The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid development of extra-high voltage, smart power grid and energy internet leads to relative lagging of production management. This management strategy develops electric big data in depth and realizes an intelligent management platform with full life cycle management, standard defect closed-loop management, safety risk control, equipment state evaluation, etc. as its main carriers on the basis...
Examining the degree of achievement of principal specifications through prototyping during early development of an Internet of Things (IoT) system enables anticipation of what is to be accomplished by completion and confirmation of the user-defined market response. This paper presents a proposal of a method of evaluating examination results using analytic hierarchy process (AHP) for objective estimation...
The integration of multiple Unmanned Aerial Vehicles (UAVs) in civil applications have been attracted a lot of attentions in many scientific and engineering fields. Most of Multi-UAV systems have been characterized to be controlled by one Ground Control Station (GCS). However, in a case of an enormous number of UAVs with different assignments to each one or each group, one GCS cannot handle such a...
Integrated with cloud computing technologies, a large-scale cyber-physical system (CPS) can outsource its extensive computations to a cloud, creating a cloud-enabled CPS (CE-CPS). However, outsourcing the computation to an untrusted cloud may expose the privacy of the data in the CPS. To this end, this paper presents a secure and practical mechanism to securely outsource the output feedback control...
The protection of content confidentiality as well as of access and pattern confidentiality of data moved to the cloud have been recently the subject of several investigations. The distributed shuffle index addresses these issues by randomly partitioning data among three independent cloud providers. In this paper, we describe the implementation of the distributed shuffle index in the high-performance...
With the rapid development of bulk power grid under extra-high voltage (EHV) AC/DC hybrid power system and extensive access of distributed energy resources (DER), operation characteristics of power grid have become increasingly complicated. To cope with new severe challenges faced by safe operation of interconnected bulk power grids, an in-depth analysis of bulk power grid security defense system...
The Internet of Things (IoT) paradigm envisions a world of interconnected objects in which every object or thing can be univocally addressed and accessed, independently of its inherent technology and location. To the date, most of the state-of-the-art solutions proposed to realize the IoT vision employ a cloud-based approach. This means that, independently on where objects are physically located,...
This paper presents a multi-layer distributed performance management model for Internet of Things (IoT) as a service for caregivers. Performance monitoring and control of IoT devices and services are vital functions for e-health systems. Cloud-based IoT systems with centralized data centers further underline the need for distributed management. The main contribution of this paper is a model and prototype...
iSkin Specialist is an attempt to combine the power of smartphones (which is becoming common globally) with specialist doctors (which is very limited) or to an expert system — to provide quick diagnosis for skin conditions like rash, bug bite, etc. The diagnosis in many cases are simple but without proper diagnosis and treatment, some of these skin conditions can have serious health impact and can...
In the 5G era, radio IP capacity is expected to reach 20 Gbit/s per sector, and ultra-large content traffic will travel across the faster wireless/wireline access network and packet core network. Also massive and mission-critical IoT is the main differentiator of 5G services. These types of real-time and large-bandwidth consuming services require radio latency of less than 1ms, and end-to-end latency...
In order to reduce operational expenditure (OPEX), network function virtualization infrastructure (NFVI) should be distributed over multiple geographical locations and managed by a centralized and unified management and orchestration system (MANO). In addition, the NFV platform is required to archive a high level of availability and scalability for virtual network functions (VNFs) across multi-site...
With the rapid growth of Cloud Computing technologies, enterprises are increasingly deploying their services in the Cloud. Dynamically priced cloud resources such as the Amazon EC2 Spot Instance provides an efficient mechanism for cloud service providers to trade resources with potential buyers using an auction mechanism. With the dynamically priced cloud resource markets, cloud consumers can buy...
With the upsurge in the volume of data and profuse cloud applications, big data analytics becomes very popular in the research communities in industry as well as in academia. This led to the emergence of real-time distributed stream processing systems such as Flink, Storm, Spark, and Samza. These systems sanction complex queries on streaming data to be distributed across multiple worker nodes in a...
Cloud computing technology is causing a shift in Information Communication Technology usage by transforming the approaches businesses employ information technology services. This benefits computing usage by allowing users to share hardware resources via multiplexing of virtual machines which are the basic units of cloud computing. Small and new businesses which often lack good financial standing but...
Network virtualization provides a flexible solution to reduce costs, share network resources and improve recovery time upon failure. An important part of virtual network management consists in migrating them in order to optimize resource allocation and react to link failures. However, the migration process might entail the loss of security properties in the virtual network, such as confidentiality...
The state-of-practice for Internet of Things (IoT) applications is deployment on specialised networks of embedded devices connected to a cloud backend. While this paradigm has successfully supported a range of IoT systems, its power is limited by the high latency and bandwidth caused by communications with remote data servers and the inability to share specialised IoT infrastructure across applications...
The thriving success of the Cloud Industry greatly relies on the fact that virtual resources are as good as bare metal resources when it comes to ensuring a given level of quality of service. Thanks to the isolation provided by virtualisation techniques based on hypervisors, a big physical resource can be spatially multiplexed into smaller virtual resources which are easier to sell. Unfortunately,...
The key to maintaining high standards of quality and power conservation of physical machines in data centers lies in efficient consolidation of virtual machines (VMs). Several schemes have been proposed for this purpose; and these include online migration and VM placement — which can offer the best in terms of resource utilization. The consolidation process can be made effective by finding “opportunities”...
Cloud providers have an incomplete view of their hosted virtual infrastructures managed by a Cloud Management System (CMS) and a Software Defined Network (SDN) controller. For various security reasons (e.g. isolation verification, modeling attack paths in the network), it is necessary to know which virtual machines can interact via network protocols. This requires building a connectivity graph between...
This documents presents a development methodology which purpose is propose procedures that allows to transform a monolithic system into an architecture based in microservices the document offers a description of each stage and explains it's implementation of the methodology in an open source monolith application. The methodology starts from the analysis of the business model of a monolithic application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.