the protein-I project is a cross Ireland initiative that takes a food systems approach to enhancing the sustainability of protein production across the island of Ireland, as part of the protein-I project, this study a...
详细信息
ISBN:
(纸本)9783031486418;9783031486425
the protein-I project is a cross Ireland initiative that takes a food systems approach to enhancing the sustainability of protein production across the island of Ireland, as part of the protein-I project, this study aims to produce a smart agricultural supply chain solution. there is a need for the requirements of the system to be tailored for the specific use case, agriculture on the island of Ireland is different from agriculture in other parts of the world. the average size of a farm in the Republic of Ireland is 32.4 ha [8], compare this to Australia where the average is 4,331 ha [7], therefore farm practices in Australia will be different. To develop a solution that is catered to the needs of the Agri-food sector on the island of Ireland this study gathered requirements from a series of workshops and interviews with stakeholders. Several use cases were presented by the stakeholders to identify the deficiencies in the current supply chain, and to address these challenges, a custom solution has been designed and implemented.
Network security is a continuously evolving procedure now present in every aspect of communications. 5G and 6G networks are examples of networks that can suffer from network security problems and become critical asset...
详细信息
ISBN:
(纸本)9798350377774;9798350377767
Network security is a continuously evolving procedure now present in every aspect of communications. 5G and 6G networks are examples of networks that can suffer from network security problems and become critical assets for every operation. While the security of the infrastructure is operated at lower layers of the ISO-OSI stack and dedicated protocols or by specific researches on network slicing and Service Management and Orchestration [1], services such as Multiaccess Edge computing, Virtual Network Functions, and network assets need to be secured. We propose a security tool enabled by MEC: MECHATRON, which covers the security of Assets, Services, and Continuous Monitoring through an integrated platform.
distributed Network emulators (e.g., Mininet Cluster Edition) have proven to be an attractive solution to perform extreme-scale network and systems evaluation on smaller-size testbeds and experiment platforms. they ca...
详细信息
ISBN:
(纸本)9781665477062
distributed Network emulators (e.g., Mininet Cluster Edition) have proven to be an attractive solution to perform extreme-scale network and systems evaluation on smaller-size testbeds and experiment platforms. they can provide contained, customisable, and scalable testing environments for researchers to evaluate their contributions and reproduce their results. the major drawback of this approach in network experimentation is the use of virtual components (hosts, network switches, etc.) that do not behave with perfect similarity to the physical components they emulate, mainly due to the concurrency in using the underlay network and computing resources. We thus present in this paper a methodology to monitor emulation fidelity by measuring the network delays of emulated packets, which relies on statistical metrics to evaluate their inaccuracy. We further dig into the possible sources of emulation inaccuracy and show how our system can detect them to avoid biased experiment results. We particularly show through a common experiment scenario how undetected network emulation errors can lead to biased results.
In today's digital era, traditional methods of academic certificate validation are plagued by inefficiencies and vulnerabilities to fraudulent activities. To combat these challenges, integrating blockchain technol...
详细信息
It is our great pleasure to welcome you to the twelfth edition of the international Workshop on Load Testing and Benchmarking of Software systems - LTB 2024, (https://***/). this one-day workshop brings together softw...
详细信息
ISBN:
(纸本)9798400704451
It is our great pleasure to welcome you to the twelfth edition of the international Workshop on Load Testing and Benchmarking of Software systems - LTB 2024, (https://***/). this one-day workshop brings together software testing and software performance researchers, practitioners, and tool developers to discuss the challenges and opportunities of conducting research on load testing and benchmarking software systems, including theory, applications, and experiences. LTB 2024 includes 2 keynote talks, 4 research papers, and 2 industry presentations. the topics cover performance of serverless computing, performance and load testing, performance-driven culture, workload generation, workload tracing, benchmarking, and performance verification.
In the realm of medical imaging, the detection of lung pneumonia through automated methods has garnered significant attention due to its potential to augment diagnostic processes. this study proposes a novel approach,...
详细信息
distributed large memory offers the use of large virtual memory by using remote memory distributed over nodes in a cluster. the message passing interface (MPI) plays important role in DLM. MPI-based DLM manages the la...
详细信息
IoT smart applications must deal withthe inherently distributed nature of IoT infrastructures that may vary among different deployments. For example, in urban environments, some deployments may require distributed ed...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
IoT smart applications must deal withthe inherently distributed nature of IoT infrastructures that may vary among different deployments. For example, in urban environments, some deployments may require distributed edge nodes to support the sensors and actuators, while others may skip this processing stage and go directly to the cloud. We propose the concept of an IoT computing Continuum, or IoTinuum, with multiple computing stages spread over the distributed IoT infrastructure. We present the modeling and implementation of two urban use cases for a 6-stage IoTinuum: smart drone delivery and smart structural monitoring. In our experience, the IoTinuum improves the understanding of function placement in application development and reveals important performance tradeoffs.
Vehicular Ad-Hoc Networks (VANETs) are a cornerstone of intelligent transportation systems, enabling vehicles to communicate with each other and roadside infrastructure to enhance traffic safety and efficiency. Securi...
详细信息
the rapid evolution of digital technologies and the pervasive nature of data connectivity have significantly expanded the scope of decentralized machine learning tasks. At the forefront of this shift is distributed ma...
详细信息
ISBN:
(纸本)9798331540913;9798331540906
the rapid evolution of digital technologies and the pervasive nature of data connectivity have significantly expanded the scope of decentralized machine learning tasks. At the forefront of this shift is distributed machine learning, which leverages distributed data while promoting privacy and efficiency. Built on the principles of cloud computing, distributed machine learning decomposes complex computational tasks into smaller components processed concurrently across interconnected nodes, optimizing resource utilization and scalability. the global cloud computing market, integral to the advancement of distributed machine learning, is projected to grow substantially, reaching USD 2,495.2 billion by 2032. Central to this study is the Cloud-Based Ratio Proportion Data Distribution Algorithm (CB-RPDDA), an innovative solution to traditional data distribution inefficiencies. CB-RPDDA reallocates data based on the processing speeds of individual machines, ensuring optimal resource utilization and effective workload distribution. this method introduces a new perspective on dataset division among worker nodes, enhancing load balancing and performance. By integrating CB-RPDDA withdistributed machine learning frameworks, we improve the efficiency of decentralized learning processes, ensuring efficient data distribution across nodes while maintaining data security and privacy. Our findings demonstrate the potential of combining CB-RPDDA withdistributed machine learning to offer scalable, efficient, and secure machine learning solutions, driving significant advancements in the field.
暂无评论