We consider the problem of computing a maximal matching with a distributed algorithm in the presence of batch-dynamic changes to the graph topology. We assume that a graph of n nodes is vertex-partitioned among k play...
详细信息
ISBN:
(纸本)9783959773096
We consider the problem of computing a maximal matching with a distributed algorithm in the presence of batch-dynamic changes to the graph topology. We assume that a graph of n nodes is vertex-partitioned among k players that communicate via message passing. Our goal is to provide an efficient algorithm that quickly updates the matching even if an adversary determines batches of edge insertions or deletions. We first show a lower bound of Q ( k) rounds for recomputing a matching assuming an oblivious adversary who is unaware of the initial (random) vertex partition as well as the current state of the players, and a stronger lower bound of Q( k rounds against an adaptive adversary, who may choose any balanced (but not necessarily random) vertex partition initially and who knows the current state of the players. We also present a randomized algorithm that has an initialization time of 0 log n) rounds, while achieving an update time that that is independent of n: In more detail, the update time is 0( N1 log k) against an oblivious adversary, who must fix all updates in advance. If we consider the stronger adaptive adversary, the update time becomes 0 ([1 log k) rounds.
Poultry farming based products significantly contribute in providing healthy and protein-based food to human beings. the rapid increase in demand for poultry-based products and the growth of information and communicat...
详细信息
ISBN:
(纸本)9781665477062
Poultry farming based products significantly contribute in providing healthy and protein-based food to human beings. the rapid increase in demand for poultry-based products and the growth of information and communication tools lead to smart poultry farms. the environment of the poultry farm has a significant impact on the health of the birds and the production of the farm. this article proposes a low-cost edge computing and Internet of things ( IoT)-based solution for poultry farms to control the farm environment with minimal human intervention and control of diseases in poultry farm. the model will sense the temperature, humidity, greenhouse gases, and light intensity inside the poultry farm and send these signals to the local server developed withthe help of the Raspberry Pi. Withthe help of edge computing, data is processed at the local server and intelligent information is extracted to control the various actuators inside the farm. the cost of the system is affordable for the farmers due to usage of low-cost computing devices like the Raspberry Pi.
In the medical and healthcare fields, the integration of clinical images and question-answering systems is believed to be a powerful tool that has the capacity to change the pattern of diagnosing. the proposed model i...
详细信息
the proceedings contain 16 papers. the special focus in this conference is on Intelligent computing and Networking. the topics include: Performance Analysis of Medical Image Fusion Using Wavelet Technique;correlation ...
ISBN:
(纸本)9789819786305
the proceedings contain 16 papers. the special focus in this conference is on Intelligent computing and Networking. the topics include: Performance Analysis of Medical Image Fusion Using Wavelet Technique;correlation Analysis and Stock Market Prediction of Nifty and Nasdaq Indices Using Machine Learning Techniques;Integrated RFID-Verified Smart Manufacturing System for Bottle Production Using Industry 4.0;Comparing Advanced Programming Languages Based on Machine Learning (ML);optimal Cluster and Node Balancing Technique Using K-Mean Based on Q-Learning for Wireless Sensor Network;optimizing IoT Task Offloading with Federated Deep Reinforcement Learning in Vehicle and Industrial Environments;enhancing Video Action Recognition with Spatial–Temporal Convolutional Attention Networks;spatial Federated Learning Based Blockchain Mechanism for Smart Contract Vulnerability Detection;enhancing Healthcare Recommendations for Special-Need Patients Using Deep Learning and Blockchain Security;machine-Learning-Enhanced Blockchain for Dynamic Pricing Models in E-Commerce;mining Intelligence Hierarchical Feature for Malware Detection;scraping Data from Google Maps: Comparisons and Experimentations;source Code Pre-processing and Analysis to Extricate Features Using Abstract Syntax Tree;AI-Based Wireless Communication: Ultra-Reliable MAC Protocols.
the advent of autonomous vehicles marks a significant milestone in the evolution of automotive technologies. Central to the operation of autonomous vehicles is the perception system that interprets the surroundings an...
详细信息
Utilizing blockchain along with fog computing to improve secure data access control mechanisms within the realm of distributed data storage and authentication poses various challenges. One such hurdle is finding a bal...
详细信息
ISBN:
(纸本)9798350370249
Utilizing blockchain along with fog computing to improve secure data access control mechanisms within the realm of distributed data storage and authentication poses various challenges. One such hurdle is finding a balance between decentralization and scalability within blockchain technology. As the blockchain ledger grows, it may lead to increased latency and resource requirements. the goal of this research is to combine blockchain with fog computing, along with an algorithm for hybrid encryption, to improve the security and efficiency of data access control in distributed data storage as well as authentication. Authentication mechanisms leverage Multi-Factor Authentication (MFA) and Token-Based Authentication for heightened security. Token-Based Authentication employs dynamic codes generated by a physical or mobile token. Symmetric encryption ensures efficiency in data transmission, while asymmetric encryption provides secure key exchange Honey Encryption-based Hybrid Cryptographic Algorithm. the integration of the Zero Trust Security (ZTS) Model with Secure Multi-Party Computation (SMPC) enhances the security of data access and storage in distributed fog environments. Zero Trust emphasizes the necessity for continuous verification of user and device trustworthiness, irrespective of their location, reinforcing the principles of SMPC. MATLAB experiments were implemented to evaluate the efficacy of proposed mechanisms under a range of scenarios. Leveraging the platform's computational capabilities, simulations were conducted and analyzed to provide a comprehensive performance assessment of the proposed solutions, thereby informing the design and optimization of these mechanisms. the findings for encryption time and decryption time of these metrics reflect the durations needed to encode and decode data of varying sizes securely. the potential for the blockchain along withthe fog computing model to ensure secure data access control in the future depends on further dev
Reinforcement getting to know (RL) is a kind of machine getting to know approach that focuses on gaining knowledge of a policy that enables an agent to interact correctly in an environment if you want to maximize its ...
详细信息
the Ant Colony Optimization (ACO) algorithm is a famous metaheuristic technique that has been successfully applied in various optimization issues. It mimics the foraging conduct of ants to locate the shortest path amo...
详细信息
Withthe proliferation of 5G/B5G networks, there has been a tremendous strain on fog-cloud systems to allocate resources efficiently and reduce the total completion time of tasks. this paper aims to make an efficient ...
详细信息
Actual-Time streaming in dispensed and cooperative sensing networks is a vital software program area for wireless networks because it allows transmitting, storing, and conveying significant volumes of real-Time inform...
详细信息
暂无评论