The Internet of Things (IoT) is becoming a part of everyday life through its various sensing devices that collect valuable information. The huge number of interconnected heterogeneous IoT devices poses immense challen...
详细信息
The Blended teaching system is a learning method that mixes the online classes with traditional offline classroom methods. Web-based blended teaching system influences web technologies for create a blended learning en...
详细信息
Fog computing is a promising computing paradigm that brings computing resources close to end users at the edge of the network. Hence, it handles large-scale, geographically distributed, and latencysensitive services. ...
详细信息
Fog computing is a promising computing paradigm that brings computing resources close to end users at the edge of the network. Hence, it handles large-scale, geographically distributed, and latencysensitive services. However, there are several security challenges that must be addressed due to the unreliable nature of this architecture. One can cite the verification of data integrity among the most critical issues in the context of fog computing. In fact, since data is often stored dynamically in a fully distributed manner, traditional solutions based on a centralized third-party auditor for integrity verification become unsuitable for such highly dynamic and distributed contexts. Indeed, the constant transfer of data to and from the central auditor results in high network latency and potential ***, in this paper, we propose a new efficient public verification protocol that ensures the integrity of the data in fog computing architecture. Our solution protects data integrity and authenticity using the short integer solution problem (SIS) and identity-based signatures. Moreover, in order to legitimately modify the data, our protocol allows to distributively identify the data owners and to delegate their signatures to other entities in the architecture. Furthermore, it enables effective data integrity verification even when data is separately shared across several servers. This verification can be performed by any legitimate end user connected to the architecture, and without relying on any trusted third party. Finally, we prove that our protocol is highly efficient and outperforms existing solutions, as demonstrated by our extensive simulations and thorough security analysis that confirmed its security.
Image-text matching is an important problem at the intersection of computer vision and natural language processing. It aims to establish the semantic link between image and text to achieve high-quality semantic alignm...
详细信息
Energy revolution and digital revolution are jointly promoting the transformation and upgrading of traditional power grid to digital power grid. The digital power grid is facing the demand for two-way transmission of ...
详细信息
This paper introduces a new method for managing fire hydrants that uses a monitoring system based on the Internet of Things (IoT) and a Naive Bayes Classifier (NBC) for predictive maintenance. Water pressure, flow rat...
详细信息
The performance of distributed and data-centric applications often critically depends on the interconnecting network. Emerging reconfigurable datacenter networks (RDCNs) are a particularly innovative approach to impro...
详细信息
In light of the growing number of user privacy violations in centralized social networks, the need to define effective platforms for decentralized online social networks (DOSNs) is deeply felt. Interesting solutions h...
详细信息
In light of the growing number of user privacy violations in centralized social networks, the need to define effective platforms for decentralized online social networks (DOSNs) is deeply felt. Interesting solutions have been proposed in the past, which own the necessary mechanisms to allow users keeping control over their personal information and setting the rules to regulate the access of other users. Unfortunately, the effectiveness of this type of solutions is severely reduced by the fact that different user communities with a shared interest could be disconnected/separated from each other. This translates into a reduced ability in effectively spreading data of common interest towards all interested users, as it currently happens in centralized social networks. In order to overcome the cited limitation, this paper proposes a disruptive approach, which exploits the availability of a new class of Internet of Things (IoT) devices with autonomous social behaviors and cognitive abilities. Such devices can be leveraged as friendship intermediaries between devices' owners who are connected to a DOSN platform and share the same interest. We will demonstrate that clear advantages can be achieved in terms of increased percentage of Interested Reachable Nodes (a specific measure of Delivery Ratio) in distributed social networks among humans, when enhanced with so called Mediator Objects adhering to the well-known social IoT (SIoT) paradigm. (c) 2021 Elsevier B.V. All rights reserved.
One technological trend that will not go away in the modern world is the Internet of Things (IoT). With the development of the Internet of Things, the world is becoming smarter. The efficacy, flexibility, and simplici...
详细信息
The proceedings contain 37 papers. The special focus in this conference is on Applied Innovations in IT. The topics include: Use of Heterogeneous Special Purpose Telecommunication networks for Provision of Convergent ...
ISBN:
(纸本)9783031892950
The proceedings contain 37 papers. The special focus in this conference is on Applied Innovations in IT. The topics include: Use of Heterogeneous Special Purpose Telecommunication networks for Provision of Convergent Services;methodology for Choosing the Best Network Topology for the Multiple Objects Network;turing Machine Development for High Protected Remote Control of the IoT Mobile Platform;distributed Multi-agent systems Based on the Mixture of Experts Architecture in the Context of 6G Wireless Technologies;technological Principles for Building a Network Architecture of Service Data Processing Centers;Comparison of Performance and Power Consumption in Sigfox, NB-IoT, and LTE-M;approach to Effective Query Execution;possible Features of Designing Telemedicine networks and Telemedicine Stations;applying Adaptive Learning Techniques for Studying of Installation Process an Operating System on a Personal computer;determination the Conversion Power of the Most Popular Switching Converters for computersystems;achieving Cyber-Physical Consistency for Immersive Robot Controlling;quantifying the Economic Impact of Investment Activities: Methods and Applications;analysis of Modern Solutions for the Identification of Anonymous Users;ontology-Driven Approach to the Structuring of Information Resources Describing a Subject Domain;a Comprehensive Integration of Practical Strategies in DevOps;methods of Spline Functions in Information Technologies;adaptive Clustering for Distribution Parameter Estimation in Technical Diagnostics;semi-Autonomous Object Retrieval with Robot Arm and Depth Camera for Quadruped Robots;power-to-X Strategies: A Key Driver for Decarbonization and Renewable Energy Integration in Economies;Estimation of the Repeater Span Length of OTH Transmission System with QAM Modulation;automated 3D Sign Language Animation Using Machine Learning Algorithms.
暂无评论