769 research outputs found

    C-NEST: cloudlet based privacy preserving multidimensional data stream approach for healthcare electronics.

    Get PDF
    The Medical Internet of Things (MIoT) facilitates extensive connections between cyber and physical "things" allowing for effective data fusion and remote patient diagnosis and monitoring. However, there is a risk of incorrect diagnosis when data is tampered with from the cloud or a hospital due to third-party storage services. Most of the existing systems use an owner-centric data integrity verification mechanism, which is not computationally feasible for lightweight wearable-sensor systems because of limited computing capacity and privacy leakage issues. In this regard, we design a 2-step Privacy-Preserving Multidimensional Data Stream (PPMDS) approach based on a cloudlet framework with an Uncertain Data-integrity Optimization (UDO) model and Sparse-Centric SVM (SCS) model. The UDO model enhances health data security with an adaptive cryptosystem called Cloudlet-Nonsquare Encryption Secret Transmission (C-NEST) strategy by avoiding medical disputes during data streaming based on novel signature and key generation strategies. The SCS model effectively classifies incoming queries for easy access to data by solving scalability issues. The cloudlet server measures data integrity and authentication factors to optimize third-party verification burden and computational cost. The simulation outcomes show that the proposed system optimizes average data leakage error rate by 27%, query response time and average data transmission time are reduced by 31%, and average communication-computation cost are reduced by 61% when measured against state-of-the-art approaches

    An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT.

    Get PDF
    Social Edge Service (SES) is an emerging mechanism in the Social Internet of Things (SIoT) orchestration for effective user-centric reliable communication and computation. The services are affected by active and/or passive attacks such as replay attacks, message tampering because of sharing the same spectrum, as well as inadequate trust measurement methods among intelligent devices (roadside units, mobile edge devices, servers) during computing and content-sharing. These issues lead to computation and communication overhead of servers and computation nodes. To address this issue, we propose the HybridgrAph-Deep-learning (HAD) approach in two stages for secure communication and computation. First, the Adaptive Trust Weight (ATW) model with relation-based feedback fusion analysis to estimate the fitness-priority of every node based on directed graph theory to detect malicious nodes and reduce computation and communication overhead. Second, a Quotient User-centric Coeval-Learning (QUCL) mechanism to formulate secure channel selection, and Nash equilibrium method for optimizing the communication to share data over edge devices. The simulation results confirm that our proposed approach has achieved effective communication and computation performance, and enhanced Social Edge Services (SES) reliability than state-of-the-art approaches

    An Euler-type formula for β(2n)\beta(2n) and closed-form expressions for a class of zeta series

    Full text link
    In a recent work, Dancs and He found an Euler-type formula for  ζ(2 n+1)\,\zeta{(2\,n+1)},  n \,n\, being a positive integer, which contains a series they could not reduce to a finite closed-form. This open problem reveals a greater complexity in comparison to ζ(2n)\zeta(2n), which is a rational multiple of π2n\pi^{2n}. For the Dirichlet beta function, the things are `inverse': β(2n+1)\beta(2n+1) is a rational multiple of π2n+1\pi^{2n+1} and no closed-form expression is known for β(2n)\beta(2n). Here in this work, I modify the Dancs-He approach in order to derive an Euler-type formula for  β(2n)\,\beta{(2n)}, including  β(2)=G\,\beta{(2)} = G, the Catalan's constant. I also convert the resulting series into zeta series, which yields new exact closed-form expressions for a class of zeta series involving  β(2n)\,\beta{(2n)} and a finite number of odd zeta values. A closed-form expression for a certain zeta series is also conjectured.Comment: 11 pages, no figures. A few small corrections. ACCEPTED for publication in: Integral Transf. Special Functions (09/11/2011

    Resource offload consolidation based on deep-reinforcement learning approach in cyber-physical systems.

    Get PDF
    In cyber-physical systems, it is advantageous to leverage cloud with edge resources to distribute the workload for processing and computing user data at the point of generation. Services offered by cloud are not flexible enough against variations in the size of underlying data, which leads to increased latency, violation of deadline and higher cost. On the other hand, resolving above-mentioned issues with edge devices with limited resources is also challenging. In this work, a novel reinforcement learning algorithm, Capacity-Cost Ratio-Reinforcement Learning (CCR-RL), is proposed which considers both resource utilization and cost for the target cyber-physical systems. In CCR-RL, the task offloading decision is made considering data arrival rate, edge device computation power, and underlying transmission capacity. Then, a deep learning model is created to allocate resources based on the underlying communication and computation rate. Moreover, new algorithms are proposed to regulate the allocation of communication and computation resources for the workload among edge devices and edge servers. The simulation results demonstrate that the proposed method can achieve a minimal latency and a reduced processing cost compared to the state-of-the-art schemes

    A quantum-inspired sensor consolidation measurement approach for cyber-physical systems.

    Get PDF
    Cyber-Physical System (CPS) devices interconnect to grab data over a common platform from industrial applications. Maintaining immense data and making instant decision analysis by selecting a feasible node to meet latency constraints is challenging. To address this issue, we design a quantum-inspired online node consolidation (QONC) algorithm based on a time-sensitive measurement reinforcement system for making decisions to evaluate the feasible node, ensuring reliable service and deploying the node at the appropriate position for accurate data computation and communication. We design the Angular-based node position analysis method to localize the node through rotation and t-gate to mitigate latency and enhance system performance. We formalize the estimation and selection of the feasible node based on quantum formalization node parameters (node contiguity, node optimal knack rate, node heterogeneity, probability of fusion variance error ratio). We design a fitness function to assess the probability of node fitness before selection. The simulation results convince us that our approach achieves an effective measurement rate of performance index by reducing the average error ratio from 0.17-0.22, increasing the average coverage ratio from 29% to 42%, and the qualitative execution frequency of services. Moreover, the proposed model achieves a 74.3% offloading reduction accuracy and a 70.2% service reliability rate compared to state-of-the-art approaches. Our system is scalable and efficient under numerous simulation frameworks

    A DRL-based service offloading approach using DAG for edge computational orchestration.

    Get PDF
    Edge infrastructure and Industry 4.0 required services are offered by edge-servers (ESs) with different computation capabilities to run social application's workload based on a leased-price method. The usage of Social Internet of Things (SIoT) applications increases day-to-day, which makes social platforms very popular and simultaneously requires an effective computation system to achieve high service reliability. In this regard, offloading high required computational social service requests (SRs) in a time slot based on directed acyclic graph (DAG) is an NP-complete problem. Most state-of-art methods concentrate on the energy preservation of networks but neglect the resource sharing cost and dynamic subservice execution time (SET) during the computation and resource sharing. This article proposes a two-step deep reinforcement learning (DRL)-based service offloading (DSO) approach to diminish edge server costs through a DRL influenced resource and SET analysis (RSA) model. In the first level, the service and edge server cost is considered during service offloading. In the second level, the R-retaliation method evaluates resource factors to optimize resource sharing and SET fluctuations. The simulation results show that the proposed DSO approach achieves low execution costs by streamlining dynamic service completion and transmission time, server cost, and deadline violation rate attributes. Compared to the state-of-art approaches, our proposed method has achieved high resource usage with low energy consumption

    Multiwavelength Observations of Supersonic Plasma Blob Triggered by Reconnection Generated Velocity Pulse in AR10808

    Full text link
    Using multi-wavelength observations of Solar and Heliospheric Observatory (SoHO)/Michelson Doppler Imager (MDI), Transition Region and Coronal Explorer (TRACE) 171 \AA, and Hα\alpha from Culgoora Solar Observatory at Narrabri, Australia, we present a unique observational signature of a propagating supersonic plasma blob before an M6.2 class solar flare in AR10808 on 9th September 2005. The blob was observed between 05:27 UT to 05:32 UT with almost a constant shape for the first 2-3 minutes, and thereafter it quickly vanished in the corona. The observed lower bound speed of the blob is estimated as ∼\sim215 km s−1^{-1} in its dynamical phase. The evidence of the blob with almost similar shape and velocity concurrent in Hα\alpha and TRACE 171 \AA\ supports its formation by multi-temperature plasma. The energy release by a recurrent 3-D reconnection process via the separator dome below the magnetic null point, between the emerging flux and pre-existing field lines in the lower solar atmosphere, is found to be the driver of a radial velocity pulse outwards that accelerates this plasma blob in the solar atmosphere. In support of identification of the possible driver of the observed eruption, we solve the two-dimensional ideal magnetohydrodynamic equations numerically to simulate the observed supersonic plasma blob. The numerical modelling closely match the observed velocity, evolution of multi-temperature plasma, and quick vanishing of the blob found in the observations. Under typical coronal conditions, such blobs may also carry an energy flux of 7.0×106\times10^{6} ergs cm−2^{-2} s−1^{-1} to re-balance the coronal losses above active regions.Comment: Solar Physics; 22 Pages; 8 Figure

    Non-Markovian diffusion equations and processes: analysis and simulations

    Full text link
    In this paper we introduce and analyze a class of diffusion type equations related to certain non-Markovian stochastic processes. We start from the forward drift equation which is made non-local in time by the introduction of a suitable chosen memory kernel K(t). The resulting non-Markovian equation can be interpreted in a natural way as the evolution equation of the marginal density function of a random time process l(t). We then consider the subordinated process Y(t)=X(l(t)) where X(t) is a Markovian diffusion. The corresponding time evolution of the marginal density function of Y(t) is governed by a non-Markovian Fokker-Planck equation which involves the memory kernel K(t). We develop several applications and derive the exact solutions. We consider different stochastic models for the given equations providing path simulations.Comment: 43 pages, 19 figures, in press on Physica A (2008
    • …
    corecore