48 research outputs found

    Design and implementation of testbed using IoT and P2P technologies: improving reliability by a fuzzy-based approach

    Get PDF
    The internet of things (IoT) is a new type of internet application which enables the objects to be active participants with other members of the network. In P2P systems, each peer has to obtain information of other peers and propagate the information through neighbouring peers. However, in reality, each peer might be faulty or might send incorrect information. In our previous work, we implemented a P2P platform called JXTA-overlay, which provides a set of basic functionalities, primitives, intended to be as complete as possible to satisfy the needs of most JXTA-based applications. In this paper, we present the implementation of a testbed using IoT and P2P technologies. We also present two fuzzy-based systems (FPRS1 and FPRS2) to improve the reliability of the proposed approach. Comparing the complexity of FPRS1 and FPRS2, the FPRS2 is more complex than FPRS1. However, FPRS2 makes the platform more reliable.Peer ReviewedPostprint (author's final draft

    Cloud scheduling optimization: a reactive model to enable dynamic deployment of virtual machines instantiations

    Get PDF
    This study proposes a model for supporting the decision making process of the cloud policy for the deployment of virtual machines in cloud environments. We explore two configurations, the static case in which virtual machines are generated according to the cloud orchestration, and the dynamic case in which virtual machines are reactively adapted according to the job submissions, using migration, for optimizing performance time metrics. We integrate both solutions in the same simulator for measuring the performance of various combinations of virtual machines, jobs and hosts in terms of the average execution and total simulation time. We conclude that the dynamic configuration is prosperus as it offers optimized job execution performance

    Meta-scheduling Issues in Interoperable HPCs, Grids and Clouds

    Get PDF
    Over the last years, interoperability among resources has been emerged as one of the most challenging research topics. However, the commonality of the complexity of the architectures (e.g., heterogeneity) and the targets that each computational paradigm including HPC, grids and clouds aims to achieve (e.g., flexibility) remain the same. This is to efficiently orchestrate resources in a distributed computing fashion by bridging the gap among local and remote participants. Initially, this is closely related with the scheduling concept which is one of the most important issues for designing a cooperative resource management system, especially in large scale settings such as in grids and clouds. Within this context, meta-scheduling offers additional functionalities in the area of interoperable resource management, this is because of its great agility to handle sudden variations and dynamic situations in user demands. Accordingly, the case of inter-infrastructures, including InterCloud, entitle that the decentralised meta-scheduling scheme overcome issues like consolidated administration management, bottleneck and local information exposition. In this work, we detail the fundamental issues for developing an effective interoperable meta-scheduler for e-infrastructures in general and InterCloud in particular. Finally, we describe a simulation and experimental configuration based on real grid workload traces to demonstrate the interoperable setting as well as provide experimental results as part of a strategic plan for integrating future meta-schedulers

    Analysing and using subjective criteria to improve dental care recommendation systems

    Get PDF
    Online reviews and rating sites are shaping industries as the users rely on recommendations given by former consumers and sharing opinions on the web. Dentistry has also been impacted by dental patients' reviews. This paper classifies trust-related information for dental care recommendations onto 4 categories: context, relationship, reputation and subjective criteria. It discusses each category and describes how they help focussing on trust when matching patients and dentists in brief. The paper then focuses on subjective criteria and presents the results of a survey aimed at showing trustrelated information emerged from subjective characteristics. Traits of personalities are used as subjective characteristics of patients and that of dentists are derived from the online patients' reviews. 580 Australian patients were surveyed to determine what factors affect their decision to find the trusted dentist. Subjective characteristics of dentists such as dentists' qualities and experienced dentists are considered the most important factors after location and cost. The most preferred dentists' qualities by almost all types of personalities are experienced, professional and quality of service. When the patients are further classified based on levels of fear, their preferences for dentists' qualities changed. Subjective qualities of both patients and dentists are important factors to improve the matching capability for the dental care recommendation systems

    次世代コンピュータシステムのための人間中心コンピューティング

    Get PDF
    博士(工学)法政大学 (Hosei University

    サーバクラスタでの低消費電力化のための移行モデルの研究

    Get PDF
    博士(工学)法政大学 (Hosei University

    A Novel WLAN Client Puzzle against DoS Attack Based on Pattern Matching

    Get PDF
    Despite the popularity of 802.11 based networks, they suffer several types of DoS attack, launched by an attacker whose aim is to make an access point (AP) unavailable to legitimate users. One of the most common DoS attacks on 802.11 based networks is to deplete the resources of the AP. A serious situation like this can occur when the AP receives a burst of connection requests. This paper addresses this common DoS attack and proposes a lightweight puzzle, based on pattern-matching. Using a pattern-matching technique, this model adequately resists resource-depletion attacks in terms of both puzzle generation and solution verification. Using a sensible series of contextual comparisons, the outcomes were modelled by a simulator, and the security definition and proofs are verified, among other results
    corecore