267 research outputs found

    Intelligent Mobile Edge Computing Integrated with Blockchain Security Analysis for Millimetre-Wave Communication

    Get PDF
     With the increase in number of devices enabled the Internet of Things (IoT) communication with the centralized cloud computing model. With the implementation of the cloud computing model leads to increased Quality of Service (QoS). The cloud computing model provides the edge computing technologies for the real-time application to achieve reliability and security. Edge computing is considered the extension of the cloud computing technology involved in transfer of the sensitive information in the cloud edge to increase the network security. The real-time data transmission realizes the interaction with the high frequency to derive improved network security. However, with edge computing server security is considered as sensitive privacy information maintenance. The information generated from the IoT devices are separated based on stored edge servers based on the service location. Edge computing data is separated based in edge servers for the guaranteed data integrity for the data loss and storage. Blockchain technologies are subjected to different security problem for the data integrity through integrated blockchain technologies. This paper developed a Voted Blockchain Elliptical Curve Cryptography (VBECC) model for the millimetre wave application. The examination of the blockchain model is evaluated based on the edge computing architecture. The VBECC model develop an architectural model based Blockchain technology with the voting scheme for the millimetre application. The estimated voting scheme computes the edge computing technologies for the estimation of features through ECC model. The VBECC model computes the security model for the data transmission in the edge computing-based millimetre application. The experimental analysis stated that VBECC model uses the data security model ~8% increased performance than the conventional technique

    mARC: Memory by Association and Reinforcement of Contexts

    Full text link
    This paper introduces the memory by Association and Reinforcement of Contexts (mARC). mARC is a novel data modeling technology rooted in the second quantization formulation of quantum mechanics. It is an all-purpose incremental and unsupervised data storage and retrieval system which can be applied to all types of signal or data, structured or unstructured, textual or not. mARC can be applied to a wide range of information clas-sification and retrieval problems like e-Discovery or contextual navigation. It can also for-mulated in the artificial life framework a.k.a Conway "Game Of Life" Theory. In contrast to Conway approach, the objects evolve in a massively multidimensional space. In order to start evaluating the potential of mARC we have built a mARC-based Internet search en-gine demonstrator with contextual functionality. We compare the behavior of the mARC demonstrator with Google search both in terms of performance and relevance. In the study we find that the mARC search engine demonstrator outperforms Google search by an order of magnitude in response time while providing more relevant results for some classes of queries

    A review on green caching strategies for next generation communication networks

    Get PDF
    © 2020 IEEE. In recent years, the ever-increasing demand for networking resources and energy, fueled by the unprecedented upsurge in Internet traffic, has been a cause for concern for many service providers. Content caching, which serves user requests locally, is deemed to be an enabling technology in addressing the challenges offered by the phenomenal growth in Internet traffic. Conventionally, content caching is considered as a viable solution to alleviate the backhaul pressure. However, recently, many studies have reported energy cost reductions contributed by content caching in cache-equipped networks. The hypothesis is that caching shortens content delivery distance and eventually achieves significant reduction in transmission energy consumption. This has motivated us to conduct this study and in this article, a comprehensive survey of the state-of-the-art green caching techniques is provided. This review paper extensively discusses contributions of the existing studies on green caching. In addition, the study explores different cache-equipped network types, solution methods, and application scenarios. We categorically present that the optimal selection of the caching nodes, smart resource management, popular content selection, and renewable energy integration can substantially improve energy efficiency of the cache-equipped systems. In addition, based on the comprehensive analysis, we also highlight some potential research ideas relevant to green content caching

    Modeling and Simulation of Multi-tier Enterprise IT System

    Get PDF
    This paper discusses modelling and simulation of multi-tier enterprise IT system. The layers in multi-tier architecture consist of web layer, application layer and database layer. Entities in the multi-tier system have been abstracted out into 3 categories- consumer, resource and router. Existing modelling and simulation frameworks for multi-tier systems focus on power management or performance of load balancing algorithms. Our framework enables seamless modelling, simulation, and experimentation of a wide range of what-if scenarios in multi-tier systems while encapsulating all the variations that arise due to configuration, composition, design and deployment. As an illustration, we discuss and simulate prediction of bottleneck scenario with results

    Protein Structure Determination Using Chemical Shifts

    Full text link
    In this PhD thesis, a novel method to determine protein structures using chemical shifts is presented.Comment: Univ Copenhagen PhD thesis (2014) in Biochemistr

    Proactive content caching in future generation communication networks: Energy and security considerations

    Get PDF
    The proliferation of hand-held devices and Internet of Things (IoT) applications has heightened demand for popular content download. A high volume of content streaming/downloading services during peak hours can cause network congestion. Proactive content caching has emerged as a prospective solution to tackle this congestion problem. In proactive content caching, data storage units are used to store popular content in helper nodes at the network edge. This contributes to a reduction of peak traffic load and network congestion. However, data storage units require additional energy, which offers a challenge to researchers that intend to reduce energy consumption up to 90% in next generation networks. This thesis presents proactive content caching techniques to reduce grid energy consumption by utilizing renewable energy sources to power-up data storage units in helper nodes. The integration of renewable energy sources with proactive caching is a significant challenge due to the intermittent nature of renewable energy sources and investment costs. In this thesis, this challenge is tackled by introducing strategies to determine the optimal time of the day for content caching and optimal scheduling of caching nodes. The proposed strategies consider not only the availability of renewable energy but also temporal changes in network trac to reduce associated energy costs. While proactive caching can facilitate the reduction of peak trac load and the integration of renewable energy, cached content objects at helper nodes are often more vulnerable to malicious attacks due to less stringent security at edge nodes. Potential content leakage can lead to catastrophic consequences, particularly for cache-equipped Industrial Internet of Things (IIoT) applications. In this thesis, the concept of \trusted caching nodes (TCNs) is introduced. TCNs cache popular content objects and provide security services to connected links. The proposed study optimally allocates TCNs and selects the most suitable content forwarding paths. Furthermore, a caching strategy is designed for mobile edge computing systems to support IoT task offloading. The strategy optimally assigns security resources to offloaded tasks while satisfying their individual requirements. However, security measures often contribute to overheads in terms of both energy consumption and delay. Consequently, in this thesis, caching techniques have been designed to investigate the trade-off between energy consumption and probable security breaches. Overall, this thesis contributes to the current literature by simultaneously investigating energy and security aspects of caching systems whilst introducing solutions to relevant research problems
    corecore