1,188 research outputs found

    MHAV: multitier heterogeneous adaptive vehicular network with LTE and DSRC

    Get PDF
    Enabling cooperation between vehicles form vehicular networks, which provide safety, traffic efficiency and infotainment. The most vital of these applications require reliability and low latency. Considering these requirements, this paper presents a multitier heterogeneous adaptive vehicular (MHAV) network. Comprising of transport operator or authority owned vehicles in high tier and all the other privately owned vehicles in low tier, integrating cellular network with dedicated short range communications. The proposed framework is implemented and evaluated in Glasgow city center model. Simulation results demonstrate that the proposed architecture outperforms previous multitier architectures in terms of latency while offloading traffic from cellular networks

    Vehicular multitier gateway selection algorithm for heterogeneous VANET architectures

    Get PDF

    Advances in the Design and Implementation of a Multi-Tier Architecture in the GIPSY Environment

    Get PDF
    We present advances in the software engineering design and implementation of the multi-tier run-time system for the General Intensional Programming System (GIPSY) by further unifying the distributed technologies used to implement the Demand Migration Framework (DMF) in order to streamline distributed execution of hybrid intensional-imperative programs using Java.Comment: 11 pages, 3 figure

    Multitier Modules

    Get PDF
    Multitier programming languages address the complexity of developing distributed systems abstracting over low level implementation details such as data representation, serialization and network protocols. Since the functionalities of different peers can be defined in the same compilation unit, multitier languages do not force developers to modularize software along network boundaries. Unfortunately, combining the code for all tiers into the same compilation unit poses a scalability challenge or forces developers to resort to traditional modularization abstractions that are agnostic to the multitier nature of the language. In this paper, we address this issue with a module system for multitier languages. Our module system supports encapsulating each (cross-peer) functionality and defining it over abstract peer types. As a result, we disentangle modularization and distribution and we enable the definition of a distributed system as a composition of multitier modules, each representing a subsystem. Our case studies on distributed algorithms, distributed data structures, as well as on the Apache Flink task distribution system, show that multitier modules allow the definition of reusable (abstract) patterns of interaction in distributed software and enable separating the modularization and distribution concerns, properly separating functionalities in distributed systems

    Improved Storage Security using IDS and Performance using Container De-Duplication

    Get PDF
    Due to enormous increase in use of web services in our day today life, web services have moved to multitier design where in web server runs the application front-end logic and data are outsourced to a database or file server. In our system, we will implement secure de-duplication which is a technique for eliminating duplicate copies of data, it has been largely used in cloud storage to reduce storage space and upload bandwidth with Container security, an IDS system that models the network acts as user sessions across both front-end web server and back-end database. By monitoring both the web and subsequent database requests, we are capable to search out attacks that an independent Intrusion Detection System (IDS) unable to identify. In this system, each user requesting for our application will be allocated separate container. The container based web architecture not only fasters profiling of causal mapping, but it also provides an isolation that obstruct future session hijacking attacks .Each user will hold de-key which is a new construction in which users do not require to manage any keys on their own but as an alternative securely distribute the convergent key shares across multiple servers. We implement De-key to demonstrate that De-key incurs limited overhead in realistic environments

    Web-Based Laboratory Using Multitier Architecture

    Get PDF

    Implementation of Customized UTP Algorithm for Attack Detection in Multitier Web Applications

    Get PDF
    Internet services and application have gained lots of importance in our daily life such as banking, travel and social networking. Personal information from any of the remote location can be communicated and managed with the help of Internet. Due to their omnipresent use for daily task, web applications have been target for attack. To deal with increasing demand and data complexity web services and applications have moved to a multitiered design. The idea is to detect attacks in multitier architecture to model the network behavior of user sessions across both the front-end web server and the back-end database. The attacks like SQL injection, cross site scripting attack, privilege escalation attack and direct DB attack can be monitored with both the web and subsequent database requestusing customized UTP algorithm, which an independent system cannot do

    Multiparty Languages: The Choreographic and Multitier Cases (Pearl)

    Get PDF
    Choreographic languages aim to express multiparty communication protocols, by providing primitives that make interaction manifest. Multitier languages enable programming computation that spans across several tiers of a distributed system, by supporting primitives that allow computation to change the location of execution. Rooted into different theoretical underpinnings - respectively process calculi and lambda calculus - the two paradigms have been investigated independently by different research communities with little or no contact. As a result, the link between the two paradigms has remained hidden for long. In this paper, we show that choreographic languages and multitier languages are surprisingly similar. We substantiate our claim by isolating the core abstractions that differentiate the two approaches and by providing algorithms that translate one into the other in a straightforward way. We believe that this work paves the way for joint research and cross-fertilisation among the two communities

    Design, implementation, and testing of advanced virtual coordinate-measuring machines

    Get PDF
    Copyright @ 2011 IEEE. This article has been made available through the Brunel Open Access Publishing Fund.Advanced virtual coordinate-measuring machines (CMMs) (AVCMMs) have recently been developed at Brunel University, which provide vivid graphical representation and powerful simulation of CMM operations, together with Monte-Carlo-based uncertainty evaluation. In an integrated virtual environment, the user can plan an inspection strategy for a given task, carry out virtual measurements, and evaluate the uncertainty associated with the measurement results, all without the need of using a physical machine. The obtained estimate of uncertainty can serve as a rapid feedback for the user to optimize the inspection plan in the AVCMM before actual measurements or as an evaluation of the measurement results performed. This paper details the methodology, design, and implementation of the AVCMM system, including CMM modeling, probe contact and collision detection, error modeling and simulation, and uncertainty evaluation. This paper further reports experimental results for the testing of the AVCMM
    • 

    corecore