All articles must contain an abstract. Peer to Peer (P2P) network is useful for developing applications and downloading files from the internet. In the existing P2P networks, communication is initiated and supported b...
All articles must contain an abstract. Peer to Peer (P2P) network is useful for developing applications and downloading files from the internet. In the existing P2P networks, communication is initiated and supported by peers. Security issues constitute the main challenge in the design of reliable communication techniques for P2P networks. In the past, Rumor Riding Protocol was used in distributed systems for performing coordination and communication. However, the existing Rumor Riding Protocol is used flooding technique to forward the response to the initiator it may leads high network traffic to avid this I have Enhanced Multi path forwarding technique to Rumor Riding Protocol and also enhancement with security features to make them suitable for downloading applications in P2P networks. In this method, it enhances the Rumor Riding Protocol with security features by including a Cryptographic Puzzle, a Challenge Question scheme using trust modeling and an intelligent beta reputation model for secured communication in P2P networks. For this purpose, five new techniques are proposed in this research work, all of which aim at enhancing the security of communication using Rumor Riding Protocol in the P2P networks.
The Spatiotemporal pattern is considered by most of the researchers to be a rehashed arrangement or relationship of specific occasions or highlights of spatiotemporal and to distinguish these groupings or affiliations...
The Spatiotemporal pattern is considered by most of the researchers to be a rehashed arrangement or relationship of specific occasions or highlights of spatiotemporal and to distinguish these groupings or affiliations are related to the spatiotemporal patterns of wrongdoing events and proper separation are clearly based on length based estimations that are expected to oblige the size or state of the pattern and ST patterns comprises of various sizes and shapes after some time are non-consistently disseminate over space by performing analytical learning of spatiotemporal successions as it is capable of creating future pictures by knowledge from the authentic edges. Spatial advents and temporal varieties are two pivotal structures which are considered in this paper which proposes the predictive methodology which utilizes recurrent neural network where the approach of persistent neural networks stands apart as a suitable worldview for without model as the data is based on the prediction of nonlinear dynamical frameworks by applying the methodology in Spatiotemporal pattern which predicts the limited mistake.
In recent years, large-scale urbanisation has been on the rise with cities being the hubs for growth, but rural business continues to play an important role in any country's overall development. A recent report re...
In recent years, large-scale urbanisation has been on the rise with cities being the hubs for growth, but rural business continues to play an important role in any country's overall development. A recent report reveals that almost 69 percent of India's population resides in their villages, accounting for almost 50 percent of the nation's GDP. This agricultural region varies from small towns with less than 500 residents to small towns. There are also similar situations in western nations. Despite their economic contribution, smaller villages seem to earn fewer in terms of infrastructural expenditure. The major problems addressed in these small towns include shortage of adequate public transit, emergency care and limited knowledge on federal subsidies for rural areas. Our vision is to expand the Smart city to Smart village by allowing use of recent technical advances and giving more attention to the problems in rural areas. The approach in this chapter is to bring IoT technology to Villages by literally showing a network of linked sensors and knowledge dissemination devices, controlling energy use and ensuring infrastructure protection. It gives a wide-ranging vision of enhancing the standard of living in villages and encourages them to meet the essential needs of domestic villagers.
Splicing systems was first proposed by Head on organic considerations to demonstrate indubitable chimeric behavior of DNA particles and are of current intrigue and study. In this paper, we study some of the chomskian ...
Splicing systems was first proposed by Head on organic considerations to demonstrate indubitable chimeric behavior of DNA particles and are of current intrigue and study. In this paper, we study some of the chomskian hierarchy of array grammars namely (Regular:Regular)array grammar,(Context Free:Regular)array grammar and (Regular:Context Free)array grammar using H-array system. The Array rewriting rules is limited to extent by the action of row and column splicing.
作者:
Dutt, NikilRegazzoni, Carlo S.Rinner, BernhardYao, XinNikil Dutt (Fellow
IEEE) received the Ph.D. degree from the University of Illinois at Urbana–Champaign Champaign IL USA in 1989.""He is currently a Distinguished Professor of computer science (CS) cognitive sciences and electrical engineering and computer sciences (EECS) with the University of California at Irvine Irvine CA USA. He is a coauthor of seven books. His research interests include embedded systems electronic design automation (EDA) computer architecture distributed systems healthcare Internet of Things (IoT) and brain-inspired architectures and computing.""Dr. Dutt is a Fellow of ACM. He was a recipient of the IFIP Silver Core Award. He has received numerous best paper awards. He serves as the Steering Committee Chair of the IEEE/ACM Embedded Systems Week (ESWEEK). He is also on the steering organizing and program committees of several premier EDA and embedded system design conferences and workshops. He has served on the Editorial Boards for the IEEE Transactions on Very Large Scale Integration (VLSI) Systems and the ACM Transactions on Embedded Computing Systems and also previously served as the Editor-in-Chief (EiC) for the ACM Transactions on Design Automation of Electronic Systems. He served on the Advisory Boards of the IEEE Embedded Systems Letters the ACM Special Interest Group on Embedded Systems the ACM Special Interest Group on Design Automationt and the ACM Transactions on Embedded Computing Systems. Carlo S. Regazzoni (Senior Member
IEEE) received the M.S. and Ph.D. degrees in electronic and telecommunications engineering from the University of Genoa Genoa Italy in 1987 and 1992 respectively.""He is currently a Full Professor of cognitive telecommunications systems with the Department of Electrical Electronics and Telecommunication Engineering and Naval Architecture (DITEN) University of Genoa and a Co-Ordinator of the Joint Doctorate on Interactive and Cognitive Environments (JDICE) international Ph.D. course started initially as EU Erasmus Mundus Project and
Autonomous systems are able to make decisions and potentially take actions without direct human intervention, which requires some knowledge about the system and its environment as well as goal-oriented reasoning. In c...
详细信息
Autonomous systems are able to make decisions and potentially take actions without direct human intervention, which requires some knowledge about the system and its environment as well as goal-oriented reasoning. In computer systems, one can derive such behavior from the concept of a rational agent with autonomy (“control over its own actions”), reactivity (“react to events from the environment”), proactivity (“act on its own initiative”), and sociality (“interact with other agents”) as fundamental properties \n[1]\n. Autonomous systems will undoubtedly pervade into our everyday lives, and we will find them in a variety of domains and applications including robotics, transportation, health care, communications, and entertainment to name a few. \nThe articles in this month’s special issue cover concepts and fundamentals, architectures and techniques, and applications and case studies in the exciting area of self-awareness in autonomous systems.
A wide variety of predictive analytics techniques have been developed in statistics, machine learning and data mining; however, many of these algorithms take a black-box approach in which data is input and future pred...
详细信息
A wide variety of predictive analytics techniques have been developed in statistics, machine learning and data mining; however, many of these algorithms take a black-box approach in which data is input and future predictions are output with no insight into what goes on during the process. Unfortunately, such a closed system approach often leaves little room for injecting domain expertise and can result in frustration from analysts when results seem snurious or confusing. In order to allow for more human-centric approaches, the visualization community has begun developing methods to enable users to incorporate expert knowledge into the pre- diction process at all stages, including data cleaning, feature selection, model building and model validation. This paper surveys current progress and trends in predictive visual ana- lytics, identifies the common framework in which predictive visual analytics systems operate, and develops a summariza- tion of the predictive analytics workfiow.
Biometric systems are the most advanced access technology developed so far in the 21st century. It does not even require to carry key cards or passwords in mind. Today most of the commercial and private entries are pr...
Biometric systems are the most advanced access technology developed so far in the 21st century. It does not even require to carry key cards or passwords in mind. Today most of the commercial and private entries are protected by biometric recognition systems like fingerprint scans facial recognition, retina scans, voice matching, etc. Even our phones, laptops, and daily access devices are equipped with biometric systems. In banks, the PCs are secured by the combination of passwords and fingerprint scans. Biometric scans are considered the most secure access technology so far. Our paper is to examine whether they are secure? Should we rely on them with our hard-earned money and social identity? Is there any way we can use these services without actually compromising our data and security? Our observation is on our digital identity. Promoting digitization in every department brings our topic in the picture. All our information is saved in our phones, our daily routine, whom we talk, what we purchase, whom we chat, where we travel, etc. Almost every smartphone has biometric fingerprint locks which means our phones have our fingerprint scans in database and with internet blend it's tethered worldwide. Our fingerprints are connected to our bank accounts, PAN Cards, Passport, and SIM Cards using Aadhar Cards. If someone has our fingerprint they can easily reach our Aadhar Card and through that to all our personal information. Most of the phone companies are Chinese, Korean, German, and American. As per their country policies, they must share their data with the governing authorities. We aim to create a security system without actually using the biometric scans. The system is an advancement of the biometric system but with better accuracy and intelligence. We interface image acquisition tools to live track the red color things. The web camera or inbuilt system lens can be used as the acquisition system. When the red color object is moved in front of the lens it shows the co
SMART cities suggest a domain that attracts an increasing scientific, political and economic attention. Smart Cities have been characterised and defined by a number of factors including sustainability, economic develo...
详细信息
ISBN:
(数字)9781728150611
ISBN:
(纸本)9781728150628
SMART cities suggest a domain that attracts an increasing scientific, political and economic attention. Smart Cities have been characterised and defined by a number of factors including sustainability, economic development and a high quality of life. Enhancing these factors can be achieved through infrastructure (physical capital), human capital, social capital and ICT infrastructure. It requires ambitious projects to transform entire urban areas through master planning and infrastructure development. This required SMART project management. In order to accomplish the goals of SMART project management, the construction industries have to rely on multi -disciplinary project teams having varied expertise. Majority of these companies have adopted virtual teams for their business activities. These virtual teams work at global level and face a number of challenges that can have an impact on team effectiveness. This research paper focuses on classification of smart cities and key challenges faced by the virtual project teams. Further to this, this paper reviews existing international literature to identify the variables affecting trust among virtual team members in construction sector of Middle East. The variables are then grouped together to form factors after understanding their definitions and commonalities among them. This research highlights the importance of these factors to project managers of smart city projects and it would be beneficial to Project Managers of Architectural/Engineering/Construction Companies as well as that of other sectors by facilitating them to know the actions required for better team collaboration in virtual teams. This may lead to greater team performance and individual learning.
A research team comprised of students and faculty from Central Connecticut State University's (CCSU) School of Engineering, science, and technology has begun the design, production, and testing of a full-scale hel...
详细信息
Implicit discourse relation recognition is a challenging task due to the absence of the nec-essary informative clue from explicit connec-tives. The prediction of relations requires a deep understanding of the semantic...
详细信息
暂无评论