As a significant communication method for transferring quantum state, quantum teleportation is the foundation of scalable quantum network and distributed quantum computation. Here a novel quantum teleportation protoco...
详细信息
ISBN:
(纸本)9781538636527
As a significant communication method for transferring quantum state, quantum teleportation is the foundation of scalable quantum network and distributed quantum computation. Here a novel quantum teleportation protocol for eight-qubit state by utilizing a quantum channel of six-particle cluster state is proposed. In our scheme, multiple controlled-NOT operations and von-Neumann projective measurement are adopted to reconstruct the received quantum state with deterministic probability. Computational results show that higher efficiency can be achieved by our scheme.
This paper improves the parallel multi-dimensional indexing system which stores data into several multi-dimensional indexes and retrieves required data from them in parallel. This system treats a set of data as a rect...
详细信息
This paper improves the parallel multi-dimensional indexing system which stores data into several multi-dimensional indexes and retrieves required data from them in parallel. This system treats a set of data as a rectangle, which covers the data. The rectangle is inserted into an index. We must consider two important points. One is that the area of each index covers as wide as possible so that many indexes could be used in the retrieval. The other is that the number of rectangles which each index has is the same as possible so that the time in finishing the retrieval on each index could be the same as possible. The conventional system selects an index to which a rectangle is moved by using the area that the index covers and the number of rectangles that the index has. The conventional system first evaluates the degree of the expansion of area and then evaluates the number of rectangles. This paper changes the evaluation order. The number of rectangles is firstly evaluated. It is experimentally shown that the new evaluation order gives us good retrieval performance.
Several wild animal species are endangered by poaching. As a solution, deploying wireless sensors on animals able to send regular messages and also alert messages has been envisaged recently by several authorities and...
详细信息
ISBN:
(纸本)9781538668764
Several wild animal species are endangered by poaching. As a solution, deploying wireless sensors on animals able to send regular messages and also alert messages has been envisaged recently by several authorities and foundations. In that context, this paper proposes Wi1dMAC, a multichannel, multihop wireless communication protocol for these specific wireless sensor networks that have to collect data from unknown large areas with different QoS requirements. Wi1dMAC is a TDMA based MAC protocol that leverages long range communication properties to propose an efficient data collection mean. Its performance evaluation shows it meets QoS requirements.
Now a day's, cognitive radio networks (CRNs) is an emerging area of research in wireless communication paradigm. In CRN, the secondary user (SU) node exploits radio environment of primary user (PU) for spectrum ho...
详细信息
ISBN:
(纸本)9781538644300
Now a day's, cognitive radio networks (CRNs) is an emerging area of research in wireless communication paradigm. In CRN, the secondary user (SU) node exploits radio environment of primary user (PU) for spectrum holes and thus maximizes spectrum utilization. The communication and computation may he interfered by arbitrarily appearance of PU for its channel However, it can he handled by increasing the size of available vacate channel set. The backup set for channels would help to avoid premature failure. Therefore, the present work proposes a SU-NODES REPLACEMENT (SUNR) distributed algorithm for maintaining minimum spanning tree (MST) after single node failure in CRN. Our MST tree maintenante algorithm successfully tackles unpredictable dection and makes the protocol fault-tolerant. The correct oof and simulation is included for algorithm verification.
We consider a Software Defined networking (SDN)-enabled edge computing domain, where networking devices also have processing capabilities. In particular, we investigate the problem of dynamic allocation of stateless c...
详细信息
ISBN:
(纸本)9781538678992
We consider a Software Defined networking (SDN)-enabled edge computing domain, where networking devices also have processing capabilities. In particular, we investigate the problem of dynamic allocation of stateless computations, that we call lambda functions, and propose an architectural framework through which requests for execution of lambda functions originated by mobile nodes can be appropriately routed to specific edge devices following a serverless model. In addition, we propose a detailed emulation environment to test the architecture. Our framework supports many possible distributed algorithms to dynamically adapt the choice where requests should be executed, in order to optimize a given performance target. In the paper we consider a few such policies, to test the flexibility of the architecture. We thus present extensive performance results of the considered policies.
Status quo, the process of maintaining land ownership records employed by many countries is archaic, providing scope for fraudulence, tampering and/or misrepresentation of data, with little to no accountability for en...
详细信息
Status quo, the process of maintaining land ownership records employed by many countries is archaic, providing scope for fraudulence, tampering and/or misrepresentation of data, with little to no accountability for ensuring the authenticity of the managed records. This inefficiency and lack of transparency in the system can heavily exploited by the malicious middlemen with questionable intent, entrusted with the task of maintaining the records. The paper aims at introducing transparency, especially in the realm of land acquisition and ownership record management, by ensuring that each transaction is validated by all involved parties. It removes the scope for fraudulence by creating an immutable history of records, which is permanently linked to the system, thereby streamlining documentation and record-keeping. A peer-to-peer tamper-proof and forge-proof network is leveraged for this purpose, using a permissioned Blockchain such as Hyperledger Fabric. The system is interfaced with Interplanetary File System for secure documentation record management.
We present, in this paper, a new overlay network design that is suited for large scale peer-to-peer networks requiring fast message transmission. We particularly address the problem of designing an overlay communicati...
详细信息
ISBN:
(纸本)9781538621950
We present, in this paper, a new overlay network design that is suited for large scale peer-to-peer networks requiring fast message transmission. We particularly address the problem of designing an overlay communication network that spans across a set of data centres located in multiple geographic locations with the necessity of requiring locality properties for applications. Our design for the overlay network is motivated by the social network structures and we use different operators as found in evolutionary computing to emulate a semi-structured *** present the network structure and the various algorithms required for basic communication and maintenance. We also study the proposed network by simulation and compare with existing overlay networks. The simulated results show that on an average there are at most six hops required for a message originated at any node in the network to be transferred to any other node in the network. The network so designed is scalable, and resilient to failure and, can include node of arbitrary in processing capacity, network bandwidth and storage.
Supply chain in industry is a flow of information and goods traversal through multiple suppliers such as raw material suppliers, manufacturers, distributors, retailers and end users. Supply chain management (SCM) help...
详细信息
Supply chain in industry is a flow of information and goods traversal through multiple suppliers such as raw material suppliers, manufacturers, distributors, retailers and end users. Supply chain management (SCM) helps in smooth monitoring and accounting of information and goods traversal among multiple users. However, the existing supply chain management processes lack in offering transparency of information, user's privacy, timely updates on demand peaks, improper tracing of information, quality management, deal repudiation and trust among users. To address these problems, we propose a novel framework for pharmaceutical supply chain management which uses an ethereum blockchain, a distributed ledger technology. We propose different smart contracts to manage pharmaceutical supply chain processes over an ethereum blockchain. This framework helps in achieving user privacy, transparency of the supplied drug, tracking of drugs, quality management, non-repudiation and demand supply management with the improved trust among the users. At the end, we analyze the proposed framework in terms of fulfilling the pharmaceutical supply chain management requirements.
This work presents a software-centric visible light communication (VLC) system in full duplex mode with CSMA/CA and RTS-CTS in mobile environment. We focus on channel access mechanism problems in the same environment....
详细信息
ISBN:
(纸本)9781450359030
This work presents a software-centric visible light communication (VLC) system in full duplex mode with CSMA/CA and RTS-CTS in mobile environment. We focus on channel access mechanism problems in the same environment. To solve these we modify distributed Coordination function (DCF) by adding ambient light measurement slot. The result shows modified DCF can handle the problems.
In recent years, with the progress of IoT, the entry data from various sensors is accumulated on the cloud server and used for various analyses as big data. On the other hand, in order to transfer a large amount of da...
详细信息
ISBN:
(纸本)9781538621950
In recent years, with the progress of IoT, the entry data from various sensors is accumulated on the cloud server and used for various analyses as big data. On the other hand, in order to transfer a large amount of data to the cloud server, there were the problems such as the restriction of network bandwidth, and the delay of feedback control of the sensors. For these problems, Fog computing has been proposed in which the primary processing of the sensor data is performed at the fog node installed near the sensors, and only its processing results are transferred to the cloud server. However, in this method, in the case where the original data of the sensor is required for various analyses at the cloud server, such a data must be transferred additionally. That is, a mechanism is necessary to manage the data of the entire system and to mutually utilize it. In this paper, I propose a data model which consists of three levels: the first level saves the original sensor data and is placed in the fog node;the second level saves the extraction data extracted by the primary processing;the third level saves the analysis results data. The second and third levels are placed in the cloud server. And, by constructing this data model with a distributed database, it can be performed efficiently to refer the arbitrary original sensor data in the fog nodes from the cloud server. Moreover, I implement this reference processing in two ways using MongoDB, which is a kind of NoSQL database, to evaluate this data model. And, I show it is necessary to select the reference way according to the system environment: the network bandwidth, the database performance of the fog node and cloud server, and the number of the fog nodes.
暂无评论