39 research outputs found

    Federated learning optimization: A computational blockchain process with offloading analysis to enhance security

    Get PDF
    The Internet of Things (IoT) technology in various applications used in data processing systems requires high security because more data must be saved in cloud monitoring systems. Even though numerous procedures are in place to increase the security and dependability of data in IoT applications, the majority of outside users can decode any transferred data at any time. Therefore, it is essential to include data blocks that, under any circumstance, other external users cannot understand. The major significance of proposed method is to incorporate an offloading technique for data processing that is carried out by using block chain technique where complete security is assured for each data. Since a problem methodology is designed with respect to clusters a load balancing technique is incorporated with data weights where parametric evaluations are made in real time to determine the consistency of each data that is monitored with IoT. The examined outcomes with five scenarios process that projected model on offloading analysis with block chain proves to be more secured thereby increasing the accuracy of data processing for each IoT applications to 89%

    Paths to Innovation in Supply Chains: The Landscape of Future Research

    Get PDF
    This chapter presents a Strategic Research and Innovation Agenda for supply chain and it is the result of an intensive work jointly performed involving a wide network of stakeholders from discrete manufacturing, process industry and logistics sector to put forward a vision to strengthen European Supply Chains for the next decade. The work is based on matching visions from literature and from experts with several iterations between desk research and workshops, focus groups and interviews. The result is a detailed analysis of the supply chain strategies identified as most relevant for the next years and definition of the related research and innovation topics as future developments and steps for the full implementation of the strategies, thus proposing innovative and cutting-edge actions to be implemented based on technological development and organisational change

    Advances in Vehicular Ad-hoc Networks (VANETs): challenges and road-map for future development

    Get PDF
    Recent advances in wireless communication technologies and auto-mobile industry have triggered a significant research interest in the field of vehicular ad-hoc networks (VANETs) over the past few years. A vehicular network consists of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications supported by wireless access technologies such as IEEE 802.11p. This innovation in wireless communication has been envisaged to improve road safety and motor traffic efficiency in near future through the development of intelligent transportation system (ITS). Hence, governments, auto-mobile industries and academia are heavily partnering through several ongoing research projects to establish standards for VANETs. The typical set of VANET application areas, such as vehicle collision warning and traffic information dissemination have made VANET an interesting field of mobile wireless communication. This paper provides an overview on current research state, challenges, potentials of VANETs as well as the ways forward to achieving the long awaited ITS

    Modeling Delegation in Requirements−Driven Trust Framework

    No full text

    A Survey of Trust in Workflows and Relevant Contexts

    No full text

    The reviews and analysis of the state-of-the-art service workflow specification languages

    No full text
    In the globalized market and business environment, enterprises strive to cope with rapid market changes and competition. To sustain competitiveness, enterprises need to continually adapt their business processes to accommodate changes promptly. This view includes the integration of external services with their internal services for required capabilities to catch new business opportunities. A number of services with similar service functionalities are available, posing a great challenge in composing optimized business processes in a timely manner. This requires effective methodologies and tools in selecting services and composing them as service workflows for specified goals. Service workflow technology facilitates these by providing methodologies to support business process modeling and reengineering to optimize and automate processes according to workflow requirement specifications. This paper provides reviews and analysis of the state-of-the-art service workflow specification languages, including (1) Self-Adaptive Configuration based on HMS (2) BAM, (3) CTR, (4) SOLOIST, and (5) SWSpec. These languages are evaluated against the fundamental principles for general service workflow specification languages

    The reviews and analysis of the state-of-the-art service workflow specification languages

    No full text
    In the globalized market and business environment, enterprises strive to cope with rapid market changes and competition. To sustain competitiveness, enterprises need to continually adapt their business processes to accommodate changes promptly. This view includes the integration of external services with their internal services for required capabilities to catch new business opportunities. A number of services with similar service functionalities are available, posing a great challenge in composing optimized business processes in a timely manner. This requires effective methodologies and tools in selecting services and composing them as service workflows for specified goals. Service workflow technology facilitates these by providing methodologies to support business process modeling and reengineering to optimize and automate processes according to workflow requirement specifications. This paper provides reviews and analysis of the state-of-the-art service workflow specification languages, including (1) Self-Adaptive Configuration based on HMS (2) BAM, (3) CTR, (4) SOLOIST, and (5) SWSpec. These languages are evaluated against the fundamental principles for general service workflow specification languages
    corecore