115 research outputs found
A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission
To slow down the spread of COVID-19, governments around the world are trying
to identify infected people and to contain the virus by enforcing isolation and
quarantine. However, it is difficult to trace people who came into contact with
an infected person, which causes widespread community transmission and mass
infection. To address this problem, we develop an e-government Privacy
Preserving Mobile and Fog computing framework entitled PPMF that can trace
infected and suspected cases nationwide. We use personal mobile devices with
contact tracing app and two types of stationary fog nodes, named Automatic Risk
Checkers (ARC) and Suspected User Data Uploader Node (SUDUN), to trace
community transmission alongside maintaining user data privacy. Each user's
mobile device receives a Unique Encrypted Reference Code (UERC) when
registering on the central application. The mobile device and the central
application both generate Rotational Unique Encrypted Reference Code (RUERC),
which broadcasted using the Bluetooth Low Energy (BLE) technology. The ARCs are
placed at the entry points of buildings, which can immediately detect if there
are positive or suspected cases nearby. If any confirmed case is found, the
ARCs broadcast pre-cautionary messages to nearby people without revealing the
identity of the infected person. The SUDUNs are placed at the health centers
that report test results to the central cloud application. The reported data is
later used to map between infected and suspected cases. Therefore, using our
proposed PPMF framework, governments can let organizations continue their
economic activities without complete lockdown.Comment: 12 pages, 9 figures, 1 table, 1 algorith
A study on anatomy of smartphone,”
Abstract: The latest smartphones are attributed with the quality graphics, portable size and user applications support and multimode connectivity features. Smartphone incorporatesthe capabilities of both computing and communication devices. The latest distributed computing models are focused on employing smartphone as a significant stakeholder for enabling complicated and ubiquitous applications in the changing mobile computing world. Therefore, it is necessary to understand the components of smartphone and its working behavior for operation in the cellular and data networks. In this paper we study the anatomy of the smartphone by discussing its major components such as application processor and baseband processor. We describe different subcategories of smartphone components and highlight the behavior and significance of each component for dual mode functionalities of smartphone. The paper provides tutorial for understanding the architecture of the smartphone and exploring the functionalities of the dual processors of smartphone which are used for accessing different types of wireless networks. It helps in developing optimal procedures for deploying the components of the smartphone while accessing cellular and data network
Network-coding-based Cooperative V2V Communication in Vehicular Cloud Networks
Chinacom 2018 - 13th EAI International Conference on Communications and Networking in China, 23-25 October 2018, Chengdu, ChinaThis is the author accepted manuscript. the final version is available from Springer Verlag via the DOI in this recordWe investigate the potential of applying cooperative relaying and network coding techniques to support vehicle-to-vehicle (V2V) communication in vehicular cloud networks (VCN). A reuse-mode MIMO content distribution system with multiple sources, multiple relays, and multiple destinations under Nakagami-m fading is considered. We apply a class of finite field network codes in the relays to achieve high spatial diversity in an efficient manner and derive the system communication error probability that the destinations fail to recover the desired source messages. The results show that our method can improve the performance over conventional data transmission solutions
Social Internet of Things and New Generation Computing -- A Survey
Social Internet of Things (SIoT) tries to overcome the challenges of Internet
of Things (IoT) such as scalability, trust and discovery of resources, by
inspiration from social computing. This survey aims to investigate the research
done on SIoT from two perspectives including application domain and the
integration to the new computing models. For this, a two-dimensional framework
is proposed and the projects are investigated, accordingly. The first dimension
considers and classifies available research from the application domain
perspective and the second dimension performs the same from the integration to
new computing models standpoint. The aim is to technically describe SIoT, to
classify related research, to foster the dissemination of state-of-the-art, and
to discuss open research directions in this field.Comment: IoT, Social computing, Surve
A Review on VANET Security: Future Challenges and Open Issues
VANET is a well-established vehicular communication technology well-aligned with emerging vehicular technologies such as the Internet of Vehicles (IoV), Unmanned Aerial Vehicle (UAV), etc. Although VANET offers improved methods for addressing contemporary technology, it confronts significant challenges in supplying adequate security measures for intended access. VANET operates on multiple execution platforms as a service delivery mechanism, namely roadside units, vehicle-to-vehicle, vehicle-to-device, and vehicle-to-everything (V2X). Using these communication platforms, VANET must establish its security measures for future purposes and bolster protocol authentications. Without adequate security conformance, VANET data delivery and network-wide execution become insecure. Consequently, VANET requires correct security configurations and device engagements for improved protocol working environments and changes. In this work, we describe some recent security problems for the VANET mechanism so that developers and engineers will be aware of the specific security needs and can avoid errors or intruders when deploying VANETS across cities and urban roadsides. This study describes the primary security components and categorical difficulties for VANET through the following themes: classification of security attacks, standard or timely requested security protocol problems and solutions, and the best feasible security criteria for extended VANETs. We finish this paper by discussing many open topics and future VANET security developments or concerns
Performance enhancement framework for cloudlet in mobile cloud computing / Md Whaiduzzaman
A tremendous increase in the use of mobile devices, such as smart phones and tablets,
has been observed in recent years. Mobile device resources, such as CPU, memory and
storage resources, have also experienced dramatic increases in capacity. Simultaneously,
a rich variety of mobile applications that require extensive computational resources for
mobile application execution have been developed. These new applications are complemented
with cloud resources through the emerging Mobile Cloud Computing (MCC)
paradigm. MCC augments mobile device capabilities by leveraging the resources of distant
clouds, nearby cloudlets or mobile ad-hoc clouds in the vicinity. However, practical
utilization of MCC is hindered by limitations associated with network connectivity. In the
case of distant clouds, jitter, bandwidth, and propagation delay pose a challenge to realtime
application response. On the other hand, cloudlets and mobile ad-hoc clouds are not
sufficiently resource-rich to be able to support rich mobile applications. In this research,
we consider a mobile user in the vicinity of a cloudlet that is situated at a distance of one
hop through aWi-Fi communication medium. We show that a substantial number of users
accessing the cloudlet for computation-intensive tasks results in delayed task completion
and ultimately diminishes the benefits of using cloudlets. The problem is referred to as
the cloudlet resource scarcity problem. To alleviate this problem, various researchers have
offered solutions whereby mobile device resources are used for partial task completion.
However, the proposed approaches do not consider the mobile device offered-serviceto-
load ratio. In this research, we propose the Mobile-device-based Cloudlet Resource
Enhancement (MobiCoRE) framework for mobile application augmentation to employ
nearby mobile devices while ensuring the following: (i) mobile devices always obtain
time benefits for their tasks when submitted to the cloudlet, and (ii) the cloudlet-induced
mobile device load is a fraction of its own service requirements. We map MobiCoRE on
iii
the M/M/c/K queue and model the system using a birth-death Markov chain. We show
that for cloudlets, the framework always obtains the maximum advantage for mobile devices
in terms of job completion time when the cloudlet service time is set to ¯ c
l , where ¯ c
is the cloudlet utilization and l is the application arrival rate. Furthermore, the optimal
service time is independent of the application’s service requirement. We implemented the
MobiCoRE framework using the Openstack cloud. The evaluation shows that MobiCoRE
accommodates up to 50% more users when operating at the optimal service time and provides
50% time benefits for mobile users. The empirical analysis and statistical validation
demonstrate that our proposed framework, i.e., MobiCoRE, significantly and positively
impacts the cloudlet performance by exploiting and orchestrating nearby mobile device
resources
A Methodological Framework on Development the Garment Payroll System (GPS) as SaaS
Management of Payroll is a challenging task for a production based Ready Made Garmentindustry to pay the employee's salary just in time with accuracy. In an existing Garment industry, calculate thousands of worker's monthly pay depending on each and every piece of production and with different grades of workers is really a tough job. Hence, it is essential to make the system automated. In cloud based garment payroll system, it keeps track of all workers' individual daily production, including style and size and after the end of each month generates worker's net salary by calculating the production amount, production bonus, attendance bonus, festival bonus, no work amount, night allowance by deducting advance if any then generate wages by a single click. This user-friendly proposed cloud Garment Payroll System (GPS) helps to generate thousands or more of a worker's salary just with a few clicks and 100% accuracy. Unlike traditional payroll system, which is installed on site, cloud-based payroll is hosted and managed by the vendor and pay as you go. The system then can be accessed from any locations from any web-enabled devices like desktop, laptop, Smartphone, tab, etc. using internet connectivity. This proposed system also increases productivity, increase efficiency, security and moreover reduce human errors.</p
- …