2,981 research outputs found
Fog computing, applications , security and challenges, review
The internet of things originates a world where on daily basis objects can join the internet and interchange information and in addition process, store, gather them from the nearby environment, and effectively mediate on it. A remarkable number of services might be imagined by abusing the internet of things. Fog computing which is otherwise called edge computing was introduced in 2012 as a considered is a prioritized choice for the internet of things applications. As fog computing extend services of cloud near to the edge of the network and make possible computations, communications, and storage services in proximity to the end user. Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. In this paper, we will summarize and overview fog computing model architecture, characteristic, similar paradigm and various applications in real-time scenarios such as smart grid, traffic control system and augmented reality. Finally, security challenges are presented
On Inversion in Z_{2^n-1}
In this paper we determined explicitly the multiplicative inverses of the
Dobbertin and Welch APN exponents in Z_{2^n-1}, and we described the binary
weights of the inverses of the Gold and Kasami exponents. We studied the
function \de(n), which for a fixed positive integer d maps integers n\geq 1 to
the least positive residue of the inverse of d modulo 2^n-1, if it exists. In
particular, we showed that the function \de is completely determined by its
values for 1 \leq n \leq \ordb, where \ordb is the order of 2 modulo the
largest odd divisor of d.Comment: The first part of this work is an extended version of the results
presented in ISIT1
Abolishing the maximum tension principle
We find the series of example theories for which the relativistic limit of
maximum tension represented by the entropic force can be
abolished. Among them the varying constants theories, some generalized entropy
models applied both for cosmological and black hole horizons as well as some
generalized uncertainty principle models.Comment: 5 pages, no figures, REVTEX4-1, a typo in abstract correcte
- …