The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The integration of Hive, Impala and Spark SQL platforms has achieved to perform rapid data retrieval using SQL query in big data environment. This paper is to design the optimized platform selection for highly improving the response of data retrieval. It can automatically choose the best-perform platform to best perform SQL commands. In addition, the distributed memory storage systems using Memcached...
Since information communication via radio transmission can be easily eavesdropped, therefore, many radio frequency identification (RFID) security mechanisms for location privacy protection have been proposed recently. However, most of previously proposed schemes do not conform to the EPC Class-1 GEN-2 standard for passive RFID tags as they require the implementation of hash functions on the tags....
It is well-known that localization in Wireless Sensor Networks (WSNs) is costly. However, after deploying and localizing the sensors, sensors may be moved from their original location by the depredation of the enemy or natural phenomena. In such cases, moved sensors return the inconsistent information with their incorrect location to sink or spread the incorrect location to the network resulted in...
This paper introduces Cloud-Mobile Computing system to realize a real-time video/voice over IP (VVoIP) applications, called Cloud-VVoIP. In addition, access control designs authentication authorization, and accounting mechanism using biometrics technology (including face recognition and fingerprint identification) that is applied to secure legal access from the outsider, giving a safer way to login...
Modular datacenters (MDC) use shipping containers as large pluggable building blocks for mega-datacenter. Although it simplifies the construction and maintenance of mega-datacenters, interconnecting hundreds or even thousands of containers is still challenging. In this paper, we present a high cacpacity and fault-tolerant inter-container datacenter network based on Kautz graph, called iCautz. Based...
This paper introduces the Open filer operation system to setup a network storage environment, and to build five different private small-cloud computing servers (PSCCS). Then by using the iSCSI storage technique through the TCP/IP protocol to explore the accessing assessments of the Open filer storage device for each feasible cloud computing system is undertaken. This includes comparing reading efficiency...
In this paper, we proposed network services connection management methods and mechanisms to address the network connection port is unavailable (connect failure) and network services can not share Internet connection resource. In order to achieve the above objectives, the network packet header is removed and the establishment of the corresponding service connection channel. Using the channel of the...
Modular datacenters (MDC) use shipping containers, which encapsulate thousands of servers, as large pluggable building blocks for mega datacenter. We present a novel modular datacenter network (MDCN) based on Kautz, called SCautz, and design a fast data dissemination algorithm, called FDAA. FDDA is able to construct 2d edge-disjoint spanning trees for parallel data dissemination. Results from theoretical...
This paper describes the efficiency distributed video content management in surveillance system. The main project was to develop an IP-based physical security follow ONVIF standard. This ICL ONVIF middleware was using iSCSI distributed network to establish distributed surveillance system. In this paper, we aim at the combination of multimedia content processing by load balance control and building...
Combining virtual machine technology, virtual computing is able to effectively aggregate the widely distributed resources to provide users services. We view the federation of multiple data centers and voluntary resources on the Internet as a very large scale resource pool. Based on the tree structure of the pool, this paper proposes a virtual machine deployment algorithm, called iVDA, considers users'...
To the best of our knowledge, all most previously proposed schemes based on smart cards which have the tamper resistance assumption for the smart card. However, many researches have shown that the secrets stored in a smart card can be breaches by analyzing the leaked information or monitoring the power consumption. This article will propose a new mutual authentication scheme based on nonce and smart...
This study introduces a “Private Small-Cloud Computing” (PSCC). The idea of private small-cloud computing is based on three concepts: small clusters, virtualization, and general graphics processor. In this study, a small-cloud is a cloud controller (CLC ) via a wired or wireless network connected to several mobile or stationary client devices, and afterward a cloud controller (CLC ) connected to several...
Combining virtual machine technology and network computing technology will be able to effectively aggregate the widely distributed heterogeneous and autonomous resources in the Internet. This paper proposes a virtual machine server aggregation algorithm, called DVSA, based on hierarchical clustering method for virtual computing environment. According to network latencies, the algorithm clusters virtual...
In three-party password based key exchange protocol, a client is allowed to share a human-memorable password with a trusted server such that two clients can negotiate a session key to communicate with each other secretly. Recently, many three-party password based key exchange protocols have been developed. However, these proposed schemes cannot simultaneously achieve security and efficiency. Based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.