The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present lowerbounds for the competitive ratio of randomized algorithms on the online minimum matching problem on the line for both the minimum weight and bottleneck objectives. To the best of our knowledge, there is no established lowerbound for randomized algorithms for either objective on the line: we show a lowerbound of 2 for the minimum weight objective and a linear lowerbound for the bottleneck...
Security and privacy of big data is of primary concern for many applications. For example, in case of smart meters, data of the consumers must be protected else private information can be leaked. Similarly, due to the cost-efficiency, reduced overhead management and dynamic resource needs, content owners are outsourcing their data to the cloud who can act as a service provider on their behalf. However,...
Although migration and replication of applications in a distributed environment have been discussed by many researchers, the implementations of these features are rarely focused when deployed in the Cloud. Distributed computing started with the cluster, evolved into the grid and now in the era of Cloud computing, where services are provided on demand and used with a pay-as-you-go style. In the Cloud,...
The key factor which rules the cloud's performance is the workflow scheduling, one of the well-known problems have proven to be NP-complete. Many algorithms in the literature have been targeting the workflow scheduling problem, however, handful efficient solutions have been proposed. This paper proposes a metaheuristic algorithm called PSOi which based on the Particle Swarm Optimization method. Our...
The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret...
With the advent of the era of big data, the data scale being processed is more and more large, which brings new challenge to the design of privacy-preserving protocols. For the Private Set Intersection (PSI) problem, when the sizes of sets is large, keeping its efficiency and scalability is becoming very difficult. In addition, elements in these sets are likely to be twodimensional data, which usually...
One of the major issues in urban areas is waste disposal. The country's per capita waste generation is so high, that lack of timely waste collection results in a huge pile of garbage in the city, leading to an unhygienic environment. In this paper, we introduce an automated system called SWaCH (Smart Waste Collecting Hopper) that helps to collect waste without human intervention. SWaCH has a web portal...
Ubiquitous network deals with wireless communication between service stations and users along with their mobility, invisibility and evolved smart space. In ubiquitous network, users get their services from available service stations invisibly. In such an open environment, an outsider malicious entity can disrupt the service communication by compromising the privacy of communicating users and(or) service...
Although using both user name and password is predominantly the main solution for online authentication, it has several drawbacks such as user necessity to memorize different complex passwords, the need to renew password periodically, and the possibility of being victim of spear phishing or social engineering. Most importantly, many users end up saving their passwords in plain text file that could...
With the rapid development of internet, the distributed file system is gradually facing problem of supporting concurrent 10K and 100K servers operations, so it now becomes an important issue that how to improve performance of the metadata server in high concurrent reading /writing environments. This paper designs and implements the distributed file system named Raccoon FS, researches and solves the...
IoT is a computing device, which identifies things in daily use and has the ability by mutual recognition of transferring data over a network. A home IoT device has a simple function to control things in the home environment. This has basic functions and a smaller interface than other IoT devices. For these reasons, security technology is often overlooked. If home appliances are operated by unauthorized...
Cloud computing is an emerging technology which provides the computing and data storage services in the form of clusters. User can share data from one cluster to other or in same cluster. Data integrity is the major security issues in the shared cloud environment because after store/share data in cloud, user lose their control. This paper describes the data traceability methodology, when the user...
Fat trees are considered suitable structures for data center interconnection networking. Such structures are rigid, and hard to scale up and scale out. A good data center network structure should have high scalability, efficient switch utilization, and high reliability. In this paper we present a class of data center network structures based on hypergraph theory and combinatorial block design theory...
Cloud computing systems assist applications by offering virtualized resources that can be provisioned on demand basis. Computing resources are delivered by Virtual Machines (VMs). Traditional development models have many limitations such as cost and delay. Platform as services is an effective solution for most of problems on traditional development application model that faced by programmers as Platform...
This paper focuses on the speeding up of transfer rate, the site that has low transfer rate will link with similar site that is hosting on cloud, in this paper, two cloud systems have been use; hosting own simulated system, and hosting real system.
Organizations have begun outsourcing management of their data to third party cloud service providers after the introduction of Database as a Service (DAS) model. A cloud database is a database that typically runs on a cloud computing platform, such as Amazon EC2, GoGrid, Salesforce and Rackspace. But outsourcing the data raises concerns over privacy. A typical solution is to store databases in encrypted...
Significant improvements in Information and Communication (ICT) infrastructure over the last decade put Sri Lanka among the top developing nations for ICT-led economic and social growth. While ICT has also contributed to increased research outcomes through better access to world-class knowledge, research resources, and other researchers, overall growth and significance of research findings are not...
VoIP is technology for transmitting voice and data over IP for communication. It has various benefits such as, voice messaging, calling, video messaging as well as video conferencing with file sharing. VoIP is better than Public Switched Telephone Network (PSTN) and cellular network. We can see all the services in VoIP based application such as Skype, Google talk. Due to the file sharing and information...
The interconnection of heterogeneous data sources could provide a comprehensive picture of health parameters, thereby triggering an intervention by the medical staff upon detection of conditions that may lead to health deterioration, thus realizing preventive care. Supported Internet of Things technologies can be used to allow health related information to be locally aggregated and transmitted for...
Distributed data stream processing has been gaining increasing research attention in recent years. Data continuity and massiveness has made it is critical and challenging to design a scalable and efficient dissemination system. Thus, a system that enables changes in database to copy or duplicate from one physical location or system to another (typically from a master to a slave system) is pertinent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.