The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to ensure the security of mobile ad hoc networks (MANETs), the research on certificateless key management scheme is attracting more and more attention. The certificateless key management scheme can well resist the key escrow problem and it is very suitable for MANET, which is source-constrained and has no public key infrastructure. In this paper, we give an overview of some recent certificateless...
A novel disturbance estimation approach is presented for a class of single-input-single-output (SISO) systems subjected to single-sinusoidal disturbance with unknown frequency. The exogenous modeled disturbance is represented in a parametric uncertainty form by series of virtual disturbances. Especially the unknown parameter related to disturbance frequency can be reduced to a scalar, and is estimated...
MapReduce (MR) has been widely used to process distributed large data sets. Meanwhile, speculative execution is known as an approach for dealing with same problems by backing up those tasks running on a low performance machine to a higher one. In this paper, we have modified some pitfalls and taken heterogeneous environment into consideration. We also have implemented it in Hadoop-2.6 based on node...
Cloud computing is a newfound service which has a rapid growth in IT industry recent years. Despite it has a huge contribution to the development of the technology and society, the cloud still exists some security deficiencies to block its development such as data leakage, illegal access and privacy risks. Hence, access control and user authentication is very important in cloud environment. Some related...
In order to achieve object trajectory tracking without blind angle, we propose a pedestrian movement monitoring system with face recognition outdoor and RFID radio frequency equipment indoor, which connect people, object and events. While granting integrated human movement information, we also provide two-dimensional trajectory panoramic map browsing, preview video clips on designated area, video...
MapReduce (MR) is a popular programming model for the purposes of processing large data sets among data clusters or grids, e.g. a Hadoop environment. Load balancing as a key factor affecting the performance of map resource distribution, has recently gained high concerns to optimize. Current MR processes in the realization of distributing tasks to clusters use hashing with random modulo operations,...
To address the challenge of automated performance benchmarking in virtualized cloud infrastructures, an extensible and adaptable framework called CloudBench has been developed to conduct scalable, controllable, and repeatable experiments in such environments. This paper presents the hardware-in-the-loop simulation technique used in CloudBench, which integrates an efficient discrete-event simulation...
The increasing scale and complexity of virtualized data centers pose significant challenges to system management software stacks, which still rely on special-purpose controllers to optimize the operation of cloud infrastructures. Autonomic computing allows complex systems to assume much of their own management, achieving self-configuration, self-optimization, self-healing, and self-protection without...
In next generation of wireless mobile communications, it is demanded that users could visit Internet services through any kind of radio access technology. Monitoring of radio access network (RAN) is very important for reconfigurable terminals (RT) in Mobile Internet. It is the foundation of network cooperation and seamless access for user services. In this paper, a new RAN monitoring scheme based...
Digital Environment Home Energy Monitoring System (DEHEMS) is a wide scale domestic energy monitoring and managing system that enables real-time and historical energy monitoring and feedback, provides comparison of groups of households with similar characteristics and personalised energy saving tips and alerts. This paper presents the design and development of the DEHEMS system and compares DEHEMS...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.