In order to study the issue of resource search for edge computing, a method is proposed for the first time, which can not only locating base stations within a designed region, also search for a base station locating o...
详细信息
ISBN:
(数字)9783319723297
ISBN:
(纸本)9783319723297;9783319723280
In order to study the issue of resource search for edge computing, a method is proposed for the first time, which can not only locating base stations within a designed region, also search for a base station locating outside the region but with a coverage overlapping the region. Mathematical model is applied to simulation of the shape and location of the region, the rectangular bounding box is used to narrow the searching scope. Moreover, the use of the ray method makes contributions to determining whether the base station in the region, and the implementation of the genetic algorithm helps to find the largest internal rectangle of the region, thus reduce the amount of calculation.
Interoperability and enormous data processing remain significant challenges for internet of Things' Systems. High heterogeneity in protocols, Vendors, data formats and worldwide acceptable standards' scarcity ...
详细信息
Big data are a data trend present around us mainly through internet -social networks and smart devices and meters -mostly without us being aware of them. Also they are a fact that both industry and scientific research...
详细信息
Cloud computing and the future internet concept highlight new requirements for the software engineering phases including testing and validation of modular web services. A major reason is because cloud applications are...
详细信息
ISBN:
(纸本)9781509060290
Cloud computing and the future internet concept highlight new requirements for the software engineering phases including testing and validation of modular web services. A major reason is because cloud applications are developed by services belonging to different providers, thus making software testing a really challenging issue. In this work, we propose a testing methodology that includes two fold testing actions;a unit testing of cloud service APIs following white and black box techniques and an integration testing strategy by identifying services that could interface with each other. In addition, we present the Elvior TestCast T3 (TTCN-3) testing tool for automation of use case testing. We demonstrate the results of the methodology when applied to different cloud services and we present a discussion of our conclusions for a real world use case, in which we applied this methodology.
With the rapid development in the field of internet, most of the communication takes place through insecure network. Rather than one to one communication, group communication incur significant utilization of the bandw...
详细信息
ISBN:
(纸本)9781538611449
With the rapid development in the field of internet, most of the communication takes place through insecure network. Rather than one to one communication, group communication incur significant utilization of the bandwidth. Security of an information can be achieved by the process of encryption and decryption of data with the secret group key. Security also depends on the efficient management of the group secret key. The proposed algorithm for group secret key generation is based on the Diffie-Hellman Key Exchange algorithm. In group communication, the user may join or leave the group at any time. In order to achieve security requirements like confidentiality, authentication, integrity, forward secrecy and backward secrecy, the group key must be updated immediately after the membership change. In this regard algorithms are described for initial group setup, group member withdrawal and group member inclusion. The generated group secret key is used in the symmetric encryption and decryption of an image. Symmetric encryption methods like Advanced Encryption Standard (AES) and Cipher Feedback mode (CFB) algorithms are used for encryption and decryption of an image. The performance analysis of the secret key in an image encryption/decryption is obtained by comparing the results of entropy, correlation coefficient and histogram band of an original image with an encrypted image. It is observed that, from the value of entropy, correlation coefficient and histogram band, that an encrypted image does not contain any residual information. So that it is very difficult for the unauthorized recipient to appreciate the data transmitted.
The proceedings contain 56 papers. The topics discussed include: intelligent FH sequence for high security satellite communication: the generation, performance analysis and application;from IoT to ephemeral computing:...
ISBN:
(纸本)9781450348447
The proceedings contain 56 papers. The topics discussed include: intelligent FH sequence for high security satellite communication: the generation, performance analysis and application;from IoT to ephemeral computing: understanding cyber-physical interactions;towards sustainable smart society: big data driven approaches;towards sustainable smart society: big data driven approaches;cooperative hybrid wireless-powerline channel transmission for peer-to-peer energy trading and sharing system;a survey on authentication techniques for the internet of things;an improved dynamic load balancing algorithm applied to a cafeteria system in a university campus;and a survey on data confidentiality and privacy in cloud computing.
In this paper, A new fuzzy algorithm(PPMFA) based on pursuit project model is presented, which is applied to the text clustering. The main defect of traditional methods of fuzzy clustering algorithm based on partition...
详细信息
ISBN:
(纸本)9781450352086
In this paper, A new fuzzy algorithm(PPMFA) based on pursuit project model is presented, which is applied to the text clustering. The main defect of traditional methods of fuzzy clustering algorithm based on partition is to know the number of clustering in advance. The text eigenvector is acquired based on the vector space model (VSM) and *** method. The pursuit project model is applied to the fuzzy neural network's structure, which achieves clustering. The experiment shows the precision and the efficiency of clustering PPMFA are higher than traditional fuzzy clustering algorithm FCM.
Cloud computing is a revolution in IT technology that provides scalable, virtualized on-demand resources to the end users with greater flexibility, less maintenance and reduced infrastructure cost. These resources are...
详细信息
cloud computing offers great opportunities for higher education institutions to take advantage of e-learning solutions without having to invest in hardware, software or infrastructure. Kabul Polytechnic (KPU) is a maj...
详细信息
Today many users with their smart mobile devices enjoy the benefits of broadband internet services. This is primarily enabled by pushing computing, control, data storage and processing into the cloud. However, the clo...
详细信息
暂无评论