The widespread use of digital images has led to a new challenge in digital image forensics. These images can be used in court as evidence of criminal cases. However, digital images are easily manipulated which brings up the need of a... more
The widespread use of digital images has led to a new challenge in digital image forensics. These images can be used in court as evidence of criminal cases. However, digital images are easily manipulated which brings up the need of a method to verify the authenticity of the image. One of the methods is by identifying the source camera. In spite of that, it takes a large amount of time to be completed by using traditional desktop computers. To tackle the problem, we aim to increase the performance of the process by implementing it in a distributed computing environment. We evaluate the camera identification process using conditional probability features and Apache Hadoop. The evaluation process used 6000 images from six different mobile phones of the different models and classified them using Apache Mahout, a scalable machine learning tool which runs on Hadoop. We ran the source camera identification process in a cluster of up to 19 computing nodes. The experimental results demonstrate exponential decrease in processing times and slight decrease in accuracies as the processes are distributed across the cluster. Our prediction accuracies are recorded between 85 to 95% across varying number of mappers.
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating healthcare applications and... more
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating healthcare applications and services is one of the vast data approaches that can be adapted to mobile cloud computing. This work proposes a framework of a global healthcare computing based combining both mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security.
Mobile Edge Computing is an emerging technology that provides cloud and IT services within the close proximity of mobile subscribers. Traditional telecom network operators perform traffic control flow (forwarding and filtering of... more
Mobile Edge Computing is an emerging technology that provides cloud and IT services within the close proximity of mobile subscribers. Traditional telecom network operators perform traffic control flow (forwarding and filtering of packets), but in Mobile Edge Computing, cloud servers are also deployed in each base station. Therefore, network operator has a great responsibility in serving mobile subscribers. Mobile Edge Computing platform reduces network latency by enabling computation and storage capacity at the edge network. It also enables application developers and content providers to serve context-aware services (such as collaborative computing) by using real time radio access network information. Mobile and Internet of Things devices perform computation offloading for compute intensive applications, such as image processing, mobile gaming, to leverage the Mobile Edge Computing services. In this paper, some of the promising real time Mobile Edge Computing application scenarios are discussed. Later on, a state-of-the-art research efforts on Mobile Edge Computing domain is presented. The paper also presents taxonomy of Mobile Edge Computing, describing key attributes. Finally, open research challenges in successful deployment of Mobile Edge Computing are identified and discussed.
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
Cloud computing is emerging as one of the most important branch for providing seamless applications on mobile devices. Mobile Cloud Computing integrates the cloud computing into the mobile environment and overcomes obstacles related to... more
Cloud computing is emerging as one of the most important branch for providing seamless applications on mobile devices. Mobile Cloud Computing integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance, environment and security. Mobile Cloud Computing refers to an infrastructure where data processing and storage can happen outside the mobile device. This paper presents a brief Survey about Mobile Cloud Computing Architecture, Applications, Challenges and Solutions and Advantages.
Transcript is an inventory system holding student academic record. This system has been implemented conventional, electronically or implemented using web services approaches which have been devoid of mobile computing approach and system... more
Transcript is an inventory system holding student academic record. This system has been implemented conventional, electronically or implemented using web services approaches which have been devoid of mobile computing approach and system classification rules. The proposed architecture provides an assiduous pathway for the implementation of the aforementioned issues. This architecture has the propensity for cutting down operational cost and hardcopy documentation while handling organizational procedures and processes.
Hierarchical Genetic Algorithms (HGA) as a tool for search and optimizing methodology have now reached a mature stage. The minimum resource facility to carry user traffic, termed a channel unit (CU), is composed of a one time-slot and one... more
Hierarchical Genetic Algorithms (HGA) as a tool for search and optimizing methodology have now reached a mature stage. The minimum resource facility to carry user traffic, termed a channel unit (CU), is composed of a one time-slot and one code in the TD-CDMA/TDD system. The control of the number of CUs depends on the traffic load solves varied and asymmetrical traffic problems in the 3G system. In a cellular network, the call arrival rate, call duration and the communication overhead between the base stations and the control center are vague and uncertain, regardless of whether the criteria of concern are nonlinear, constrained, discrete or NP hard. In this paper, the HGA is used to tackle the neural network (NN) topology as well as the fuzzy logic controller for the dynamic CU allocation scheme in wireless cellular networks. Therefore, we propose a new efficient HGA CUs Allocation (HGACA) in cellular networks. It aims to efficiently satisfy the diverse quality-of-service (QoS) requirements of multimedia traffic. The results show our algorithm has a lower blocking rate, lower dropping rate, less update overhead, and shorter channel-acquisition delay than previous methods.
April 24 ~ 25, 2021, Copenhagen, Denmark https://csit2021.org/ipdca/index.html Scope & Topics 10 th International conference on Parallel, Distributed Computing and Applications (IPDCA 2021) will provide an excellent international forum... more
April 24 ~ 25, 2021, Copenhagen, Denmark https://csit2021.org/ipdca/index.html Scope & Topics 10 th International conference on Parallel, Distributed Computing and Applications (IPDCA 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Parallel, Distributed Computing. Original papers are invited on Algorithms and Applications, computer Networks, Cyber trust and security, Wireless networks and mobile Computing and Bioinformatics. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Traditional TCP cannot detect link contention losses and route failure losses which occur in MANET and considers every packet loss as congestion. This results in severe degradation of TCP performance. In this research work, we modified... more
Traditional TCP cannot detect link contention losses and route failure losses which occur in MANET and considers every packet loss as congestion. This results in severe degradation of TCP performance. In this research work, we modified the operations of TCP to adapt to network states. The cross-layer notifications are used for adapting the congestion window and achieving better performance. We propose Cross-layer information based Transmission Control Protocol (CTCP) which consists of four network states. Decelerate state to recover from contention losses, Cautionary state to deal with route failures, Congested state to handle network congestion and Normal state to be compatible with traditional TCP. Decelerate state makes TCP slow down if the packet loss is believed to be due to contention rather than congestion. Cautionary state suspends the TCP variables and after route reestablishment resumes with conservative values. Congestion state calls congestion control when network is actually congested and normal state works as standard TCP. Simulation results show that network state based CTCP is more appropriate for MANET than packet loss based traditional TCP.
We considered building high performance tools on the Raspberry Pi 4. We implemented OpenMP and OpenCoarrays Fortran in conjunction with the statistical language R. We found that the OpenCoarrays is more effective when working with... more
We considered building high performance tools on the Raspberry Pi 4. We implemented OpenMP and OpenCoarrays Fortran in conjunction with the statistical language R. We found that the OpenCoarrays is more effective when working with vectors, while OpenMP is better in the arena with large matrices in a geostatistics application. These results can be very useful for researchers with limited access to high performance tools or limited funding.
International Journal of Mobile ad hoc and sensor networks(IJMSN) is a open access journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and... more
International Journal of Mobile ad hoc and sensor networks(IJMSN) is a open access journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Apriori is one of the key algorithms to generate frequent itemsets. Analysing frequent itemset is a crucial step in analysing structured data and in finding association relationship between items. This stands as an elementary foundation... more
Apriori is one of the key algorithms to generate frequent itemsets. Analysing frequent itemset is a crucial step in analysing structured data and in finding association relationship between items. This stands as an elementary foundation to supervised learning, which encompasses classifier and feature extraction methods. Applying this algorithm is crucial to understand the behaviour of structured data. Most of the structured data in scientific domain are voluminous. Processing such kind of data requires state of the art computing machines. Setting up such an infrastructure is expensive. Hence a distributed environment such as a clustered setup is employed for tackling such scenarios. Apache Hadoop distribution is one of the cluster frameworks in distributed environment that helps by distributing voluminous data across a number of nodes in the framework. This paper focuses on map/reduce design and implementation of Apriori algorithm for structured data analysis.
Pervasive computing is at an exciting stage of its evolution, with an increasing number of devices of various shapes and sizes appearing in our everyday surroundings. In such an environment, the need to utilise application sessions... more
Pervasive computing is at an exciting stage of its evolution, with an increasing number of devices of various shapes and sizes appearing in our everyday surroundings. In such an environment, the need to utilise application sessions within and across device rich spaces becomes apparent. This paper introduces the concept of mobile sessions for smart space environments, by outlining a candidate framework, OTIS (object transfer in smart -spaces), that specifically addresses session transfer in smart space environments, such as intelligent buildings. Having done this we compare OTIS to the AURA and GAIA infrastructures, which most closely relate to our work. Finally we summarise the main findings of our research and outline our plans for taking this work forward.
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of... more
International Journal of Ad hoc, sensor & Ubiquitous Computing (IJASUC) is a bi monthly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of Ad Hoc & Ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ad hoc, Sensor & Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life.
India is an agriculture based developing country. Information dissemination to the knowledge intensive agriculture sector is upgraded by mobile-enabled information services and rapid growth of mobile telephony. It bridge the gap between... more
India is an agriculture based developing country. Information dissemination to the knowledge intensive agriculture sector is upgraded by mobile-enabled information services and rapid growth of mobile telephony. It bridge the gap between the availability of agricultural input and delivery of agricultural outputs and agriculture infrastructure. Mobile computing, cloud computing, machine learning and soft computing are the immerging techniques which are being used in almost all fields of research. Apart from this, they are also useful in our day-today activities such as education, medical and agriculture. This paper explores how Android Apps of agricultural services have impacted the farmers in their farming activities.
From the multi-agent system perspective Intelligent Buildings (IB) are a new research area and this domain poses several interesting challenges. Our IB model comprises a building containing room based embedded-agents which control... more
From the multi-agent system perspective Intelligent Buildings (IB) are a new research area and this domain poses several interesting challenges. Our IB model comprises a building containing room based embedded-agents which control environmental variables and devices within rooms that communicate with each other via a network. Inter-agent communication is central to such multi-agent systems. In this paper we explain why existing agent communication languages (ACLs) are unsuitable for IB embedded-agents and present a specification for a hierarchical Distributed Intelligent Building Agent Language (DIBAL) that overcomes the problems in applying ACLs to IB based embedded-agents. The paper begins by reviewing existing Agent Communication Languages (ACL) and discussing their unsuitability for IB applications before presenting our IB embedded-agent communication language, DIBAL. We then illustrate the ways in which DIBAL would facilitate the functionality we require by looking at a few IB scenarios in some detail.
10th International conference on Parallel, Distributed Computing and Applications (IPDCA 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Parallel,... more
10th International conference on Parallel, Distributed Computing and Applications (IPDCA 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Parallel, Distributed Computing. Original papers are invited on Algorithms and Applications, computer Networks, Cyber trust and security, Wireless networks and mobile Computing and Bioinformatics. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote portable devices have access to a shared infrastructure, independent of their physical location. Mobile computing... more
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote portable devices have access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital due to the increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet irrespective of the physical location of the node. Mobile computing systems are computing systems that may be readily moved physically and whose computing ability may be used while they are being moved. Mobile computing has rapidly become a vital new example in today's real world of networked computing systems. It includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth-enabled PDA's to wireless sensor networks; mobile computing has become ubiquitous in its influence on our quotidian lives. In this paper various types of mobile devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned devices are talking. Another aim of this paper is to point out some of the characteristics, applications, limitations, and issues of mobile computing.
International Journal of Mobile ad hoc and sensor networks(IJMSN) is a open access journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and... more
International Journal of Mobile ad hoc and sensor networks(IJMSN) is a open access journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad... more
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad hoc networks • Resource management in mobile, wireless and ad-hoc networks • Data management on mobile and wireless computing • Integration of wired and wireless networks • Broadband access networks • Energy saving protocols for ad hoc and sensor networks • Complexity analysis of algorithms for mobile environments • Information access in wireless networks • Algorithms and modeling for tracking and locating mobile users • Satellite communications • Cryptography, security and privacy of mobile & wireless networks
Actually in distributed computing, data frequently resides on multiple sites inside an organization. This data might be managed by several Database Management Systems for multiple reasons such as performance, scalability, access and... more
Actually in distributed computing, data frequently resides on multiple sites inside an organization. This data might be managed by several Database Management Systems for multiple reasons such as performance, scalability, access and management. This paper describes specification and the core behavior concepts (time, action, state, behavior, interaction and the binding object). Secondly describes and specifies the behavior by the activity diagram, and proposes how the concepts defined in Part 2 and Part 3 of RM-ODP can be combined to develop EA models, especially on the aspects of business functions and information and computational processing, we present the syntax and the structure of a BPEL Behavior Processes of Working Object, we focus on behavioral interaction. The behavior of an ODP system is determined by collecting all possible actions in which the system (acting as a data object), or any of its constituent data objects, might take part, together with a set of constraints on when these actions can occur. In order to specify the executable behavior of a system and to make the processes of the management executable and controllable, the Reference Model for ODP RM-ODP can be used as a meta-model for behavioral specifications.
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating healthcare applications and... more
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating healthcare applications and services is one of the vast data approaches that can be adapted to mobile cloud computing. This work proposes a framework of a global healthcare computing based combining both mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a software framework used with Apache... more
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a software framework used with Apache Hadoop, which has become the de facto standard platform for processing and storing large amounts of data in a distributed computing environment. The research presented here focuses on the variations observed among the results of an efficient iterative transitive closure algorithm when run against different distributed environments. The results from these comparisons were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The experiment results highlighted the inconsistencies that can occur when using the same codebase with different implementations of Map Reduce.
The International Journal of Multimedia & Its Applications (IJMA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Multimedia & its applications. The journal... more
The International Journal of Multimedia & Its Applications (IJMA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Multimedia & its applications. The journal focuses on all technical and practical aspects of Multimedia and its applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding recent developments this arena, and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Multimedia & its applications
The rise of the use of mobile technologies in the world, such as smartphones and tablets, connected to mobile networks is changing old habits and creating new ways for the society to access information and interact with computer systems.... more
The rise of the use of mobile technologies in the world, such as smartphones and tablets, connected to mobile networks is changing old habits and creating new ways for the society to access information and interact with computer systems. Thus, traditional information systems are undergoing a process of adaptation to this new computing context. However, it is important to note that the characteristics of this new context are different. There are new features and, thereafter, new possibilities, as well as restrictions that did not exist before. Finally, the systems developed for this environment have different requirements and characteristics than the traditional information systems. For this reason, there is the need to reassess the current knowledge about the processes of planning and building for the development of systems in this new environment. One area in particular that demands such adaptation is software estimation. The estimation processes, in general, are based on characteristics of the systems, trying to quantify the complexity of implementing them. Hence, the main objective of this paper is to present a proposal for an estimation model for mobile applications, as well as discuss the applicability of traditional estimation models for the purpose of developing systems in the context of mobile computing. Hence, the main objective of this paper is to present an effort estimation model for mobile applications.
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Our environments are being gradually occupied with an abundant number of digital objects with networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities... more
Our environments are being gradually occupied with an abundant number of digital objects with networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities in the form of services so that they can be discovered and, if desired, exploited by a user or other networked device. With the increasing number of these devices attached to networks the complexity to configure and control them increases which may lead to major processing and communication overheads. Hence, the devices are no longer expected to just act as primitive stand-alone appliances which only provide the facilities and services to the user they are designed for, rather they can offer complex services from unique combinations of devices; which in turn creates the necessity for these devices to be equipped with some sort of intelligence and self-awareness which enables them to be self configuring and self programming. Intelligence in devices is obtained by embedding intelligent agents into them which provides them with proactive control and learning capabilities. Self-awareness within agents enables capabilities to operate in with a minimum of cognitive loading of the user, thereby supporting the vision for cognitive disappearance or ambient intelligence. This paper present a novel intelligent embedded agent technique for reducing the number of associations and interconnections between various agents operating within an AIE in order to minimize the processing latency and overhead caused by message flooding in a Pub/Sub middleware whilst reducing the cognitive load of configuringthese associations to personalize themselves to the user needs. The main goal of the proposed fuzzy based intelligent embedded agents includes learning and adapting the network configuration and the system functionality to meet the user’s needs based on monitoring the user behaviors in a lifelong non intrusive mode to pre-emptively control the environment on his behalf. In addition, the F-IAS agent aimed at reducing the agent associations and interconnections to the most relevant set in order to reduce its processing overheads and thus implicitly improving the system overall efficiency. Moreover, we employ ambassador agents which limit the number of messages reaching the societies by performing an analysis and filtering routine to determine if the propagated events mat ch the desired criteria of the member agents of the societies. Ambassadors are also utilized with novel characteristics to discover and select associations among agent pairs residing in separate societies based on a concurrence analysis of published events. In order to validate the efficiency of the proposed methods we will present two set of unique experiments. The first experiments described the obtained results carried out within the intelligent Dormitory (iDorm) which is a real world test bed for AIE research. Here we specifically demonstrate the utilization of the F-IAS agents and discuss that by optimizing the set of associations, the agents increases efficiency and performance. The second set of experiments is based on emulation of an iDorm-like large scale multi society based AIE environment. The results illustrate how ambassadors discover strongly correlated agent pairs and cause them to form associations so that relevant agents of separate societies can start interacting with each other.
Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. The data transmitted by those applications are sensitive. Then due to the weakness of the radio... more
Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. The data transmitted by those applications are sensitive. Then due to the weakness of the radio links, appropriate protection mechanisms are needed to prevent attackers from exploiting those lacks of security. In this paper we present a solution to authenticate the nodes and protect the sent data. We investigate the use of secure tunnels as a solution to improve the protection of WSNs. We propose a tunneling scheme that conforms to the security requirements of WSNs while having less computational and network overhead. A set of experiments has been conducted to assess the performance of the proposed scheme with regard to traditional tunnels built using the IPSec protocol. We found that our protocol considerably reduces the number of transmitted messages as well as the computational load, which makes it suitable for WSNs.
This paper presents a new model of mobile distance learning system (MDL) in an extended mobile cloud computing environment (MCC) by using High Performance Computing (HPC) Cluster Infrastructure, as well as some existing videoconferencing... more
This paper presents a new model of mobile distance learning system (MDL) in an extended mobile cloud computing environment (MCC) by using High Performance Computing
(HPC) Cluster Infrastructure, as well as some existing videoconferencing technologies enriched with mobile and wireless devices. This MCC model can be applied everywhere where there is need of fast and intensive computing and analysis of huge amount of data, such as modeling of 3D graphics visualization and animation in ecology, global climate solutions, financial risks, healthcare and medical learning, decoding genome projects, etc. After the MCC model presentation, the experimental system architecture will be provided, as well as its possibilities, with particular reference to mobile learning environment and its potential issues. In this architecture the mobile device may optionally use the open source e-learning course management system platform Moodle, to access the learning material and the relevant data that needs to be transferred to the HPC Cluster Infrastructure for further computing. In order to provide higher quality of presenting the learning material, the Cisco WebEx application will be used to test the distance learning in both fixed and mobile environment. Then, a Quality of Experience (QoE)
evaluation of such mobile distance learning system will be provided. Finally, it will be concluded that this MCC model that incorporates HPC Cluster Infrastructure can be applied anywhere where there is need of fast and intensive computing and analysis of huge amount of data which cannot be performed by a conventional PC, Laptop or Mobile Device.
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy... more
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad... more
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad hoc networks • Resource management in mobile, wireless and ad-hoc networks • Data management on mobile and wireless computing • Integration of wired and wireless networks • Broadband access networks • Energy saving protocols for ad hoc and sensor networks • Complexity analysis of algorithms for mobile environments • Information access in wireless networks • Algorithms and modeling for tracking and locating mobile users • Satellite communications • Cryptography, security and privacy of mobile & wireless networks
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad... more
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad hoc networks • Resource management in mobile, wireless and ad-hoc networks • Data management on mobile and wireless computing • Integration of wired and wireless networks • Broadband access networks • Energy saving protocols for ad hoc and sensor networks • Complexity analysis of algorithms for mobile environments • Information access in wireless networks • Algorithms and modeling for tracking and locating mobile users • Satellite communications • Cryptography, security and privacy of mobile & wireless networks
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad... more
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad hoc networks • Resource management in mobile, wireless and ad-hoc networks • Data management on mobile and wireless computing • Integration of wired and wireless networks • Broadband access networks • Energy saving protocols for ad hoc and sensor networks • Complexity analysis of algorithms for mobile environments • Information access in wireless networks • Algorithms and modeling for tracking and locating mobile users • Satellite communications