Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing最新文献

筛选
英文 中文
Design of smart ships for the IoT 物联网智能船舶设计
J. A. Muñoz, R. Pérez
{"title":"Design of smart ships for the IoT","authors":"J. A. Muñoz, R. Pérez","doi":"10.1145/3018896.3018930","DOIUrl":"https://doi.org/10.1145/3018896.3018930","url":null,"abstract":"Ships vessels are like small or not so small, cities or industries. These kind of artifacts can take advantage of the developments on IoT to deliver smart vessels to improve operation, usability and profitability for shipowners, users and workers. To introduce the different possibilities of IoT in vessels it is needed to start from the initial concept and the initial design. This paper presents some ideas on how to make a ship conceptual design from the very beginning by taking into account the necessities of the different components of a ship in order to be connected in the world of the IoT. For making this design it is necessary to use advanced tools capable of incorporating the latest achievements in the IoT and to manage all this complexity.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multiservice network for gas and water meters management 煤气和水表管理的多业务网络
F. Colace, M. Ferro, F. Abate, A. Pietrosanto
{"title":"A multiservice network for gas and water meters management","authors":"F. Colace, M. Ferro, F. Abate, A. Pietrosanto","doi":"10.1145/3018896.3018927","DOIUrl":"https://doi.org/10.1145/3018896.3018927","url":null,"abstract":"The increasing offer of connectivity and of mobile tools (mobile phones, PDA) has determined a new scenario of computation in which the users can access resources and services and interact with each other in any moment and place. This technological revolution has involved all the fields, included the one that involves the meters and their management. If the remote management of the meters of latest generation has at this point entered our everyday life, there is a considerable number of old meters that cannot be neglected, but that have to be remotely controlled for reasons of security and efficacy. In this paper, it is proposed a system to connect these devices creating a management environment in complete compliance with the paradigm of the Internet of Things. The entire environment has been tested in a real context giving satisfying results.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134253171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT powered portable aquaponics system 物联网供电的便携式鱼菜共生系统
N. Jacob
{"title":"IoT powered portable aquaponics system","authors":"N. Jacob","doi":"10.1145/3018896.3018965","DOIUrl":"https://doi.org/10.1145/3018896.3018965","url":null,"abstract":"In this paper, a smart and portable indoor aquaponics system was designed and developed, with various electronic components and sensors, coupled with IoT technology. Features of this system include: remote control of the watering and lighting cycle, live visual updates of the system using a camera, water overflow detection and temperature monitoring of the aquarium. Such a system is aimed towards people in urban areas who neither have the time nor the physical space, to grow their own organic food.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133353719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Customization of virtual machine allocation policy using k-means clustering algorithm to minimize power consumption in data centers 使用k-means聚类算法定制虚拟机分配策略,最小化数据中心的功耗
Ulysse Rugwiro, C. Gu
{"title":"Customization of virtual machine allocation policy using k-means clustering algorithm to minimize power consumption in data centers","authors":"Ulysse Rugwiro, C. Gu","doi":"10.1145/3018896.3018947","DOIUrl":"https://doi.org/10.1145/3018896.3018947","url":null,"abstract":"Cloud Computing provides rapid provision of computing resources like processing power, memory, network resources, storage, etc. Running computing resources for longer time, leads energy consumption, increase the emission of Carbon Dioxide (CO2) and increase the expenditure cost for the resources usage. Hence there is a necessity to minimize the execution time to reduce energy consumption in the cloud environment. One of the existing approaches to reducing energy consumption is based on Migration and Placement Policy for Virtual Machine, but still improving placement technique we can further minimize power consumption. In our proposed architecture for cloud resource allocation based on Clustering method, we do map a group of tasks to virtual machines. For clustering, we work on task usage of CPU, memory, and bandwidth. This proposed clustering technique further decreases energy consumption by efficient resource allocation.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"674 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116104804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi-agent systems for scalable internet of things security 用于可扩展物联网安全的多代理系统
P. Kendrick, A. Hussain, N. Criado, M. Randles
{"title":"Multi-agent systems for scalable internet of things security","authors":"P. Kendrick, A. Hussain, N. Criado, M. Randles","doi":"10.1145/3018896.3065844","DOIUrl":"https://doi.org/10.1145/3018896.3065844","url":null,"abstract":"Providing effective and scalable real-time security to Internet of Things devices can be a challenging task given the limited computational capacity of portable devices and a significant volume of network traffic. Multi-Agent Systems have proven to be a valuable tool in the areas of cyber security, distributed networks and legacy systems because of their scalable and flexible architecture. In this paper, we present a novel implementation of a Multi-Agent System for use within, or to support, Internet of Things networks through the distributed processing of security events to offload the computational cost of processing data from Internet of Things devices. In particular, domain experts can add new agents to existing systems which can automatically work with preexisting agents without manual reconfiguration. The scalability of this deployment model makes it suitable for a broad range of environments including dynamic and large-area networks.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122168711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Spectrum expansion/contraction problem for multipath routing with time-varying traffic on elastic optical networks 弹性光网络中时变流量多径路由的频谱扩展/收缩问题
D. Din, Yifan Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu
{"title":"Spectrum expansion/contraction problem for multipath routing with time-varying traffic on elastic optical networks","authors":"D. Din, Yifan Wu, Bo-Jun Guo, Ching Chen, Pei-Jung Wu","doi":"10.1145/3018896.3018946","DOIUrl":"https://doi.org/10.1145/3018896.3018946","url":null,"abstract":"The spectrum allocated to an end-to-end connection between source and destination nodes varies dynamically with time (denoted as time-varying traffic). For serving time-varying traffic in an Elastic optical network (EON), the spectrum allocated for the connection can be expanded or contracted to meet the traffic requirement. Moreover, multipath routing algorithms can more flexibly utilize spectrum resources than single-path routing algorithms in dynamic scenario, since it splits a traffic request into multiple small-size connections and individually transmitting them through several optical paths. In this paper, the spectrum expansion /contraction problem (SECP) for multipath routing on EONs is studied with time-varying traffic. The expansion and contraction algorithms are proposed to solve this problem and these algorithms are examined through simulations. Simulations show that the proposed algorithms can achieve good results.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A novel approach to secure cloud data storage and dynamic data auditing in a cloud 一种在云中保护云数据存储和动态数据审计的新方法
K. Brindha, N. Jeyanthi
{"title":"A novel approach to secure cloud data storage and dynamic data auditing in a cloud","authors":"K. Brindha, N. Jeyanthi","doi":"10.1145/3018896.3018907","DOIUrl":"https://doi.org/10.1145/3018896.3018907","url":null,"abstract":"Cloud computing is a new emerging computing paradigm in which any individual or organization can remotely store the information and it also reduces the burden of the cost of its storage and maintenance. Even though the cloud provides tangible merits to cloud users, it suffers from various security flaws. Due to these grave concerns, data confidentiality and integrity has become a challenging task not only for the data owners but also to the trusted service providers. To overcome this problem, this article proposes a novel approach for protecting data using visual cryptography technique, dynamic data verification using algebraic signature and data dynamics using Cuckoo Hash Table (CHT).","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125085079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the path to cyber-peace: a robust 'diagnosis-filter' for safeguarding future systems and machines 在通往网络和平的道路上:一个强大的“诊断过滤器”,用于保护未来的系统和机器
N. Tantouris, D. Polemi, Kleanthis Dellios
{"title":"On the path to cyber-peace: a robust 'diagnosis-filter' for safeguarding future systems and machines","authors":"N. Tantouris, D. Polemi, Kleanthis Dellios","doi":"10.1145/3018896.3065834","DOIUrl":"https://doi.org/10.1145/3018896.3065834","url":null,"abstract":"Nowadays, a lot of skepticism and generic apprehension is raising toward the neo-industrial (r)evolution regarding the healthiness and cyber-security of all types of cyber-physical systems and machines (including from critical infrastructures, satellites, (bio)mechatronics and IoT devices, robots and drones, exoskeleton wearables, implantables and more) that are all equipped with sensors and actuators. On the path to cyber-peace, robust 'diagnosis-filters' is only a proposed way to safeguard not only the cyber-physical state of systems and machines but also sustain/maintain their reliability and autonomy, setting them trustworthy.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure cloud framework for ICMetric based IoT health devices 基于ICMetric的物联网健康设备的安全云框架
Ruhma Tahir, Hasan Tahir, Ali Sajjad, K. Mcdonald-Maier
{"title":"A secure cloud framework for ICMetric based IoT health devices","authors":"Ruhma Tahir, Hasan Tahir, Ali Sajjad, K. Mcdonald-Maier","doi":"10.1145/3018896.3056788","DOIUrl":"https://doi.org/10.1145/3018896.3056788","url":null,"abstract":"Wearable devices are an important part of internet of things (IoT)with many applications in healthcare. Prevalent security concerns create a compelling case for a renewed approach by incorporating the ICMetric technology in IoT healthcare. The ICMetric technology is a novel security approach and uses the features of a device to form the basis of cryptographic services like key generation, authentication and admission control. Cryptographic systems designed using ICMetric technology use unique measurable device features to form a root of trust. This paper uses the MEMS bias in a body wearable Shimmer sensor to create a device ICMetric. The ICMetric identity is used to generate cryptographic key to perform encryption and decryption of patients data which is being communicated to health professionals. The cloud based component of the proposed framework provides much needed distributed data processing and availability. The proposed schemes have been simulated and tested for conformance to high levels of security and performance.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Missing plane identification using doppler effect and distance method in satellite communication 卫星通信中多普勒效应与距离法的失联飞机识别
P. Valliammai, K. Ganapathy
{"title":"Missing plane identification using doppler effect and distance method in satellite communication","authors":"P. Valliammai, K. Ganapathy","doi":"10.1145/3018896.3025143","DOIUrl":"https://doi.org/10.1145/3018896.3025143","url":null,"abstract":"The impact of missing planes causes serious issues worldwide. Existing search and rescue operations are carried out by Search and Rescue Satellite Aided Tracking (SARSAT). This paper explains the small module of satellite aided tracking operation to rescue the flight that goes missing. With the prior known information of the path of the respective flight and the deployment of camera and Global Positioning System (GPS) in satellite, facilitates the identification of missing flight. The proposed work identifies the missing plane using Doppler effect through satellite communication principles. With respect to time and path tracking, the plane missing is confirmed. To identify the missing plane exact location, the proposed work uses Doppler effect and distance calculation method. constellation of satellites is positioned in lower orbits, to locate and give the position of the missing vessels. Further the search and rescue operation is performed by search and rescue forces using the information downlinked by the satellite.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129664589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信