Internet of Things and Cloud Computing最新文献

筛选
英文 中文
Developing Concatenative Based Text to Speech Synthesizer for Tigrigna Language Tigrigna语言中基于连接的文本到语音合成器的开发
Internet of Things and Cloud Computing Pub Date : 2020-10-28 DOI: 10.11648/j.iotcc.20200802.12
Mezgebe Araya Keletay, Hussien Seid Worku
{"title":"Developing Concatenative Based Text to Speech Synthesizer for Tigrigna Language","authors":"Mezgebe Araya Keletay, Hussien Seid Worku","doi":"10.11648/j.iotcc.20200802.12","DOIUrl":"https://doi.org/10.11648/j.iotcc.20200802.12","url":null,"abstract":"A Text-To-Speech (TTS) synthesizer is a computer-based system able to read any text and convert it into speech that resembles as closely as possible a native speaker of the language. This thesis describes the first Text-to-Speech (TTS) system for the Tigrigna language, using speech synthesis architecture in MATLAB. The TTS system is working based on concatenative synthesis and applying LPC technique. The performance of the system is measured and the quality of synthesized speech is assessed in terms of intelligibility and naturalness. The result of the synthesizer is evaluated in two ways, in word level and sentences level. The test results indicate in the word level is evaluated by NeoSpeech tool online and most of the words are recognizable. The overall performance of the system in the word level which is evaluated by NeoSpeech tool is found to be 78%. When it comes to the intelligibility and naturalness of the synthesized speech in the sentence level, it is measured in MOS scale and the overall intelligibility and naturalness of the system is found to be 3.28 and 3.27 respectively. The values of performance, intelligibility and naturalness are encouraging and show that diphone speech units are good candidates to develop fully functional speech synthesizer. But there are areas that can be improved. Inclusion of text analyzer to pronounce zonal dialects of the language and prosody generator are some of the things that need further investigation.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131900524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Review in Internet of Things 物联网中的安全审查
Internet of Things and Cloud Computing Pub Date : 2019-10-16 DOI: 10.11648/j.iotcc.20190703.14
F. Ali, Muhammad S. Khan, Hassan Akhtar
{"title":"Security Review in Internet of Things","authors":"F. Ali, Muhammad S. Khan, Hassan Akhtar","doi":"10.11648/j.iotcc.20190703.14","DOIUrl":"https://doi.org/10.11648/j.iotcc.20190703.14","url":null,"abstract":"In this decade, the exceedingly rising state of the art industry is internet of things where trillion devices will be connected. IoT is being appraised to transform the concept of communication. To support this paradigm shift, companies and organizations are endowing worthwhile attention with researchers and scholars. Internet of thing is lending a hand with its essential role to build a new and smart world in a smarter way where everything will be under the umbrella of it. The internet of things enables an overwhelming smartness to help the humankind with various entities and diverse applications. Although, it is greatest achievement in this decade but some prevails are being engendered calamitous situations with subject to security concerns such as threats, vulnerabilities, attacks in internet of things with its connected and inter-connected devices and objects. Some hazards are critically perilous and alarming to internet of things such as physical attacks, network attack, encryption attacks, software attacks, authorization, surveillance, identity theft, vandalism, secure communication and so on. The most salient concern and important part on internet of things is secure architecture of internet of things. In near future with the connectivity of billion or trillion devices, it would be very difficult to resolve the security issues for impending generations. In this paper, we reviewed different security architecture of IoT and highlighted the absence of security layer in all models.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128394014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Based Smart City with Vehicular Safety Monitoring 基于物联网的智慧城市与车辆安全监控
Internet of Things and Cloud Computing Pub Date : 2019-09-22 DOI: 10.11648/j.iotcc.20190703.11
Hitesh Mohapatra, Asmini Behura
{"title":"IoT Based Smart City with Vehicular Safety Monitoring","authors":"Hitesh Mohapatra, Asmini Behura","doi":"10.11648/j.iotcc.20190703.11","DOIUrl":"https://doi.org/10.11648/j.iotcc.20190703.11","url":null,"abstract":"A definition of a smart city can be defined as a city which works smartly, reduce human effort, and collects data from the various parameters that include students, devices, water supply network, classes, labs, transportation, information system, etc. and analysis the data for the future work. Our internet of things (IoT) based stimulated and conceptual model consists of various systems which collect data from the different parameters and send data to the central control room through the access point. Various sensors are used for different environment parameter which is controlled by the microcontroller unit (MCU). These systems are centrally controlled and managed. Each system has its limit or levels respectively. If data crosses the limit, then our model activates the alert system which is installed in different location of the city. The alert system also displays the precautions and safety tricks for public information. The collected data are stored in a central repository for the data analysis. The collected data are displayed for public information which is deployed in a different location. Our smart city model consists of web & speed monitoring system which includes a radar system to measure the vehicles speed. If the speed of a vehicle crosses the speed limit then web/CCTV camera gets activated and captures the video/imagery data of the responsible vehicle and collects the information like vehicle color, vehicle types, vehicle number, etc. and sent to the central control room. Central control room broadcast the information to the management so that the responsible vehicle can be caught.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125154348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Rise of Big Data and Cloud Computing 大数据和云计算的兴起
Internet of Things and Cloud Computing Pub Date : 2019-09-19 DOI: 10.11648/J.IOTCC.20190702.12
Mohaiminul Islam, Shamim Reza
{"title":"The Rise of Big Data and Cloud Computing","authors":"Mohaiminul Islam, Shamim Reza","doi":"10.11648/J.IOTCC.20190702.12","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20190702.12","url":null,"abstract":"Big Data has emerged in the past few years as a new paradigm providing abundant data and opportunities to improve and/or enable research and decision-support applications with unprecedented value for digital earth applications including business, sciences and engineering. At the same time, Big Data presents challenges for digital earth to store, transport, process, mine and serve the data. Cloud computing provides fundamental support to address the challenges with shared computing resources including computing, storage, networking and analytical software; the application of these resources has fostered impressive Big Data advancements. This paper surveys the two frontiers – Big Data and cloud computing – and reviews the advantages and consequences of utilizing cloud computing to tackling Big Data in the digital earth and relevant science domains. While Big Data is responsible for data storage and processing, the cloud provides a reliable, accessible, and scalable environment for Big Data systems to function. Big Data is defined as the quantity of digital data produced from different sources of technology, for example, sensors, digitizers, scanners, numerical modeling, mobile phones, Internet, videos, social networks. Cloud Computing and Big Data are complementary to each other. Rapid growth in Big Data is regarded as a problem. Clouds are evolving and providing solutions for the appropriate environment of Big Data while traditional storage cannot meet the requirements for dealing with Big Data, in addition to the need for data exchange between various distributed storage locations. Cloud Computing provides solutions and addresses problems with Big Data. Big data and Cloud computing both the technologies are valuable on its own. Furthermore, many businesses are targeting to combine the two techniques to reap more business benefits. Both the technologies aim to enhance the revenue of the company while reducing the investment cost. While Cloud manages the local software, Big data helps in business decisions. In paper introduces the relationship between Big Data and Cloud Computing, Cloud Computing role of Big Data, advantages of Big Data and Cloud computing, cloud architecture, importance of Cloud Computing.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114798961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Efficient Hardware Implementation of Modular Arithmetic and Group Operation Over Prime Field 素数域上模运算和群运算的高效硬件实现
Internet of Things and Cloud Computing Pub Date : 2019-06-15 DOI: 10.11648/J.IOTCC.20190701.15
Sakib Absar, Selim Hossain, Yinan Kong
{"title":"Efficient Hardware Implementation of Modular Arithmetic and Group Operation Over Prime Field","authors":"Sakib Absar, Selim Hossain, Yinan Kong","doi":"10.11648/J.IOTCC.20190701.15","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20190701.15","url":null,"abstract":"The need for secure communication over the network has increased drastically over recent years, and Elliptic Curve Cryptography (ECC) carries out a significant role in moving secured information. In this work, a hardware implementation of modular arithmetic and group operations over the prime field for an Elliptic Curve Cryptography Processor (ECP) for an efficient security system is proposed. The modular addition or subtraction operation takes only one clock cycle and the modular multiplication, which is designed using the interleaved modular multiplication method, requires 257 clock cycles. For elliptic curve group operation separate point doubling (PD) and point addition (PA) architectures are implemented in Jacobean coordinates. These new architectures are simulated in a Xilinx ISE 14.7. After that, the architectures are implemented in Xilinx Virtex-7 field-programmable gate array (FPGA) with the VHDL language. Proposed modular arithmetic and group operations can be utilized to design an Elliptic Curve Point Multiplication (ECPM).","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modifying Broker Policy for Better Distribution of the Load Over Geo-distributed Datacenters 修改代理策略以更好地在地理分布的数据中心上分配负载
Internet of Things and Cloud Computing Pub Date : 2019-06-15 DOI: 10.11648/J.IOTCC.20190701.14
Louai Sheikhani, Weichao Ding, J. Talwana, C. Gu
{"title":"Modifying Broker Policy for Better Distribution of the Load Over Geo-distributed Datacenters","authors":"Louai Sheikhani, Weichao Ding, J. Talwana, C. Gu","doi":"10.11648/J.IOTCC.20190701.14","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20190701.14","url":null,"abstract":"As an increasing number of businesses move toward Cloud based services, issues such as reduce response time, optimize cost, and load balance over data centers are important factor that need to be studied. Selecting the suitable data center to handle the user request is affecting those factors directly. The Broker policy determines which data center should service the request from each user base; so choosing appropriate policy can improve the performance noticeably. One of the benchmarks policies is service proximity-based that routing the request to the data center, which has lowest network latency or minimum transmission delay from a user base. If there are more than one data centers in a region in close proximity, then one of the data centers is selected at random to service the incoming request. However, other factors such as cost, workload, number of virtual machines, processing time etc., are not taken into consideration. Randomly selected data center gives undesirable results in terms of response time, data processing time, cost, and other parameters. this work propose modifying that policy by applying new schedule algorithm that control the load balance. the results showed that the using of this algorithm instead of the random selection would improve the distribution of the workload over the available datacenters noticeably.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134067971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effectiveness Level of Online Plagiarism Detection Tools in Arabic 阿拉伯语在线抄袭检测工具的有效性水平
Internet of Things and Cloud Computing Pub Date : 2019-05-23 DOI: 10.11648/J.IOTCC.20190701.13
Ghadah Adel, Yuping Wang
{"title":"Effectiveness Level of Online Plagiarism Detection Tools in Arabic","authors":"Ghadah Adel, Yuping Wang","doi":"10.11648/J.IOTCC.20190701.13","DOIUrl":"https://doi.org/10.11648/J.IOTCC.20190701.13","url":null,"abstract":"Plagiarism affects education quality, academic research results and publishers reputation. Consequently, many online plagiarism tools have been developed to detect and reduce such affects. However, most of these tools were evaluated according to their abilities to reveal different rates of plagiarism in English text. While evaluating their capability in detecting different plagiarism rates from different patterns in Arabic text is still vague. This paper aims to evaluate the efficiency level of online academic plagiarism detection tools (PlagScan, iThenticate and CheckForPlagiarism.net) in detecting different plagiarism patterns’ amounts in Arabic language. A comparison was made between, PlagScan, iThenticate and CheckForPlagiarism.net, detection capabilities by merging university theses and dissertations with eight plagiarism patterns (whole document, some parts, insertion, sentence split or join, phrase reordering, syntax, lexical and morpho-syntactic) with the ratio between 90% , 30% and 10% respectively. Experiment’s results showed that iThenticate is the most efficient online plagiarism detection tool in Arabic for eight plagiarism patterns between 90% and 80% ratio Arabic language. While none of the three online plagiarism detection tools are efficient for less than 80% plagiarized text from any of the eight plagiarism patterns. Hence, mechanism enhancements and consideration to the Arabic anguage structure are recommended for online plagiarism detection tool in Arabic.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124849102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Development of Internet of Vehicles Technology 车联网技术发展研究
Internet of Things and Cloud Computing Pub Date : 2019-02-01 DOI: 10.11648/j.iotcc.20190701.12
Ying Pan
{"title":"Research on the Development of Internet of Vehicles Technology","authors":"Ying Pan","doi":"10.11648/j.iotcc.20190701.12","DOIUrl":"https://doi.org/10.11648/j.iotcc.20190701.12","url":null,"abstract":"Internet of vehicles (IOV) is a large interactive network composed of vehicles' position, speed, route and other information. Through global positioning system (GPS), radio frequency identification (RFID), sensor, camera image processing and other devices, the vehicle can complete its own environment and state information collection; Through Internet technology, all vehicles can transfer all kinds of information to the central processing unit (CPU). Through computer technology, this mass of vehicle information can be analyzed and processed to calculate the best route for different vehicles, timely report the road condition and so forth. The development of IOV will have a comprehensive driving effect on social construction in many aspects, such as intelligent traffic management, energy conservation, emission reduction and safe driving. In general, mature industrial base, huge consumer market and important strategic significance make the IOV become the focus of large-scale development and application of the IOV in the industry in the world, which has won strong attention from all parties. There is no strict definition for the so-called IOV. To put it simply, it is to realize the coordinated interaction of people, vehicles, roads and the environment through wireless communication and other means by taking cars as nodes in the information network, so as to realize intelligent transportation. However, since its birth, the IOV has always been faced with the lack of a unified management situation. In this paper, we studied the main technology involved in the IOV, the existing problems and so on.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115586236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boundedness and Asymptotic Behaviour of the Solutions for a Third- Order Fuzzy Difference Equation 一类三阶模糊差分方程解的有界性和渐近性
Internet of Things and Cloud Computing Pub Date : 2019-01-30 DOI: 10.11648/j.iotcc.20190701.11
Xiaotong Jing, Yonghong Li, Changyou Wang
{"title":"Boundedness and Asymptotic Behaviour of the Solutions for a Third- Order Fuzzy Difference Equation","authors":"Xiaotong Jing, Yonghong Li, Changyou Wang","doi":"10.11648/j.iotcc.20190701.11","DOIUrl":"https://doi.org/10.11648/j.iotcc.20190701.11","url":null,"abstract":"Our aim in this paper is to investigate the dynamics of a third-order fuzzy difference equation. By using new iteration method for the more general nonlinear difference equations and inequality skills as well as a comparison theorem for the fuzzy difference equation, some sufficient conditions which guarantee the existence, unstability and global asymptotic stability of the equilibriums for the nonlinear fuzzy system are obtained. Moreover, some numerical solutions of the equation describing the system are given to verify our theoretical results.","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132077984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Village Health System IoT to Envisage Chronical Disease Using Artificial Neural Network 智慧村庄医疗系统物联网利用人工神经网络设想慢性疾病
Internet of Things and Cloud Computing Pub Date : 1900-01-01 DOI: 10.11648/j.iotcc.20210904.11
Muhammad Yousif, Akifa Abbas, Zahid Hasan, Danish Ali, Muhammad Sarfraz
{"title":"Smart Village Health System IoT to Envisage Chronical Disease Using Artificial Neural Network","authors":"Muhammad Yousif, Akifa Abbas, Zahid Hasan, Danish Ali, Muhammad Sarfraz","doi":"10.11648/j.iotcc.20210904.11","DOIUrl":"https://doi.org/10.11648/j.iotcc.20210904.11","url":null,"abstract":"","PeriodicalId":173948,"journal":{"name":"Internet of Things and Cloud Computing","volume":"50 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120924234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信