2,981 research outputs found

    Fog computing, applications , security and challenges, review

    Get PDF
    The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented

    On Inversion in Z_{2^n-1}

    Get PDF
    In this paper we determined explicitly the multiplicative inverses of the Dobbertin and Welch APN exponents in Z_{2^n-1}, and we described the binary weights of the inverses of the Gold and Kasami exponents. We studied the function \de(n), which for a fixed positive integer d maps integers n\geq 1 to the least positive residue of the inverse of d modulo 2^n-1, if it exists. In particular, we showed that the function \de is completely determined by its values for 1 \leq n \leq \ordb, where \ordb is the order of 2 modulo the largest odd divisor of d.Comment: The first part of this work is an extended version of the results presented in ISIT1

    Abolishing the maximum tension principle

    Full text link
    We find the series of example theories for which the relativistic limit of maximum tension Fmax=c4/4GF_{max} = c^4/4G represented by the entropic force can be abolished. Among them the varying constants theories, some generalized entropy models applied both for cosmological and black hole horizons as well as some generalized uncertainty principle models.Comment: 5 pages, no figures, REVTEX4-1, a typo in abstract correcte
    • …
    corecore