the industrial IoT and its promise to realize data-driven decision-making by analyzing industrial event streams is an important innovation driver in the industrial sector. Due to an enormous increase of generated data...
详细信息
Differential Privacy (DP) conceptualizes a system for sharing information about a cluster of individuals in a dataset and protecting their privacy at the same time. DP, characterized by parameters (ϵ, δ), provides ma...
ISBN:
(纸本)9781450397971
Differential Privacy (DP) conceptualizes a system for sharing information about a cluster of individuals in a dataset and protecting their privacy at the same time. DP, characterized by parameters (ϵ, δ), provides mathematical assurances on privacy and hence is a recognized approach for privacy-preserving data analysis and aggregation. DP data transformation mechanisms add randomness to the data to achieve differential privacy, therefore adversely impacting the utility of the data resulting in a trade-off between utility and privacy. While researchers have developed numerous mechanisms for differentially private data aggregation and sharing, a desirable mechanism should be fault-tolerant (ability to compute aggregate of partially shared data) and should obviate the need for interactive communication amongst data owners or the need for a trusted aggregator. Various researchers have endeavored to address some aspects of desirability. However, none have addressed all the desirable features simultaneously. Developing a distributed, differentially private aggregation mechanism called Privacy-Preserving Endpoint Aggregation (PPEA), satisfying all the desirable characteristics of DP data aggregation and sharing is a key contribution of this thesis. Additionally, by the experimentation, it is demonstrated that PPEA provides better utility at par with an existing ‘Central, Trusted’ method called PrivEx. An improvement of 11% is observed in PPEA w.r.t. PrivEx on UCI ML Smart Meter Dataset [3]. this is further verified for Synthetic Dataset and gives 4 times better utility as compared to PrivEx [5]. PPEA meets the standards of current state of art technique ‘Central, Trusted’ techniques. DPBench benchmark[1] principles have been followed to design the set of experiments while validating the technique. In addition to experimental validation, PPEA has been validated on real-time IoT devices for feasibility [8]. Issues like the implementation of Random number generators and data
the proceedings contain 24 papers. the topics discussed include: natural language goal understanding for smart home environments;information-driven adaptive sensing based on deep reinforcement learning;activity recogn...
ISBN:
(纸本)9781450387583
the proceedings contain 24 papers. the topics discussed include: natural language goal understanding for smart home environments;information-driven adaptive sensing based on deep reinforcement learning;activity recognition and user preference learning for automated configuration of IoT environments;fault detection in sensors using single and multi-channel weighted convolutional neural networks;clock skew-based physical authentication protocol for 802.15.4 IR-UWB indoor positioning;R-Bus: a resource bus for modular system design;deterministic 40 year battery lifetime through a hybrid perpetual sensing platform (HyPer);distributed data validation network in IoT: a decentralized validator selection model;VibeRing: using vibrations from a smart ring as an out-of-band channel for sharing secret keys;and is your home becoming a spy? a data-centered analysis and classification of smart connected home systems.
the proceedings contain 19 papers. the special focus in this conference is on Telematics and Computing. the topics include: Methodological Proposal for Privilege Escalation in Windows systems;Satisfaction of Members o...
ISBN:
(纸本)9783030895853
the proceedings contain 19 papers. the special focus in this conference is on Telematics and Computing. the topics include: Methodological Proposal for Privilege Escalation in Windows systems;Satisfaction of Members of a Facebook Group withthe Credible Information Provided to Reduce Medical Misinformation in Obstetrics During the COVID-19 Pandemic in Peru;content Distribution and Storage based on Volunteer and Community Computing;classification of Cardiac Arrhythmias Using Machine Learning Algorithms;Performance Analysis of S-ALOHA Protocol Under Pareto distributed Packet Arrival;learning through Interactive Vicarious and Social Experiences, an Alternative to Developing Teaching Training Processes in Ict Skills;analysis of User Generated Content based on a Recommender System and Augmented Reality;an Improved Riesz s-Energy-based Archive to Handle Dominance Resistant Solutions;analysis of the Level of Geographic Criminal Risk Oriented to Women;mexican Edaphology Database;security Incident Classification Applied to Automated Decisions Using Machine Learning;integration of Rural and Urban Training in Teachers, Students and Older Adults in Computer Security Mediated by Technology;accuracy Comparison Between Deep Learning Models for Mexican Lemon Classification;detection of Covid-19 by Applying a Convolutional Artificial Neural Network in X-ray Images of Lungs;Scientific Literature Review for the Search of Vulnerabilities and Pentesting Tools for SCADA System;automatic Diagnosis of Cardiovascular Diseases Using Electrocardiogram Data and Artificial Intelligence Algorithms: A Systematic Review;optic Disc and Optic Cup Segmentation Using Polar Coordinate and Encoder-Decoder Architecture.
Hardware cache coherence limits the scalability of shared-memory multicore and multi-processors. Recently, there has been an increasing shift towards cache-incoherent architectures in many computing environments. Supe...
详细信息
ISBN:
(纸本)9780738110462
Hardware cache coherence limits the scalability of shared-memory multicore and multi-processors. Recently, there has been an increasing shift towards cache-incoherent architectures in many computing environments. Supercomputers can benefit from shared memory, yet must avoid the price of coherency across the system. To support co-locating multiple applications on cores, processors, and the overall system, an Operating System must manage the distributed memory resources. In this context, incoherence poses a significant challenge for OS that must manage memory access permissions across the system without compromising the performance of software. In this paper, we introduce the Ch'i microkernel that leverages incoherent shared memory using quiescence-based techniques to bound the extent of non-coherency. Ch'i maintains type and context consistency of its core data structures: capabilities. this enables a uniform, capability-based security model to manage system-wide memory. Using this approach, we demonstrate data-structure consistency in software in support of high-throughput, low-latency applications.
Applications increasingly demand distribution across the global Internet. the Actor model of computation has been wisely designed to abstract communication between actors and hence remains transparent w.r.t. distribut...
详细信息
ISBN:
(纸本)9781450381857
Applications increasingly demand distribution across the global Internet. the Actor model of computation has been wisely designed to abstract communication between actors and hence remains transparent w.r.t. distribution. Performance, security, and deployment considerations, however, make it difficult to define a specific communication transport that should be hardcoded into an actor framework. It is rather desirable to design appropriate transport abstractions, which allow for flexible choices and configurations of transport functions on the Internet. In this paper, we report about our ongoing work of redesigning, implementing, and evaluating a network stack that abstracts transport for the C++ Actor Framework (CAF). the stack allows for the exchanging of transport protocols and adds configuration options as well as compositions of protocols. First comparisons of TCP versus UDP with configurable reliability options are provided, as well as an early evaluation of its performance.
Today the trend towards a completely distributed measuring device is progressing and increasing numbers of measuring instruments have already a cloud connection. this development requires new solutions to cover the re...
详细信息
ISBN:
(纸本)9789897584244
Today the trend towards a completely distributed measuring device is progressing and increasing numbers of measuring instruments have already a cloud connection. this development requires new solutions to cover the requirements laid down by legal metrology. these new challenges could be tackled by designing innovative solutions which extend and merge novel technologies. the aim of this publication is to use blockchain technology and functional encryption to develop a model of a secure smart metering system, demonstrating the capabilities and limitations of these technologies in a practical scenario in the framework of legal metrology.
Complexity of the process control systems within the industrial environment increases rapidly over the years. this may not be the critical issue for the design of the control system itself, but human limitations place...
详细信息
ISBN:
(纸本)9781450384315
Complexity of the process control systems within the industrial environment increases rapidly over the years. this may not be the critical issue for the design of the control system itself, but human limitations places operators in a difficult position facing an increasing level of complexity of the Human-Machine Interface (HMI) with growing amounts of data and control parameters. this paper proposes a lightweight web-based software solution in the form of the addition to the existing control system that monitors desired segments of the controlled process in real time and aids the operator in timely detection of the recurring critical situation based on the initial operator's observation. Proposed solution does not rely on machine learning or any demanding computational task and therefore can coexist with existing control systems without need for additional computational power. Furthermore, there is no need for additional client software on any working station used for process control as it is accessed via web browser.
the problem of the optimization of location of elements in the complex distributed power supply systems is considered in this paper. the article proposes a mathematical model of solving the problem of optimal location...
详细信息
ISBN:
(数字)9781728167602
ISBN:
(纸本)9781728167602
the problem of the optimization of location of elements in the complex distributed power supply systems is considered in this paper. the article proposes a mathematical model of solving the problem of optimal location of multiple power supply and consumer assigning in the electric supply system. A modified genetic algorithm for solving this problem has been developed based on the methods of evolutionary modeling and genetic programming. the results of experiments showed good performance of the proposed genetic algorithm and the possibility of its application for the optimal placement of power sources in a distributed electrical network.
the proceedings contain 46 papers. the topics discussed include: isolated handwritten digit recognition using LPQ and LBP features;a comparative study on load balancing algorithms in cloud environment;an expert system...
ISBN:
(纸本)9781450376556
the proceedings contain 46 papers. the topics discussed include: isolated handwritten digit recognition using LPQ and LBP features;a comparative study on load balancing algorithms in cloud environment;an expert system for fuzzy server failure data warehouse analysis;two-stages intrusion detection system based on hybrid methods;sentiment analysis on product reviews data using supervised learning: a comprehensive review of recent techniques;data mining contribution to intrusion detection systems improvement;BEPSO: bees elitist particle swarm optimization for solving constrained engineering optimization problems;and estimating daily diffuse solar radiation using neuro-fuzzy, fuzzy c-means and subtractive clustering (case study: Adrar, Algeria).
暂无评论