108 research outputs found

    Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

    Get PDF
    Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy

    Vehicle Positioning System Based on Cubic Spline Interpolation Using Statistical Analysis

    Get PDF
    Vehicle monitoring and positioning become an essential factor in road management to secure and safeguard the vehicular network, which influences the coupling of reliability on the advanced automobile technologies. Furthermore, to predict the exact location of a car in a given time is challenging, because it depends on a myriad number of elements. Moreover, knowing the position of a vehicle helps passengers as well as increase vehicle network security. In this paper, we propose a mathematical model to predict the position of a car from a prepopulated dataset using spline interpolation. More interestingly, the prediction point of a mobile vehicle will be presented without any help from real-time monitoring devices. Simulation of vehicle positioning is done using bus trajectory data in a university environment in the University of Malaya to verify the feasibility and benefit of the proposed approach. Accordingly, a process of evaluation has been performed based on a plethora of components and existing works to show the effectiveness of the proposed method

    An Automatic Zone Detection System for Safe Landing of UAVs

    Get PDF
    As the demand increases for the use Unmanned Aerial Vehicles (UAVs) to monitor natural disasters, protecting territories, spraying, vigilance in urban areas, etc., detecting safe landing zones becomes a new area that has gained interest. This paper presents an intelligent system for detecting regions to navigate a UAV when it requires an emergency landing due to technical causes. The proposed system explores the fact that safe regions in images have flat surfaces, which are extracted using the Gabor Transform. This results in images of different orientations. The proposed system then performs histogram operations on different Gabor-oriented images to select pixels that contribute to the highest peak, as Candidate Pixels (CP), for the respective Gabor-oriented images. Next, to group candidate pixels as one region, we explore Markov Chain Codes (MCCs), which estimate the probability of pixels being classified as candidates with neighboring pixels. This process results in Candidate Regions (CRs) detection. For each image of the respective Gabor orientation, including CRs, the proposed system finds a candidate region that has the highest area and considers it as a reference. We then estimate the degree of similarity between the reference CR with corresponding CRs in the respective Gabor-oriented images using a Chi square distance measure. Furthermore, the proposed system chooses the CR which gives the highest similarity to the reference CR to fuse with that reference, which results in the establishment of safe landing zones for the UAV. Experimental results on images from different situations for safe landing detection show that the proposed system outperforms the existing systems. Furthermore, experimental results on relative success rates for different emergency conditions of UAVs show that the proposed intelligent system is effective and useful compared to the existing UAV safe landing systems

    Effect of size and location of solid on conjugate heat transfer in porous cavity

    Get PDF
    The highlight of this article is the influence of a solid over heat transfer characteristics in a square porous cavity. The solid placed inside the porous medium is fraction of the whole domain whose size is varied at 5 different locations of the cavity such as left ( = 0 ), center ( = 0.5), right ( = 1), mid of left and center ( = 0.25), mid of center and right ( = 0.75) wall of cavity. The equations that govern the physical phenomenon have been simplified using popular numerical technique such as finite element method. These simultaneous equations are solved for the solution variables such as temperature and the stream function. The physical domain is divided into smaller segments with the help of triangular elements. The left and right vertical surfaces of cavity are maintained at hot and cold temperature Th and Tc such that Th>Tc

    A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges

    Get PDF
    The domain of underwater wireless sensor networks (UWSNs) had received a lot of attention recently due to its significant advanced capabilities in the ocean surveillance, marine monitoring and application deployment for detecting underwater targets. However, the literature have not compiled the state-of-the-art along its direction to discover the recent advancements which were fuelled by the underwater sensor technologies. Hence, this paper offers the newest analysis on the available evidences by reviewing studies in the past five years on various aspects that support network activities and applications in UWSN environments. This work was motivated by the need for robust and flexible solutions that can satisfy the requirements for the rapid development of the underwater wireless sensor networks. This paper identifies the key requirements for achieving essential services as well as common platforms for UWSN. It also contributes a taxonomy of the critical elements in UWSNs by devising a classification on architectural elements, communications, routing protocol and standards, security, and applications of UWSNs. Finally, the major challenges that remain open are presented as a guide for future research directions

    A new image size reduction model for an efficient visual sensor network

    Get PDF
    Image size reduction for energy-efficient transmission without losing quality is critical in Visual Sensor Networks (VSNs). The proposed method finds overlapping regions using camera locations, which eliminate unfocussed regions from the input images. The sharpness for the overlapped regions is estimated to find the Dominant Overlapping Region (DOR). The proposed model partitions further the DOR into sub-DORs according to capacity of the cameras. To reduce noise effects from the sub-DOR, we propose to perform a Median operation, which results in a Compressed Significant Region (CSR). For non-DOR, we obtain Sobel edges, which reduces the size of the images down to ambinary form. The CSR and Sobel edges of the non-DORs are sent by a VSN. Experimental results and a comparative study with the state-of-the-art methods shows that the proposed model outperforms the existing methods in terms of quality, energy consumption and network lifetime

    Local Descriptor for Retinal Fundus Image Registration

    Get PDF
    A feature-based retinal image registration (RIR) technique aligns multiple fundus images and composed of pre-processing, feature point extraction, feature descriptor, matching and geometrical transformation. Challenges in RIR include difference in scaling, intensity and rotation between images. The scale and intensity differences can be minimised with consistent imaging setup and image enhancement during the pre-processing, respectively. The rotation can be addressed with feature descriptor method that robust to varying rotation. Therefore, a feature descriptor method is proposed based on statistical properties (FiSP) to describe the circular region surrounding the feature point. From the experiments on public Fundus Image Registration dataset, FiSP established 99.227% average correct matches for rotations between 0° and 180°. Then, FiSP is paired with Harris corner, scale-invariant feature transform (SIFT), speeded-up robust feature (SURF), Ghassabi's and D-Saddle feature point extraction methods to assess its registration performance and compare with the existing feature-based RIR techniques, namely generalised dual-bootstrap iterative closet point (GDB-ICP), Harris-partial intensity invariant feature descriptor (PIIFD), Ghassabi's-SIFT, H-M 16, H-M 17 and D-Saddle-histogram of oriented gradients (HOG). The combination of SIFT-FiSP registered 64.179% of the image pairs and significantly outperformed other techniques with mean difference between 25.373 and 60.448% (p = <;0.001*)

    SVR-based model to forecast PV power generation under different weather conditions

    Full text link
    Inaccurate forecasting of photovoltaic (PV) power generation is a great concern in the planning and operation of stable and reliable electric grid systems as well as in promoting large-scale PV deployment. The paper proposes a generalized PV power forecasting model based on support vector regression, historical PV power output, and corresponding meteorological data. Weather conditions are broadly classified into two categories, namely, normal condition (clear sky) and abnormal condition (rainy or cloudy day). A generalized day-ahead forecasting model is developed to forecast PV power generation at any weather condition in a particular region. The proposed model is applied and experimentally validated by three different types of PV stations in the same location at different weather conditions. Furthermore, a conventional artificial neural network (ANN)-based forecasting model is utilized, using the same experimental data-sets of the proposed model. The analytical results showed that the proposed model achieved better forecasting accuracy with less computational complexity when compared with other models, including the conventional ANN model. The proposed model is also effective and practical in forecasting existing grid-connected PV power generation

    Medical identifier technology for pilgrims during the Hajj season

    Get PDF
    Hajj is known as one of the Muslim’s ritual duties as described in the Five Pillar of Islam. Since many people gather in one place, it tends to create many problems, especially in crowded environment, such as flood, fire and stampedes. It is not included with died pilgrims that always happen every year, because of age factor and unfortunate incident, as well as lost pilgrims that always been reported each hour during Hajj. Without papers that showing their exact location as well as contact number, yet with the problems of communication (language barriers), always puts a tremendous pressure on the security officers who taking care of pilgrims. This paper seeks to provide a comprehensive review about the potential technology and design which suitable to be implemented as a medical identifier. This medical device will be built into a new design of bracelet, due to be worn by pilgrims. This proposed bracelet is specifically designated for them, due to replace the existing bracelet worn by pilgrims as identification tag. It is equipped with additional function of technology, which capable to monitor the pilgrim’s health condition, as well as pilgrims’ data information
    corecore