files pertaining to individuals and businesses are being stored in the cloud, worries have started to grow about how safe it actually is. Among these are the protection of software for virtualization and distributed computing, the safety of application software, the administration of identities, and the authentication and restriction of access. Nevertheless, efficient user authentication is the most essential need of cloud computing, as it limits unauthorized usage of a cloud server. Cloud computing has become increasingly popular in recent years. In this research, we present a new authentication method between users and online computing systems that is based on the suggested secure hash algorithm (SHA-3) and makes use of the lightweight Sosemanuk method. We created this technique. That system is going to be known as the SoSha3 system. The design that has been proposed for the system deals with data in three different sizes: 128, 256, and 512 bits. In order to make these authentication systems suitable for cloud computing at high rates, some modifications were made to them. The three-dimensional chaotic system, also known as the Lorenz system, will be combined with the authentication architecture tha
Smart cities require better cellular communication, incorporating a high data rate that satisfies the Internet, cloud computing, and the Internet of Things (IoT) requirements. A high data rate demands higher bandwidth...
详细信息
The integration of sensor devices into an IoT network is experiencing significant growth. Along with the rise of several application demands, it is necessary to continuously develop new designs to accommodate these ch...
详细信息
This work aims to implement a multi-feature intrusion detection system for the CAN bus. As vehicle technologies become more advanced, automated, and connected, their electronic systems become increasingly vulnerable t...
详细信息
In this paper, the performance of various panoramic image stitching techniques applicable across diverse domains, including virtual reality, robotics, remote sensing, and multimedia content creation, is investigated. ...
详细信息
This paper proposes a symmetric searchable encryption scheme that hides both search pattern and access pattern. The protocol allows users to obtain correct search results on ciphertexts without leaking privacy. We int...
详细信息
A smart agricultural informatics platform integrated with Internet of Things (IoT) aims to revolutionize farming practices through a decentralized communication framework, the primary goal is to establish a knowledge-...
详细信息
Solar panels can connect through an array in myriad ways. This research shows the performance for different partial shading conditions through an SP connection for the iine-to-ground fault. The SP connection includes ...
详细信息
暂无评论