In the past ten years, mobile broadband has made an inroad into the country and just in the last six years a twenty-two percent leap has been gained with respect to Internet use penetration. To this end the use of Inf...
详细信息
In the past ten years, mobile broadband has made an inroad into the country and just in the last six years a twenty-two percent leap has been gained with respect to Internet use penetration. To this end the use of Information and Communication Technology by Nigerians for their various daily activities has gradually but steadily grown. This has remarkably created new jobs, raised the national GDP, and has generally improved ways people live and do business. This advancement however has proven to be a double edged sword as a good number of Nigerians have reportedly fallen victim to different forms of threats online or might have heard about victims of such crimes, which has led to gross distrust in new and existing innovations in the world of ICT. The negative consequence of this on the potential economic alongside technological development that the country could enjoy from the ICT sector is quite obvious. This paper investigates the nature of threats posed at Nigerians as they go online via an online survey. The survey shows 95.2% of respondents are regular internet users with 14.4% as victims of online fraud.
Cloud computing is an evolutionary model for distributed computing, which consists of centralized data centers providing resources for massive scalable computing. Major security challenges are the generation, distribu...
详细信息
作者:
Shen, JiajieGu, JiazhenZhou, YangfanWang, XinSchool of Computer Science
Fudan University Shanghai China The State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China
In data storage systems, data are typically stored in redundant storage nodes to ensure storage reliability. When storage nodes fail, with the help of the redundant nodes, the lost data can be restored in new storage ...
详细信息
Argus exploits a Multi-Agent Reinforcement Learning (MARL) framework to create a 3D mapping of the disaster scene using agents present around the incident zone to facilitate the rescue operations. The agents can be bo...
详细信息
ISBN:
(纸本)9781509016556
Argus exploits a Multi-Agent Reinforcement Learning (MARL) framework to create a 3D mapping of the disaster scene using agents present around the incident zone to facilitate the rescue operations. The agents can be both human bystanders at the disaster scene as well as drones or robots that can assist the humans. The agents are involved in capturing the images of the scene using their smartphones (or on-board cameras in case of drones) as directed by the MARL algorithm. These images are used to build real time a 3D map of the disaster scene. Via both simulations and real experiments, an evaluation of the framework in terms of effectiveness in tracking random dynamicity of the environment is presented.
Device-to-Device (D2D) communication is mainly launched by the transmission requirements between devices for specific applications such as Proximity Services in Long-Term Evolution Advanced (LTE-A) networks, and each ...
详细信息
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model(MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electric...
详细信息
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model(MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electricity bill and valley electricity bill in the time dimension to model the single-user demand response. Second based on the single-user demand response model, combined with the overall users' electricity distribution density function, we build an all-users demand response model. The proposed model has two objectives: minimize energy consumption and maximize residents' satisfaction. Simulation results confirm that the proposed model can optimize the ladder-pricing scheme.
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting...
详细信息
ISBN:
(纸本)9781509026357
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting of both SDN and legacy switches may be a tradeoff. Nevertheless most of the current SDN control planes can not handle legacy switches. To overcome this problem, we present HybridFlow, a lightweight control plane for hybrid SDN. HybridFlow can abstract a hybrid network into a logical SDN network and existing SDN control applications can run on it transparently.
A transfer function is a mathematical function relating the output or response of a system to the input or stimulus. It is a concise mathematical model representing the input/output behavior of a system and is widely ...
详细信息
ISBN:
(纸本)9781479953424
A transfer function is a mathematical function relating the output or response of a system to the input or stimulus. It is a concise mathematical model representing the input/output behavior of a system and is widely used in many areas of engineering including system theory and signal analysis. Binary Decision Diagrams (BDDs) are a canonical representation of Boolean functions. We implement a framework to build transfer function models of digital switching functions using BDDs and demonstrate their application on simulation and implication.
Teaching Test-Driven Development (TDD) to the students is challenging. TDD is best learned when it is actually performed rather than read about. Especially when the students are novice to TDD, starting by writing a te...
Teaching Test-Driven Development (TDD) to the students is challenging. TDD is best learned when it is actually performed rather than read about. Especially when the students are novice to TDD, starting by writing a test first seems to be extremely hard, and proceeding with the small steps that the TDD cycle requires often demands explicit guidance. Coding Dojo is a dynamic and collaborative activity where people can practice programming, especially techniques related to agile methods. This paper discusses the two experiments conducted to find out how Coding Dojo methodology improves the code coverage of students programming and how it improves motivation in students to learn TDD.
Shortest-path queries on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks (SDN), since SDN contr...
详细信息
ISBN:
(纸本)9781509032822
Shortest-path queries on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks (SDN), since SDN controllers need to perform a shortest-path query for every flow. Unlike classic solutions (e.g., Dijkstra's algorithm), high-performance shortest-path query algorithms include two stages: preprocessing and query answering. Despite the improved query answering time, existing two-stage algorithms are still extremely time-consuming in preprocessing large-scale graphs. In this paper, we propose an efficient shortest-path query algorithm, called BBQ, which reduces the running time of both stages via tree decomposition. BBQ constructs a distance oracle in a bottom-top-bottom manner, which significantly reduces preprocessing time over existing algorithms. In addition, BBQ can answer batch queries in bulk by traversing the decomposed tree instead of executing separate queries. Our experimental results show that BBQ outperforms state-of-the-art approaches by orders of magnitude for the running time of the preprocessing stage. Meanwhile, BBQ also offers remarkable acceleration for answering batches of queries. As a result, SDN controllers that use BBQ can sustain 1.1-27.9 times higher connection request rates.
暂无评论