Newly arising IoT-driven use cases often require low-latency analytics to derive time-sensitive actions, where a centralized cloud approach is not applicable. An emerging computing paradigm, referred to as fog computi...
详细信息
ISBN:
(纸本)9781728123653
Newly arising IoT-driven use cases often require low-latency analytics to derive time-sensitive actions, where a centralized cloud approach is not applicable. An emerging computing paradigm, referred to as fog computing, shifts the focus away from the central cloud by offloading specific computational parts of analytical stream processing pipelines (SPP) towards the edge of the network, thus leveraging existing resources close to where data is generated. However, in scenarios of mobile edge nodes, the inherent context changes need to be incorporated in the underlying fog cluster management, thus accounting for the dynamics by relocating certain processing elements of these SPP. This paper presents our initial work on a conceptual architecture for context-aware and dynamic management of SPP in the fog. We provide preliminary results, showing the general feasibility of relocating processing elements according to changes in the geolocation.
Horizontal and vertical integration rely on flexible interaction, i.e. communication and cooperation, of heterogeneous systems.and subsystems.on several abstraction layers. A large ontology (the Digital Reference) tha...
详细信息
The proceedings contain 24 papers. The special focus in this conference is on Risks and Security of Internet and systems. The topics include: WPA3 Connection Deprivation Attacks;An Approach for Thwarting Malicious Sec...
ISBN:
(纸本)9783030415679
The proceedings contain 24 papers. The special focus in this conference is on Risks and Security of Internet and systems. The topics include: WPA3 Connection Deprivation Attacks;An Approach for Thwarting Malicious Secret Channel: The Case of IP Record Route Option Header-Based Covert Channels;toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud computing;A Framework for GDPR Compliance in Big Data systems."I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical Interns;unsupervised Machine Learning for Card Payment Fraud Detection;intrusion Detection Study and Enhancement Using Machine Learning;watch Out! Doxware on the Way..;CDISS-BEMOS: A New Color Document Image Steganography System Based on Beta Elliptic Modeling of the Online Signature;an Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary Substations;A Graph Based Model for UAVs Group-Wide Collaboration Applied on an Anti-terrorism Scenario;modelling and Executing Time-Aware Processes in Trustless Blockchain Environment;Multi-scale Adaptive Threshold for DDoS Detection;a Recommender System for User-Specific Vulnerability Scoring;distributed Detection System Using Wavelet Decomposition and Chi-Square Test;continuous Risk Management for Industrial IoT: A Methodological View;systematic Asset Identification and Modeling During Requirements Engineering;inference Control in distributed Environment: A Comparison Study;MAPPER: Mapping Application Description to Permissions;Delegation of Computation Using FV Cryptosystem;Hardware Optimization on FPGA for the Modular Multiplication in the AMNS Representation;a Semantic Framework with Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production systems.
In this paper, a comparative study of the available important passive islanding techniques used for distributed generation is carried out. The following passive methods are compared and analyzed: under/over voltage, u...
详细信息
ISBN:
(数字)9789811370915
ISBN:
(纸本)9789811370915;9789811370908
In this paper, a comparative study of the available important passive islanding techniques used for distributed generation is carried out. The following passive methods are compared and analyzed: under/over voltage, under/over frequency, rate of change of frequency, voltage unbalance and total harmonic distortion, rate of change of active and reactive power, rate of change of phase angle difference, and rate of change of negative- and positive-sequence current methods. The above methods are tested and compared for numerous islanding and non-islanding cases by generating data on the IEEE 399-1997 system through PSCAD/EMTDC software.
The proceedings contain 93 papers. The special focus in this conference is on Design, Simulation, Manufacturing: The Innovation Exchange. The topics include: Estimation of Random Flow-Rate Characteristics of the Autom...
ISBN:
(纸本)9783030504908
The proceedings contain 93 papers. The special focus in this conference is on Design, Simulation, Manufacturing: The Innovation Exchange. The topics include: Estimation of Random Flow-Rate Characteristics of the Automatic Balancing Device Influence on Centrifugal Pump Efficiency;simulation of Wearing Processes with High Sliding Speed;analysis of Frictional Interaction in a Couple "Billet – Crystallizer";analysis of the Initial Corrosion Stage of a Steel Disk Under the Influence of Stress;research on the Energy State of the Surface of Alloys for Gas-Turbine Engine Blades;topology optimization procedure of aircraft mechanical components based on computer-aided design, multibody dynamics, and finite element analysis;numerical Simulation of Compression and Detonation Strokes in a Pulse Compression Detonation System;simulation of Bird Collision with Aircraft Laminated Glazing;ultrasonic Technology of Impregnation and Dosing Application of Liquid Epoxy Binders on Fabric Fiber Fillers;experimental Identification of a Car Dynamic Model Using the Numerical Algorithms for Subspace State-Space System Identification;parameter Identification of the Capillary Rising Process in Nanomaterials for Evaporative Cooling Applications;hydrodynamics of Two-Phase Upflow in a Pneumatic Classifier with the Variable Cross-Section;effect of Hydrodynamic Parameters on Membrane Electrolysis Enhancement;numerical Simulation of the Mass-Transfer Process Between Ammonia and Water in the Absorption Chiller;cooling Process Intensification for Granular Mineral Fertilizers in a Multistage Fluidized Bed Device;substantiation of Energy Parameters of a Continuous-Action Vibroextractor for a Solid-Liquid System;development of the Typical Design of the High-Pressure Stage of a Steam Turbine;improvement of the Heat Substation Design for District Heating Supply systems.
distributed graph computing technology for processing large-scale graph data has been widely used in social network, communication network and so on. The foundation of distributed graph computing is reasonable partiti...
详细信息
ISBN:
(纸本)9781450371926
distributed graph computing technology for processing large-scale graph data has been widely used in social network, communication network and so on. The foundation of distributed graph computing is reasonable partitioning of large-scale graph in distributed system. Most proposed graph partitioning algorithms cannot achieve the goals of load balance and minimizing the number of edge-cuts at the same time. This paper constructs a cost function to measure the efficiency of partitioning large-scale graphs in a distributed system, where the graph is dynamically updated in real time. Based on the cost function, the update algorithm is proposed for the addition of vertex and edge. Experimental results show that the proposed algorithm can yield significant reduction in load imbalance and number of edge-cuts.
A shift in power system control paradigm from centralized to a distributed framework has been evident for the past years. With the adoption of distributed Energy Resources (DER) in the grid and the formation of the co...
详细信息
ISBN:
(纸本)9781728138480
A shift in power system control paradigm from centralized to a distributed framework has been evident for the past years. With the adoption of distributed Energy Resources (DER) in the grid and the formation of the concept of microgrid (MG) that is now extended to the cooperation of multiple MGs to form Multi-Microgrid (MMG) systems. a distributed control framework has deemed to be more feasible for such systems. However, distributed control relies heavily on communication to achieve the system objective that in reality is not perfect at all times. In this paper, a fully distributed AC Optimal Power Flow (OPF) control algorithm with resilience from failure of communication infrastructure is presented. In the algorithm, missing parameters are estimated using time-series estimation methods and an additional control layer is added to ensure supply-demand balance in the system. The algorithm was tested in different network configurations of a MMG system with different degrees of communication failure and the results show that using the control algorithm, the system was able to achieve supply-demand balance at the least possible cost of generation.
The proceedings contain 50 papers. The special focus in this conference is on Smart Trends for Information Technology and Computer Communications. The topics include: An Automated Framework to Uncover Malicious Traffi...
ISBN:
(纸本)9789811500763
The proceedings contain 50 papers. The special focus in this conference is on Smart Trends for Information Technology and Computer Communications. The topics include: An Automated Framework to Uncover Malicious Traffic for University Campus Network;comparative Analysis of K-Means Algorithm and Particle Swarm Optimization for Search Result Clustering;design and Implementation of Rule-Based Hindi Stemmer for Hindi Information Retrieval;research on the Development Trend of Ship Integrated Power System Based on Patent Analysis;detection of Data Anomalies in Fog computing Architectures;cloud Data for Marketing in Tourism Sector;road Travel Time Prediction Method Based on Random Forest Model;video Synchronization and Alignment Using Motion Detection and Contour Filtering;Mutichain Enabled EHR Management System and Predictive Analytics;PSO-ANN-Based Computer-Aided Diagnosis and Classification of Diabetes;quick Insight of Research Literature Using Topic Modeling;Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE);security Vulnerabilities of OpenStack Cloud and Security Assessment Using Different Software Tools;smart Physical Intruder Detection System for Highly Sensitive Area;two-level Classification of Radar Targets Using Machine Learning;a Cognitive Semantic-Based Approach for Human Event Detection in Videos;analysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador;load and Renewable Energy Forecasting for System Modelling, an Effort in Reducing Renewable Energy Curtailment;RAM: Rotating Angle Method of Clustering for Heterogeneous-Aware Wireless Sensor Networks;GWO-GA Based Load Balanced and Energy Efficient Clustering Approach for WSN;Round Robin Scheduling Based on Remaining Time and Median (RR_RT&M) for Cloud computing;proof of Authenticity-Based Electronic Medical Records Storage on Blockchain.
The proceedings contain 35 papers. The special focus in this conference is on Convergent Cognitive Information Technologies. The topics include: Path Planning of Mobile Robot Based on an Improved Ant Colony Algorithm;...
ISBN:
(纸本)9783030374358
The proceedings contain 35 papers. The special focus in this conference is on Convergent Cognitive Information Technologies. The topics include: Path Planning of Mobile Robot Based on an Improved Ant Colony Algorithm;algorithm for Customers Loss Minimization with Possible Supply Chain Disruption;regulation of the Crowd Dynamic Objects Flight Through the Narrow Tunnel;Financial Risk Assessment in the SiU8 Futures Trading Using Neural Network Based on the SAR-Method;some Questions of Trajectory Control of Quadrotor Motion;Dynamics Characteristics Optimization for the UAV Ensemble of Motions;application the Evolutional Modeling to the Problem of Searching the Optimal Sensors Location of Fire-Fighting System;adaptive System Monitoring of the Technical Condition Technological Objects Based on Wireless Sensor Networks;disaster Tolerance of On-Board Control systems.for Ground Robots;on Mathematical Visualization in Education;application of the Asymptotic Observers for the Stabilization of the Time-Delay Linear Equations;multi-purpose Control of a Moving Object Using Computer Vision Algorithms;stabilization of the Underactuated Robot on the Visual Trajectory;simplified Rotor Angular Velocity Estimation for a Permanent Magnets Synchronous Motor by Current and Voltage Measurements;on Data Analysis of Software Repositories;Development of BI-Platforms for Cybersecurity Predictive Analytics;improving the Target Quality Chat-Bots on the Basis of Linguistic Metametric Text;new Methods of the Cybersecurity Knowledge Management Analytics;on a New Approach to Neighbor Discovery as Data Sharing Tool;research of Urban Residents Involvement in Environmental Processes Using a Mobile Environmental Application;cognitive computing Cybersecurity: Social Network Analysis;about the Digital Economy Software.
Navigation is one of the most critical aspects of the twenty-first century. It is used heavily in every aspect of our lives;whether it would be travelling to the cold store in your local area or travelling to another ...
详细信息
暂无评论