Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Preface
Organization
Contents
Implementation of Self-adaptive Middleware for Mobile Vehicle Tracking Applications on Edge Computing
1 Introduction
2 Related Work
3 Approach
3.1 Scenario
3.2 Requirements
3.3 Approach
4 Design and Implementation
4.1 Design of Self-adaptive Middleware
4.2 Implementation
5 Mobile Vehicle Tracking Application
5.1 Vehicle Recognition
5.2 Mobile Vehicle Tracking
6 Conclusion
References
Towards the Succinct Representation of m Out of n
1 Introduction
1.1 Related Works
1.2 Contributions
2 Proposed Approach
2.1 Preliminaries
2.2 Unranking Using Optimization
2.3 Parallelization
3 Computational Experiments
3.1 Basic Settings
3.2 Experiment Instances
3.3 Complexity Function
4 Concluding Remarks
References
Extending the Advisor Concept to Deal with Known-Ahead Transportation Tasks
1 Introduction
2 The EIA for Pickup and Delivery Problems
2.1 Pickup and Delivery Problems
2.2 Digital Infochemical Coordination
2.3 The Efficiency Improvement Advisor for DIC for PDP
3 The EEIA for Pickup and Delivery
4 Experimental Evaluation
4.1 Setup
4.2 The EEIA for Static Run Instances
4.3 Comparison of the Systems for Two Vehicles
4.4 EEIA vs EIA vs Base System for Two and More Vehicles
5 Related Works
6 Conclusion and Future Work
References
A Framework for Task-Guided Virtual Machine Live Migration
1 Introduction
2 Background and Related Works
3 Task Guided Live Migration
4 Experiments and Analysis
5 Concluding Remarks and Future Directions
References
Verifiable Privacy-Preserving Payment Mechanism for Smart Grids
1 Introduction
2 Preliminaries
2.1 System Model
2.2 Security Requirement
2.3 Partially Blind Signature Scheme
2.4 Online Electronic Cash Protocol
3 The Proposed Scheme
3.1 System Initialization
3.2 User Payment Generation
3.3 Collecting Blinded E-Cash
3.4 Obtaining Electricity Payment
4 Security
4.1 Unlinkability
4.2 Unforgeability
4.3 Confidentiality
5 Comparison
6 Conclusion
References
Increasing Interoperability Between Heterogeneous Smart City Applications
1 Introduction
2 Related Work
3 Design of Architecture
3.1 Architectural Overview
3.2 Business Layer Components
3.3 Core Layer Components
4 Conclusion and Future Work
References
Reduced Transmission in Multi-server Coded Caching
1 Introduction
2 Known Result and Our Main Results
3 Preliminaries
3.1 MN Scheme
3.2 Bipartite Graph and the Scheme in LAP
3.3 Research Motivation
4 Improved Scheme for Three Servers
4.1 Refined Methods
4.2 Modified Scheme
5 More Refined Methods
6 Conclusion
References
Distributed Sensor Fusion for Activity Detection in Smart Buildings
Abstract
1 Introduction
2 Distributed Fusion Algorithm
2.1 Local HMM
3 Fusion Algorithm
4 Performance Evaluation
4.1 Choice of Sensing Modality
4.2 Experimental Deployment
4.3 Simulation Methodology
4.4 Feature Selection
4.5 Time Requirements and Computational Cost
4.6 Activity Recognition
4.7 Effect of Channel Erasure
5 Conclusions
Acknowledgment
Appendix
References
Climbing Ranking Position via Long-Distance Backlinks
1 Introduction
2 Scenario
2.1 Link Building
2.2 PageRank
3 Long-Distance In-link Based Heuristic
3.1 Results
4 Conclusions
References
Financial Application on an Openstack Based Private Cloud
1 Introduction
1.1 Problem Description
1.2 Infrastructure
2 Related Work
3 Finance Background
4 Monte-Carlo Simulation
5 Experiments and Evaluation
5.1 Application Testing
5.2 Performance Testing
6 Conclusion and Future Work
References
Towards Island Networks: SDN-Enabled Virtual Private Networks with Peer-to-Peer Overlay Links for Edge Computing
Abstract
1 Introduction
2 IoT Application Characteristics
2.1 An Example Scenario
2.2 Model Characteristics
2.3 Networking Implications
2.4 Overlay and Island Networks Concepts
3 An Architecture for Overlay Networks
3.1 Controller
3.2 Data Plane
4 Experimental Evaluation
4.1 Experimental Testbed
4.2 Scenarios and Results
4.3 Results Evaluation
5 Conclusion
Acknowledgments
References
Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys
1 Introduction
2 Preliminaries
2.1 Notations
2.2 Time-Bound Keys
2.3 Dynamical-Almost-Full Anonymity
2.4 Digital Signature Schemes
2.5 Encryption Scheme
2.6 Simulation-Sound Non-interactive Zero Knowledge Proof System
3 Our Scheme
3.1 Description of the Scheme
4 Security Analysis of the Scheme
4.1 Applying Dynamical-Almost-Full Anonymity
4.2 Correctness
4.3 Dynamical-Almost-Full Anonymity
4.4 Traceability
4.5 Non-frameability
5 Evaluation of the Scheme and Conclusion
References
Path Planning for Multi-robot Systems in Intelligent Warehouse
Abstract
1 Introduction
2 Statements and Preliminaries
2.1 Statements
2.2 Preliminaries
3 Solution for Troubles
3.1 Local Minima
3.2 Non-reachable Target
3.3 Collision and Traffic Jams
4 Simulation
5 Conclusion
Acknowledgment
References
Dynamic Framework for Reconfiguring Computing Resources in the Inter-cloud and Its Application to Genome Analysis Workflows
1 Introduction
2 Virtual Cloud Provider
3 Overview of Reconfiguration Framework
3.1 Reconfiguration Mechanism
3.2 Constraints on Specifications
4 Application Scheduler for Genome Analysis Workflows
4.1 Overview
4.2 Metrics Collection Scheme
5 Evaluation
6 Related Work
6.1 Resource Managers
6.2 Reconfiguration of Workflow Execution
7 Conclusion
References
Game-Theoretic Approach to Self-stabilizing Minimal Independent Dominating Sets
1 Introduction
2 Background and Related Work
3 IDS Games
3.1 MIS-Based IDS Game
3.2 Symmetric MDS-Based IDS Game
3.3 Asymmetric MDS-Based IDS Game
4 Simulation Results
5 Conclusions
References
Towards Social Signal Separation Based on Reconstruction Independent Component Analysis
1 Introduction
2 Problem Definition
3 Separating Social Event Signals from Noise with RICA
4 Case Study with Social Events on Twitter
5 Conclusion and Future Work
References
Performance, Resilience, and Security in Moving Data from the Fog to the Cloud: The DYNAMO Transfer Framework Approach
1 Introduction
2 Related Work
3 Design
3.1 Edge/Cloud Sides Key Exchange
3.2 Edge Side Design
3.3 Cloud Side Design
4 Implementation
5 Evaluation
6 Conclusion and Future Directions
References
Development of a Support System to Resolve Network Troubles by Mobile Robots
1 Introduction
2 Monitoring System of Network Devices by Robots
2.1 Monitoring System of Network Devices
2.2 Collecting Information by Robots
3 Proposed Method
4 Implementation
4.1 Overview of System
4.2 Additional Functions to Robots
4.3 Checking Terminal and Supporting Taking a Photo of Display
4.4 Confirming Whether Tablet PC Is Returned to Robot
4.5 Operation of Tablet PC
4.6 Obtaining Characters from Image
5 Experiment
6 Discussion
7 Related Studies
8 Conclusion
References
A Benchmark Model for the Creation of Compute Instance Performance Footprints
1 Introduction
2 Problem Formulation
3 Related Work
4 Benchmark Model
5 Example Benchmark Process
5.1 Benchmark Setup
5.2 Benchmark Results
6 Conclusion
References
Developing Agent-Based Smart Objects for IoT Edge Computing: Mobile Crowdsensing Use Case
1 Introduction
2 Agent-Based Crowdsensing System
3 Systematic Approach to Crowdsensing So Development
3.1 Analysis Phase
3.2 Design Phase
3.3 Implementation Phase
4 Discussion and Conclusion
References
Path Planning of Robotic Fish in Unknown Environment with Improved Reinforcement Learning Algorithm
Abstract
1 Introduction
2 Improved Reinforcement Learning for Path Planning
2.1 Q Learning
2.2 Simulated Annealing
2.3 Improved Reinforcement Learning
3 Robotic Fish and Environment Model
3.1 Robotic Fish
3.2 2D Environment Model
4 Experiment Results
5 Conclusion
Acknowledgement
References
Review of Swarm Intelligence Algorithms for Multi-objective Flowshop Scheduling
Abstract
1 Introduction
2 Multi-objective Flowshop Scheduling Problem
3 Literature Review
3.1 SIAs for Multi-objective Flowshop Scheduling
3.2 Discussion
4 Future Research Directions
4.1 New Hybrid MOSIA
4.2 MOSIA with High Computational Efficiency
4.3 MOSIA Based on Machine Learning and Big Data
4.4 Multi-objective Approach
4.5 Many-objective Flowshop Scheduling
5 Conclusion
Acknowledgement
References
Exploiting Long Distance Connections to Strengthen Network Robustness
1 Introduction
2 Scale–Free Networks Robustness Enhancement
3 Results
4 Conclusions
References
An Online Adaptive Sampling Rate Learning Framework for Sensor-Based Human Activity Recognition
1 Introduction
2 Proposed Framework
3 Applied Algorithms
4 Conclusions
References
A Secure Video-Based Robust and Aesthetic 2D Barcode
1 Introduction
2 The Proposed Video-Based Robust and Aesthetic 2D Barcode
3 Implementation and Demo of the Proposed vRA Code
4 Conclusion
References
A Migratable Container-Based Replication Management for Inter-cloud
1 Introduction
2 Requirements
3 Approach
4 Conclusion
References
Dilated Deep Residual Network for Post-processing in TPG Based Image Coding
1 Introduction
2 Methodology
2.1 Discussing
3 Conclusion
References
Underground Intelligent Logistic System Integrated with Internet of Things
Abstract
1 Introduction
2 Architecture
3 Conception
3.1 Decentralized Network Layout
3.2 Intelligent Management and Distribution
3.3 Intensification of Management and Distribution
4 Internet of Things and Urban Underground Intelligent Logistics System
5 Summary
References
Author Index
← Prev
Back
Next →
← Prev
Back
Next →