One of the basic requirements of humans is clothing and this approach aims to identify the garments selected by customer during shopping, from surveillance video. The existing approaches to detect garments were develo...
详细信息
Cloud computing was first established to connect people and data at anytime from anywhere in the 1960s. Today cloud computing is one of the most widely used technologies. Its applications include Multi-cloud, healthca...
详细信息
Cloud computing was first established to connect people and data at anytime from anywhere in the 1960s. Today cloud computing is one of the most widely used technologies. Its applications include Multi-cloud, healthca...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
Cloud computing was first established to connect people and data at anytime from anywhere in the 1960s. Today cloud computing is one of the most widely used technologies. Its applications include Multi-cloud, healthcare, testing, finance, data storage and handling big data to increase efficiency and how it differs from traditional systems. We have stated how cloud computing can be used in various domains and have compared its efficiency to traditional systems in terms of data recovery, access control, management, security and cost. However, like any other technology, this one too might have flaws which can be exploited. This paper also lists the security challenges that will have to be kept in mind while implementing these systems.
Rapid development of metropolitan cities into smart cities and daily increased in number of vehicles on the roads causes increase in traffic maintenance challenges such as traffic congestion, accidents, dispatching of...
详细信息
Rapid development of metropolitan cities into smart cities and daily increased in number of vehicles on the roads causes increase in traffic maintenance challenges such as traffic congestion, accidents, dispatching of emergency vehicle and pollution. It will suffers people travel time, delay in response time of emergency vehicle such as ambulance, fire brigade, police etc., causes heavy loss or effects society in terms of wealth, emotions and security. The research work done in the area of Intelligent Transportation Systems and Traffic Management primarily focuses on determining effectively green light duration along with dispatching of emergency vehicle. In this research paper, we propose an algorithm which not only determines green light duration dynamically but also handles the emergency vehicle management efficiently. The objectives of the proposed algorithm are minimizing average waiting time. It always analysis the traffic situation at traffic intersection, along with continuous monitoring of emergency vehicle arrival at different lanes causes to optimize the waiting time of vehicle in lanes. It also deals with the deadlock and starvation condition, due to arrival of emergency vehicle in repeated interval of time in traffic intersection. The security level of emergency vehicle is in consideration during dispatching that assigned and verified by authorities to preserve security measures and society values. Here, the source of input on dynamic traffic condition is collected through Wireless Sensor Networks technology.
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made dif...
详细信息
Having finally taken a foothold by the radial growth of the internet generation in the recent years, steganography serves as a mean for private, secure and sometimes malicious communication. From a technical eye, this...
详细信息
Having finally taken a foothold by the radial growth of the internet generation in the recent years, steganography serves as a mean for private, secure and sometimes malicious communication. From a technical eye, this thesis focuses on amalgamation of two methods for securing global cyber data. To achieve this perfect blend, A-b MAP Cipher is performed in order to tune the cyber data to cipher text pursued by bit replacement in audio signal with cipher bits by adopting ASET. This multilevel cladding ensures high level security to the global cyber data.
作者:
DOSHI, bTHO 3M-335
AT&T Bell Laboratories Holmdel NJ 07733 U.S.A. Bharat T. Doshi is a supervisor in the Performance Analysis Department at AT&T Bell Laboratories
Holmdel New Jersey. His group provides analytic support for a variety of AT&T's information management systems telecommunications systems and networks and computer networks in the areas of performance engineering capacity planning and congestion management. His group also conducts research in integrated communication systems and networks. Recent work has concentrated on frame relay networks ATMibroadband ISDN wireless networking and PCS. The focus is in the areas of error controls flow and congestion controls communication protocols routeing strategies network design and fault-tolerant operation. Bharat's research interests include queueing theory and teletraffic theory and their applications to computer and communications systems. He has over sixty publications in a variety of technical journals. Bharat received his B.Tech. from ITT Bombay in 1970 and an M.S. and Ph.D. in Operations Research from Cornell University in 1973 and 1974 respectively. Bharat is member of IEEE and ORSA and Associate Editor of the OR Letters High Speed Networking and Queueing Systems Journals.
Deterministic rule based traffic descriptors in general, and leaky bucket based (Lbb) traffic descriptors in particular, offer many advantages over statistical descriptors for specifying and monitoring traffic in the ...
详细信息
Deterministic rule based traffic descriptors in general, and leaky bucket based (Lbb) traffic descriptors in particular, offer many advantages over statistical descriptors for specifying and monitoring traffic in the ATM based broadband ISDN (bISDN). However, these traffic descriptors do not specify the traffic pattern uniquely. Thus, acceptance of a connection request with specific traffic descriptor parameter values implies that the network has agreed to guaranteeing the quality of service (QOS) for the worst case traffic compliant with the traffic descriptor (and hence allowed by the monitor). This poses challenges which have not been addressed adequately. Two of the important ones are: (i) definition of the worst case behaviour and characterization of the worst case traffic compliant with the traffic descriptor;(ii) connection acceptance controls (CAC) for the worst case traffic sources compliant with the traffic descriptors. In this paper we address these questions for leaky bucket based (Lbb) traffic descriptors. The focus is on the first problem. The implications on the second problem are discussed briefly. The performance measure and QOS requirements are in terms of the cell loss ratios. We first define the worst case behaviour for homogeneous and heterogeneous environments in terms of collective cell loss ratio (CLR)) from the multiplexer. We consider both the unbuffered and buffered cases. However, most of the results here are for the unbuffered case. For the case of an unbuffered multiplexer and homogeneous source environment, we show that a simple on-off source represents the worst case behaviour of an Lbb source. In a heterogeneous source traffic environment, the on-off behaviour is the worst only in a limited sense and the use of a collective measure results in anomalous relationships between the source behaviour and the CLR. A more appropriate measure should be based on individual cell loss ratios or on the maximum of the individual CLRs. We analyse L
暂无评论