22 research outputs found

    Watchword-Oriented and Time-Stamped Algorithms for Tamper-Proof Cloud Provenance Cognition

    Full text link
    Provenance is derivative journal information about the origin and activities of system data and processes. For a highly dynamic system like the cloud, provenance can be accurately detected and securely used in cloud digital forensic investigation activities. This paper proposes watchword oriented provenance cognition algorithm for the cloud environment. Additionally time-stamp based buffer verifying algorithm is proposed for securing the access to the detected cloud provenance. Performance analysis of the novel algorithms proposed here yields a desirable detection rate of 89.33% and miss rate of 8.66%. The securing algorithm successfully rejects 64% of malicious requests, yielding a cumulative frequency of 21.43 for MR

    Li-Fi technology-based long-range FSO data transmit system evaluation

    Get PDF
    Visible light is used by a technology known as Light Fidelity to establish wireless internet connections very quickly. This article offers line-of-sight communication between the transmitter and receiver using LED technology. Li-Fi technology is a method that transmits data using LED light, which is faster and more efficient than Wi-Fi. Since it is practically ubiquitous, light can be used for communication as well. A cutting-edge technology called optical communication includes a subset called Li-Fi. By sending out visible light, the Li-Fi device enables wireless intranet communication. An in-depth study and analysis of Li-Fi, a novel technology that transmits data at high speeds over a wide spectrum by using light as a medium of transmission

    Hard Real-Time Constraints in Implementing the Myopic Scheduling Algorithm

    Get PDF
    This paper presents an investigation into the constraints in implementing the Myopic scheduling algorithm. The Myopic algorithm is a hard real-time (RT) task scheduling algorithm for multiprocessor systems. It selects a suitable task based on a heuristic function, H from a subset (feasibility check window, K ) of all ready tasks. On the other hand, the original heuristic scheduling algorithm chooses the task with the least H value from all N ready tasks. Performance of the Myopic algorithm significantly depends on the chosen heuristic function and the size of the feasibility check window since it considers only K tasks from N tasks (where K ≤N ). This research investigates the impact of scheduling non-periodic hard RT tasks using the Myopic algorithm and evaluates the performance for different parameters to demonstrate the merits and constraints of the algorithm. The effects of the feasibility check window size, K , choice of heuristic function, H , the worst case processing time of tasks, p T on the performance of the Myopic algorithm under various loads are investigated. Finally, the performance of the algorithm is evaluated as task completion ratio, presented and discussed through a set of experiments

    Intelligence Differences Between Genders based on Multiple Intelligence (MI) Theory

    No full text
    Human intelligence differs from person to person. Factors that are associated with intelligence were always an essential theme to discuss and so do the intelligence difference based on gender discrimination. Studying and discussion of the topic were important as it can show a clear view of which gender is worthy for which type of work. So that males and females do not face any physical or mental trouble while finishing their random or given tasks, either at the workplace or at home. In 1983, American psychologist Howard Gardner wrote a treatise titled "Frames of mind: The Theory of Multiple Intelligence" and there he proposed the core eight abilities of an individual from where the term multiple intelligence was born. The eight core abilities are divided into subcategories based on task differences including visual efficiency, organ coordinations, analytical thinking etc. Since then, researchers began to study depending on the theory to find out the intelligence supremacy between male and female. In this study some recent research on multiple intelligence and their results are analyzed briefly to determine whether males or females have better intelligence than the opposite gender. Methodology of the study is divided into two steps. Each step gives an overview of an already done research on multiple intelligence theory where a number of individuals were participated upon whom several tests were given and finally both step research results are merged to reach the study conclusion
    corecore