The internet of things (IoT) will revolutionise the future internet through ubiquitous sensing. One of the challenges of having the hundreds of billions of devices that are estimated to be deployed would be rise of an...
详细信息
The internet of things (IoT) will revolutionise the future internet through ubiquitous sensing. One of the challenges of having the hundreds of billions of devices that are estimated to be deployed would be rise of an enormous amount of data, along with the devices ability to manage. This paper presents an approach as a controller solution and designed specifically for autonomous management, connectivity and data interoperability in an IoT gateway. The approach supports distributed IoT nodes with both management and data interoperability with other cloud-based solutions. The concept further allows gateways to easily collect and process interoperability of data from IoT devices. We demonstrated the feasibility of the approach and evaluate its advantages regarding deep sensing and autonomous enabled gateway as an edge computational intelligence.
Replication typically occurs in a wide range of open distributed systems, especially in self-healing systems (i.e., mainly for fault-tolerance purposes) and in high-performance computing (i.e., mainly for fast respons...
详细信息
ISBN:
(纸本)9789897583049
Replication typically occurs in a wide range of open distributed systems, especially in self-healing systems (i.e., mainly for fault-tolerance purposes) and in high-performance computing (i.e., mainly for fast response times). All these systems face a common issue: how can replicas automatically and efficiently be managed in a system despite changing requirements of their environment? One way to overcome this issue is trust. The contribution of this paper is a novel approach based on trust that provides a good management of replicas - especially for those of important services - despite uncertainties in the behavior of nodes. Depending on the importance level of a service possessing the replicas and the assessment of the trustworthiness of a node, we can optimize the trust distribution of replicas at runtime. For evaluation purposes we applied our approach to an evaluator based on the TEM middleware. In this testbed, the usage of trust reduced the replication overhead by about 14% while providing a much better placement of important replicas than without trust.
Trust is a fundamental concern in large-scale open distributed systems. It lies at the core of all interactions between the entities that have to operate in such uncertain and constantly changing environments. Given t...
详细信息
Trust is a fundamental concern in large-scale open distributed systems. It lies at the core of all interactions between the entities that have to operate in such uncertain and constantly changing environments. Given this complexity, these components, and the ensuing system, are increasingly being conceptualised, designed, and built using agent-based techniques and, to this end, this paper examines the specific role of trust in multi-agent systems. In particular, we survey the state of the art and provide an account of the main directions along which research efforts are being focused. In so doing, we critically evaluate the relative strengths and weaknesses of the main models that have been proposed and show how, fundamentally, they all seek to minimise the uncertainty in interactions. Finally, we outline the areas that require further research in order to develop a comprehensive treatment of trust in complex computational settings.
In this article, networks and automation structures which are used in Continuous Galvanizing Line (CGL), is last project of Cold Mill Lines in Eregli Iron and Steel Works Co. has researched. It is said that network st...
详细信息
ISBN:
(纸本)078037729X
In this article, networks and automation structures which are used in Continuous Galvanizing Line (CGL), is last project of Cold Mill Lines in Eregli Iron and Steel Works Co. has researched. It is said that network structure is necessary due to complex structure of the continuous lines. After that server-client system, producer-consumer system and leader/follower-synchronization system which are used in ODS configurations are explained. In addition, open distributed systems' features and subsystems which are constructed on LAN are explained using a model configuration. In the second part of this article network's transmission speeds, communication protocols, transmission capacity, addressing in network, max station number on the network and how it will grown, the total length of transmission, the trouble in the transmission channel, how it will possible to build, up a high reliability network and how network provides high resistance against noise etc. subjects are examined. Melsec Net10 network which is developed for low speed I/O is also explained and it is examined that how this network affect system cost. Man Machine Interface (MMI) systems are also examined and it is determined that what the modern MMI's advantages for the operators and automation system engineers a Technological developments about the PLC, DCS, MMI a, programming therminals are explained. Finally it is presented how this developments affect system cost, reliability, productivity and expandability.
open distributed systems operate in a networked global space where parts are owned by - thus can be controlled by - the local system owner, but most parts are shared globally. The system boundaries are fuzzy and we ca...
详细信息
ISBN:
(纸本)0792373898
open distributed systems operate in a networked global space where parts are owned by - thus can be controlled by - the local system owner, but most parts are shared globally. The system boundaries are fuzzy and we can only count the system owner to control his/her assets at some point of time. The generic system parts - those shared globally - are data oriented. The specific system parts - those owned by the local system owner - are information oriented. This fact should have impact on the way we view assets when setting the right security requirements. Many approaches focus only on the generic parts, i.e. to protect the data. They thereby overlook the informational aspect of the asset. In order to find these specific requirements, it is important to analyze the risks related to information so that it can be protected in a satisfactory way. This paper will describe how the problem can be solved by use of a risk analysis approach with so called X-ification. X-ifying is a way of mating together the best available experience with values appropriate for the local target system X X-ifying factors differ depending on if you look at assets from a data or informational point of view. They also change in importance from asset to asset, from industry to industry and from person to person.
暂无评论